cyber security Crossword Puzzles
Draeko Cybersecurity Crossword 2024-10-26
Across
- A form of malware that encrypts a user’s data and demands payment to unlock it.
- Malware that gathers information about a person or organization without their knowledge.
- Malware that gathers information about a person or organization without their knowledge.
- A network security device or software that monitors and controls incoming and outgoing traffic.
- A simulated cyberattack to evaluate the security of a system.
- An extra layer of security requiring two forms of identification for access.
Down
- The psychological manipulation of people to disclose confidential information.
- Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
- The process of converting information into a code to prevent unauthorized access.
- A type of social engineering attack where attackers trick users into revealing personal information.
- A trial-and-error method used to guess passwords or encryption keys.
- An attack where multiple systems flood a target, causing denial of service.
- A tool that encrypts internet traffic and hides a user’s IP address.
- A flaw in software that is unknown to the vendor and, therefore, unpatched.
- A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.
15 Clues: A simulated cyberattack to evaluate the security of a system. • A trial-and-error method used to guess passwords or encryption keys. • A tool that encrypts internet traffic and hides a user’s IP address. • An attack where multiple systems flood a target, causing denial of service. • A flaw in software that is unknown to the vendor and, therefore, unpatched. • ...
ITGS Security: Malware 2022-04-13
Across
- Spreads without user interaction
- Malicious software
- Documents user key inputs
- Unauthorized file encryption
- mimics a legitimate program
- Used to launch DDoS attacks
Down
- Malicious advertising
- Unauthorized monitoring of user activities
- Unwanted performance hindering software
- Damages files and spreads across devices
- Used to take remote control over a device
- The bypassing of a security system
12 Clues: Malicious software • Malicious advertising • Documents user key inputs • mimics a legitimate program • Used to launch DDoS attacks • Unauthorized file encryption • Spreads without user interaction • The bypassing of a security system • Unwanted performance hindering software • Damages files and spreads across devices • Used to take remote control over a device • ...
Security Information Crossword 2013-10-01
Across
- Interfere with computer operation
- Social networks targets business professionals
- Largest social network today
- Not a form of social media
- Real-time communication
- Not harmful to your computer
- Common form of authentication
Down
- Stealing a person’s bank account number
- Activity computer becoming infected by Malware
- Junk e-mail
- Responsible for managing LAN
- Computer viruses and Trojan Horses
12 Clues: Junk e-mail • Real-time communication • Not a form of social media • Largest social network today • Responsible for managing LAN • Not harmful to your computer • Common form of authentication • Interfere with computer operation • Computer viruses and Trojan Horses • Stealing a person’s bank account number • Activity computer becoming infected by Malware • ...
Social Security Administration 2016-04-27
Across
- when someone disagrees with a decision
- a scheduled date and time for an event
- type of agency for SSA
- how we inform recipients of changes to their benefits
- recipents get this every month
Down
- how we communicate with the public
- when SSA employees gather as a group to receive information
- how SSA workers stay informed of updated policies
- a condition/illness that allows SSA to pay an individual
- health insurance SSA offers the public at age 65
- SSA assigns this unique set to each individual
- SSA videos
12 Clues: SSA videos • type of agency for SSA • recipents get this every month • how we communicate with the public • when someone disagrees with a decision • a scheduled date and time for an event • SSA assigns this unique set to each individual • health insurance SSA offers the public at age 65 • how SSA workers stay informed of updated policies • ...
Unit-1: Security Architecture and OS Security Fundamentals 2025-08-04
Across
- This component manages hardware and software resources on a computer(13 letters)
- A set of processes and technologies used to protect data in information systems(13 letters)
- A type of security that focuses on protecting communication via emails (5,8 letters)
- A structured collection of data or information that can be easily accessed, managed, and updated(8 letters)
- The high-level description of how an OS interacts with hardware and software (9,7 letters)
- These are categorized into tangible and intangible types, and have organizational value (5,5 letters)
- Refers to the weaknesses in an operating system that can be exploited (14 letters)
- A rule that enforces how passwords should be created and managed (8,8 letters)
- A method of security that often involves layers like hardware, software, and processes (8,7 letters)
Down
- The full form of DBMS (8,10 letters)
- An individual element in an information system that has value and requires protection(5 letters)
- A program that manages user permissions and roles in a system (4,13 letters)
- Refers to the protection of devices and users connected through the web (7,8 letters)
- The process of verifying the identity of a user(14 letters)
- The overall design and structure of security controls in an organization(11 letters)
15 Clues: The full form of DBMS (8,10 letters) • The process of verifying the identity of a user(14 letters) • A program that manages user permissions and roles in a system (4,13 letters) • A rule that enforces how passwords should be created and managed (8,8 letters) • This component manages hardware and software resources on a computer(13 letters) • ...
Spanish Vocab 2024-05-10
Terrorism Case Study - 9/11 2014-05-11
Across
- The fourth plane crashed in an empty field in ______ due to heroic passengers
- Hijackers aboard Flight 77 crash the plane into the western front of the ______
- USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
- The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
Down
- Terrorist group responsible for September 11th attacks.
- The Department of _______ Security was created to coordinate national efforts against terrorism
- The use of force or threats to frighten people and the government
- Agents that move to a country, blend into a community
- The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
- _____ bin Laden was responsible for coordinating the attacks
- Letters containing bacteria that cause _____ were sent to members of Congress
11 Clues: Agents that move to a country, blend into a community • Terrorist group responsible for September 11th attacks. • _____ bin Laden was responsible for coordinating the attacks • The use of force or threats to frighten people and the government • The fourth plane crashed in an empty field in ______ due to heroic passengers • ...
The Executive Cabinet 2025-03-10
Across
- focuses on programs and services and services that improve the well-being of society (_______ and Human Services)
- handles foreign policy and international relations
- deals with housing programs and the development of highly populated areas (Housing and _____ Development)
- oversees policies and programs that affect schools and FAFSA
- oversees farming and food safety
- handles policies related to fuel sources and nuclear security
- manages national parks and natural resources
Down
- promotes economic growth and technological innovation
- serves former military personnel
- enforces federal laws
- oversees infrastructure related to roads, railroads and airports
- manages the nation's finances and collects taxes
- responsible for protecting the country against foreign invasion
- focusing on domestic security
- protects workers' rights
15 Clues: enforces federal laws • protects workers' rights • focusing on domestic security • serves former military personnel • oversees farming and food safety • manages national parks and natural resources • manages the nation's finances and collects taxes • handles foreign policy and international relations • promotes economic growth and technological innovation • ...
RansomWare activity 2025-05-23
Across
- Plants malicious encryption software
- New Years ransomware attack
- Locksdevices and causing data across the network to be encrypted
- U.S. workforce management
- Attacked by the Darkside group
Down
- Receive an on-screen notification from the cyber criminal
- blocks access to a computer system until a sum of money is paid
7 Clues: U.S. workforce management • New Years ransomware attack • Attacked by the Darkside group • Plants malicious encryption software • Receive an on-screen notification from the cyber criminal • blocks access to a computer system until a sum of money is paid • Locksdevices and causing data across the network to be encrypted
Safety Switch Crossword 2024-05-11
Across
- Who you take safety concerns to.
- What is available if we are injured at work?
- What we do with near misses.
- What to complete after a safety incident.
- What comes first, always?
Down
- What you always need for cleaning tasks.
- What we remember with security incidents.
- The step before fixing hazards.
- What to do if you see unsafe behaviour?
- What should we do after mistakes?
- How do you report security incidents?
11 Clues: What comes first, always? • What we do with near misses. • The step before fixing hazards. • Who you take safety concerns to. • What should we do after mistakes? • How do you report security incidents? • What to do if you see unsafe behaviour? • What you always need for cleaning tasks. • What we remember with security incidents. • What to complete after a safety incident. • ...
Grow in Grace 2013-10-19
Across
- In Christian term, it is the act of maturing.
- The condition of man.
- Every person has come _______ of the glory...
- Our security comes from God's __________.
- Not knowing for sure.
- Book in the Bible that teaches that there are two types of people.
- You are saved through _________.
- According to his ________ we are saved. (Titus 3:5)
Down
- Salvation is really a new __________.
- Salvation is like this, it is always free.
- Another term for payment.
- Equitable in character or act.
- It is the assurance of Salvation.
- It is a paper, the value of which depends upon its acceptance by the person implicated.
14 Clues: The condition of man. • Not knowing for sure. • Another term for payment. • Equitable in character or act. • You are saved through _________. • It is the assurance of Salvation. • Salvation is really a new __________. • Our security comes from God's __________. • Salvation is like this, it is always free. • In Christian term, it is the act of maturing. • ...
Round 3 Finance Crossword 2024-11-14
Across
- India's Financial Capital
- An asset pledged as security for the repayment of a loan
- The date on which the instrument becomes due
- Which country has the most Billionaires
- india's biggest philanthropist (Current)
- The term for the number of employees assigned to a manager
Down
- Tradable financial instruments that represent ownership (stocks)
- Airlines that has the biggest customer base during 2008-2011 (Named after a bird)
- In USP, P stands for?
- India's largest Cars and Trucks exporter
- The one organizes a company's Funances
- Current chairperson of NITI Ayog
- Largest finance company in India
- Indian Bank with most branches in foreign country
14 Clues: In USP, P stands for? • India's Financial Capital • Current chairperson of NITI Ayog • Largest finance company in India • The one organizes a company's Funances • Which country has the most Billionaires • India's largest Cars and Trucks exporter • india's biggest philanthropist (Current) • The date on which the instrument becomes due • ...
