cyber security Crossword Puzzles

CYBER BULLYING 2024-07-25

CYBER BULLYING crossword puzzle
Across
  1. someone who control a certain thing
  2. when a hateful person does mean things online
  3. someone who stand up for the victim
  4. the web we share
Down
  1. a code you make to secure your information
  2. a witness who ignores the bully
  3. being safe online

7 Clues: the web we sharebeing safe onlinea witness who ignores the bullysomeone who control a certain thingsomeone who stand up for the victima code you make to secure your informationwhen a hateful person does mean things online

Crossing Cyber 2023-07-27

Crossing Cyber crossword puzzle
Across
  1. It is a way of communicating amongst one another around the world along with expressing oneself through this
  2. It is a way of insulting or taking control of one's feelings and toying with them
  3. A type of advancement into society that helps to perform tasks for humans entertainment and/or convenience
Down
  1. The act of doing something illegal
  2. A word or phrase that has the ability of hurting a person mentally or emotionally
  3. A technological device that helps one to do work with a digital means
  4. The act of invading through one's software and leaking, invading or messing one's personal information

7 Clues: The act of doing something illegalA technological device that helps one to do work with a digital meansA word or phrase that has the ability of hurting a person mentally or emotionallyIt is a way of insulting or taking control of one's feelings and toying with them...

Cyber Wellness 2023-02-01

Cyber Wellness crossword puzzle
Across
  1. respect peoples o________
  2. info do not reveal your p________I____
  3. we cannot share our home a______ to others
Down
  1. our personal p____________ is not suppose to be share
  2. i_________ is needed to do work
  3. Think before you p_____
  4. we unlock your phone p___________

7 Clues: Think before you p_____respect peoples o________i_________ is needed to do workwe unlock your phone p___________info do not reveal your p________I____we cannot share our home a______ to othersour personal p____________ is not suppose to be share

Cyber attacks 2023-05-26

Cyber attacks crossword puzzle
Across
  1. AI-enabled attacks occur when a threat actor uses AI to assist in an attack
  2. is a blanket term for any kind of computer software with malicious intent.
  3. is the act of intimidating, threatening, or coercing people online through the use of digital or electronic methods such as social media, email, text messages, or blog posts
Down
  1. The term vandalism describes the deliberate act of damaging or destroying another person or company's property without their permission.
  2. theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  3. a data breach exposes confidential, sensitive, or protected information to an unauthorized person.
  4. is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM), or messages posted to a discussion group or forum.

7 Clues: is a blanket term for any kind of computer software with malicious intent.AI-enabled attacks occur when a threat actor uses AI to assist in an attacka data breach exposes confidential, sensitive, or protected information to an unauthorized person....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. Online fights using electronic messages
  2. Talking someone into revealing their secrets and sharing them online.
  3. A disease.
  4. Type of bulling.
Down
  1. Copying someone's work.
  2. Sending nasty, mean, and insulting messages.
  3. When someone steals your personal information.

7 Clues: A disease.Type of bulling.Copying someone's work.Online fights using electronic messagesSending nasty, mean, and insulting messages.When someone steals your personal information.Talking someone into revealing their secrets and sharing them online.

Cyber techniques 2024-11-18

Cyber techniques crossword puzzle
Across
  1. Examining server and network records to trace unauthorized access
  2. Working across borders to catch international cybercriminals.
  3. A phrase used to describe how investigators trace stolen money
  4. Collaborating with social media and telecom companies for metadata.
Down
  1. Identifying patterns of suspicious online behavior using Artificial Intelligence
  2. Recovering lost or hidden data from digital devices
  3. Analyzing the behavior and tactics of suspects

7 Clues: Analyzing the behavior and tactics of suspectsRecovering lost or hidden data from digital devicesWorking across borders to catch international cybercriminals.A phrase used to describe how investigators trace stolen moneyExamining server and network records to trace unauthorized access...

cyber ethics 2025-05-21

cyber ethics crossword puzzle
Across
  1. it refers to an illegal intrusion into a computer
  2. it refers to being aware of the ethical practiceswhile using internet
  3. it is also known as digital dossier
  4. a licence or copyright is required to copy the genuine programs
Down
  1. it refers to unwanted bulk emails that come from unknown sources
  2. it refers to criminal activites that involves the use of internet
  3. it refers to using the language and thoughts of another person

7 Clues: it is also known as digital dossierit refers to an illegal intrusion into a computerit refers to using the language and thoughts of another persona licence or copyright is required to copy the genuine programsit refers to unwanted bulk emails that come from unknown sourcesit refers to criminal activites that involves the use of internet...

Cyber Safety 2021-05-25

Cyber Safety crossword puzzle
Across
  1. Protect your account by using a strong ______________.
  2. Someone who uses a computer to gain access to unauthorised access to other's details.
  3. A ______________ scam is used by online scammers to trick you into giving out your personal information by pretending to come from legitimate sources.
Down
  1. stop and think before you open attachments and click on ______________.
  2. Be ______________ when something is too good to be true!
  3. Do not accept friend requests from ______________.
  4. Do not give out ______________ information to strangers.

7 Clues: Do not accept friend requests from ______________.Protect your account by using a strong ______________.Be ______________ when something is too good to be true!Do not give out ______________ information to strangers.stop and think before you open attachments and click on ______________....

Cyber Bulling 2013-09-09

Cyber Bulling crossword puzzle
Across
  1. Physically or emotionally injuring someone.
  2. A target of social cruelty.
  3. The most popular social networking system with over 100 million active users making profiles that give off too much personal information
  4. Intentionally excluding someone from an online group cruelly
Down
  1. A place where people like to talk on the internet.
  2. Talking someone into revealing secrets or embarrassing information about someone and then sharing it online
  3. An agressor or someone who is causing harm.

7 Clues: A target of social cruelty.Physically or emotionally injuring someone.An agressor or someone who is causing harm.A place where people like to talk on the internet.Intentionally excluding someone from an online group cruellyTalking someone into revealing secrets or embarrassing information about someone and then sharing it online...

Cyber safety 2013-11-03

Cyber safety crossword puzzle
Across
  1. Websites that have places to chat and post things
  2. A person who sees bullying
  3. Something that can be harmful to your laptop or computer
  4. Copy others work
Down
  1. A person who uses the internet to intimidate another person
  2. A form of communication using the internet
  3. A person who is being bullied

7 Clues: Copy others workA person who sees bullyingA person who is being bulliedA form of communication using the internetWebsites that have places to chat and post thingsSomething that can be harmful to your laptop or computerA person who uses the internet to intimidate another person

Cyber Burnout 2022-04-18

Cyber Burnout crossword puzzle
Across
  1. Making sure your ___ are not suffering.
  2. Addicted to online ___ life.
  3. Too much screen time may cause eye___.
  4. The online platform.
Down
  1. Feeling ___ from the real world.
  2. Be ___, track your online usage.
  3. Something active you can do offline.

7 Clues: The online platform.Addicted to online ___ life.Feeling ___ from the real world.Be ___, track your online usage.Something active you can do offline.Too much screen time may cause eye___.Making sure your ___ are not suffering.

CYBER RUN 2024-10-18

CYBER RUN crossword puzzle
Across
  1. Unauthorized access to data in a system
  2. A security system controlling network traffic
  3. A technique used to trick people into giving up sensitive information
Down
  1. Software designed to disrupt or gain unauthorized access to a system
  2. The process of converting information into a code to prevent access
  3. A secret word or phrase used to gain access to a system or account
  4. A type of malware that replicates and spreads to other computers

7 Clues: Unauthorized access to data in a systemA security system controlling network trafficA type of malware that replicates and spreads to other computersA secret word or phrase used to gain access to a system or accountThe process of converting information into a code to prevent accessSoftware designed to disrupt or gain unauthorized access to a system...

CYBER BULLYING 2024-07-25

CYBER BULLYING crossword puzzle
Across
  1. someone who control a certain thing
  2. when a hateful person does mean things online
  3. someone who stand up for the victim
  4. the web we share
Down
  1. a code you make to secure your information
  2. a witness who ignores the bully
  3. being safe online

7 Clues: the web we sharebeing safe onlinea witness who ignores the bullysomeone who control a certain thingsomeone who stand up for the victima code you make to secure your informationwhen a hateful person does mean things online

cyber bully? 2024-07-25

cyber bully? crossword puzzle
Across
  1. seek to harm,or intimidate
  2. person who speaks or acts in support
  3. person who habitually seeks to harm or intimidate
Down
  1. www is a system of interconnected public webpages accessible through the Internet.
  2. the use of technology to harass, threaten, embarrass, or target another person
  3. person who is present at an event or incidentbut doesnt participate
  4. Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person

7 Clues: seek to harm,or intimidateperson who speaks or acts in supportperson who habitually seeks to harm or intimidateperson who is present at an event or incidentbut doesnt participatethe use of technology to harass, threaten, embarrass, or target another personwww is a system of interconnected public webpages accessible through the Internet....

Cyber Crimes 2025-12-02

Cyber Crimes crossword puzzle
Across
  1. Unwanted or junk messages sent in large numbers, usually for advertising or scams
  2. theft Stealing someone’s personal information (like their name, ID number, or bank details) and pretending to be them to commit crimes.
  3. Tricking someone in order to steal their money, personal information, or valuables
Down
  1. Breaking into a computer system or network without permission to view, change, or steal information.
  2. Sending fake emails, messages, or websites that look real to trick people into giving away passwords, bank details, or personal information
  3. Illegally copying or sharing music, movies, software, or other digital content without permission.
  4. attack When a harmful program (virus) infects a computer, damages files, slows the system, or steals data.

7 Clues: Unwanted or junk messages sent in large numbers, usually for advertising or scamsTricking someone in order to steal their money, personal information, or valuablesIllegally copying or sharing music, movies, software, or other digital content without permission....

CYBER ETHICS 2025-05-28

CYBER ETHICS crossword puzzle
Across
  1. using someone else's work or ideas without giving credit
  2. the correct and acceptable behaviour when using the internet
  3. a crime that happens in the internet
Down
  1. behaving responsibly and being kind and respectful to online communication
  2. copying digital content without permission
  3. a code to protect your online informations
  4. someone who hacks your personal informations

7 Clues: a crime that happens in the internetcopying digital content without permissiona code to protect your online informationssomeone who hacks your personal informationsusing someone else's work or ideas without giving creditthe correct and acceptable behaviour when using the internet...

Module 6 Puzzle 2021-09-29

Module 6 Puzzle crossword puzzle
Across
  1. Do this to all unneeded programs/software
  2. Hackers who hack only for legal/ethical purposes
  3. This should be done to large networks to break them up into more manageable networks.
  4. The six Ps of security are: ports, patch, _____, probe, policies, & physical
  5. The process to look for vulnerabilites on a network
  6. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  8. Using interpersonal skills to extract information about a computer system and its security
  9. preferred location for storing backups
  10. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
  1. one of the most prestigious certifications for networking professionals
  2. A numerical designation for a connection point on a computer
  3. Someone who attempts to compromise a system to assess its vulnerability
  4. A reference to how long a user has used a password
  5. Searching through trash looking for information that might be useful in hacking or identity theft
  6. checking a target machine to see what ports are open
  7. The minimum frequency for system probing and audits
  8. A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
  9. Perform system patches, probe for flaws, check logs, and review policies
  10. The most basic rule of computer security is to install these as soon as they are available

20 Clues: preferred location for storing backupsDo this to all unneeded programs/softwareHackers who hack only for legal/ethical purposesA reference to how long a user has used a passwordThe minimum frequency for system probing and auditsThe process to look for vulnerabilites on a networkchecking a target machine to see what ports are open...

