cyber security Crossword Puzzles
IT March Madness Crossword Puzzle 2022-01-19
Across
- the wireless technology used to connect computers, tablets smartphones and other devices to the internet.
- Name of our mascot
- the name of the university
- electronic mail
- What our department works with
- the connection of at least two computer systems
- Building Where IT Central Office is
Down
- a word, phrase, or string of characters intended to differentiate an authorized user or process
- vast network that connects computers all over the world
- A short stocky dog breed
- relating to or characteristic of the culture of computers information technology, and virtual reality.
- Phones What we talk to other people with
12 Clues: electronic mail • Name of our mascot • A short stocky dog breed • the name of the university • What our department works with • Building Where IT Central Office is • Phones What we talk to other people with • the connection of at least two computer systems • vast network that connects computers all over the world • ...
No place for hate! Bob 2015-10-12
Across
- illeagaly downloading content to your computer
- Junkmail that can sometimes contain viruses
- Type of internet protection
- type of virus that is used to extract data from one computer to another
- someone who abuses or bully’s someone through social media
- code used to protect data
- someone who has been affected by hackers, viruses, or cyber bullies
Down
- someone who steals identities using a computer
- digital messaging system
- ability to have computer find problems and solutions
- type of software that is used to protect sensitive files
- thief one who steals some ones credentials using a computer
12 Clues: digital messaging system • code used to protect data • Type of internet protection • Junkmail that can sometimes contain viruses • someone who steals identities using a computer • illeagaly downloading content to your computer • ability to have computer find problems and solutions • type of software that is used to protect sensitive files • ...
Words related to bullying and other stuff (health 7B) 2021-06-24
Across
- A form of bulling but with harsh words
- The target of bulling
- A witness who does nothing
- A person who seeks harm
- A serious mental illness, who those which are bullied may have
- Talk or rumours about ones personal life
- ones confidence or worth in oneself
Down
- A form of bulling which is physically interacting with the victim
- A form of bulling which people talk while spread rumours and lies
- behaviour involving physical force to harm or damage someone or something
- A form of bulling online
- aggressive pressure or intimidation
12 Clues: The target of bulling • A person who seeks harm • A form of bulling online • A witness who does nothing • aggressive pressure or intimidation • ones confidence or worth in oneself • A form of bulling but with harsh words • Talk or rumours about ones personal life • A serious mental illness, who those which are bullied may have • ...
THE IT ACT, 2000 2022-05-26
Across
- criminal activities carried out by means of computer or internet
- example of certifying authority in India
- key used to create a digital sign
- authentication of electronic record
- person in whose name the digital signature certificate is issued
- means to verify genuiness of the record
- cyber crime includes
Down
- upon the death of the subscriber digital signature certificate shall be
- issued by certifying authority to subscriber for digital signature certificate
- act of establishing a particular person as the creator of work
- key used to verify digital sign
- The IT act shall not apply to a
12 Clues: cyber crime includes • key used to verify digital sign • The IT act shall not apply to a • key used to create a digital sign • authentication of electronic record • means to verify genuiness of the record • example of certifying authority in India • act of establishing a particular person as the creator of work • ...
Economic Goals 2022-03-28
Across
- efficient use of productive resources
- having as many people working as possible
- spending more than what you have collected
- rise in the general level of prices
- includes insurance and Social Security
Down
- sum of goods and services produced in a year
- period without inflation or deflation
- bring in more than what is going out
- a reduction of the general level of prices
- goal of using resources wisely
- making sure practices are fair in work related matters
- individuals making their own economic decisions
- improving material well-being or standard of living
13 Clues: goal of using resources wisely • rise in the general level of prices • bring in more than what is going out • period without inflation or deflation • efficient use of productive resources • includes insurance and Social Security • having as many people working as possible • a reduction of the general level of prices • spending more than what you have collected • ...
confidentiality 2025-02-06
Across
- of information
- work history, date of birth, social security number, criminal record,
- records of an employee’s performance on the job such as performance reports,
- information about an employee prior to employment such as a résumé,
- set of rules or promises which limits access or places restrictions on certain
- actions, supervisory notations
- insurance information
Down
- keeping employee, customer and client information private
- form of espionage conducted for commercial purposes rather than security;
- information
- religion, etc.
- involves individuals hired to steal trade secrets, new products or
- information which may arise from employment-related physicals, drug tests and
13 Clues: information • of information • religion, etc. • insurance information • actions, supervisory notations • keeping employee, customer and client information private • involves individuals hired to steal trade secrets, new products or • information about an employee prior to employment such as a résumé, • work history, date of birth, social security number, criminal record, • ...
vocab 2025-02-06
Across
- records of an employee’s performance on the job such as performance reports,
- religion, etc.