QAF5.2.IAM301 2025-11-03
Across
- Linking identities across organizations or systems
- Single Sign-On allowing one login for multiple apps
- Result of unsynchronized clocks in SSO systems
- Restricting token use to one specific device
- Multi-Factor Authentication adding extra login security
- Granting only the access needed to perform a job
- Privileged Access Management for admin accounts
Down
- Security model that verifies every access request
- Attack type limited by short token lifespans
- Temporary credential used for authentication
- Digital credential whose misconfiguration causes trust issues
- Analogy for IAM verifying user access like a club guard
- Protocol that uses timestamps to prevent tampering
- Manages who can access which systems or resources
14 Clues: Attack type limited by short token lifespans • Temporary credential used for authentication • Restricting token use to one specific device • Result of unsynchronized clocks in SSO systems • Privileged Access Management for admin accounts • Granting only the access needed to perform a job • Security model that verifies every access request • ...
Cybersecurity Terms 2023-10-27
15 Clues: GRC • Purple • Razeen • Toddlers • Checkmarx • Teel Tech • Picus Security • Philip Cherian • Video Forensics • Incident Response • Mobile Acquisition • #NotTraditionalPAM • Data Classification • Mobile Device Management • External Threat Landscape
5/20 - DO NOW (tener que) 2025-05-13
16 Clues: nadar • hotel • el mapa • el taxi • la playa • la playa • embarque • el viaje • pasaporte • el boleto • el volcán • aeropuerto • las maletas • el ascensor • la seguridad • la estación de autobús
Decode the Competencies Behind the Titles 2025-06-12
Across
- practice specialized in the design and development of features that Supports from L1 autonomous to L3 autonomous adhering to standard APSICE compliance.
- Designs and validates automotive-grade hardware like ECUs, sensor modules, and controller boards, supporting high-speed interfaces, thermal and EMI/EMC requirements, and production readiness.
- Supports OEMs in developing EV systems such as battery management systems (BMS), electric drivetrains, onboard chargers, and power electronics aligned with global electrification trends
- Delivers robust automotive cyber security solutions including secure boot, secure communication, ECU hardening, and compliance with standards like ISO/SAE 21434 to protect connected vehicle ecosystems
- involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions
- Develops and integrates telematics control units (TCUs), cloud communication modules, and data analytics platforms enabling vehicle tracking, remote diagnostics, and V2X capabilities.
- Focuses on cloud-enabled connected car platforms, including over-the-air (OTA) updates, remote diagnostics, telematics backends, and fleet data analytics to enhance vehicle connectivity and user experience.
- Provides ISO 26262-compliant safety solutions including safety analysis, tool qualification, and software/hardware validation for safety-critical systems like ADAS, powertrain, and steering.
Down
- Encompasses end-to-end automotive engineering services at Tata Elxsi, including vehicle architecture, domain integration, and support across powertrain, ADAS, body, and infotainment systems
- Specializes in the design and development of advanced test automation solutions and test execution.
- Provides system-level engineering services including vehicle architecture definition, integration, and validation to ensure cross-domain functionality and performance in modern vehicle platforms.
- Utilizes tools like MATLAB/Simulink for algorithm development, rapid prototyping, and auto code generation to accelerate ECU development and validation for domains such as powertrain and chassis.
- practice specializes in the development virtual models of controller, system on chips, ECUs so that embedded software can be developed and validated much before the target hardware is available.
- Covers development of advanced digital cockpit solutions including infotainment, digital instrument clusters, voice assistants, and connected vehicle services using Android Automotive and embedded platforms.
14 Clues: Specializes in the design and development of advanced test automation solutions and test execution. • involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions • ...
tosta 2024-05-17
Scientific Management 2023-01-17
ICT-Begrippen 2017-10-06
Across
- software foutje
- een reserve harde schijf waar data op bewaard kan worden
- camera in of aan de computer waarmee anderen je via internet, jou of je omgeving kunnen zien
- apparaat waarmee fysieke afdrukken van documenten kunnen worden gemaakt
- virus
- draadloze verbinding op korte afstand
- digitaal
- Acces Point(WAS): draadloos netwerk toegangspunt
- apparaat dat computer netwerken met elkaar kan verbinden
- (vaste) onderdelen van de computer
- apparaat waarmee fysieke documenten en/of afbeeldingen digitaal omgezet worden
- virtuele munteenheid
- schijf extern geheugen van de computer waar gegevens op bewaard kunnen worden
Down
- externe opslag
- het toetsenbord
- systeem dat beschermt tegen misbruik of inbraak van buitenaf
- computer en/of programma die diensten verleend
- systeembord of elektronische printplaat
- internet(pagina)
- computerprogramma's
- actualiseren
- apparaat waarmee je specifieke dingen op een computer kan aanwijzen of aanklikken
- online opslag
23 Clues: virus • digitaal • actualiseren • online opslag • externe opslag • software foutje • het toetsenbord • internet(pagina) • computerprogramma's • virtuele munteenheid • (vaste) onderdelen van de computer • draadloze verbinding op korte afstand • systeembord of elektronische printplaat • computer en/of programma die diensten verleend • Acces Point(WAS): draadloos netwerk toegangspunt • ...
Crossword of terms in class 2013-05-23
Across
- The secret word when you log in at Edmodo is your....
- Where music can be created
- This is where settings are placed
- Where all the files you delete end up
- The computers we are using in class
- Home page for all the students
- The place where music is organized and in several lists
- Our mouse for the computer
- Where presentations with several slides of pictures can be created
- Protect your computer from viruses
- Where apps can be downloaded
Down
- The newest apple phone
- Message when you have turned in an assignment on Edmodo
- Where is this crossword made?
- Free homepage we all created
- Where all the numbers can be created
- Cyber game
- This is the place where pictures can be edited
- Where your movies can be put together and edited
- For people who like to write many pages of words
20 Clues: Cyber game • The newest apple phone • Where music can be created • Our mouse for the computer • Free homepage we all created • Where apps can be downloaded • Where is this crossword made? • Home page for all the students • This is where settings are placed • Protect your computer from viruses • The computers we are using in class • Where all the numbers can be created • ...
Health and Christmas 2020-12-15
Across
- Stay away from others for 14 days
- This is an abbreviated form of a growing movement
- Speak to an ___________ if there is a problem
- You should never answer the door when you are
- Self care is good for personal _________
- There are __ food groups
- This is a drink enjoyed at Christmas
- There are ____ for making poor choices
- When in public we must wear a
- The idea of including everyone
- Christmas in French
Down
- Being aware of healthy choices for our body
- Our bodies depend on this to survive
- Call 911 if someone is ever ____
- ______ can become involved with serious bullying
- Cyber, verbal or physical
- It saves someone from an allergic reaction
- _____ should check in with their kids often
- If you're unsure of the water enter slow and _ first
- When a building can be easily entered it is__
20 Clues: Christmas in French • There are __ food groups • Cyber, verbal or physical • When in public we must wear a • The idea of including everyone • Call 911 if someone is ever ____ • Stay away from others for 14 days • Our bodies depend on this to survive • This is a drink enjoyed at Christmas • There are ____ for making poor choices • Self care is good for personal _________ • ...
Journalism Vocab Crossword 2020-12-20
Across
- Leading up to the end
- Publisher imprint
- Online
- Highschool, College, Middleschool
- to argue
- Trump vs. Biden
- The front
- How you live
- vertical sections
- Four colors
- used to seperate
- To persuade
- thin
- pays respects to someone whos past
- The beginning
- re-route
- The press
- What holds a book together
- biomes, outside
- First page in a book
- Used for climbing
- how you sign your name
- Whats in the book
Down
- detailed coverage
- Text with information
- A topic
- Biology, DNA, Biomes
- Double
- A sector
- Cameo
- Occupation, Profession
- Everybody's got one
- Detective
- Frontal
- Pictures
- A written account of events
- the last page
- Color generated by ink
- An overview
- An Alphabetical list
- Piece of writing
- Football
- To Uncover something
- Feedback
44 Clues: thin • Cameo • Online • Double • A topic • Frontal • to argue • A sector • Pictures • re-route • Football • Feedback • The front • Detective • The press • Four colors • To persuade • An overview • How you live • the last page • The beginning • Trump vs. Biden • biomes, outside • used to seperate • Piece of writing • detailed coverage • Publisher imprint • vertical sections • Used for climbing • Whats in the book • Everybody's got one • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
HMH Crossword Puzzle 2023-04-20
Across
- starting point when call comes in
- attachment icon
- ticketing system for HMHN
- Not supported by CSD
- nine characters used in log in
- inquiry with insurance carrier
- HUMC\user id
- What field is PHI in?
- view only users that Do Not have Epic training
- Outpatient care
- call when Cyber Ark is locked
- Tool for self-service-password reset and unlock accounts
- place user's email in this field
- used to verify users
Down
- Self service area in Epic
- Inactive for more than 180 days or six months
- tool used for dictation
- Block that CSD can remove
- what unlock that does not require verification?
- Grand Central used for transfer, admissions etc.
- Service Access request
- what can CSD use to prepopulate tickets with certain information
- User calls to report something broken or needs repair
- the training environment transfer to TSD
- citrix shadowing tool
25 Clues: HUMC\user id • attachment icon • Outpatient care • Not supported by CSD • used to verify users • What field is PHI in? • citrix shadowing tool • Service Access request • tool used for dictation • Self service area in Epic • ticketing system for HMHN • Block that CSD can remove • call when Cyber Ark is locked • nine characters used in log in • inquiry with insurance carrier • ...