Cybersecurity 2025-06-29

Cybersecurity crossword puzzle
Across
  1. Code used to take advantage of a vulnerability
  2. Isolated environment used to test software safely
  3. Hidden method to bypass normal authentication
  4. Malware that hides its presence and grants admin access
  5. Device that filters network traffic to enhance security
  6. Malicious software designed to harm or compromise systems
  7. Network of infected devices controlled remotely
  8. Deceptive technique to steal confidential information
  9. Manipulation technique to trick people into giving information
  10. Detection of unauthorized access or suspicious activity
  11. Unauthorized access to confidential data
  12. Process of verifying the identity of a user or device
  13. Attack that floods a network or server to disrupt service
  14. Deliberate attempt to damage or access a computer system
  15. Program that records every keystroke typed
  16. Impersonation technique to deceive systems or users
  17. Security method that requires two forms of identification
Down
  1. Rule-based barrier that blocks or allows network traffic
  2. Process of converting data into an unreadable format for protection
  3. Digital file used to prove the identity of a website or user
  4. Update to fix security vulnerabilities in software
  5. Malware that encrypts files and demands payment for access
  6. Software that detects and removes malicious programs
  7. Virtual private network that encrypts internet connections
  8. Weakness in a system that can be exploited by attackers
  9. Function that converts data into a fixed-size string
  10. Vulnerability unknown to developers and without a fix
  11. Decoy system used to lure and monitor attackers
  12. Malware disguised as legitimate software
  13. Software that secretly collects user information

30 Clues: Unauthorized access to confidential dataMalware disguised as legitimate softwareProgram that records every keystroke typedHidden method to bypass normal authenticationCode used to take advantage of a vulnerabilityNetwork of infected devices controlled remotelyDecoy system used to lure and monitor attackers...

Chapter 2 Crossword 2025-11-14

Chapter 2 Crossword crossword puzzle
Across
  1. order order where you want to buy or sell when the stock reaches a certain price
  2. Policy action taken to manage supply of money and interest rates
  3. ensures people's accounts up to $250,000
  4. financial investment issued by a corporation or the government
  5. Bill security that matures in a year or less
  6. Bank financial institution that provides services for businesses
  7. Company For profit buisness that sells insurance produces
  8. Firm institution involved in trading securities in fiancial markets
  9. bond security that pays interest over terms of 10-30 years
  10. Company Makes money by issuing loans
  11. document guaranteering payment of a specific amount of money (named on document)
  12. cards allow customers to pay for purchases and withdraw cash
  13. of value money is a common measure of the worth or price of a good or service
  14. someone who assists you with purchasing stocks and bonds
  15. System mechanism a nation uses to provide and manage money for itself
Down
  1. people who buy shares of stock in the company
  2. Note security that pays interest over 2 to 10 years
  3. Market Accounts has low risk/low return
  4. handles stock sales and purchases
  5. of value money can be saved and used at later date
  6. Banks largest category of deposit institutions
  7. Deposit money is directly deposited into a customers checking account
  8. Capitalization has intermediate risk in investment
  9. Accounts for sophisticated borrowers who borrow money to purchase securities
  10. financial institution that accepts money from customers and deposits it into their account
  11. Stocks has high risk investment
  12. Reserve central bank of the United States
  13. Union nonprofit financial institution that is privately owned and provides banking services for its members
  14. limited liability corporation
  15. Online Banking allows this

30 Clues: Online Banking allows thislimited liability corporationhandles stock sales and purchasesensures people's accounts up to $250,000Market Accounts has low risk/low returnpeople who buy shares of stock in the companyReserve central bank of the United StatesStocks has high risk investment...

week 1 be cyber smart 2021-09-21

week 1 be cyber smart crossword puzzle
Across
  1. part of MFA
  2. you don't want to reuse this
  3. Cleanliness
Down
  1. what you want 2 across to be
  2. insititue of cyber best practices

5 Clues: part of MFACleanlinesswhat you want 2 across to beyou don't want to reuse thisinsititue of cyber best practices

Airport Crossword 2023-01-26

Airport Crossword crossword puzzle
Across
  1. flight
  2. tourist office
  3. to land
  4. to get in line
  5. to go through security
  6. passenger
  7. gate
  8. arrival
  9. to go through customs
  10. to take a taxi
Down
  1. baggage claim
  2. airport
  3. monitor
  4. train station
  5. flight attendent
  6. to board
  7. bus stop
  8. to take off
  9. to chekc ones luggage

19 Clues: gateflightairportmonitorto landarrivalto boardbus stoppassengerto take offbaggage claimtrain stationtourist officeto get in lineto take a taxiflight attendentto chekc ones luggageto go through customsto go through security

Aviation 2024-06-08

Aviation crossword puzzle
Across
  1. ministry of something
  2. everyone has access
  3. a kind of traveller
  4. cabin
  5. a sort of security
  6. kind of operations
  7. ramp
  8. organisation
  9. a sort of system
Down
  1. a kind of traveller
  2. only travellers have access
  3. explosive
  4. traffic
  5. passenger what
  6. service
  7. stairs
  8. operator
  9. agent
  10. Aviation
  11. officer

20 Clues: rampcabinagentstairstrafficserviceofficeroperatorAviationexplosiveorganisationpassenger whata sort of systema sort of securitykind of operationsa kind of travellereveryone has accessa kind of travellerministry of somethingonly travellers have access

Chapter 10.1 Vocabulary 2014-05-14

Chapter 10.1 Vocabulary crossword puzzle
Across
  1. to leave
  2. plane ticket
  3. to begin a trip
  4. arrival
  5. there
  6. to take a trip
  7. to board
  8. ID
  9. airport
Down
  1. to wait in line
  2. security checkpoint
  3. airplane
  4. customs
  5. wallet
  6. to change money
  7. to wait
  8. travel bag, purse

17 Clues: IDtherewalletarrivalcustomsto waitairportto leaveairplaneto boardplane ticketto take a tripto wait in lineto begin a tripto change moneytravel bag, pursesecurity checkpoint

File 3A Air Travel 2 2020-11-29

File 3A Air Travel 2 crossword puzzle
Across
  1. застегнуть
  2. выход на посадку
  3. стыковочный рейс
  4. синдром смены часовых поясов
  5. путь, дорога
  6. садиться в самолёт
  7. верхняя багажная полка
  8. приземляться
  9. забирать (багаж)
Down
  1. спасательный жилет
  2. по расписанию
  3. место получения багажа
  4. багаж
  5. отправление
  6. проход
  7. авиационная безопасность
  8. посадочный талон

17 Clues: багажпроходзастегнутьотправлениепуть, дорогаприземлятьсяпо расписаниювыход на посадкустыковочный рейспосадочный талонзабирать (багаж)спасательный жилетсадиться в самолётместо получения багажаверхняя багажная полкаавиационная безопасностьсиндром смены часовых поясов

ENA4 Topic 1 2023-08-13

ENA4 Topic 1 crossword puzzle
Across
  1. saavutus
  2. abstrakti, käsitteen tasolla oleva
  3. kansallinen identiteetti
  4. yleinen; yleisesti
  5. varallisuus, toimeentulo
  6. terveys
  7. turvallisuudentunne
  8. yksilöllisyys
  9. konkreettinen, "käsin kosketeltava", varsinainen
Down
  1. ympäristö
  2. keskeinen arvo
  3. tämänhetkinen, nykyinen
  4. yhteiskunta
  5. etnisyys, etninen tausta, "kansallisuus"
  6. yhteisö
  7. itseilmaisu
  8. työllisyys

17 Clues: yhteisöterveyssaavutusympäristötyöllisyysyhteiskuntaitseilmaisuyksilöllisyyskeskeinen arvoyleinen; yleisestiturvallisuudentunnetämänhetkinen, nykyinenkansallinen identiteettivarallisuus, toimeentuloabstrakti, käsitteen tasolla olevaetnisyys, etninen tausta, "kansallisuus"konkreettinen, "käsin kosketeltava", varsinainen

security 2022-05-19

security crossword puzzle
Across
  1. defpassword
  2. defsmishing
  3. deffirewall
Down
  1. defphishing
  2. defvulnerability

5 Clues: defpassworddefphishingdefsmishingdeffirewalldefvulnerability

Security 2024-01-30

Security crossword puzzle
Across
  1. used to secure computer
  2. letting someone follow
Down
  1. getting ___
  2. to work on
  3. scam

5 Clues: scamto work ongetting ___letting someone followused to secure computer

Computer Professions and Cyber crimes 2022-03-28

Computer Professions and Cyber crimes crossword puzzle
Across
  1. - a technique of tricking a user into clicking on something different from what the user perceives. (deprecated attack)
  2. - A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
  3. - is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  4. - is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
  5. - is gaining unauthorized access to a computer system via another user's legitimate connection.
  6. - is an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later.
  7. gap (networking) - It is a network security measure used on one or more computers to ensure the physical isolation of a secure computer network from unsecured networks, such as the public Internet or an unsecured local area network.
  8. - attack in which a person or a program successfully identifies as another by falsifying a data.
  9. (computing) - is a method of bypassing normal authentication procedures, usually through a network connection such as the Internet.
  10. - is the theft of money from the card to your card, account, account in the payment system, as well as the purchase of goods using someone else's credit card. Most often, carders use cash withdrawals, the purchase of branded clothing or electronics.
  11. – it refers to any video in which faces have been either swapped or digitally altered, with the help of AI.
  12. - is the area of development that refers to the server-side development. It focuses on databases, scripting, and website architecture.
  13. - is the area of development that refers to the client-side development. It is the development of the graphical user interface of a website.
  14. (horse) - is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.
Down
  1. - Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
  2. - when a person builds an online relationship with a young person and tricks or pressures him/ her into doing a sexual act.
  3. request forgery (CSRF) - a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. (also deprecated)
  4. slicing - attack in which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
  5. - A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  6. - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
  7. - type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web.
  8. - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.
  9. - is a cyberattack in which spam emails, or other forms of communication, are sent en masse, with the intention of tricking recipients into doing something that undermines their security or the security of the organization they work for.
  10. - is a set of computer programs, usually malicious, designed to provide access to a computer or an area of its software that is otherwise prohibited.
  11. (denial of service attack) - is a cyberattack in which a criminal wants to make a computer or network resource inaccessible to users by disrupting the services of a host connected to the network. Denial of service is usually achieved by filling a resource with redundant requests to overload systems and prevent legitimate requests from being executed.
  12. - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
  13. - an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.

27 Clues: - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.- is gaining unauthorized access to a computer system via another user's legitimate connection.- attack in which a person or a program successfully identifies as another by falsifying a data....