- set of rules or promises which limits access or places restrictions on certain
- information about an employee prior to employment such as a résumé,
- involves individuals hired to steal trade secrets, new products or
- of information
- information which may arise from employment-related physicals, drug tests and
Down
- keeping employee, customer and client information private
- work history, date of birth, social security number, criminal record,
- actions, supervisory notations
- insurance information
- form of espionage conducted for commercial purposes rather than security;
- information
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • keeping employee, customer and client information private • involves individuals hired to steal trade secrets, new products or • information about an employee prior to employment such as a résumé, • work history, date of birth, social security number, criminal record, • ...
SHERATON 2022-02-08
13 Clues: - SAFE • - Parish • - Clothing • - Location • - Pharmacy • - Furniture • - Appliances • - Restaurants • - Gym & Workout • - Intel Building • - Shipping worldwide • - Visual Entertainment • - Have a drink and socialise
kin haalʼá áhání áhoot’éhígíí 2023-03-06
18 Clues: - IT • - Hogan • - Dorms • - Airport • - Library • - Kitchen • - White Tent • - Music Room • - Dining hall • - Weight room • - Nurse office • - Front office • - Security shack • - inside the dorms • - Outside Play Area • - Outside meeting area • - Safe Place for drills • - Eagles nest or Aux gym
Bullying 2014-06-19
Across
- what site do people get bullied most
- What type of bulling is done over the internet
- what do you do if you are being bullied
- What is the victims reaction most of the time
- what is the person being mean called
- what type of bulling is done with hitting/punching
- how do bullys act
- what do you do If you see someone being bullied
Down
- what is the person getting bullied called
- what is the person watching called
- What type of bullying is done with name calling
- one way to not listen to a bully
- What is a good bully movie
- what is one place to call for help
- Where does bullying mostly happen
15 Clues: how do bullys act • What is a good bully movie • one way to not listen to a bully • Where does bullying mostly happen • what is the person watching called • what is one place to call for help • what site do people get bullied most • what is the person being mean called • what do you do if you are being bullied • what is the person getting bullied called • ...
bullying crossword 2014-06-05
Across
- hitting or hurting someone
- when you leave someone out of the group
- when you call someone names.
- : use of words that upset the victim
- threatening someone or making them scared enough to make them do what you want
- attacking the victim and contact with the victim
- when its done face to face
- when things are said that arnt true
Down
- is a crime
- making someone feel as they have to do what you tell them to do
- groups that hep you with bullying
- the person who is being mean to the victim
- a person who is watching but doesnt do anything about it
- when its done through social media
- the person who is getting bullied
15 Clues: is a crime • hitting or hurting someone • when its done face to face • when you call someone names. • groups that hep you with bullying • the person who is getting bullied • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • the person who is being mean to the victim • ...
Security XMas Crossword 2020-11-24
Across
- A 4in1 keretében többek között ezt is átvehetted.
- A csengettyű ilyen hangot ad.
- Ez lapul a karácsonyfa alatt.
- Finom illatú karácsonyi sütemény.
- Adathalászat, idegen szóval.
Down
- Sérülékenység, idegen szóval.
- ...koszorú.
- Kártékony szoftver, röviden.
- A Mikulás leghíresebb rénszarvasa.
- Így hívják a mézeskalácsot a Shrek-ben.
- Édesség, amit a karácsonyfára teszünk.
- Deutsche Telekom ... Solutions Kft.
12 Clues: ...koszorú. • Kártékony szoftver, röviden. • Adathalászat, idegen szóval. • Sérülékenység, idegen szóval. • A csengettyű ilyen hangot ad. • Ez lapul a karácsonyfa alatt. • Finom illatú karácsonyi sütemény. • A Mikulás leghíresebb rénszarvasa. • Deutsche Telekom ... Solutions Kft. • Édesség, amit a karácsonyfára teszünk. • Így hívják a mézeskalácsot a Shrek-ben. • ...
Food Security & Sustainability 2026-03-03
Across
- A crop traditionally used as a local staple, but younger generations might enjoy it in bubble tea.
- Singapore aims to produce 20% of this locally, from vegetables and mushrooms, by the year 2035.
- Food _______ means access to sufficient, safe, and nutritious food for all.
- Singapore Food ______ oversees plant and food safety.
- Singapore aims to produce 30% of this locally, from seafood and eggs, by the year 2035.
- Singapore imports more than _______ percent of its food.
Down
- A way of growing plants without soil.
- A soil creature that helps to decompose waste and aerate soil.