TTS PKK 2024-11-06
Across
- Tindakan untuk memperluas pasar dengan masuk ke daerah baru
- Produk yang ada dalam bentuk virtual atau digital
- Tahap siklus hidup dimana penjualan produk mnecapai puncak sebelum melambat
- Barang yang tak mudah habis
- Mewujudkan
- Proses hidup suatu produk dalam bisnis
- Proses pembuatan prototipe produk
- Dimensi yang menilai perkiraan masa hidup produk
- Proses berfikir kreatif untuk menghasilkan berbagai solusi unik
- Model dari suatu produk barang atau jasa yang akan dibuat
Down
- Nama atau simbol yabg digunakan untuk membedakan produk
- Orang yang merancang dam membuat prototipe produk
- Proses untuk mengenalkan produk ke distributor atau pengecer
- Dimensi yang memastikan prototipe sesuai dengan produk
- Metode untuk memecahkan masalah dalam waktu singkat
- Proses memahami apa yang konsumen rasakan dan butuhkan
- Yang menjadi pemimpin dalam proses design sprint
- Dimensi yang menggambarkan prototipe melalui visual atau tulisan
- Proses desain untuk mendefinisikan kebutuhan konsumen
- Konsumen dengan pengetahuan tentang produk
20 Clues: Mewujudkan • Barang yang tak mudah habis • Proses pembuatan prototipe produk • Proses hidup suatu produk dalam bisnis • Konsumen dengan pengetahuan tentang produk • Yang menjadi pemimpin dalam proses design sprint • Dimensi yang menilai perkiraan masa hidup produk • Orang yang merancang dam membuat prototipe produk • Produk yang ada dalam bentuk virtual atau digital • ...
Extra Credit Crossword Puzzle 2024-12-06
Across
- Network that revolutionized global communication
- Means of mass communication central to the digital age
- The revolution marked by computers and the internet
- Key driver of globalism and communication advances
- A communication medium popular before the digital era
- A term reflecting contemporary ideas and practices
- Modernist medium that transformed storytelling and culture
- Modernist design school emphasizing function and form
- Modernist art style associated with Picasso
- An early movement influencing modernist ideas
- Reflecting worldwide scale and influence
Down
- A characteristic of modernist art and design
- Movement rejecting the ideas of modernism
- Long-established customs and ideas challenged by modernists
- Artistic movement that broke away from traditional forms
- An artistic movement celebrating technology and speed
- Prefix often used in terms related to digital technology
- A global communication tool from the digital revolution
- New form of media delivery enabled by the digital age
- The interconnectedness of the world through technology and trade
20 Clues: Reflecting worldwide scale and influence • Movement rejecting the ideas of modernism • Modernist art style associated with Picasso • A characteristic of modernist art and design • An early movement influencing modernist ideas • Network that revolutionized global communication • Key driver of globalism and communication advances • ...
Eagle 101 topics 2025-10-06
Across
- the ability to understand and share the feelings of another
- to achieve something successfully
- the action of organizing something
- working together
- the feeling that something good can happen and that you can help make it happen
- a strong feeling of annoyance and hostile behavior
- able to be relied on as honest to be treated
- the vaping lesson speaker
- a natural response to fear or stress
- saying I can do this
- bullying bullying online
Down
- the act of working together for a common purpose to achieve a mutual benefit
- a unstoppable habet
- standing up against behaviors that are mean and harmful happening over and over again
- an intense and irrational fear of something
- treating others how you want to be treated
- Drug, abuse, resistance and education
- believing in yourself
- the quality of being friendly, generous and considerate
- response to life's pressure
20 Clues: working together • a unstoppable habet • saying I can do this • believing in yourself • bullying bullying online • the vaping lesson speaker • response to life's pressure • to achieve something successfully • the action of organizing something • a natural response to fear or stress • Drug, abuse, resistance and education • treating others how you want to be treated • ...
Julia Zorrilla, block 6 2024-05-09
Across
- Is a loan that the bond purchaser, or bondholder, makes to the bond issuer.
- Is a security that pays interest over terms ranging from 2-10 years.
- Means that money is the common measure of worth or price of a good.
- Is the process of transferring from one individual/organization to another.
- Is money used in exchange for goods and services needed by individuals and governments.
- Allows customers to pay for a purchase directly from their checking account.
- Is a security that matures in a year or less.
Down
- Is a transfer of money from one bank account to another one.
- Means money can also be save and stored for later.
- Is the mechanism a nation uses to provide and manage money for itself.
- Is a negotiable promissory note which one party can use to pay another party a specific amount of money.
- Is the name of currency in the U.S
- Is a plastic card that allows the holder to make credit purchases up to an authorized amount.
- Is the state of being or feeling secure; freedom from fear, anxiety, and danger.
14 Clues: Is the name of currency in the U.S • Is a security that matures in a year or less. • Means money can also be save and stored for later. • Is a transfer of money from one bank account to another one. • Means that money is the common measure of worth or price of a good. • Is a security that pays interest over terms ranging from 2-10 years. • ...
ASM 2020-11-22
Across
- - This is how Office ID is called in ASM (2 words without space) (9)
- - It's used when MFA is activated for the application (4)
- - A component of the office ID (8)
- - A login, used to access the system and perform automated tasks within Amadeus application (7)
- - All changes to data stored in the system are logged and can be displayed using ... (7)
- - The graphical user interface of the Logon and Security Server (3)
- - A gateway, that routes messages to Logon and Security Server (2)
- - An aggregation of the Permissions or Sub-roles (4)
Down
- - We change the user status to ... when the employee has maternity leave (6)
- - You create ... when you want to group together offices within the Organization (2 words without a space) (16)
- - A component of the office mask (7)
- - Filter, used to define the format of the offices that can be attached to ORG or OGU (2 words without space) (10)
- - Payment Card Industry Data Security Standards (6)
- - This is the process for the users to use the same credentials to log into different Amadeus applications (3)
- - To change an office location within the Organization tree I use ... (4)
15 Clues: - A component of the office ID (8) • - A component of the office mask (7) • - Payment Card Industry Data Security Standards (6) • - An aggregation of the Permissions or Sub-roles (4) • - It's used when MFA is activated for the application (4) • - A gateway, that routes messages to Logon and Security Server (2) • ...
Helloto 2025-11-19
Across
- – OSCE mediation format created to negotiate a political settlement of the Nagorno-Karabakh conflict.
- – 1994 document that formalized the ceasefire starting on 12 May 1994.
- – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
- – Principle emphasized by Azerbaijan to defend its internationally recognized borders.
- – Principle invoked by Armenia to justify claims regarding Nagorno-Karabakh’s status.
- – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
- – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
Down
- – Agreement brokered by Iran in May 1992 that collapsed after the occupation of Shusha.
- – 1996 OSCE summit that adopted principles affirming Azerbaijan’s territorial integrity.
- – First UN Security Council resolution demanding withdrawal of occupying forces from Kalbajar.
- – UN Security Council resolution of October 1993 that reaffirmed Nagorno-Karabakh as part of Azerbaijan.
- – Azerbaijani town where a massacre of civilians took place during the conflict.
- – 1994 OSCE meeting where the Minsk Group co-chairmanship and peacekeeping role were defined.
- – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
- – Strategically important town whose occupation marked a turning point in the war.
15 Clues: – 1994 document that formalized the ceasefire starting on 12 May 1994. • – Azerbaijani town where a massacre of civilians took place during the conflict. • – Strategically important town whose occupation marked a turning point in the war. • – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict. • ...
Technology and social media 2021-09-17
Across
- The streaming platform created in 2005
- The online platform you use for maths homework
- Never disclose this
- An education version is now in schools
- The company that develops the xbox console
- The name given to online bullying
- The football game that is often played online
- If you post on Twitter you .....
- A platform that allows you to upload videos
- The company that develops the iPhone and iPad
Down
- The age you must be to have a WhatsApp account
- The BBC's online live tv and streaming service
- The age you must be to have a Facebook account
- A streaming service to listen to music
- What you sign into to access the chromebooks
- A streaming service to watch TV and films
- You should be thirteen to play this game
17 Clues: Never disclose this • If you post on Twitter you ..... • The name given to online bullying • The streaming platform created in 2005 • A streaming service to listen to music • An education version is now in schools • You should be thirteen to play this game • A streaming service to watch TV and films • The company that develops the xbox console • ...
DEFINITIONS - Working within the private security industry 2015-03-14
Across
- Hostile attitude towards someone who belongs to a certain group.
- The security industry authority.
- Immediate assistance given to an injured person.
- Approved contractor scheme.
- Those who commit a sexual crime against the vulnerable.
- The sending and receiving of signals.
- Staff members responsible for an area of fire safety.
- Any serious unplanned incident
- The use of violence, threats and intimidation in pursuit of political aims.
- Anything hat makes communication difficult.
Down
- A state of feeling safe and secure.
- Identification of hazards and risks.
- Rules that prevent people from committing a serious offence
- Lumping certain groups of people together.
- Reporting of injuries diseases and dangerous occurrences regulations.
- Anyone who may be at risk of harm.
- When someone is treated less favourably than another person.
- Rules that help govern our daily lives.
- The likelihood of harm occurring.
19 Clues: Approved contractor scheme. • Any serious unplanned incident • The security industry authority. • The likelihood of harm occurring. • Anyone who may be at risk of harm. • A state of feeling safe and secure. • Identification of hazards and risks. • The sending and receiving of signals. • Rules that help govern our daily lives. • Lumping certain groups of people together. • ...
Roosevelt and the New Deal 2023-02-13
Across
- a debt security that the government sells in order to finance its spending
- the state of being successful and thriving, especially in financial terms
- security
- to define oneself
- planting trees in areas where they had been cut down
- lucky
- a campaign to support a political, social, or religious cause
- projects that are financed by government through tax revenues for the benefit of the people
- land not good for farming
Down
- lack of trees that can be cut down and used
- a strong invitation to participate in an important project
- giving out
- the ability to anticipate future events or needs
- to increase
- things that are not necessary for survival or basic comfort
- a long and severe economic downturn
- land where trees have been cut down
- someone who tells about the future
- wearing away of the top, fertile layer of soil
19 Clues: lucky • security • giving out • to increase • to define oneself • land not good for farming • someone who tells about the future • a long and severe economic downturn • land where trees have been cut down • lack of trees that can be cut down and used • wearing away of the top, fertile layer of soil • the ability to anticipate future events or needs • ...