JUMPING THE LIGHTS 2023-12-05

JUMPING THE LIGHTS crossword puzzle
Across
  1. bei Rot über die Ampel fahren
  2. Fahrverbot
  3. Betroffener
  4. wohnhaft
  5. ZBS
  6. zugeben
  7. Anzeigenformular
  8. Haltelinie
  9. beobachten
  10. Sicherheitsleistung
Down
  1. Ampelanlage
  2. Rotlichtverstoß
  3. abstreiten
  4. übersehen
  5. Zustellungsbevollmächtigter

15 Clues: ZBSzugebenwohnhaftübersehenFahrverbotabstreitenHalteliniebeobachtenAmpelanlageBetroffenerRotlichtverstoßAnzeigenformularSicherheitsleistungZustellungsbevollmächtigterbei Rot über die Ampel fahren

Safety Week 2021 2021-09-08

Safety Week 2021 crossword puzzle
Across
  1. being aware of your surroundings
  2. A safe location in a high wind or tornado situation
  3. Who sends out safety messages on Pulse?
  4. Options in an active shooter situation
  5. what animal do you walk like on snow or ice?
  6. What is the name of the suicide project?
Down
  1. What is the name of DMU's emergency text system?
  2. Who do you contact with a COVID situation?
  3. who you call if you need a security escort
  4. Short for Floor Emergency Coordinators
  5. what you should have in your home to put out fires
  6. short for wireless emergency alerts
  7. Short for Automatic External Defibulator

13 Clues: being aware of your surroundingsshort for wireless emergency alertsShort for Floor Emergency CoordinatorsOptions in an active shooter situationWho sends out safety messages on Pulse?Short for Automatic External DefibulatorWhat is the name of the suicide project?Who do you contact with a COVID situation?who you call if you need a security escort...

PE&TS Q3 Team Meeting 2023-09-07

PE&TS Q3 Team Meeting crossword puzzle
Across
  1. IT Control Management
  2. Information for Risk Assessor Dashboard
  3. Unauthorized Software Detection & Investigation
  4. I am the guardian of Privileged Access Management
  5. System Security General Practices
  6. I completed my COMPTIA certification with flying colors!
  7. You don't want to mess with me. I got a Purple belt in Jujitsu
Down
  1. I celebrated my national day on 7th September!
  2. Security, Privacy, Availability, Confidentiality, Process Integrity
  3. IT objects ownership data extraction by individual in scope
  4. I make sure the 'Big Red Button' is ready
  5. IT objects ownership data extraction by functional organization in scope
  6. IT System Information Request

13 Clues: IT Control ManagementIT System Information RequestSystem Security General PracticesInformation for Risk Assessor DashboardI make sure the 'Big Red Button' is readyI celebrated my national day on 7th September!Unauthorized Software Detection & InvestigationI am the guardian of Privileged Access Management...

Robotics 2017-02-09

Robotics crossword puzzle
Across
  1. A car company that makes robots?
  2. A dishwasher is this type of machinery?
  3. A film that includes robots?
  4. A metal used to make robots?
  5. You need to do this to make your robot carry out a command?
Down
  1. The Cyber men come from this T.V series?
  2. A repetitive task carried out by robots?
  3. A high precision task carried out by a robot?

8 Clues: A film that includes robots?A metal used to make robots?A car company that makes robots?A dishwasher is this type of machinery?The Cyber men come from this T.V series?A repetitive task carried out by robots?A high precision task carried out by a robot?You need to do this to make your robot carry out a command?

NATO Nuggets Crossword Puzzle 2022-03-23

NATO Nuggets Crossword Puzzle crossword puzzle
Across
  1. A NATO ______ ______ is a security manager or SSR designated to officially process and log classified NATO material.
  2. US-marked information _____ overrides NATO-marked information.
  3. A political-military alliance currently comprised of 30 member countries, including the United States.
  4. ATOMAL material must be filed ________ from non-ATOMAL material.
  5. When NATO was formed in 1949, how many member countries were there?
  6. Where are NATO read-ons stored?
  7. NATO HQ is located in _______.
Down
  1. Printing NATO classified is a last _____.
  2. The NATO ______ is a permission-restricted library of shared classified NATO documents.
  3. EUCOM's NATO Sub-Registry Office/INFOSEC encourages the sharing of NATO classified information in the _____ format.
  4. How is NATO SECRET information residing inside a U.S. document marked?
  5. The principle that an attack against one or several NATO members is considered an attack against all is called the principle of ________ defense.
  6. The governing document for the implementation of NATO security requirements.
  7. How often does EUCOM's NATO Sub-Registry Manager have to report printed CTS and ATOMAL material to the Central US Registry (CUSR)?
  8. The physical security requirements for NATO CONFIDENTIAL and above are the ____ as for US material of the same level of classification.
  9. HQ USEUCOM's commander concurrently serves as NATO's _______ Allied Commander (SACEUR).

16 Clues: NATO HQ is located in _______.Where are NATO read-ons stored?Printing NATO classified is a last _____.US-marked information _____ overrides NATO-marked information.ATOMAL material must be filed ________ from non-ATOMAL material.When NATO was formed in 1949, how many member countries were there?...

Deborah Chen 8L : Social Engineering 2023-02-02

Deborah Chen 8L : Social Engineering crossword puzzle
Across
  1. an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to tick them into providing valuable data.
  2. ( also known as shoulder surfing.)
  3. baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.
  4. an attack that was designed from cyber criminals to make up fun quizzes or questions to find out more about their information.
Down
  1. a set of methods used by cyber criminals to deceive individuals into handing over info that they can use for fraudulent purposes.
  2. an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money.

6 Clues: ( also known as shoulder surfing.)baiting attacks use a false promise to take advantage of a victim’s greed or curiosity.an attack in which the perpetrator invents a scenario in order to continue the victim to give them data or money....

week 1 be cyber smart 2021-09-21

week 1 be cyber smart crossword puzzle
Across
  1. part of MFA
  2. you don't want to reuse this
  3. Cleanliness
Down
  1. what you want 2 across to be
  2. insititue of cyber best practices

5 Clues: part of MFACleanlinesswhat you want 2 across to beyou don't want to reuse thisinsititue of cyber best practices

KELAS 7.4 ARYO KURNIAWAN 2023-05-10

KELAS 7.4 ARYO KURNIAWAN crossword puzzle
Across
  1. sebuah platform media sosial yang diciptakan pada tahun 2005
  2. aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat
  3. perlindungan mengekpresikan identitas diri atau kepribadian melalui pembicaraan atau kegiatan
  4. tahun 2004 diciptakan
Down
  1. tahun 1995 lahir situs
  2. sebuah pembelajaran yang dilakukan tanpa tatap muka langsung disebut
  3. pada tahun 2010 diciptakan apk sosial pertama
  4. BOLYING dampak negatif penggunaan tik
  5. aplikasi yang muncul pada tahun 2006 sebagi situs jejaring sosial yang lebih simpel
  6. salah satu apk yang digunakan untuk buat konten

10 Clues: tahun 2004 diciptakantahun 1995 lahir situsBOLYING dampak negatif penggunaan tikpada tahun 2010 diciptakan apk sosial pertamasalah satu apk yang digunakan untuk buat kontensebuah platform media sosial yang diciptakan pada tahun 2005aplikasi media sosial yang lahir pada tahun 2002 yang tumbuh pesat...

Our digital lives 2024-06-02

Our digital lives crossword puzzle
Across
  1. - a person who lost interest to live.
  2. - an online journal that offers regularly updated content.
  3. - a currently popular and widely discussed
  4. Feeling a strong need to do something.
  5. - The application of scientific knowledge to the practical aims of human life.
Down
  1. bullying - Use of online apps to harm someone.
  2. - A software program that is designed to perform a specific function.
  3. - The action of sending something to someone.
  4. A person who is not identified by the name.
  5. - A verbal or written remark.

10 Clues: - A verbal or written remark.- a person who lost interest to live.Feeling a strong need to do something.- a currently popular and widely discussedA person who is not identified by the name.- The action of sending something to someone.bullying - Use of online apps to harm someone.- an online journal that offers regularly updated content....

Bully Free, That's ME 2024-10-22

Bully Free, That's ME crossword puzzle
Across
  1. It takes______ to stand up to bullies.
  2. The first thing we do when we see bullying.
  3. This type of bullying hurts your body.
  4. mean and repeated behaviors.
  5. It is possible to be bullied by my friends.
  6. The third thing we do when we see bullying.
Down
  1. This type of bullying involves words and hurts your heart.
  2. The second thing we do when we see bullying.
  3. You should tell this person if you feel you are being bullied.
  4. This type of bullying occurs virtually.

10 Clues: mean and repeated behaviors.It takes______ to stand up to bullies.This type of bullying hurts your body.This type of bullying occurs virtually.The first thing we do when we see bullying.It is possible to be bullied by my friends.The third thing we do when we see bullying.The second thing we do when we see bullying....

UX Word Wizard - 1 2024-11-19

UX Word Wizard - 1 crossword puzzle
Across
  1. Temporary storage for data
  2. A small window that appears suddenly to convey information
  3. A component to scroll through images or content horizontally
  4. A clickable element that performs an action
  5. An indication that something went wrong during an interaction
Down
  1. The arrangement of elements on a page
  2. Regular updates sent via email to subscribers
  3. A cyber attack aimed at stealing sensitive user information
  4. A tool to refine or narrow down search results
  5. An area on a webpage for users to enter information

10 Clues: Temporary storage for dataThe arrangement of elements on a pageA clickable element that performs an actionRegular updates sent via email to subscribersA tool to refine or narrow down search resultsAn area on a webpage for users to enter informationA small window that appears suddenly to convey information...

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Refers to unwanted bulk emails that come from unknown sources
  2. The process of transforming data into an unreadable code
  3. Device that connects multiple networks
  4. It can be defined as the legal rules and restrictions imposed on online laws
Down
  1. Type of cyber attack that tricks users
  2. Wireless technology used to interconnect mobiles computers etc
  3. Network topology with a central hub
  4. Practice of protecting digital information
  5. It is a combination of two terms 'net' and 'etiquette'
  6. Refers to an illegal intrusion into a computer system or network

10 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Executive Branch, Presidency 2022-12-06

Executive Branch, Presidency crossword puzzle
Across
  1. Corporations
  2. Bureaucracy
  3. Order
  4. Sanctioning
  5. System
  6. Appointees
  7. Service System
Down
  1. Service Workers
  2. Agreement
  3. Security
  4. Policy
  5. Agencies
  6. College
  7. System

14 Clues: OrderPolicySystemSystemCollegeSecurityAgenciesAgreementAppointeesBureaucracySanctioningCorporationsService SystemService Workers

Executive Branch 2022-12-15

Executive Branch crossword puzzle
Across
  1. System
  2. Appointees
  3. College
  4. Agreement
  5. Security
Down
  1. Policy
  2. System
  3. Sanctioning
  4. Corporations
  5. Service System
  6. Agencies
  7. Bureaucracy
  8. Service Workers
  9. Order

14 Clues: OrderPolicySystemSystemCollegeAgenciesSecurityAgreementAppointeesSanctioningBureaucracyCorporationsService SystemService Workers

Computer Systems crossword 2014-09-09

Computer Systems crossword crossword puzzle
Across
  1. evidence
  2. facebook
  3. firewall
  4. security
  5. opposite of closed
  6. computing
Down
  1. blocked
  2. secure
  3. computer
  4. database
  5. recycle

11 Clues: secureblockedrecycleevidencecomputerdatabasefacebookfirewallsecuritycomputingopposite of closed

occupation 2022-09-29

occupation crossword puzzle
Across
  1. sweeper
  2. estate agent
  3. man
  4. hostess
  5. jockey
Down
  1. player
  2. guard
  3. driver
  4. Writer
  5. up artist
  6. driver
  7. diver