- Buying more food than we can consume before it spoils contributes to food _____.
- ___________ gardens are where neighbours can come together to plant and harvest.
- A way of recycling food scraps to add back into soil.
- A leafy green vegetable closely related to kai lan.
12 Clues: A way of growing plants without soil. • A leafy green vegetable closely related to kai lan. • Singapore Food ______ oversees plant and food safety. • A way of recycling food scraps to add back into soil. • Singapore imports more than _______ percent of its food. • A soil creature that helps to decompose waste and aerate soil. • ...
Program Security Crossword 2024-04-23
Across
- Form that is completed and submitted annual or as new "yes" answers are added
- Either affections or associated that need to be reported to PERSEC
- Is another name for following someone through the mantrap without swiping/scanning your own badge
- Prohibited from entering SAPFs without prior approval from the PSO
- Hotline: 202-433-9111
Down
- A handling caveat used within SAP control channels
- Indicators include unexplained affluence, financial hardship, attempts to circumvent security procedures, and drastic changes in behavior/work habits
- Must be reported at least 30 days before departing the US
- Transmitting classified material on an unauthorized network
- SAPs are extremely sensitive programs containing...
- Required to be worn inside all SAPFs
- Legally binding documents that is signed prior to SAP indoctrination
12 Clues: Hotline: 202-433-9111 • Required to be worn inside all SAPFs • A handling caveat used within SAP control channels • SAPs are extremely sensitive programs containing... • Must be reported at least 30 days before departing the US • Transmitting classified material on an unauthorized network • Either affections or associated that need to be reported to PERSEC • ...
air travel 2022-09-12
14 Clues: Лифт • Выход • Таможня • Тележка • Прибытие • Высадить • Терминал • Подобрать • Регистрация • Отправление • Сдача багажа • Выдача багажа • Паспортный контроль • Проверка безопасности
Geography Volcabulary 2025-01-09
Cyber safety 2013-11-03
7 Clues: Copy others work • A person who sees bullying • A person who is being bullied • A form of communication using the internet • Websites that have places to chat and post things • Something that can be harmful to your laptop or computer • A person who uses the internet to intimidate another person
Cyber Code 2020-06-10
7 Clues: Long red beam of light • Extra Terrestrial being • People fly these to space • we dont have a lot of this in space • big rock in space that is a big threat • The thing that floats in space,and we call home • humans use this in order to be able to go into space
Cyber Bullying 2021-05-03
Across
- The recording of everything accessed through the internet.
- The act of engaging and following someone constantly where it breaches the victim's safety.
- The action of repeatedly sending offensive and insulting messages.
Down
- Bullying through online resources
- When pretending to be someone else online
- When a group of people excludes someone intentionally.
- Stopping the access of particular areas on the web.
7 Clues: Bullying through online resources • When pretending to be someone else online • Stopping the access of particular areas on the web. • When a group of people excludes someone intentionally. • The recording of everything accessed through the internet. • The action of repeatedly sending offensive and insulting messages. • ...
Cyber Marathon 2023-09-25
Across
- A set of rules and configurations that control network traffic to enhance security
- A technique to disguise a message or data to make it unreadable without the proper decryption key
- A program designed to infect and spread across computer systems
- The practice of tricking individuals into revealing sensitive information through deceptive emails
- A unique string of characters that verifies a user's identity, often used for two-factor authentication
Down
- A type of malware that encrypts a user's files and demands a ransom for their release
- The process of guessing passwords to gain unauthorized access
7 Clues: The process of guessing passwords to gain unauthorized access • A program designed to infect and spread across computer systems • A set of rules and configurations that control network traffic to enhance security • A type of malware that encrypts a user's files and demands a ransom for their release • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
Cyber Wellness 2022-02-27
Across
- Do not store credit card __________ in online accounts.
- Ask for __________ before downloading or purchasing any content online.
- Avoid downloading ________ hacks.
- footprint is not entirely private online.
- ______ criminals can exploit vulnerabilities in outdated software to breach devices.
Down
- Download software, app updates from official and ________ sources.
- Acquire knowledge about ________ safety rules for ________ gaming and navigating the internet safely.
7 Clues: Avoid downloading ________ hacks. • footprint is not entirely private online. • Do not store credit card __________ in online accounts. • Download software, app updates from official and ________ sources. • Ask for __________ before downloading or purchasing any content online. • ______ criminals can exploit vulnerabilities in outdated software to breach devices. • ...
Cyber Puzzle 2025-02-03
Across
- - Telling your password to someone else is not --?
- A type of online attack where hackers trick people into sharing personal information.