CNN Student News 2/18 - 2/20 2014-02-20
Across
- latest retail company hacked by cyber criminals
- SAD: Symtoms include fatigue, lack of energy, oversleeping & food cravings
- Born on February 22, 1732
- European city where anti-government protests turned violent on Tuesday
Down
- Country leading in gold medals at the Olympics as of Tuesday
- __________ & togetherness; a cure for the winter blues
- South American country experiencing anti-government political protests
- US City that experienced it's snowiest winter on record this year
- Company using data from music choices to guess your political preference
- Cost of Lincoln Memorial in 1914
- Country's unemployment at 3%, hitting a 6 year low
- Capital city of Thailand
12 Clues: Capital city of Thailand • Born on February 22, 1732 • Cost of Lincoln Memorial in 1914 • latest retail company hacked by cyber criminals • Country's unemployment at 3%, hitting a 6 year low • __________ & togetherness; a cure for the winter blues • Country leading in gold medals at the Olympics as of Tuesday • ...
Unit 5 Key Words 2015-08-20
Across
- People who receive bad treatment from others.
- When a persons identity is unknown or hidden
- Someone who treats other people badly, harassing them and making them feel bad.
- instant messaging
- Writing about something that interests you on the internet
Down
- To annoy or repeatedly bother someone intentionally
- Meaning very, very old!
- To tell somebody that you will do something bad to them.
- The act of physically or mentally abusing somebody
- A verb and a noun meaning to talk about others without them knowing.
- Something which may or may not be true.
- a prefix meaning using the internet and technology
12 Clues: instant messaging • Meaning very, very old! • Something which may or may not be true. • When a persons identity is unknown or hidden • People who receive bad treatment from others. • The act of physically or mentally abusing somebody • a prefix meaning using the internet and technology • To annoy or repeatedly bother someone intentionally • ...
Learning Theories revision 2023-04-10
Across
- A type of economy used to exchange with rewards
- The psychologist who did the dog study
- When your results accurately measure what you intended to measure
- out humanity
- Learning through the consequences of another person’s behavior
- Psychologist who researched Cyber-dehumanization: Violent Video game play
Down
- Known for his work on classical conditioning
- the disappearance of behavior that was previously learnt through being associated with another stimulus
- where a person copies the behavior of a role model
- When a theory/study ignores free will
- The psychologist know for his pigeon study
- How many pigeons used in the superstitious pigeon study
12 Clues: out humanity • When a theory/study ignores free will • The psychologist who did the dog study • The psychologist know for his pigeon study • Known for his work on classical conditioning • A type of economy used to exchange with rewards • where a person copies the behavior of a role model • How many pigeons used in the superstitious pigeon study • ...
THE IT ACT, 2000 2022-05-26
Across
- key used to verify digital sign
- person in whose name the digital signature certificate is issued
- upon the death of the subscriber digital signature certificate shall be
- act of establishing a particular person as the creator of work
- means to verify genuiness of the record
- authentication of electronic record
Down
- issued by certifying authority to subscriber for digital signature certificate
- key used to create a digital sign
- criminal activities carried out by means of computer or internet
- example of certifying authority in India
- cyber crime includes
- The IT act shall not apply to a
12 Clues: cyber crime includes • key used to verify digital sign • The IT act shall not apply to a • key used to create a digital sign • authentication of electronic record • means to verify genuiness of the record • example of certifying authority in India • act of establishing a particular person as the creator of work • ...
Media and Law 2023-05-18
Across
- to show smith that was previously secret
- to force someone to leave somewhere
- a legal document ordering someone to appear in a law court
- looking cheap and of law quality
- an act of breaking a law
- the act of believing that something is true without having any proof
Down
- a piece if writing that contains bad or false things about a person
- not interesting and exciting (or not clear or shiny)
- statements given in a law court
- to try very hard to do something
- involving or relating to computers
- a change made in the text
12 Clues: an act of breaking a law • a change made in the text • statements given in a law court • to try very hard to do something • looking cheap and of law quality • involving or relating to computers • to force someone to leave somewhere • to show smith that was previously secret • not interesting and exciting (or not clear or shiny) • ...
Learning Through Gaming 2014-09-15
Across
- HIPPA applies to all _____ organizations
- Does not require written patient permission
- Type of law
- How many years could a person face for releasing protected health information
- Must furnish the patient a privacy ______
- Steps organizations take to protect electronic information
- Health records can only be requested by the _____
Down
- You may refuse to release information that may be ______
- All employees that handle protected health information must go through _____
- After a patient dies who gets control of the patient information
- Computer Security
- HIPPA regulations are managed by the ______
- Health records cannot be requested by the _____
- Health records include the following format paper, electronic, and _____
- Health Insurance Portability and Accountability Act
15 Clues: Type of law • Computer Security • HIPPA applies to all _____ organizations • Must furnish the patient a privacy ______ • HIPPA regulations are managed by the ______ • Does not require written patient permission • Health records cannot be requested by the _____ • Health records can only be requested by the _____ • Health Insurance Portability and Accountability Act • ...
SMUN' 24 UN Trivia 2024-10-26
Across
- UN specialized agency providing food assistance
- The UN Headquarters are in this city
- Name of the UN's Paris-based cultural organization
- UN's agency for child welfare
- Last and best MUN Conference of 2024 in Bangladesh
- Official title for the UN’s top diplomat
- Organization replaced by the UN in 1945
Down
- number of permanent members in the Security Council
- agency dealing with labor rights and standards
- UN agency focusing on international health issues
- UN's organization that works for gender equality
- The founding document of UN
- UN body responsible for maintaining international peace and security
- Document that outlines fundamental human rights, adopted in 1948
- second most common language in UN after English
15 Clues: The founding document of UN • UN's agency for child welfare • Organization replaced by the UN in 1945 • The UN Headquarters are in this city • agency dealing with labor rights and standards • second most common language in UN after English • Official title for the UN’s top diplomat • Last and best MUN Conference of 2024 in Bangladesh • ...
CITTADINANZA DIGITALE:IACU 2022-01-12
Across
- capacità di un individuo di partecipare alla società anche online
- “pirata digitale”
- atto disonesto e aggressivo, può portare a gravi conseguenze
- specifico simbolo che identifica una specifica marca pubblicizzandola
- rete che consente la funzione di internet
- spargere notizie private senza il consenso del diretto interessato
Down
- social dove condividere foto e video
- attività diventata obbligatoria ormai per tutte le materie scolastiche
- deridere qualcuno per le sue condizioni fisiche
- foto scattata dal soggetto che può essere in compagnia di amici e postata sui social
- programma realizzato per essere installato su dispositivi portatili
11 Clues: “pirata digitale” • social dove condividere foto e video • rete che consente la funzione di internet • deridere qualcuno per le sue condizioni fisiche • atto disonesto e aggressivo, può portare a gravi conseguenze • capacità di un individuo di partecipare alla società anche online • programma realizzato per essere installato su dispositivi portatili • ...
Gossip 2018-01-17
Across
- An attack made as a response to another attack.
- Resist the urge to _______________ .
- Don’t _____________ anyone who is violent.
- What you wrote about me was really m______ .
Down
- Sometimes it’s hard to ____________ the temptation to fight back.
- All the gossip that has spread about me cheating in the final exam has ruined my _________ as school captain.
- A response that is more dramatic or greater than necessary.
- To say you’re sorry.
- Someone who bullies people online.
- Failure to recognise or to pretend something is not happening.
- Somebody who’s being picked on.
11 Clues: To say you’re sorry. • Somebody who’s being picked on. • Someone who bullies people online. • Resist the urge to _______________ . • Don’t _____________ anyone who is violent. • What you wrote about me was really m______ . • An attack made as a response to another attack. • A response that is more dramatic or greater than necessary. • ...
crossword puzzle 2025-11-27
Across
- The most common way attackers send phishing links.
- secret string of characters used to gain access.
- To break into a computer system illegally
- The written instructions that make software work.
Down
- Safe or protected from attack
- Malicious code that spreads from computer to computer.
- Online storage where data is kept instead ofon your hard drive
- Information that AI needs to analyze to learn.
- Short for "robot," an automated program.
- Prefix relating to computers, information technology and the internet.
- An AI tool that has been trained on data to make predictions
11 Clues: Safe or protected from attack • Short for "robot," an automated program. • To break into a computer system illegally • Information that AI needs to analyze to learn. • secret string of characters used to gain access. • The written instructions that make software work. • The most common way attackers send phishing links. • ...
online security 2022-10-25
8 Clues: open to attack • In an accurate way • Weakened or damaged • Based on fraud or deceit • A very fast rate of change • sexually transmitted diseases • To steal, usually small amounts • According to what is claimed or believed
Ciber Security 2020-08-20
Across
- son subrepticios que trabajan activamente en contra de la persona atacada.
- evita el acceso no autorizado a una red privada.
- es un programa informático que detecta y elimina virus otros programas perjudiciales.
- tiene como objetivo obtener información de cuentas privadas, especialmente para acceder a sus cuentas bancarias.
Down
- contiene información que no es cierta.
- es el correo no solicitado que recibe una persona.
- son programas informáticos que alteran el funcionamiento del computador.
- es un software que saca información de tu computador sin tu consentimiento.
8 Clues: contiene información que no es cierta. • evita el acceso no autorizado a una red privada. • es el correo no solicitado que recibe una persona. • son programas informáticos que alteran el funcionamiento del computador. • son subrepticios que trabajan activamente en contra de la persona atacada. • ...
Security Guide 2023-07-19
Across
- a container filled with explosive, incendiary material, smoke, gas, or other destructive substance, designed to explode on impact
- a person or thing likely to cause damage or danger
- the action of evacuating a person or a place
- the practice of obtaining something, especially money, through force or threats
Down
- a person employed for wages or salary
- a person who uses a gun either regularly or on a particular occasion
- put or keep out of sight; conceal from the view or notice of other
- the civil force of a national or local government, responsible for the prevention and detection of crime and the maintenance of public order
8 Clues: a person employed for wages or salary • the action of evacuating a person or a place • a person or thing likely to cause damage or danger • put or keep out of sight; conceal from the view or notice of other • a person who uses a gun either regularly or on a particular occasion • the practice of obtaining something, especially money, through force or threats • ...