12 Clues: manguarddiverplayerdriverWriterdriverjockeysweeperhostessup artistestate agent

Science Project 2020-11-17

Science Project crossword puzzle
Across
  1. Detention
  2. Professor
  3. security guards
  4. Generators?
  5. Buses
Down
  1. teachers
  2. homework
  3. principal
  4. powerplants
  5. doors
  6. sucssesful students

11 Clues: doorsBusesteachershomeworkDetentionprincipalProfessorpowerplantsGenerators?security guardssucssesful students

CRUCIBOZZA 2022-10-20

CRUCIBOZZA crossword puzzle
Across
  1. E' il tuo noleggiatore di Ebike preferito
  2. Il tuo chef di risotti preferito
  3. Dove passa il Po'?
  4. Dove hai compiuto atti osceni in luogo pubblico (con la Cri)?
  5. ...Specializzazione medica più adatta per te
  6. Dall'alto della tua preparazione in Ortopedia: qual'è l'osso più grande del carpo?
Down
  1. Altezza della Mole Antonelliana
  2. Il tuo Cyber partner
  3. ...Non è il tuo forte
  4. Per verificare il tuo 30L in Neuro: come si chiama la via della sensibilità?
  5. Dov'eri quando sei diventata uno "scoglio"?
  6. La maneggerà Riccardo nei prossimi anni
  7. Dov'eri quando ti è stato offerto un pezzo di legno per dormire?
  8. Dov'eri quando un gruppo di uomini ti hanno soccorsa?
  9. Recentemente ne hai preso uno MOLTO grosso
  10. Stefano ed Alfo ne hanno mangiate 2kg a testa un giorno

16 Clues: Dove passa il Po'?Il tuo Cyber partner...Non è il tuo forteAltezza della Mole AntonellianaIl tuo chef di risotti preferitoLa maneggerà Riccardo nei prossimi anniE' il tuo noleggiatore di Ebike preferitoRecentemente ne hai preso uno MOLTO grossoDov'eri quando sei diventata uno "scoglio"?...Specializzazione medica più adatta per te...

Test Your Cyber Vocabulary 2023-09-29

Test Your Cyber Vocabulary crossword puzzle
Across
  1. Also called malicious software
  2. Buzz@IS has prescribed how many simple steps to stay safe online? (HINT: Answer in this edition itself)
  3. A copy of the information held on a device (such as photos and documents) that is stored somewhere else.
  4. This can slow down your computer and watch everywhere you go on the internet
  5. When somebody sends an e-mail with a link to a bogus website it is called
  6. Name of the attack that does not require any action from the victim.(HINT: An article on this attack was also published in a recent HP news edition.)
  7. Harmful computer program
  8. Encryption is a commonly used tool to achieve _________________
Down
  1. Weakness in an information system
  2. Full form of "T" in OTP
  3. Will stand like a wall to keep intruders out
  4. I have a short life; your mobile buzzes with me every time you do any financial transaction online
  5. I lock the victim's computer system files and demand payment to decrypt. Who Am I?
  6. Getting into someone else’s computer or device without their permission.
  7. Phishing over voice call is called as _____

15 Clues: Full form of "T" in OTPHarmful computer programAlso called malicious softwareWeakness in an information systemPhishing over voice call is called as _____Will stand like a wall to keep intruders outEncryption is a commonly used tool to achieve _________________Getting into someone else’s computer or device without their permission....

Cyber Cross Word (Phishing) 2025-09-18

Cyber Cross Word (Phishing) crossword puzzle
Across
  1. One way to tell if an email is a Phishing attempt is use of ______ or threatening language.
  2. If you suspect a Phishing attempt, you can ______ it.
  3. To report a Phishing attempt, email ______________ or use the "report spam" button.
  4. A form of Phishing that uses texting platforms.
  5. When a cybercriminal gets information from various sources to make a phishing attempt for one specific person, this is called _____________.
  6. Cybercriminals may get your information from ________ available sources.
  7. Phishing attempts can be spotted via bad grammar, awkward phrasing or other ______ written content.
Down
  1. Once have reported and blocked the sender, what should you do with the email?
  2. Phishing attempts via direct message on social media or a phone call is called _______.
  3. Occurs when criminals try to get you to open harmful links, emails or attachments.
  4. This form of contact is the usual form of Phishing.
  5. Communications trying to trick you commonly look like they are from someone _______.
  6. In some cases, a Phishing attempt can be ________ to your information.
  7. To handle Phishing attempts properly, its best to think before you _____.
  8. After reporting, you should _____ the sender.

15 Clues: After reporting, you should _____ the sender.A form of Phishing that uses texting platforms.This form of contact is the usual form of Phishing.If you suspect a Phishing attempt, you can ______ it.In some cases, a Phishing attempt can be ________ to your information.Cybercriminals may get your information from ________ available sources....

Financial Scams & Cyber Safety 2025-10-01

Financial Scams & Cyber Safety crossword puzzle
Across
  1. A type of malware disguised as legitimate software.
  2. Theft, Stealing someone's personal information for fraud.
  3. Criminal activities carried out using computers.
  4. A dishonest scheme or fraud.
  5. Malware that locks data and demands payment to unlock it.
  6. A secret word or phrase used to gain access.
Down
  1. Faking an identity to deceive someone online.
  2. Software that detects and removes malicious programs.
  3. A security method requiring two forms of identification.
  4. Software designed to damage or gain unauthorized access.
  5. Fraudulent emails pretending to be from trusted sources.
  6. The process of converting data into a secure code.
  7. Someone who gains unauthorized access to systems.
  8. security system that monitors and controls network traffic.
  9. Software that secretly gathers user information.

15 Clues: A dishonest scheme or fraud.A secret word or phrase used to gain access.Faking an identity to deceive someone online.Criminal activities carried out using computers.Software that secretly gathers user information.Someone who gains unauthorized access to systems.The process of converting data into a secure code....

Social Security Benefits 2021-03-31

Social Security Benefits crossword puzzle
Across
  1. Used to determine social security eligibility. Can earn a maximum of 4 per year.
  2. Benefits that help the old, survivors, and disabled
  3. Provided by Social Security administration that is a record of money earned every year
  4. an asset that is purchased with the hope that it will generate income or appreciate in value at some point in the future.
Down
  1. Medical insurance for the old, survivors, and disabled that has a reduce price or is free
  2. The age in which you collect full retirement benefits
  3. Social security and Medicare taxes
  4. 67 for those born after 1960.
  5. The time when a person stops working

9 Clues: 67 for those born after 1960.Social security and Medicare taxesThe time when a person stops workingBenefits that help the old, survivors, and disabledThe age in which you collect full retirement benefitsUsed to determine social security eligibility. Can earn a maximum of 4 per year....

Foreign Travel Crossword Puzzle 2024-03-20

Foreign Travel Crossword Puzzle crossword puzzle
Across
  1. Government organization that oversees collateral activity with Boeing Defense.
  2. Who with a clearance is required to report foreign travel.
  3. The Facility Security Officer for the Boeing Puget Sound Site?
  4. Locations considered outside the United States of America
Down
  1. Days you must report your foreign travel prior to your trip.
  2. Northern country you can do a day trip to without 30 day notice.
  3. Southern country you can do a day trip to without 30 day notice.
  4. Boeing security system where foreign travel is reported.
  5. Job title of the individual who has overall security responsibility for the entire site.

9 Clues: Boeing security system where foreign travel is reported.Locations considered outside the United States of AmericaWho with a clearance is required to report foreign travel.Days you must report your foreign travel prior to your trip.The Facility Security Officer for the Boeing Puget Sound Site?...

CGE653 PUZZLE CHAPTER 1 2025-03-24

CGE653 PUZZLE CHAPTER 1 crossword puzzle
Across
  1. A measure of human injury, environmental damage, or economic loss in terms of both the
  2. Department of Environment
  3. Social Security Organisation is a government agency that implements and administer the social security schemes under the Employees' Social Security Act.
  4. The absence of: (i) injury and harm on human and (ii) damage on property and the environment
  5. A state of physical and mental well-being – including the absence of disease or
  6. likelihood and the magnitude of the loss or injury
  7. National Institute of Occupational Safety and Health - The centre for training, consultancy, information dissemination and research in occupational safety and health in Malaysia
Down
  1. Persistent, prolonged and repeated
  2. Department of Occupational Safety and Health
  3. Immediate, short term
  4. A sequence of events that produce unintended injury, damage to property or the environment, production losses, or increased liabilities

11 Clues: Department of EnvironmentImmediate, short termPersistent, prolonged and repeatedDepartment of Occupational Safety and Healthlikelihood and the magnitude of the loss or injuryA state of physical and mental well-being – including the absence of disease orA measure of human injury, environmental damage, or economic loss in terms of both the...

Crossword 2015-02-18

Crossword crossword puzzle
Across
  1. people
  2. websites
Down
  1. fun
  2. safety

4 Clues: funpeoplesafetywebsites

Ch3 Actividades y Personas en la escuela 2022-03-08

Ch3 Actividades y Personas en la escuela crossword puzzle
Across
  1. to study
  2. to dance
  3. the coach
  4. to eat lunch
  5. to walk
  6. to participate
  7. the security guard
  8. to practice
  9. the principal
Down
  1. the custodian
  2. the counselor
  3. to play an instrument
  4. the secretary
  5. to help
  6. to work
  7. the nurse
  8. to visit
  9. to take the bus
  10. to teach

19 Clues: to helpto workto walkto studyto danceto visitto teachthe coachthe nurseto practiceto eat lunchthe custodianthe counselorthe secretarythe principalto participateto take the busthe security guardto play an instrument

My AUs uwu 2019-07-21

My AUs uwu crossword puzzle
Across
  1. Smol little peeps uwu
  2. Child support means nothing.
  3. Let's put a pin in this one and come back later.
  4. The eldest of the Spooks but not the creepiest
  5. If you hit him 5 times he will spill soda on your laptop. Very sad.
  6. His name is pretty much a cruel joke to his condition
  7. Uni of multiple things
  8. Has a kid he didn't want in the first place but refuses to share custody with the parent who wanted the kid in the first place...?
  9. F*cked Cupid before literally anyone else. That's his only accomplishment.
  10. Pisses off so many people but Cyber still someone manages to be slightly nice to him
  11. Smol quiet bad with a birdy hate uwu
  12. A lonely bab with a heart of gold. No I'm serious his pinprick is a golden heart-
Down
  1. Named after a bush and his job
  2. Walks through walls but not over water; can't see through you but you can see through him
  3. I made her to be shipped with a bad guy so I would feel bad for killing him later-
  4. Was good, then bad, and now "good" and DEAD!
  5. Named after a soda that rhymes with a princess name
  6. Betrayed people in his AU but somehow gets trusted as a Misfit :/
  7. "Spaces" out a lot. Teased for being obsessed over a- *reads smudged writing* volcano??? :/ (*Smacks white board* LAUGH!)
  8. Not to be confused with the "representative" of a Sprite-
  9. If he didn't exist his wife would be getting shipped with Panther- because she is a cat- person- thing- not a furry-
  10. Still a better love story than Twilight. Still a better character than- what was his name- the vampire one not the dog- err- I never read Twilight help me out here
  11. Killed his brother and tried to kill other people. Claims it is due to mental illnesses but Mental isn't here- so-
  12. Legends has it she is hotter than the savannah
  13. Things go wrong for him and the worse part is he can't "voice" his opinion...