- A secret combination of letters, numbers, or symbols used to protect your accounts.
- - Phishing emails usually provide links to -- websites?
Down
- A type of software that protects your computer from viruses and hackers.
- - A dangerous program that installs on the computer without our knowledge?
- A fake email or message that looks real but is designed to steal your information.
7 Clues: - Telling your password to someone else is not --? • - Phishing emails usually provide links to -- websites? • A type of software that protects your computer from viruses and hackers. • - A dangerous program that installs on the computer without our knowledge? • A fake email or message that looks real but is designed to steal your information. • ...
Cyber Law 2021-09-05
Across
- some experts regard digital______ as the third industrial revolution
- wrote Code and Other Laws of Cyberspace
- according to lessig there are _____ distinct but interdependent constraints that regulate behavior in the physical world.
- the conversion of analogue data into digital form
Down
- cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- Shawn Fanning created the______
- ______Regulation works by utilising feedback
7 Clues: Shawn Fanning created the______ • wrote Code and Other Laws of Cyberspace • ______Regulation works by utilising feedback • the conversion of analogue data into digital form • some experts regard digital______ as the third industrial revolution • cyber________ is the belief that individuals should be at liberty to pursue their own tastes and interests online. • ...
CYBER CROSSSWORD 2022-10-29
7 Clues: gatekeeper of computer • stealing of information • information technology security • imitating others to gain some information • using computer power to generate cryptocurrency • one who illegally tries to breach others' system • malware preventing users from accessing their system
Cyber Ethics 2025-06-11
Across
- - secretly break into computers to steal or destroy data
- - being aware the ethical practices and behaving responsibly while using the internet
- - impression or information about a person that exists on internet because of his online activities
- - unwanted bulk emails coming from unwanted resource
Down
- - criminal activities involving computer, networks and internet
- - defined as legal rules and restrictions imposed on online users
- - act of using or imitating the language and thoughts of another person as one's original work
7 Clues: - unwanted bulk emails coming from unwanted resource • - secretly break into computers to steal or destroy data • - criminal activities involving computer, networks and internet • - defined as legal rules and restrictions imposed on online users • - being aware the ethical practices and behaving responsibly while using the internet • ...
CYBER CRIME 2025-09-26
Across
- kegiatan kriminal dengan bentuk pencurian kartu kredit korban,
- penyusupan yang dikaukan dengan cara meretas sistem keamanan
- penyebaran virus atau malware yang berbahaya melalui website
Down
- kejahatan siber yang menargetkan kepada suatu perusahan atau perorangan dengan merusak arus lalu lintas laman
- penguntitan dunia maya
- kejahatan yang dilakukan melalui pengiriman pesan berupa link
- mengambil alih atau mencuri nomor ponsel korban oleh pelaku
7 Clues: penguntitan dunia maya • mengambil alih atau mencuri nomor ponsel korban oleh pelaku • penyusupan yang dikaukan dengan cara meretas sistem keamanan • penyebaran virus atau malware yang berbahaya melalui website • kejahatan yang dilakukan melalui pengiriman pesan berupa link • kegiatan kriminal dengan bentuk pencurian kartu kredit korban, • ...
Data Privacy 2023-09-11
Across
- The study and application of techniques to secure communication in the presence of adversaries.
- A security process where a user provides personal identifiers to gain access to a system or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- The automated processing of personal data to evaluate or predict aspects concerning that individual.
- A regulation in the EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.
- The process of removing all personally identifiable information where identification of data can no longer occur.
- The process of processing personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information.
Down
- The process of editing or preparing a document, especially to obscure or remove confidential information.
- The process of converting data into a code to prevent unauthorized access.
- Small files that are stored on a user's device when they visit a website, often used to remember user preferences or track user behaviour.
- An incident where unauthorized individuals gain access to confidential data.
- The principle that individuals should be informed about the collection and use of their personal data.
- A cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on security policies.
- The process of replacing sensitive data with unique identification symbols that retain all the essential data about the data without compromising its security.
15 Clues: The process of converting data into a code to prevent unauthorized access. • An incident where unauthorized individuals gain access to confidential data. • The practice of protecting systems, networks, and programs from digital attacks. • The study and application of techniques to secure communication in the presence of adversaries. • ...