Network Security 2024-01-30
Across
- A logic bomb lies dormant until a specific piece of program code is activated.
- Usually attached to a document or spreadsheet and uses the macro functions or scripting language of the application.
- Applies to program files and gives the user the right to run the program.
- Malicious Programs which replicate themselves from system to system without the use of a host file.
Down
- A computer program that is self replicating and can affect a computer.
- User is prohibited from accessing the file in any way.
- Assigned to each user to ensure that they may only access particular files or records according to their information needs.
- Should be made so that lost data can be recovered easily.
8 Clues: User is prohibited from accessing the file in any way. • Should be made so that lost data can be recovered easily. • A computer program that is self replicating and can affect a computer. • Applies to program files and gives the user the right to run the program. • A logic bomb lies dormant until a specific piece of program code is activated. • ...
Food Security 2024-03-19
Across
- Having enough food that meets nutritional needs for good health.
- Term referring to the state or condition of obtaining the bare necessities for survival, such as food, shelter, and clothing.
- Term referring to the food, nourishment, and resources essential for maintaining life and well-being.
- The act of providing essential nutrients for growth and health through the consumption of food.
Down
- The ability to meet current needs without compromising the ability of future generations to meet their own needs.
- The feeling of fullness and satisfaction after eating, indicating that one's hunger has been sufficiently satisfied.
- The ability of individuals and communities to bounce back and adapt to challenges or disruptions.
- The quality and availability of food that meets the dietary needs of individuals and communities, ensuring they have access to sufficient nutrients.
8 Clues: Having enough food that meets nutritional needs for good health. • The act of providing essential nutrients for growth and health through the consumption of food. • The ability of individuals and communities to bounce back and adapt to challenges or disruptions. • ...
Food security 2024-12-17
Across
- A vegetable that can be boiled, smashed and make chips
- Name of this food is also color name
- A vegetable which builds immunity
Down
- A green food which keeps your body hydrated
- A vegetable which makes you cry
- Food that keeps a doctor away
- A vegetable that can be enjoyed by rabbits
- Food that is a source of vitamin C
8 Clues: Food that keeps a doctor away • A vegetable which makes you cry • A vegetable which builds immunity • Food that is a source of vitamin C • Name of this food is also color name • A vegetable that can be enjoyed by rabbits • A green food which keeps your body hydrated • A vegetable that can be boiled, smashed and make chips
FOOD SECURITY 2024-08-14
8 Clues: A serving size of food • Purchasing more than needed • Food remaining after a meal • End of a product's shelf life • Where items are kept for future use • Excessive use or intake of resources • Giving something for free to help others • Organizing tasks and schedules ahead of time
Information Security 2024-09-05
Food Security 2024-12-18
Across
- A plant grown for food, such as wheat or maize (4 letters)
- A period when food is scarce, leading to widespread hunger (6 letters)
- A type of farming that grows crops without chemicals (7 letters)
- The opposite of surplus, often a sign of food insecurity (7 letters)
Down
- A food production system without soil (9 letters)
- Yellow tropical fruit often eaten in slices
- Staple grain consumed globally, especially in Asia (4 letters)
- This nutrient is vital for plant growth, often added as fertilizer (8 letters)
8 Clues: Yellow tropical fruit often eaten in slices • A food production system without soil (9 letters) • A plant grown for food, such as wheat or maize (4 letters) • Staple grain consumed globally, especially in Asia (4 letters) • A type of farming that grows crops without chemicals (7 letters) • The opposite of surplus, often a sign of food insecurity (7 letters) • ...
Food security 2024-11-28
Across
- we wash our hands with this to stay clean and safe
- This keeps food from getting too warm and helps it stay fresh
- you should always wash this before touching food
- Helping others who don't have enough food
Down
- This is the thing you use to kill germs on your hands and surfaces
- This can be grown at home, like fruits, vegetables
- you should always do this before eating or cooking
- Food that gives you energy and keeps you healthy
8 Clues: Helping others who don't have enough food • you should always wash this before touching food • Food that gives you energy and keeps you healthy • This can be grown at home, like fruits, vegetables • we wash our hands with this to stay clean and safe • you should always do this before eating or cooking • This keeps food from getting too warm and helps it stay fresh • ...
Nutrition security 2024-07-17
Across
- The nutrients you use in the largest amount
- Vitamin found in citrus fruits, important for immune function
- Condition caused by inadequate dietary intake, leading to weakness and poor health
- the state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balanced diet to maintain health and prevent disease
Down
- Lack of sufficient food leading to hunger and malnutrition
- Government program aimed at providing food assistance to low income individuals
- Essential nutrient needed for strong bones and teeth
8 Clues: The nutrients you use in the largest amount • Essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Vitamin found in citrus fruits, important for immune function • Eating a balanced diet to maintain health and prevent disease • ...
Nutrition security 2024-07-17
Across
- Vitamin found in citrus fruits, important for immune function
- The state of having reliable access to a sufficient quantity of affordable, nutritious food
- Eating a balnaced diet to maintain health and prevent disease
Down
- The nutrients you use in the largest amount
- Lack of sufficient food leading to hunger and malnutrition
- Lack of this can lead to anemia
- essential nutrient needed for strong bones and teeth
- food produced without synthetic chemicals
8 Clues: Lack of this can lead to anemia • food produced without synthetic chemicals • The nutrients you use in the largest amount • essential nutrient needed for strong bones and teeth • Lack of sufficient food leading to hunger and malnutrition • Vitamin found in citrus fruits, important for immune function • Eating a balnaced diet to maintain health and prevent disease • ...
Bullying 2023-02-27
Bullying 2023-02-27
Administrative Principles 2023-01-17
12 Clues: Equity • security • personnel • commanding • discipline • initiative • activities • contemporary • subordination • centralization • Responsibility • Individual Interest General Interest
Internet & Networks 2015-09-27
Across
- Internet Service Provider
- platforms for social interaction
- Fraudulent websites or "Malicious software" viruses, worms, spyware
- social applications and networking websites
- Transmission Control Protocol
- Closes all ports on a computer except ones used by services
- Wireless fidelity - wireless network technology
- main Internet pathways
- Device that uses P2P to connect thru a wireless connection
- Unique 32-bit identifier
- predecessor to the Internet
Down
- Powerful computers that accommodate many user requests
- Domain Name System tracks billions of addresses, names & servers
- Hacking technique that replaces IP address with fraud IP addresses
- Combines voice and data networks into a digital network
- technologists
- Immersive virtual environments over a network
- Network device that manages network traffic
- Video Phone Service uses P2P apps to communicate between clients
- is an address used by client/servers that associates specific service
- father of the Internet
- Research & development consortium
- cyber-criminals
23 Clues: technologists • cyber-criminals • father of the Internet • main Internet pathways • Unique 32-bit identifier • Internet Service Provider • predecessor to the Internet • Transmission Control Protocol • platforms for social interaction • Research & development consortium • Network device that manages network traffic • social applications and networking websites • ...
digital crossword 2016-02-03
Across
- something we play games on most of the time
- starts with an F many adults use it
- tattoo your permanent place online
- way you should be online
- use to everyone's advantages
- used to ruin people's life. __________ and chill
- something we use every day ________ it
- it has a bird for its symbol
Down
- chats something people use to send to many pictures
- number something we try to pick girls up with
- we use to buy useless things
- should be long and secret
- you use it every day to watch videos. MARKIPLIER PEWWWEEEEDIPIE
- something we play way to much
- something that is messed up and corrects your words
- don't send pictures you wouldn't send to grandma
- bullying something people do to hurt others
- something people need to use more often
- something people listen to music with
- it starts with a T and is used for pictures
20 Clues: way you should be online • should be long and secret • we use to buy useless things • use to everyone's advantages • it has a bird for its symbol • something we play way to much • tattoo your permanent place online • starts with an F many adults use it • something people listen to music with • something we use every day ________ it • something people need to use more often • ...
2017 Bring Your Child to Work Day! 2017-04-27
Across
- Bruce Banner
- Arthur Curry
- (Navy Core Value) “I will support and defend...”
- Diana Prince
- First U.S. manned space mission
- a permanent _____ _____ station was established on the Coronado Strand Military Reservation
- _____ of the Great White Fleet
- Reactivated January 29th, 2010 as US Fleet Cyber Command
- First U.S. two-person space mission
- Natasha Romanova
- (Navy Core Value) “I will bear true faith and allegiance...”
- First manned lunar landing mission
- Coined the phrase “Debugging”
Down
- (Navy Core Value) “I will obey the orders...”
- Clark Kent
- President of the SpongeBob Fan Club
- Don’t give up the ship!
- Bruce Wayne
- Established on July 27th, 2005 by merging FIWC Detachment San Diego with NSGA San Diego
- Old Ironsides
- Kara Danvers
- The march of the US Navy
- US Naval Academy’s mascot
- I’m _____ the Sailor Man
- America’s first submarine
- Barbara Gordon
- Operation Purple Dragon
27 Clues: Clark Kent • Bruce Wayne • Bruce Banner • Arthur Curry • Diana Prince • Kara Danvers • Old Ironsides • Barbara Gordon • Natasha Romanova • Don’t give up the ship! • Operation Purple Dragon • The march of the US Navy • I’m _____ the Sailor Man • US Naval Academy’s mascot • America’s first submarine • Coined the phrase “Debugging” • _____ of the Great White Fleet • First U.S. manned space mission • ...