25 Clues: Smol little peeps uwuUni of multiple thingsChild support means nothing.Named after a bush and his jobSmol quiet bad with a birdy hate uwuWas good, then bad, and now "good" and DEAD!The eldest of the Spooks but not the creepiestLegends has it she is hotter than the savannahLet's put a pin in this one and come back later....

TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW 2024-05-02

TOPIC 7: DEVELOPMENT OF COMPUTER INDUSTRY & LAW crossword puzzle
Across
  1. What are companies called that own or lease physical infrastructure for communication transmission?
  2. What company provides technology services for travel companies, including travel searches, booking, and processing?
  3. Which company offers the Adobe Creative Cloud Suite, Document Cloud, and Experience Cloud?
  4. What company specializes in personal and small business financial management in the U.S., offering products such as TurboTax, Quickbooks, and Mint?
  5. Which Japanese company is renowned for manufacturing laptops, notebooks, computer desktops, and other computer-related products and services?
  6. What industry does the Malaysian Communications and Multimedia Commission (MCMC) regulate, focusing on networked IT industry services and the operational and administrative aspects of the regulatory framework?
  7. What company generates revenue from four main sources, including cloud services and license support, cloud license and on-premise license, hardware, and services?
  8. What company is known for producing products such as iPods, iTunes, Mac laptops and desktop computers, the OS X operating system, and innovative devices like the iPhone and iPad?
  9. Personal Protection Act 2010 act focuses on protecting personal data in Malaysia?
Down
  1. What company specializes in corporate virtualization and workstation optimization, offering cloud software and enterprise platforms compatible with Windows and Mac?
  2. What term is commonly used to describe the infrastructure of information utilized across multiple disciplines, as defined by Chan et al. (2008) and Uddin et al. (2003)?
  3. What does cyber law provide to individuals using the internet?
  4. What are the fundamental electronic building blocks of information-age products?
  5. Computer Act 1997 is the Malaysian legislation that addresses crimes involving computers?
  6. In the semiconductor industry, what process is highly capital-intensive, indicating significant investment in equipment and facilities?
  7. Which entities manufacture and sell telecommunications equipment?
  8. What trend within cyber law involves the regulation and legal considerations surrounding the use of remote data storage and processing services?
  9. Signature Act 1997 act in Malaysia governs the legality of digital signatures?
  10. What term encompasses any law that is applicable to the internet and internet-related technologies?
  11. What company provides internet services, broadband networks, and enterprise business solutions?

20 Clues: What does cyber law provide to individuals using the internet?Which entities manufacture and sell telecommunications equipment?Signature Act 1997 act in Malaysia governs the legality of digital signatures?What are the fundamental electronic building blocks of information-age products?...

Investment Course Lesson 24 2023-03-22

Investment Course Lesson 24 crossword puzzle
Across
  1. A measurement of effectiveness regarding the company’s ability to make a profit for shareholders
  2. shows how two moving averages in a particular security are related
  3. control in order to lower risk
  4. When a stock is first introduced to a market the banks offer it at a price per share that they have determined to be based on its intrinsic worth
  5. also known as a hedge ratio
  6. when the price of a security moves contrary to other data.
Down
  1. an intangible asset
  2. patterns during different business environments or situations
  3. having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others.
  4. A type of security based on the ownership of real estate
  5. net profit divided by the number of outstanding common shares

11 Clues: an intangible assetalso known as a hedge ratiocontrol in order to lower riskA type of security based on the ownership of real estatewhen the price of a security moves contrary to other data.patterns during different business environments or situationsnet profit divided by the number of outstanding common shares...

Final Vocab 2022-05-26

Final Vocab crossword puzzle
Across
  1. Homework.
  2. To understand
  3. To plant.
  4. Want to eat.
  5. Equal to.
  6. To remove.
  7. Forerunner.
  8. Time.
  9. Large.
  10. Fierce.
  11. To buy.
Down
  1. Hidden.
  2. To ship to another country.
  3. Eats meat.
  4. obvious.
  5. Used to.
  6. Dinosaurs.
  7. Security system when a robber is in the house.
  8. Choice.
  9. Think: Hello, my name is…

20 Clues: Time.Large.Hidden.Choice.Fierce.To buy.obvious.Used to.Homework.To plant.Equal to.Eats meat.Dinosaurs.To remove.Forerunner.Want to eat.To understandThink: Hello, my name is…To ship to another country.Security system when a robber is in the house.

ENA5 revision 2023-01-17

ENA5 revision crossword puzzle
Across
  1. nivel
  2. keinotekoinen
  3. epäluotettava
  4. epäilys
  5. vanhentunut
  6. tajuissaan
  7. johtopäätös
  8. selkäranka
  9. liite
  10. neste
  11. arviolta
  12. hyvin pieni
  13. helpottunut
  14. puolueeton
  15. elvytys
Down
  1. taapero
  2. paine
  3. hermo
  4. osallistuja
  5. huhu
  6. sisäinen
  7. rohkea
  8. elin
  9. kustantaja
  10. tutkimus
  11. jälkeläinen
  12. vapaus
  13. vaikuttaja
  14. taulukko
  15. kysely
  16. muuttuja
  17. turva
  18. aikakausi

33 Clues: huhuelinpainenivelhermoliiteturvanesterohkeavapauskyselytaaperoepäilyselvytyssisäinentutkimustaulukkomuuttujaarvioltaaikakausikustantajatajuissaanselkärankavaikuttajapuolueetonosallistujavanhentunutjälkeläinenjohtopäätöshyvin pienihelpottunutkeinotekoinenepäluotettava

Henry V Act V Vocabulary 2023-02-27

Henry V Act V Vocabulary crossword puzzle
Across
  1. leaving no opportunity for denial
  2. restricting
  3. certainty
  4. common people from ancient Rome
  5. harvest; cultivation
  6. consistency
  7. uncultivated
  8. damaged
  9. approve
Down
  1. obstacle; hindrance
  2. call to mind
  3. make greater
  4. majestic
  5. wedding
  6. attempt; strive
  7. security certainty
  8. surrounded
  9. general sense or meaning
  10. obscurities; uncertainties
  11. from one side to the other

20 Clues: weddingdamagedapprovemajesticcertaintysurroundedrestrictingconsistencycall to mindmake greateruncultivatedattempt; strivesecurity certaintyobstacle; hindranceharvest; cultivationgeneral sense or meaningobscurities; uncertaintiesfrom one side to the othercommon people from ancient Romeleaving no opportunity for denial

Unit 15 and 16 2023-03-13

Unit 15 and 16 crossword puzzle
Across
  1. kohver
  2. õpipoiss
  3. loeng
  4. sadam
  5. trahv
  6. tegelik
  7. sihtkond
  8. padi
  9. deklareerima, kuulutama
  10. turvalisus, julgeolek
  11. pagas
  12. vahekäik
  13. käsipagas
  14. ilmnema
  15. aksessuaar, tarvik, lisavarustus
  16. ülemere
Down
  1. pardapääse
  2. meditsiiniline
  3. reisiterminal
  4. ürgne loodus
  5. mehaanik
  6. rabav, jahmatav
  7. sissekäik
  8. lomp,loik
  9. kirurg
  10. noortehotell
  11. toll
  12. kellegile kallale norima
  13. kandik

29 Clues: paditollloengsadamtrahvpagaskohverkirurgkandiktegelikilmnemaülemereõpipoissmehaaniksihtkondvahekäiksissekäiklomp,loikkäsipagaspardapääseürgne loodusnoortehotellreisiterminalmeditsiinilinerabav, jahmatavturvalisus, julgeolekdeklareerima, kuulutamakellegile kallale norimaaksessuaar, tarvik, lisavarustus

Hackers, Scams and Online Safety 2023-04-21

Hackers, Scams and Online Safety crossword puzzle
Across
  1. chocolate chip ___
  2. be aware
  3. boss
  4. ___ gaurd
  5. positive
  6. to give back
  7. where you see
  8. bullseye
  9. male cow - y
  10. wood, opposite of out
Down
  1. secret
  2. to instill fear
  3. trading
  4. line of ___
  5. shape math
  6. opposite of light
  7. to fish with
  8. virtual mail
  9. something that explodes
  10. to prevent entry

20 Clues: bosssecrettradingbe awarepositivebullseye___ gaurdshape mathline of ___to fish withto give backvirtual mailmale cow - ywhere you seeto instill fearto prevent entryopposite of lightchocolate chip ___wood, opposite of outsomething that explodes

Selfie Horror Story 2023-03-31

Selfie Horror Story crossword puzzle
Across
  1. lugn
  2. trösta
  3. liknande
  4. konto
  5. förbryllad
  6. brev
  7. direkt
  8. livlina
  9. slutade tänka på
  10. nyligen
  11. anonym
  12. svarade
  13. säkerhet
  14. reklam
  15. spår
  16. ladda upp
Down
  1. radera
  2. formulär
  3. omedelbart
  4. anta
  5. databrott
  6. tillgång
  7. försök
  8. störa
  9. kränkt
  10. allvarligt
  11. orolig
  12. lösenord
  13. scen
  14. out with umgås med

30 Clues: lugnantabrevscenspårkontostöraraderatröstaförsökdirektkränktoroliganonymreklamlivlinanyligensvaradeformulärliknandetillgånglösenordsäkerhetdatabrottladda uppomedelbartförbrylladallvarligtslutade tänka påout with umgås med

ON THIS PAGE 2016-02-14

ON THIS PAGE crossword puzzle
Across
  1. ........ Page
  2. Levin ....... School
  3. Safe And Secure .........
  4. ....... 40 Units
  5. Security ....... Entry
  6. ......Your Imagination
  7. ........ With Me
  8. Paper ......
  9. Open 24 .......
  10. ........ Chronicle
  11. Georgies Wigs & Hair ......
  12. Great read
Down
  1. Secure Self .........
  2. ....... $50 Paper Plus
  3. Old Kimberley ........ Grounds
  4. Some ....... Apply
  5. Shape ......
  6. WINZ Subsidies ........
  7. 20 ........ Avenue
  8. Early ....... Education
  9. 0800 00 .......
  10. ...... Just Love It

22 Clues: Great readShape ......Paper .............. PageOpen 24 .......0800 00 .............. 40 Units........ With MeSome ....... Apply20 ........ Avenue........ Chronicle...... Just Love ItLevin ....... SchoolSecure Self ................ $50 Paper PlusSecurity ....... Entry......Your ImaginationWINZ Subsidies ........Early ....... Education...