Unit 7,8,10 Vocabulary Puzzle 2023-05-16
Across
- meeting
- repeat the main points of something
- help
- voice calm voice
- solve a problem
- Bring ______ scissors for child
- The parent-teacher meeting was __________.
- I _____ have a stomachache.
- cyber ________
- not ever
- at all time
- contact skinship
- Ask for __________ when you go to the toilet.
- permit, approve
- working together
- We have to eat _____ day.
- say Hello!
- a worry about something
- cleanliness
- _____ routine
Down
- level of learning
- objects knife, scissor, ax etc.
- to choose someting
- sometimes but not often
- compliment
- happens or exists of the time or in most cases
- to wash your hands
- a star rating
- action
- problem
- What you have to keep in the classroom.
- to touch, feel, hold with your hand
- it’s similar like conversation, talk
- I _________ have nightmares.
- ready
- not often
- weekday + weekend
37 Clues: help • ready • action • meeting • problem • not ever • not often • compliment • say Hello! • at all time • cleanliness • a star rating • _____ routine • cyber ________ • solve a problem • permit, approve • working together • level of learning • voice calm voice • contact skinship • weekday + weekend • to choose someting • to wash your hands • sometimes but not often • a worry about something • We have to eat _____ day. • ...
IIDPS personalities - How well you know your team? 2024-04-20
Across
- Turban & Beard
- Clock of CoreElec
- First 3 letters of 2 SM's make her name
- Celebrated Birthday yesterday
- Presenter of Innovation topic last Thursday
- She asks lot of questions in calls
- Recent to join the Dabba Gang
- Good singer, but not sumitav
- Telengana's Tiger
- Mysore Maharaj
- Last one to join the team
- National level athlete
- Polite, Salt & pepper hair style
Down
- One of the union territories is his native (Sometimes people go here for visa appointment)
- Cracks most of the jokes during team calls
- Not his first time to UK
- Cyber saviour
- Specs in the size of face mask
- Head at the height of troposphere
- Nawab, Ruler, Monarch
- Indian❌ Japanese✅
- The leanest
- From CE, but ain't travelling
- Meetings on, Camera On
- Getting married next year
- Always has Lunch @4PM
- The Saber in the North (Yes, it's a GOT reference)
27 Clues: The leanest • Cyber saviour • Turban & Beard • Mysore Maharaj • Clock of CoreElec • Indian❌ Japanese✅ • Telengana's Tiger • Nawab, Ruler, Monarch • Always has Lunch @4PM • Meetings on, Camera On • National level athlete • Not his first time to UK • Getting married next year • Last one to join the team • Good singer, but not sumitav • Celebrated Birthday yesterday • Recent to join the Dabba Gang • ...
1-6-25 2025-01-08
Across
- Territory president elect Trump wants to buy
- number of people killed in New Orleans terrorist attack
- New Orleans street name where terrorist attack happened
- car with self driving features
- the age Jimmy Carter died at
- state where most of the sea food in America comes from
- the prime minister of what country recently stepped down?
- Olympian arrested in Miami beach
- type of crab becoming rare in Alaska
Down
- ai website used to plane Cyber truck attack
- city that faced terrorist attack on New Years
- actress who won Golden Globe award for her movie "The Substance"
- prime minister of Canada
- president serving Jimmy Carter's eulogy
- flu disease that killed one person in Louisiana
- 39th president, died at 100
- name of recent award ceremony
- Ceo of Facebook and Instagram
- state experiencing brush fire everywhere
- state adding congestion toll prices
20 Clues: prime minister of Canada • 39th president, died at 100 • the age Jimmy Carter died at • name of recent award ceremony • Ceo of Facebook and Instagram • car with self driving features • Olympian arrested in Miami beach • state adding congestion toll prices • type of crab becoming rare in Alaska • president serving Jimmy Carter's eulogy • state experiencing brush fire everywhere • ...
Informatika 2025-05-10
Across
- Kata kunci untuk mencari informasi di internet
- Sebuah situs web yang digunakan untuk berbagi informasi
- Media sosial yang berbasis teks dan percakapan
- privasi Memposting foto atau video seseorang tanpa izin
- online Sebuah bentuk cyberbullying yang melibatkan pengucilan
- online Sebuah bentuk cyberbullying yang melibatkan intimidasi
- online Sebuah bentuk cyberbullying yang melibatkan penghinaan
- Media sosial yang menghubungkan pengguna dengan teman dan keluarga
- Tindakan menyebarkan informasi palsu secara online
Down
- online Mengganggu atau melecehkan seseorang secara online
- identitas Meniru identitas seseorang secara online
- Online menghina atau mempermalukan seseorang secara online
- palsu Akun palsu yang digunakan untuk tujuan jahat
- Aplikasi pesan instan yang populer
- Online menyebarkan gosip atau rumor tentang seseorang
- online Sebuah bentuk cyberbullying yang melibatkan ancaman
- Salah satu klasifikasi media sosial berupa blog
- palsu Menyampaikan informasi yang tidak benar
- Platform media sosial yang terkenal dengan foto dan video singkat
- bullying Perilaku menyakiti orang lain secara online
20 Clues: Aplikasi pesan instan yang populer • Kata kunci untuk mencari informasi di internet • Media sosial yang berbasis teks dan percakapan • palsu Menyampaikan informasi yang tidak benar • Salah satu klasifikasi media sosial berupa blog • Tindakan menyebarkan informasi palsu secara online • identitas Meniru identitas seseorang secara online • ...
cyber warfare 2022-11-02
Cyber Crossword 2021-04-27
Across
- An action on social media platforms that allows you to limit someone else’s access to view or common on your account.(Starts with B)
- Someone who uses technology to harass, threaten, embarrass, or target another person
- Resource 3 acronym for stopping cyberbullying. (Starts with G)
- A feeling towards an individual that you firmly believe in and is reliable.(Starts with T)
Down
- A person between ages 13 to 19 are called this name, Similar to the name Adults.(Starts with T)
- When someone hits someone else but not on purpose. (Starts with A)
- An individual that repetitively causes harm or stress on another person.(Starts with B)
7 Clues: Resource 3 acronym for stopping cyberbullying. (Starts with G) • When someone hits someone else but not on purpose. (Starts with A) • Someone who uses technology to harass, threaten, embarrass, or target another person • An individual that repetitively causes harm or stress on another person.(Starts with B) • ...
Cyber Crossword 2021-06-28
Across
- Term used to prevent disclosure information to unauthorize individual or system ______
- Mark Zuckeberg founder of _______
- CCTV and Biometric are example of ______
Down
- Country that been attack by DDoS in 2007 and collapse the whole country _____
- Test the reach ability of host on an IP network _____
- Maxis,TM,Celcom are example of ____
- Computer worm that attack Iranian Nuclear Facilities _______
7 Clues: Mark Zuckeberg founder of _______ • Maxis,TM,Celcom are example of ____ • CCTV and Biometric are example of ______ • Test the reach ability of host on an IP network _____ • Computer worm that attack Iranian Nuclear Facilities _______ • Country that been attack by DDoS in 2007 and collapse the whole country _____ • ...
Cyber Responsibility 2020-08-10
7 Clues: mark zuckerberg • send out tweets • app logo is a ghost • telling people too much • acquired by Facebook in 2012 • formally known as Musical.ly • character judged by people in general
cyber safety 2019-09-30
Across
- get a pasword
- whasap
- a person that hacks your computer
Down
- it kills the computer
- not your friend and mean
- type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information
- some thins that helps you pro tech the computer
7 Clues: whasap • get a pasword • it kills the computer • not your friend and mean • a person that hacks your computer • some thins that helps you pro tech the computer • type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information
Cyber Safety 2019-09-26
Across
- bullying that takes place over digital devices like cell phones, computers, and tablets.
- software protecting the computer from danger
- criminals get sensitive information (like usernames or passwords).
Down
- the use of technologies to protect computers and data from stranger
- use of the Internet or other electronic means to stalk or harass individual
- extremely tiny parasite that can only reproduce if it is within a living being or anything that corrupts something else.
- something you shouldn't give online
7 Clues: something you shouldn't give online • software protecting the computer from danger • criminals get sensitive information (like usernames or passwords). • the use of technologies to protect computers and data from stranger • use of the Internet or other electronic means to stalk or harass individual • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
The Great Depression key terms 2023-10-16
Across
- production over producing of goods
- music type of music 1920s that was up beat
- a place where people stood to get food in the 1930s
- prices decreasing
- struggling and loss of confidence
- chat a series of speeches over the radio by fdr
- A way people all over the country communicated
- security From of program that helped elderly with their security
- failures one of the reasons that cause the Great Depression
Down
- Sand storms created by over farming
- a serious of programs intended to help the citizens
- Speeches FDR over the radio
- 1930s encampment for the homeless
- dam project started to provide jobs and water to the west
- Market Where people buy and sell and trade goods
15 Clues: prices decreasing • Speeches FDR over the radio • 1930s encampment for the homeless • struggling and loss of confidence • production over producing of goods • Sand storms created by over farming • music type of music 1920s that was up beat • A way people all over the country communicated • chat a series of speeches over the radio by fdr • ...
Housing 2024-08-12
Across
- What kind of desk can be used by anyone?
- What month is Kelvin's birthday?
- How many halls we have available for hiring
- Who would be asked to put up some shelving?
- the number of people in the Property team
- What is the name of our security company?
- the type of card you use to enter a building
- What is the name of our asset management program?
- Queen of the team
Down
- What paperwork process requires three quotes?
- often found on a Monday
- Our favourite security guard
- what we hope not to find in the roof
- How often rentals on our Housing for Older Persons get reviewed
14 Clues: Queen of the team • often found on a Monday • Our favourite security guard • What month is Kelvin's birthday? • what we hope not to find in the roof • What kind of desk can be used by anyone? • the number of people in the Property team • What is the name of our security company? • How many halls we have available for hiring • Who would be asked to put up some shelving? • ...
Carbon and Energy Security 2023-11-16
Across
- Planting trees in places with recent tree cover, replacing lost primary forests.
- _____________ circulation.
- The route taken by any form of energy from its source to its point of consumption (6,7).
- _____________ turnover. The rate at which carbon enters and leaves a store.
- 1,000,000,000,000 kilograms.
- Any change from a natural ecosystem to an alternative use; it usually reduces carbon and water stores (4,10).
- Natural gas trapped in fine-grained sedimentary rocks.
- Organic matter used as a fuel.
- Country which pioneered the use of biofuels.
- The processes operating in oceans to circulate and store carbon.
Down
- A fuel derived from living matter.
- A new geological era beginning 8,000 years ago when humans began farming. Reflects the view that humans are the main driver of Earth's processes.
- Processes and actions associated with human activity.
- An abrupt change in an ecological state (8,9)
- The leading international organisation for the scientific assessment of climate change (acronym).
- Planting trees on land that has never had forest.
- Name of Dr Gleave's cat
- A mixture of clay, sand, water and bitumen (3,5).
18 Clues: Name of Dr Gleave's cat • _____________ circulation. • 1,000,000,000,000 kilograms. • Organic matter used as a fuel. • A fuel derived from living matter. • Country which pioneered the use of biofuels. • An abrupt change in an ecological state (8,9) • Planting trees on land that has never had forest. • A mixture of clay, sand, water and bitumen (3,5). • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
Alex- bullying 2022-03-08
Across
- Rider got mad and yelled at everyone for the first time
- Jake was leaving Hayden out of the friend group chat
- of power mike and Josiah are the same height so its a fair fight
- Alex and Austin were roasting each other an laughing
- Mike and Dustin always gets in fights
- Alex was calling rider names
- Kevin told max that he's stupid
- mike told everyone but Kyle about his birthday
Down
- someone was trying to pretend to be Obama
- jimmy pushed mike down the stairs
- mike was saying rumors about Dustin
- Eli made Ale tell a very big secret
- Alex trips Hunter in the hall everyday
13 Clues: Alex was calling rider names • Kevin told max that he's stupid • jimmy pushed mike down the stairs • mike was saying rumors about Dustin • Eli made Ale tell a very big secret • Mike and Dustin always gets in fights • Alex trips Hunter in the hall everyday • someone was trying to pretend to be Obama • mike told everyone but Kyle about his birthday • ...
Madelyn Shaw-Bullying 2022-03-04
Across
- aggressive balance of power consistent and deliberate.
- what type of bullying is online?
- what is the a of The ABCD of bullying?
- what type of bullying is in a group?
- verbal
- attacked physically or emotionally with and unequal balance of power.
Down
- no one is having fun and a equal balance of power.
- what is the c of the ABCD of bullying?
- someone is getting hurt on purpose?
- when everyone is having fun and no one is getting hurt.
- What type of bullying is hitting kicking slapping etc?
- name calling and threatening
- what is the d of the ABCD of bullying?
13 Clues: verbal • name calling and threatening • what type of bullying is online? • someone is getting hurt on purpose? • what type of bullying is in a group? • what is the c of the ABCD of bullying? • what is the a of The ABCD of bullying? • what is the d of the ABCD of bullying? • no one is having fun and a equal balance of power. • ...
CRIME. WORDS IN BOLD 2018-09-06
14 Clues: kopėčios • saugumas • pavojuje • priminti • paslėptas • apiplėšti • patrauklus • prismeigti • gyvatvorė, tvora • nuosavybė, turtas • savininkas, valdytojas • laiptelis prie lauko durų • išdidus, besididžiuojantis • traukiantis įsilaužti ir apiplėšti
Cryptic Hashword 2014-01-11
Across
- 3a52b599a21b2990b28930141016c5a71afa184e3ef94958d882f519e1ddf5f2fa8f9d653eb0dc0de2307087cee6f8f5
- 0a7b77e1bff2cdf175f16e6d7ba96ce707ec6d1f
- fd9de800564763ece59368d35b281690
- 7f5217333bb19cb9ac50829635cc398601d1e505
- bfd82eb21826f62d7a9bbbd3fd0311e6a273a1d8
Down
- 6f5251e4a9d0005b8d6d36bd7c6a7af04b5fab1abb33f3b040fc27af1d165ceed6cf2cd39edc78327b88d77554c97ff10ccb65a37b081da4885f4b02b866e7f3
- b9e14d9b2886bcff408b85aefa780419
- 5de71b2143c86cd2e0c801830ed729e7ef2f8f478b454d7d3e9dd5a86a92b255
- 782bf2d07aad4de9deeee61424ecb71581f2a44b183420e8b01fe5c8
- 05e5aaf0f4c97d227a5653c3187747ea93e31d7e
- 7e0dea93ce606f7b88f6af965d37e83a
11 Clues: b9e14d9b2886bcff408b85aefa780419 • fd9de800564763ece59368d35b281690 • 7e0dea93ce606f7b88f6af965d37e83a • 0a7b77e1bff2cdf175f16e6d7ba96ce707ec6d1f • 05e5aaf0f4c97d227a5653c3187747ea93e31d7e • 7f5217333bb19cb9ac50829635cc398601d1e505 • bfd82eb21826f62d7a9bbbd3fd0311e6a273a1d8 • 782bf2d07aad4de9deeee61424ecb71581f2a44b183420e8b01fe5c8 • ...
Industralisation 2019-02-13
Across
- Who invented the telephone?
- What's the fourth step of revolution based on?
- Which religion favored the industrial Revolution?
- Who sent the America's first telegram across 3 kilometres of wire?
- Where was the Krupp Works factory situated?
- Who built the Eiffel Tower?
Down
- Where did Industralisation start?
- What was the most important invention during th second wave of the Industrial Revolution?
- What was mostly produced in Switzerland during the industralisation?
- How were rich US-American men with economic empires called?
- How were artisans organised in at the end of the 17th century?
11 Clues: Who invented the telephone? • Who built the Eiffel Tower? • Where did Industralisation start? • Where was the Krupp Works factory situated? • What's the fourth step of revolution based on? • Which religion favored the industrial Revolution? • How were rich US-American men with economic empires called? • How were artisans organised in at the end of the 17th century? • ...
Σταυρόλεξο-Αθηνά 2022-11-29
Across
- Το StumbleUpon είναι παράδειγμα δικτύου κοινωνικών....
- Το wiki είναι μια διαδικτυακή εφαρμογή που επιτρέπει τη.... πολλών χρηστών
- Σημαντικό θέμα που πρέπει να έχουμε υπόψη είναι η προστασία... δεδομένων
- Κακόβουλο πρόγραμμα που δημιουργεί προβλήματα στην ομαλή λειτουργία του υπολογιστή μας
Down
- Cyber-Bulling λέγεται αλλιώς ηλεκτρονικός.....
- Το Pinterest είναι κυρίως για....
- Η μετάδοση ιών γίνεται και μέσω... συνημμένων αρχείων
- Η ιστοσελίδα ResearchGate προσφέρεται για....και ερευνητική δικτύωση
- Το antivirus λέγεται αλλιώς λογισμικό...
- Ασύγχρονη επικοινωνία λέγεται όταν οι χρήστες δεν χρειάζεται να αλληλεπιδρούν την.... χρονική στιγμή
10 Clues: Το Pinterest είναι κυρίως για.... • Το antivirus λέγεται αλλιώς λογισμικό... • Cyber-Bulling λέγεται αλλιώς ηλεκτρονικός..... • Η μετάδοση ιών γίνεται και μέσω... συνημμένων αρχείων • Το StumbleUpon είναι παράδειγμα δικτύου κοινωνικών.... • Η ιστοσελίδα ResearchGate προσφέρεται για....και ερευνητική δικτύωση • ...
Anti-Bullying Crossword 2019-11-12
Across
- To avoid bullying, everyone should be __________ towards each other
- If you are affected by bullying, you are a ______
- Having _______ allows you to put yourself in others' shoes
- You can ______ bullying to friends, family and/or a member of staff
Down
- Bullying is not the same as ________, as bullying is one-sided
- The word to describe spoken bullying/abuse
- A person who does nothing when bullying happens
- Bullying is not __________ anywhere
- It is never too late to do the _______ thing
- 52% of students have experienced _____bullying
10 Clues: Bullying is not __________ anywhere • The word to describe spoken bullying/abuse • It is never too late to do the _______ thing • 52% of students have experienced _____bullying • A person who does nothing when bullying happens • If you are affected by bullying, you are a ______ • Having _______ allows you to put yourself in others' shoes • ...
GAYE Crossword Puzzle 2020-10-16
Across
- Strategy for 2019/2021
- UK fundraising event?
- Who is the surname of chair of CAF's Trustees?
- What is the digital currency known as?
Down
- In what sector did the contact centre come first in the top 50?
- What is the name of our new CEO?
- What is the name of the IT threat where you have to pay to get your systems released?
- What fund performed the best in 2020?
- Name a CAF investment products charities can use?
- What is the new cyber threat?
10 Clues: UK fundraising event? • Strategy for 2019/2021 • What is the new cyber threat? • What is the name of our new CEO? • What fund performed the best in 2020? • What is the digital currency known as? • Who is the surname of chair of CAF's Trustees? • Name a CAF investment products charities can use? • In what sector did the contact centre come first in the top 50? • ...