Leccion 5 Deck 1 2018-02-28

Leccion 5 Deck 1 crossword puzzle
Across
  1. El cinturón de seguridad
  2. Lodging
  3. De (buena) catergoría
  4. Excursion; tour
  5. Traveler
  6. To be full
  7. El servicio de habitación
  8. Campground
  9. Expired
  10. Peligroso
  11. Tourist
  12. Accident
  13. To sail
Down
  1. To take a trip
  2. Welcome
  3. Itinerary
  4. La ruinas
  5. Safety; security
  6. Regresar
  7. Island
  8. Passport
  9. To take off
  10. El adventurero

23 Clues: IslandWelcomeLodgingExpiredTouristTo sailTravelerRegresarPassportAccidentItineraryLa ruinasPeligrosoTo be fullCampgroundTo take offTo take a tripEl adventureroExcursion; tourSafety; securityDe (buena) catergoríaEl cinturón de seguridadEl servicio de habitación

basketball 2023-08-29

basketball crossword puzzle
Across
  1. Opponent analysis
  2. Captures moments
  3. Technical aspects
  4. Venue management
  5. PR interactions
  6. Logistics planning
  7. Gear organization
  8. Online presence
  9. Venue assistance
  10. Team transportation
  11. Ball management
Down
  1. Game commentary
  2. AV equipment
  3. Spiritual support
  4. Data analysis
  5. Public address
  6. Safety enforcement
  7. Team promotion
  8. Ticket and merch
  9. Game officiating
  10. Physical conditioning

21 Clues: AV equipmentData analysisPublic addressTeam promotionGame commentaryPR interactionsOnline presenceBall managementCaptures momentsVenue managementTicket and merchGame officiatingVenue assistanceOpponent analysisSpiritual supportTechnical aspectsGear organizationSafety enforcementLogistics planningTeam transportationPhysical conditioning

zz 2024-04-10

zz crossword puzzle
Across
  1. - Stock symbol
  2. - Noise-making toy
  3. - Blood specialist
  4. - Motor City
  5. - Variant of element
  6. - Stuffed dough
  7. - Multiplicative factor
  8. - Heart partition
  9. - Mythical creature
Down
  1. - Measurement unit
  2. - Small, agile dinosaur
  3. - Early recording device
  4. - Hovering raptor
  5. - Tectonic segment
  6. - Southern staple
  7. - Image unit
  8. - Loan security
  9. - Polearm
  10. - Indigenous Arctic people
  11. - Idle sketching

20 Clues: - Polearm- Motor City- Image unit- Stock symbol- Loan security- Stuffed dough- Idle sketching- Hovering raptor- Southern staple- Heart partition- Measurement unit- Tectonic segment- Noise-making toy- Blood specialist- Mythical creature- Variant of element- Small, agile dinosaur- Multiplicative factor- Early recording device...

nieprzewidywalny szczegół 4 2024-08-18

nieprzewidywalny szczegół 4 crossword puzzle
Across
  1. to add (perf)
  2. undecided
  3. to try (impf)
  4. go ahead!
  5. to persuade (perf)
  6. silently
  7. to persuade (impf)
  8. taking off clothes
  9. to address (impf)
  10. to address (perf)
  11. to try (perf)
Down
  1. she continued
  2. she smiled
  3. they were trying
  4. to add (impf)
  5. otherwise
  6. security guard
  7. comfortable
  8. he added
  9. addressing

20 Clues: silentlyhe addedundecidedgo ahead!otherwiseshe smiledaddressingcomfortableshe continuedto add (perf)to try (impf)to add (impf)to try (perf)security guardthey were tryingto address (impf)to address (perf)to persuade (perf)to persuade (impf)taking off clothes

Those Secret Coders, man 2024-10-16

Those Secret Coders, man crossword puzzle
Across
  1. blekkja
  2. verðskulda
  3. framlag
  4. í auknum mæli
  5. villa
  6. eyðimörk
  7. endast lengur en…
  8. hugrekki
  9. öryggi
  10. kynning
  11. leysa
  12. áríðandi
Down
  1. dulmálafræði
  2. ganga í her
  3. runa
  4. kynna
  5. neyð
  6. senda út
  7. samanstanda af
  8. ætlun
  9. bandalags-
  10. hrós
  11. dulkóðað
  12. hæfileiki
  13. slétta
  14. rannsókn
  15. gljúfur
  16. mjög

28 Clues: runaneyðhrósmjögkynnaætlunvillaleysasléttaöryggiblekkjaframlaggljúfurkynningsenda úteyðimörkdulkóðaðhugrekkirannsóknáríðandihæfileikiverðskuldabandalags-ganga í herdulmálafræðií auknum mælisamanstanda afendast lengur en…

Peanuts 2024-02-07

Peanuts crossword puzzle
Across
  1. ben FRANKLIN
  2. mr. security blanket
  3. bird
  4. dirty one
  5. smarty pants
  6. gambler
  7. charlie brown
  8. loud talker
  9. bossy person
Down
  1. naturally curly hair
  2. spiky haired
  3. D-minus
  4. pianoman
  5. blanket thief
  6. sally's best friend

15 Clues: birdD-minusgamblerpianomandirty oneloud talkerspiky hairedben FRANKLINsmarty pantsbossy personblanket thiefcharlie brownsally's best friendnaturally curly hairmr. security blanket

RU ITEC411 - Crime and Security (Ch 5) 2022-10-11

RU ITEC411 - Crime and Security (Ch 5) crossword puzzle
Across
  1. A false website that convinces people to enter personal information
  2. The act of changing data to make it unreadable to others to protect the privacy of the information
  3. An act by criminals to gain access to computers illegally
  4. Malicious software that will lock computers and/or lock/encrypt files and require payment to have them unlocked
  5. An attack that hackers use to overload websites with repetitively request for information
  6. Sending scam emails to trick people into giving away person information
  7. An in-person use of hacking involving manipulation someone into giving away personal information or private information about a company
  8. Websites that lure hackers to observe their actions
  9. Nickname for hackers who attempt to purposefully do damage
  10. Characteristics involving DNA such as fingerprints, voice, and face structures
Down
  1. A blanket term for all different types of malicious software and viruses
  2. Software that allows a person to gain access to software by passing the normal security measures
  3. Malicious software installed on a computer to observe user’s actions
  4. A law to protect computers under federal government jurisdiction (ABBR)
  5. The use of hacking with political motivations
  6. Nickname for hackers who only do so to help improve security
  7. The act of gathering personal details to impersonate someone else
  8. A public written statement attacking a person’s character
  9. A person or team of people who take the role of a hacker and try to get through security measures
  10. A malicious computer program that attaches itself to software and can spread itself

20 Clues: The use of hacking with political motivationsWebsites that lure hackers to observe their actionsAn act by criminals to gain access to computers illegallyA public written statement attacking a person’s characterNickname for hackers who attempt to purposefully do damageNickname for hackers who only do so to help improve security...

Stanley's The (Avigilon) Office Crossword 2023-08-16

Stanley's The (Avigilon) Office Crossword crossword puzzle
Across
  1. Ability to scan a QR code to see a list of users for the video intercom.
  2. When looking to better understand the path of people or vehicles in a space, it may be beneficial to use this feature
  3. Wireless Camera that is manually adjustable and includes temperature and humidity sensors
  4. How many routing profiles come with the VIP without charge?
  5. Gym membership management integration that enables simple and automated user management.
  6. What the Aware platform detects after a couple weeks of learning.
  7. Ability to add layers of security to unlock doors
  8. These are a great option when you want to add a failsafe or additional security for strict security spaces.
  9. This feature requires an additional license and can be great for parking garages or slow streets.
  10. Hardware Warranty period for the majority of our alta access control hardware
  11. This is free to users and allows them to integrate Avigilon Alta with other software solutions.
  12. How many Outbound ports are required to be open for Alta Access?
Down
  1. Ability to look for specific events based on time, appearance, etc. without needing to scrub through hours of footage.
  2. Patented Technology to allow for seamless and reliable unlocks with Alta Access.
  3. Technology used to analyze video footage for insights
  4. Destination Dispatch Technology that integrates with Alta Access
  5. Typically used in apartments, executive offices, and classrooms.
  6. Technology that helps reduce bandwidth for Alta Cameras.
  7. These cameras have a long cylindrical shell and are meant to be seen.
  8. Alta Access is OSDP Compliant (T/F)

20 Clues: Alta Access is OSDP Compliant (T/F)Ability to add layers of security to unlock doorsTechnology used to analyze video footage for insightsTechnology that helps reduce bandwidth for Alta Cameras.How many routing profiles come with the VIP without charge?Destination Dispatch Technology that integrates with Alta Access...

Financial Fundamentals 2025-05-27

Financial Fundamentals crossword puzzle
Across
  1. Regulates business activities within own boundaries; intrastate commerce
  2. Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
  3. Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
  4. Form of debt security, essentially a loan made by an investor to a borrower
  5. Where the tax rate increases along with the amount
  6. Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
  7. The debts or financial obligations that a person or company owes to others
  8. Tax where everyone pays the same amount
  9. A rise in the general level of prices (consumer price index)
  10. Tax based on purchases
Down
  1. The cost of borrowing money
  2. Businesses and other organizations which sell items, pay expenses, and borrow to finance business operations
  3. Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
  4. _____ are consumers and households who make purchases, save, innvest, and pay taxes
  5. Employment taxes such as Social Security
  6. Taxed based on land and buildings
  7. Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
  8. Ability to convert an investment to cash for full value; includes items like demand doposits, CDs, Treasury bills, and money market funds
  9. Regulates banks
  10. Regulates stock markets
  11. County boards; city or town councils; services for an orderly society
  12. Insures bank deposits
  13. Potential of a investment; Default

23 Clues: Regulates banksInsures bank depositsTax based on purchasesRegulates stock marketsThe cost of borrowing moneyTaxed based on land and buildingsPotential of a investment; DefaultTax where everyone pays the same amountEmployment taxes such as Social SecurityWhere the tax rate increases along with the amount...

The Bad Guys 1 2022-12-09

The Bad Guys 1 crossword puzzle
Across
  1. The dogs were all locked up in maximum __________.
  2. It is one of Mr. Wolf's aliases.
  3. They all have a __________ rap sheet.
  4. What animal was the security guard?
  5. The gang wants to _________ the cat in the tree.
  6. Who is the leader of The Good Guys Club?
Down
  1. Where is Mr. Piranha from?
  2. Everyone keeps mistaking Mr. Piranha for this
  3. The gang all have a bad __________
  4. Mr. Wolf throws Mr. Piranha through what?
  5. What do the gang want to be?
  6. Mr. Snake ate all of these at Mr. Ho's Pet Store.

12 Clues: Where is Mr. Piranha from?What do the gang want to be?It is one of Mr. Wolf's aliases.The gang all have a bad __________What animal was the security guard?They all have a __________ rap sheet.Who is the leader of The Good Guys Club?Mr. Wolf throws Mr. Piranha through what?Everyone keeps mistaking Mr. Piranha for this...

Sectors of the Indian Economy 2021-09-21

Sectors of the Indian Economy crossword puzzle
Across
  1. Health care centre come under which sector
  2. In which sector workers do not produce goods
  3. A large proportion of labourers in India are working in which sector
  4. DAV group of schools come under which sector
  5. In which sector workers enjoy job security
  6. Which sector is also called manufacturing sector
Down
  1. The activities in Primary, Secondary and Tertiary sector are ____________
  2. Cotton is a _________ product
  3. Sustainable development takes care of present and ________
  4. Which sector is also called agricultural sector
  5. Job assurance in rural areas
  6. unorganised sector does not has _____ security

12 Clues: Job assurance in rural areasCotton is a _________ productHealth care centre come under which sectorIn which sector workers enjoy job securityIn which sector workers do not produce goodsDAV group of schools come under which sectorunorganised sector does not has _____ securityWhich sector is also called agricultural sector...

confidentiality 2025-02-06

confidentiality crossword puzzle
Across
  1. Espionage form of espionage conducted for commercial purposes rather than security;
  2. information
  3. set of rules or promises which limits access or places restrictions on certain
  4. work history, date of birth, social security number, criminal record,
  5. involves individuals hired to steal trade secrets, new products or
  6. actions, supervisory notations
  7. or Sensitive Data information about an employee prior to employment such as a résumé,
Down
  1. etc.
  2. Data records of an employee’s performance on the job such as performance reports,
  3. insurance information
  4. in the Workplace keeping employee, customer and client information private
  5. Data information which may arise from employment-related physicals, drug tests and
  6. of information

13 Clues: etc.informationof informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,in the Workplace keeping employee, customer and client information private...