KELAS VII.4_RIDHO ILAHI 2023-05-10
Across
- keinginan untuk tidak mengungkap diri terlalu mencolok pada orang lain
- NEIGHBORING keinginan untuk tidak terlibat berinteraksi dengan orang sekitar
- aplikasi yang diciptakan pada tahun 2010
- keinginan untuk menjauh dari pandangan dan gangguan suara orang di sekitarnya dan kebisingan
- TOK salah satu app untuk membuat konten dan menonton vidio
- situs jaringansosial yang berfokus pada pertukaran pesan yang muncul pada tahun 2011
Down
- keinginan untuk merahasiakan jati diri
- keinginan untuk menyendiri
- BULYING dampak negatif penggunaan tik
- keinginan untuk dekat dengan keluarga dan orang tertentu'tapi jauh dari orang lain
10 Clues: keinginan untuk menyendiri • BULYING dampak negatif penggunaan tik • keinginan untuk merahasiakan jati diri • aplikasi yang diciptakan pada tahun 2010 • TOK salah satu app untuk membuat konten dan menonton vidio • keinginan untuk tidak mengungkap diri terlalu mencolok pada orang lain • NEIGHBORING keinginan untuk tidak terlibat berinteraksi dengan orang sekitar • ...
Personal Safety 2021-12-16
Across
- You need to keep your hands and feet to ________ (p.17)
- Healthy relationships are this (p.18)
- Use this to call 911 (p.15)
- Wear one of these when riding your bike (p.23)
- You should know this in case of an emergency (p.16)
Down
- People with these carry an epipen (p.20)
- Ms. Rudow's number one rule
- When you give permission (p.19)
- Cyber-bullying happens here (p.26)
- Stay _______ in case of an emergency (p.17)
10 Clues: Ms. Rudow's number one rule • Use this to call 911 (p.15) • When you give permission (p.19) • Cyber-bullying happens here (p.26) • Healthy relationships are this (p.18) • People with these carry an epipen (p.20) • Stay _______ in case of an emergency (p.17) • Wear one of these when riding your bike (p.23) • You should know this in case of an emergency (p.16) • ...
computer class v 2022-02-24
Across
- blocks are green in color .
- button is used to perform addition of a range in a cell.
- This package is used for data analysis and calculation
- is used to remove viruses from computer.
- bar shows the data and formula in an active cell.
Down
- is used as a tool or target in cyber crimes.
- disturb the normal functioning of computer.
- includes Viruses, worms, Trojan viruses, adware etc.
- block control the movement of sprite .
- block is used to change appearance of sprite .
10 Clues: blocks are green in color . • block control the movement of sprite . • is used to remove viruses from computer. • disturb the normal functioning of computer. • is used as a tool or target in cyber crimes. • block is used to change appearance of sprite . • bar shows the data and formula in an active cell. • includes Viruses, worms, Trojan viruses, adware etc. • ...
CROSSWORD PUZZLE 2023-12-01
Across
- Scam that acts like a banker
- A scammer’s goal
- How much was the scammer about to scam the old lady in the video
- Scam that acts like an employer
Down
- A person who steals information and money
- A scam that involves sellers
- name of the only male speaker
- Name of the daughter in the short video
- Name of the brother in the short video
- A type of cyber-attack that uses fraudulent emails or websites to trick users into revealing their personal or financial information
10 Clues: A scammer’s goal • A scam that involves sellers • Scam that acts like a banker • name of the only male speaker • Scam that acts like an employer • Name of the brother in the short video • Name of the daughter in the short video • A person who steals information and money • How much was the scammer about to scam the old lady in the video • ...
health crossword 2025-04-14
Across
- you should be getting this amount of sleep a night
- place where someone walks
- a brain injury caused in the brain
- What do you put on when you enter a car?
- Injury caused by a spine injury.
Down
- bullying conducted by someone being rude consistently online
- What do you put on when you go for a ride on a bike?
- what Doctors tell you to take it easy?
- light red light where you stop and wait
- Occupational safety and health Administration
10 Clues: place where someone walks • Injury caused by a spine injury. • a brain injury caused in the brain • what Doctors tell you to take it easy? • light red light where you stop and wait • What do you put on when you enter a car? • Occupational safety and health Administration • you should be getting this amount of sleep a night • ...
Robot friends 2024-06-21
Across
- - Artificial intelligence, the brain of a robot.
- - A robot designed to move across the surface of a planet.
- - A robot with a human appearance.
- - A small motor that moves parts of a robot.
- - A self-operating machine, often an early form of a robot.
Down
- - A device that detects changes in the environment.
- - Relating to robots and computers.
- - A robot that looks and acts like a human.
- - A path for electrical signals in a robot.
- - A flying robot often used for surveillance.
10 Clues: - A robot with a human appearance. • - Relating to robots and computers. • - A robot that looks and acts like a human. • - A path for electrical signals in a robot. • - A small motor that moves parts of a robot. • - A flying robot often used for surveillance. • - Artificial intelligence, the brain of a robot. • - A device that detects changes in the environment. • ...
different ways people bully 2025-06-19
Across
- something that uses technology
- when you see abuse and you take action and tell someone who can stop it
- when you start to get agressive
- this can be racist type of bullying
Down
- you threten them in a way they dont like
- theres people fighting and all you do is watch and dont do anything
- when you use your words to hurt someone
- touching someone
- something that can be done repetedly and they dont like it
- you bully someone for something they can control
10 Clues: touching someone • something that uses technology • when you start to get agressive • this can be racist type of bullying • when you use your words to hurt someone • you threten them in a way they dont like • you bully someone for something they can control • something that can be done repetedly and they dont like it • ...
Mod 5 2025-10-14
Across
- : Nonacademic online activities that reduce student focus
- : False or misleading information spread online
- : Related to computers or electronic technology
- : Layered security approach with multiple protections
- : Gaining access without permission
Down
- : Malware that encrypts files and demands payment
- : AI-generated fake media meant to deceive viewers
- : Fraudulent emails or websites that try to steal credentials or data
- : Teaching responsible, ethical behavior online
- : Harassing or intimidating someone online
- : Security model that assumes no implicit trust
11 Clues: : Gaining access without permission • : Harassing or intimidating someone online • : Teaching responsible, ethical behavior online • : False or misleading information spread online • : Related to computers or electronic technology • : Security model that assumes no implicit trust • : Malware that encrypts files and demands payment • ...
Unit 6 VA Studies 2022-03-03
Across
- this department provides programs to benefit Virginia's students
- The Virginia General assembly is this branch
- what Virginia citizen's pay for services such as schools and libraries
- a group of citizens who share many of the same ideas about goverment
- group of citizens chosen to hear facts in court
- chooses
Down
- state's court system
- the branch that makes sure laws are carried out
- the department that manages the national parks
- Headquarters of security, located near Washington DC
- number of presidents born in Virginia
- The first 10 amendments to our constitution
- number of years we have a presidential election
- the department that is in charge of national security
14 Clues: chooses • state's court system • number of presidents born in Virginia • The first 10 amendments to our constitution • The Virginia General assembly is this branch • the department that manages the national parks • the branch that makes sure laws are carried out • number of years we have a presidential election • group of citizens chosen to hear facts in court • ...
The Great Depression key terms 2023-10-16
Across
- production over producing of goods
- music type of music 1920s that was up beat
- a place where people stood to get food in the 1930s
- prices decreasing
- struggling and loss of confidence
- chat a series of speeches over the radio by fdr
- A way people all over the country communicated
- security From of program that helped elderly with their security
- failures one of the reasons that cause the Great Depression
Down
- Sand storms created by over farming
- a serious of programs intended to help the citizens
- Speeches FDR over the radio
- 1930s encampment for the homeless
- dam project started to provide jobs and water to the west
- Market Where people buy and sell and trade goods
15 Clues: prices decreasing • Speeches FDR over the radio • 1930s encampment for the homeless • struggling and loss of confidence • production over producing of goods • Sand storms created by over farming • music type of music 1920s that was up beat • A way people all over the country communicated • chat a series of speeches over the radio by fdr • ...
Factory Biome Markers 2023-02-16
17 Clues: Clock • Chaos • Smile • Worker • Forever • Weird Hat • Microscopic • Iron + Oxygen • Invisible Path • Marker For The • Roof In Factory • Factory Parkour • Least Used Color • Protects Factory • Corner Of Factory • Used For Deliveries • Comes Out Of Factories
Spanish 2018-10-16
17 Clues: gate • screen • to fly • flight • arrival • airport • to board • airplane • passenger • departure • stewardess • baggage claim • to get in line • go through customs • go through security • to check in baggage • can you tell me where ... is?
Unit 4 Crossword lab 2023-02-06
Computer Languages and Browsing Safely 2025-05-27
Across
- any criminal activity intended to harm anyone using a computer and an Internet connection
- the process of 'befrending' children on social media to facilitate online or physical sexual abuse
- India's greatest mathematician and astronomer and also introduced the concept of zero
- the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation
- the use of illegal methods to get money or other things that belong to a bank or its customer is called Bank ______
- Investigation team which established many cyber crime cells in different cities of India to take care of the reports and investigation of the cyber crimes
- a process which involves various kinds of arithmetic operations such as addition, subtraction, multiplication, division etc on binary numbers
- the number system consists of 10 digits ,i.e., 0 to 9 with the base 10
Down
- significant digit which is the right most digit of a binary number
- a number system which consists of two digits, i.e., 0 and 1 and has the base 2
- it is an act of harming or harassing using information technology in a deliberate manner
- a collection of technologies, processes and practices design to protect networks, computers, programs and data from attack, damage,or unauthorised access
- it extract confidential information from users and use this information to execute fraudulent tasks
- a number system which consist of two digits and has the base 8
- a number system which consist of 16 digits and has the base 16
- a German mathematician, who is credited with the invention of the modern binary number system
- a computer program that is design to identify, prevent and remove viruses from a computer
- a software which helps in preventing unauthorised access to your computer by blocking unsolicited communication
- a significant digit,which is the left most digit of a binary number
- it refers to an illegal entry into a computer system or network
- a number system is the number of digits used in it
21 Clues: a number system is the number of digits used in it • a number system which consist of two digits and has the base 8 • a number system which consist of 16 digits and has the base 16 • it refers to an illegal entry into a computer system or network • significant digit which is the right most digit of a binary number • ...