Crossword Puzzle 2022-09-21

Crossword Puzzle crossword puzzle
Across
  1. Managed ? solutions detects and mitigates cyber-attacks and data loss.
  2. The Name of Huawei Smartboard
  3. Up to ?% PSG subsidy
  4. Eemont can help businesses ? Office Networks
Down
  1. When you move offices, data and networks need to be ? over.
  2. The Name of your one-stop solution provider
  3. Is CloudEngine S5731-S48P4X PoE+ Supported?

7 Clues: Up to ?% PSG subsidyThe Name of Huawei SmartboardThe Name of your one-stop solution providerIs CloudEngine S5731-S48P4X PoE+ Supported?Eemont can help businesses ? Office NetworksWhen you move offices, data and networks need to be ? over.Managed ? solutions detects and mitigates cyber-attacks and data loss.

Religion 2022-06-01

Religion crossword puzzle
Across
  1. type de violence morale, physique et/ou psychologique.
  2. souci, sujet qui inquiète une personne
  3. période pendant laquelle notre corps change sans qu'on le comprenne
Down
  1. personne qui est harcelée
  2. réseau social sur lequel on constate souvent du harcèlement
  3. animal auquel on compare un jeune
  4. lieu où le cyber-harcèlement se passe

7 Clues: personne qui est harceléeanimal auquel on compare un jeunelieu où le cyber-harcèlement se passesouci, sujet qui inquiète une personnetype de violence morale, physique et/ou psychologique.réseau social sur lequel on constate souvent du harcèlementpériode pendant laquelle notre corps change sans qu'on le comprenne

Cyber-Mobbing 2019-05-07

Cyber-Mobbing crossword puzzle
Across
  1. Wozu kann Cyber-Mobbing im schlimmsten Fall führen?
  2. Wo soll man sich als Opfer Hilfe holen?
  3. Derjenige der die Tat ausübt
Down
  1. Internetseite zur Entfernung von peinlichen Bildern
  2. Worauf soll man im Netz achten?
  3. ein anderes Wort für World Wide Web
  4. Was sollst du tun wenn du ein Mobbingopfer siehst?

7 Clues: Derjenige der die Tat ausübtWorauf soll man im Netz achten?ein anderes Wort für World Wide WebWo soll man sich als Opfer Hilfe holen?Was sollst du tun wenn du ein Mobbingopfer siehst?Internetseite zur Entfernung von peinlichen BildernWozu kann Cyber-Mobbing im schlimmsten Fall führen?

Tantangan Kecil 2023-08-08

Tantangan Kecil crossword puzzle
Across
  1. mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
  2. bentuk perundungan melalui media elektronik
  3. Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
  4. perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
Down
  1. sisi negatif gawaihcfcbc
  2. manfaat gawai adalah sebagai alat...
  3. salah satu dampak negatif bully

7 Clues: sisi negatif gawaihcfcbcsalah satu dampak negatif bullymanfaat gawai adalah sebagai alat...bentuk perundungan melalui media elektronikperangkat elektronik seperti hp, laptop, dan tablet disebut juga...mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying...

Tantangan Kecil 2023-08-08

Tantangan Kecil crossword puzzle
Across
  1. sisi negatif gawai
  2. mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
  3. manfaat gawai adalah sebagai alat...
Down
  1. bentuk perundungan melalui media elektronik
  2. perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
  3. Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
  4. salah satu dampak negatif bully

7 Clues: sisi negatif gawaisalah satu dampak negatif bullymanfaat gawai adalah sebagai alat...bentuk perundungan melalui media elektronikperangkat elektronik seperti hp, laptop, dan tablet disebut juga...mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying...

TH CROSSWORD #1 2022-08-18

TH CROSSWORD #1 crossword puzzle
Across
  1. Condition of market when economy is receding and most stocks are declining in value
  2. Asset must be greater than ...... ?
  3. Where does wuquf take place?
  4. The month of Eid al-Adha
Down
  1. The framework that upholds Maqasid Shariah principle
  2. Commitment to safeguard ESG
  3. Cyber attack that attempts to steal your money or identity and personal information
  4. The first protection in Maqasid Shariah

8 Clues: The month of Eid al-AdhaCommitment to safeguard ESGWhere does wuquf take place?Asset must be greater than ...... ?The first protection in Maqasid ShariahThe framework that upholds Maqasid Shariah principleCyber attack that attempts to steal your money or identity and personal information...

E-Safety Extravagance 2020-05-07

E-Safety Extravagance crossword puzzle
Across
  1. A video game that is multiplayer.
  2. a physical/mental/verbal or cyber offences repeated.
  3. something that is secret to only you
  4. A fear of missing out. Usually online.
Down
  1. Fake emails people send.
  2. a fraud who makes a new identity to fit in
  3. news news posted on social media that is made up.
  4. a long sequence of symbols that protects info

8 Clues: Fake emails people send.A video game that is multiplayer.something that is secret to only youA fear of missing out. Usually online.a fraud who makes a new identity to fit ina long sequence of symbols that protects infonews news posted on social media that is made up.a physical/mental/verbal or cyber offences repeated.

Topaz Driller Crossword #6 2017-12-09

Topaz Driller Crossword #6 crossword puzzle
Across
  1. Hands off the _ _ _ _!?
  2. During well testing we use the _ _ _ _ _ system when we go on the deck.
  3. What device separates the solids and cuttings from the drilling mud?
  4. Hands on the Correct _ _ _ _ for the task!
  5. Australian Toolpushers first name?
  6. How many pedestal cranes are there on the Topaz?
  7. It is a workplace hazard on the VOC card?
Down
  1. Who is the 'cyber cementer'???
  2. What does SWL stand for?
  3. What do we ALWAYS wear to protect our eyes at work?
  4. Indonesian for 'Aware' is?
  5. If you think the job is unsafe what do YOU do?
  6. What MUST we do with our rubbish to help the environment?
  7. First name of the Rig Manager?

14 Clues: Hands off the _ _ _ _!?What does SWL stand for?Indonesian for 'Aware' is?Who is the 'cyber cementer'???First name of the Rig Manager?Australian Toolpushers first name?It is a workplace hazard on the VOC card?Hands on the Correct _ _ _ _ for the task!If you think the job is unsafe what do YOU do?How many pedestal cranes are there on the Topaz?...

transword 103 2018-07-18

transword 103 crossword puzzle
Across
  1. part-time
  2. and last but not the least, finally(two words)
  3. voice
  4. responsible
  5. day-care
  6. days
  7. security, safeguard
  8. between
  9. administrative
  10. costs
  11. full-time
  12. duration, length
Down
  1. beep
  2. kindergarten
  3. nursing home
  4. coherence
  5. to follow
  6. shelter
  7. field trips, excursions
  8. during the day, daytime
  9. take
  10. nephew, cousin
  11. answer

23 Clues: beepdaystakevoicecostsanswershelterbetweenday-carepart-timecoherenceto followfull-timeresponsiblekindergartennursing homenephew, cousinadministrativeduration, lengthsecurity, safeguardfield trips, excursionsduring the day, daytimeand last but not the least, finally(two words)

transword 103 2018-07-18

transword 103 crossword puzzle
Across
  1. kindergarten
  2. voice
  3. nursing home
  4. day-care
  5. field trips, excursions
  6. answer
  7. duration, length
  8. full-time
  9. coherence
  10. beep
  11. shelter
  12. nephew, cousin
Down
  1. days
  2. responsible
  3. part-time
  4. between
  5. administrative
  6. and last but not the least, finally(two words)
  7. costs
  8. security, safeguard
  9. during the day, daytime
  10. to follow
  11. take

23 Clues: daystakebeepcostsvoiceanswerbetweenshelterday-carepart-timeto followfull-timecoherenceresponsiblekindergartennursing homeadministrativenephew, cousinduration, lengthsecurity, safeguardduring the day, daytimefield trips, excursionsand last but not the least, finally(two words)

Puzzle hoofdstuk 5 2013-04-04

Puzzle hoofdstuk 5 crossword puzzle
Across
  1. bijwonen
  2. per
  3. wiskunde
  4. kunst
  5. geschiedenis
  6. kop
  7. pakje
  8. leren
  9. techniek
  10. beschrijven
  11. spijbelaar
  12. Frans
  13. boterham
  14. koekje
  15. toegeven
  16. biologie
  17. hek
Down
  1. minst
  2. straffen
  3. aardrijkskunde
  4. volwassene
  5. meestal
  6. cijfers
  7. kaas
  8. vegetarische
  9. Duits
  10. boete
  11. verdienen
  12. beveiliging
  13. tonijn
  14. fles
  15. pond

32 Clues: perkophekkaasflespondminstkunstpakjelerenDuitsFransboetetonijnkoekjemeestalcijfersstraffenbijwonenwiskundetechniekboterhamtoegevenbiologieverdienenvolwassenespijbelaarbeschrijvenbeveiliginggeschiedenisvegetarischeaardrijkskunde

vocabulary 1 2014-10-12

vocabulary 1 crossword puzzle
Across
  1. immigration
  2. direct flight
  3. departure
  4. to go through security
  5. to land;to touch down
  6. thing
  7. ticket
  8. recreation center
  9. buy plane
  10. visa
  11. to take a taxi
  12. stopover;layover
  13. by car
  14. currency exchange office
  15. by foot
Down
  1. train station
  2. street
  3. flight attendant
  4. suitcase
  5. boarding pass
  6. travel agent
  7. arrival

22 Clues: visathingstreetticketby cararrivalby footsuitcasedeparturebuy planeimmigrationtravel agenttrain stationdirect flightboarding passto take a taxiflight attendantstopover;layoverrecreation centerto land;to touch downto go through securitycurrency exchange office

Driver Licensing 2024-01-11

Driver Licensing crossword puzzle
Across
  1. qmatic
  2. yellow highlighter
  3. 90 days
  4. MVA 148.1
  5. dangerous action
  6. security feature
  7. truck manual
  8. number of DLKT languages
  9. violation
  10. L245
Down
  1. MV2076
  2. image capture workstation
  3. intersection safety camera
  4. 24 passenger school bus
  5. reciprocal licence
  6. MV2075
  7. account services
  8. 5/7 roadtest sheet
  9. no show roadtest sheet
  10. counter 11 & 12

20 Clues: L245MV2076qmaticMV207590 daysMVA 148.1violationtruck manualcounter 11 & 12account servicesdangerous actionsecurity featureyellow highlighterreciprocal licence5/7 roadtest sheetno show roadtest sheet24 passenger school busnumber of DLKT languagesimage capture workstationintersection safety camera

On the Go 2 Unit 4 Start 2024-01-09

On the Go 2 Unit 4 Start crossword puzzle
Across
  1. sisäänkirjautuminen
  2. lähteä(esim.lento)
  3. asemalaituri
  4. itsepalvelu
  5. matkustaja
  6. lento
  7. istuinpaikka
  8. satama
  9. vaunu
  10. kone
  11. matkatavarat
  12. lähtevät
  13. kolikkoautomaatti
  14. juna
  15. matkatavarat
  16. tulli
Down
  1. kuulutus
  2. tarkastus
  3. saapuvat
  4. tullata
  5. turvallisuus
  6. lautta
  7. kyltti
  8. junavirkailija
  9. matkustamohenkilökunta
  10. matkalippu
  11. maihinnousukortti
  12. portti
  13. valmis
  14. matkalaukku

30 Clues: konejunalentovaunutullilauttakylttisatamaporttivalmistullatakuulutussaapuvatlähtevättarkastusmatkustajamatkalippuitsepalvelumatkalaukkuasemalaituriturvallisuusistuinpaikkamatkatavaratmatkatavaratjunavirkailijamaihinnousukorttikolikkoautomaattilähteä(esim.lento)sisäänkirjautuminenmatkustamohenkilökunta

Billy Elliot-Crossword 2023-02-28

Billy Elliot-Crossword crossword puzzle
Across
  1. arbeidsledig
  2. sorg
  3. lønn
  4. konfrontasjon
  5. samfunn/ fellesskap(ordet kan ha flere betydninger)
  6. kollega
  7. lojal
  8. utdanning
  9. dans
  10. familie
  11. bror
  12. industri
  13. mot
Down
  1. støtte
  2. trygghet(ordet kan ha flere betydninger)
  3. ansvar
  4. stereotypi
  5. en som jobber i gruve
  6. grenser
  7. ballett
  8. ulojal
  9. styrke
  10. far
  11. streik
  12. kull
  13. jobb

26 Clues: farmotsorglønndansbrorkulljobblojalstøtteansvarulojalstyrkestreikkollegagrenserballettfamilieindustriutdanningstereotypiarbeidsledigkonfrontasjonen som jobber i gruvetrygghet(ordet kan ha flere betydninger)samfunn/ fellesskap(ordet kan ha flere betydninger)

Kinds of Job 2024-09-03

Kinds of Job crossword puzzle
Across
  1. Polisi
  2. Insinyur
  3. Tukang roti
  4. Tentara
  5. Arsitek
  6. Tukang kebun
  7. Pengacara
  8. Petugas keamanan
  9. Carpenter
  10. Pelaut
  11. Fotografer
  12. Seniman
  13. Pelatih
  14. Montir
Down
  1. Supir
  2. Penyanyi
  3. Aktor
  4. Pemadam kebakaran
  5. Pilot
  6. Pelayan
  7. Guru
  8. Ilmuan
  9. Petani
  10. Hakim
  11. Juru masak
  12. Perawat
  13. Pedagang
  14. Dokter
  15. Penjahit
  16. Astronot

30 Clues: GuruSupirAktorPilotHakimPolisiIlmuanPetaniDokterPelautMontirPelayanTentaraArsitekPerawatSenimanPelatihPenyanyiInsinyurPedagangPenjahitAstronotPengacaraCarpenterJuru masakFotograferTukang rotiTukang kebunPetugas keamananPemadam kebakaran

Crossword for Seniors 2023-01-30

Crossword for Seniors crossword puzzle
Across
  1. Faith
  2. Friendship
  3. A trip
  4. Compassion
  5. Funds
  6. Assured
  7. The windows to the soul
  8. Sheltered
  9. Coxa joint
  10. Social security
  11. Hinge between the femur, tibia, patella
  12. Well-being
  13. Buddy or mate
  14. relatives
Down
  1. Injury
  2. Concern
  3. Medical Personal
  4. Solitude
  5. Keeping level
  6. Self-reliant
  7. Assistance
  8. Paying attention
  9. Worry
  10. Accommodation

24 Clues: FaithFundsWorryInjuryA tripConcernAssuredSolitudeShelteredrelativesFriendshipCompassionAssistanceCoxa jointWell-beingSelf-reliantKeeping levelAccommodationBuddy or mateSocial securityMedical PersonalPaying attentionThe windows to the soulHinge between the femur, tibia, patella

OCUPATIONS AND PROFESSIONS 2023-10-09

OCUPATIONS AND PROFESSIONS crossword puzzle
Across
  1. Insinyur
  2. Petugas Kebersihan
  3. Dokter
  4. Kasir
  5. Polisi
  6. guide Pemandu wisata
  7. Pedagang
  8. Petani
  9. Tukang kayu
  10. Guru
  11. Astronot
  12. Nelayan
  13. Pekerja kantoran
Down
  1. Penari
  2. Tentara
  3. Perawat
  4. Pemadam kebakaran
  5. Dokter hewan
  6. Pilot
  7. Arsitek
  8. Dokter gigi
  9. Petugas keamanan
  10. Karyawan
  11. Tukang kebun
  12. Musisi
  13. Tukang roti
  14. Koki

27 Clues: GuruKokiPilotKasirPenariDokterPolisiMusisiPetaniTentaraPerawatArsitekNelayanInsinyurKaryawanPedagangAstronotDokter gigiTukang kayuTukang rotiDokter hewanTukang kebunPetugas keamananPekerja kantoranPemadam kebakaranPetugas Kebersihanguide Pemandu wisata

UNIT 11 2023-02-23

UNIT 11 crossword puzzle
Across
  1. to order
  2. choosy
  3. silly
  4. cutting
  5. a guide
Down
  1. to guide
  2. protection
  3. achievable
  4. landslide
  5. to confirm
  6. to cuddle
  7. an appeal

12 Clues: sillychoosycuttinga guideto guideto orderlandslideto cuddlean appealprotectionachievableto confirm

investment strats 2022-11-21

investment strats crossword puzzle
Across
  1. money for real estate, equipment, and so on
  2. bank account used by depositors to accumulate money for future use
  3. for profit businesses that sell insurance products
  4. allow customers to pay for purchases and withdraw cash
  5. a document guaranteeing payment of a specific amount of money
  6. financial institution that is involved in trading securities in financial markets
  7. prearranged amount of credit that is available for business to use as needed
  8. people who do the work
  9. bank account that allows bank owners to make deposits, write checks, withdraw money
  10. a financial investment issues by cooperation, government, or other organization
  11. long term business
  12. equals one vote
  13. security that pays interest over terms of ten to thirty years
  14. largest category of deposit institution
  15. deposit insurance in case of bank failure
  16. financial institution that provides services for businesses
  17. nation uses to provide and manage money for itself
  18. customers are required to apply for this
Down
  1. people who buy shares of stock
  2. financial institution that makes money by using loans
  3. central bank of USA
  4. online banks allow
  5. nonprofit financial institutions that privately owned and provides banking services
  6. financial institution that accepts money from customers
  7. lend money to the business in return of rate of interest
  8. banking regulations must comply with
  9. security that matures in a year or less
  10. financial institution that offers savings and loan services
  11. established in 1913
  12. regular payment made from a customers bank account to a vendor or supplier

30 Clues: equals one voteonline banks allowlong term businesscentral bank of USAestablished in 1913people who do the workpeople who buy shares of stockbanking regulations must comply withsecurity that matures in a year or lesslargest category of deposit institutioncustomers are required to apply for thisdeposit insurance in case of bank failure...

English Crossword Puzzle 2025-09-26

English Crossword Puzzle crossword puzzle
Across
  1. the activity of a person or group of people who travel outside their place of residence temporarily for recreational, business, educational, cultural, or other purposes, and utilize the facilities available at the destination.
  2. antonyms of departed.
  3. travel activity list.
  4. the synonyms of booking/registration.
  5. profession that arranges tickets and hotels.
  6. the passenger had checked ___ two heavy suitcases at the counter.
  7. documents required to enter another country.
  8. tourism with the aim of learning.
  9. historical buildings which are generally places of worship or religious relics from the Hindu-Buddhist period.
  10. tourism that emphasizes nature conservation.
  11. a unified system consisting of the use of airspace, aircraft, airports, air transportation, flight navigation, safety and security, the environment, and supporting facilities.
  12. they passed ___ security check.
  13. connecting bridge from the airport terminal to the aircraft door.
Down
  1. the synonyms of lead.
  2. a person who travels to a place outside his/her place of residence for the purpose of vacation, recreation, business or other temporary purposes is called ___
  3. what kind of tourism is included in the zoo?
  4. the stage in air travel where passengers begin to board the aircraft to occupy their reserved seats.
  5. the tourist took photos ___ the performance.
  6. document used as proof of payment for credit transactions.
  7. the tourist had all documents ready like ID, visa, and ___
  8. the antonym of "international" in tourist.
  9. they completed the ___ at the counter before going to security.
  10. the synonyms of baggage/suitcase/bag.
  11. she booked the seat and received the ___ for the trip.
  12. the synonyms of lodging.

25 Clues: the synonyms of lead.antonyms of departed.travel activity list.the synonyms of lodging.they passed ___ security check.tourism with the aim of learning.the synonyms of booking/registration.the synonyms of baggage/suitcase/bag.the antonym of "international" in tourist.what kind of tourism is included in the zoo?...

Trend Micro Mobile Security 2024-05-06

Trend Micro Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security provides ____ by including anti-theft tools to locate, lock, and wipe lost or stolen devices. (Starts with s)
  2. Trend Micro Mobile Security provides ____ controls to manage children's device usage and restrict access to inappropriate content
  3. Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m)
Down
  1. Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v)
  2. Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission
  3. Trend Micro Mobile Security provides safe ____ features to protect users from online threats while browsing the internet. (Starts with s)

6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v)Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m)Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission...

Sectors of the Indian Economy 2021-09-21

Sectors of the Indian Economy crossword puzzle
Across
  1. Sustainable development takes care of present and ________
  2. Which sector is also called agricultural sector
  3. Cotton is a _________ product
  4. A large proportion of labourers in India are working in which sector
  5. Which sector is also called manufacturing sector
  6. The activities in Primary, Secondary and Tertiary sector are ____________
Down
  1. Job assurance in rural areas
  2. DAV group of schools come under which sector
  3. Health care centre come under which sector
  4. In which sector workers enjoy job security
  5. In which sector workers do not produce goods
  6. unorganised sector does not has _____ security

12 Clues: Job assurance in rural areasCotton is a _________ productHealth care centre come under which sectorIn which sector workers enjoy job securityDAV group of schools come under which sectorIn which sector workers do not produce goodsunorganised sector does not has _____ securityWhich sector is also called agricultural sector...

Confidentiality test 2025-02-06

Confidentiality test crossword puzzle
Across
  1. religion, etc.
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. or Sensitive Data information about an employee prior to employment such as a résumé,
  5. of information
  6. information
  7. Data records of an employee’s performance on the job such as performance reports,
  8. Data information which may arise from employment-related physicals, drug tests and
  9. insurance information
Down
  1. actions, supervisory notations
  2. in the Workplace keeping employee, customer and client information private
  3. set of rules or promises which limits access or places restrictions on certain
  4. Espionage form of espionage conducted for commercial purposes rather than security;

13 Clues: informationreligion, etc.of informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,in the Workplace keeping employee, customer and client information private...