CITTADINANZA DIGITALE:IACU 2022-01-12
Across
- capacità di un individuo di partecipare alla società anche online
- “pirata digitale”
- atto disonesto e aggressivo, può portare a gravi conseguenze
- specifico simbolo che identifica una specifica marca pubblicizzandola
- rete che consente la funzione di internet
- spargere notizie private senza il consenso del diretto interessato
Down
- social dove condividere foto e video
- attività diventata obbligatoria ormai per tutte le materie scolastiche
- deridere qualcuno per le sue condizioni fisiche
- foto scattata dal soggetto che può essere in compagnia di amici e postata sui social
- programma realizzato per essere installato su dispositivi portatili
11 Clues: “pirata digitale” • social dove condividere foto e video • rete che consente la funzione di internet • deridere qualcuno per le sue condizioni fisiche • atto disonesto e aggressivo, può portare a gravi conseguenze • capacità di un individuo di partecipare alla società anche online • programma realizzato per essere installato su dispositivi portatili • ...
Module 0-4 Review 2026-02-04
Across
- How many steps are in the decision-making process
- How well you get along with other people
- Type of bullying that is often hard to see
- Short term goals add up to achieve...
- Pushy, mean speech that can make people sad
- Type of speech we use all of the time
- Factors that can negatively affect your health
Down
- How you think of yourself (Wellness Wheel)
- Peer pressure that causes us to do bad things
- The health of your body and how it works
- Behavior of people we look up to
- Your heart rate when you are doing nothing
- Being able to control your emotions
13 Clues: Behavior of people we look up to • Being able to control your emotions • Short term goals add up to achieve... • Type of speech we use all of the time • How well you get along with other people • The health of your body and how it works • How you think of yourself (Wellness Wheel) • Type of bullying that is often hard to see • Your heart rate when you are doing nothing • ...
Executive Branch 2022-12-07
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
You and your data 2024-01-30
Tyler's Super Fun Security Training 2025-03-27
Across
- What is the wealthiest nut?
- Everyone should have one of these in their drawer incase of a robbery
- Signal in the window that lets you know when to come in
- A type of cyber attack through email designed to deceive people into revealing information
- Where do we go incase of a tornado?
Down
- What fruit is always sad?
- Where is out meeting spot incase of a fire?
- Ctrl + Alt + H
- 131313
- $180 worth of money in your drawer used to give to robbers
10 Clues: 131313 • Ctrl + Alt + H • What fruit is always sad? • What is the wealthiest nut? • Where do we go incase of a tornado? • Where is out meeting spot incase of a fire? • Signal in the window that lets you know when to come in • $180 worth of money in your drawer used to give to robbers • Everyone should have one of these in their drawer incase of a robbery • ...
Nabila kirana sari (X-E10) TTS INFORMATIKA 2024-09-12
Across
- Infografis harus jelas ringkas dan mudah dipahami serta tidak memimbulkan...
- berapa jumlah keterampilan generik...
- Informatika berasal dari bahasa inggris yang disebut sebagai...
- Keterampilan generik dikenal juga sebagai keterampilan
- Berfokus pada persoalan yang solusimya membutuhkan program komputer pengertian dari berpikir...
Down
- Masyarakat sekarang dijuluki sebagai masyarakat...
- singkatan dari praktik lintas bidang adalah...
- Menyelesaikan masalah yang melibatkan pengelolaan, pengolahan dan analisis data secara komputasi merupakan pengertian komputasi dibidang...
- Cyber physhical system dikenal sebagai revolusi...
- Infografis merupakan bentuk penyajian data atau jnformasi dalam bentuk...
10 Clues: berapa jumlah keterampilan generik... • singkatan dari praktik lintas bidang adalah... • Masyarakat sekarang dijuluki sebagai masyarakat... • Cyber physhical system dikenal sebagai revolusi... • Keterampilan generik dikenal juga sebagai keterampilan • Informatika berasal dari bahasa inggris yang disebut sebagai... • ...
Bab 3 2025-09-08
Across
- BULLYING bentuk pelanggaran hak
- hak yang didapat setiap manusia
- perilaku yang memperlakukan seseorang secara beda
- ketentuan mengenai hal dan kewajiban warga negara bersifat
Down
- salah satu upaya yang dapat dilakukan oleh negara untuk mencegah kasus pelanggaran hak adalah
- merupakan tindakan semena-mena berupa menyakiti, mempersulit atau melenyapkan seseorang
- warga negara saling mengetahui hak dan kewajibannya secara tepat dan
- mempromosikan kampanye anti pelanggaran hak dan pengingkaran
- UUD NRI tahun 1945 berperan sebagai hukum
- Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi
10 Clues: BULLYING bentuk pelanggaran hak • hak yang didapat setiap manusia • UUD NRI tahun 1945 berperan sebagai hukum • perilaku yang memperlakukan seseorang secara beda • ketentuan mengenai hal dan kewajiban warga negara bersifat • mempromosikan kampanye anti pelanggaran hak dan pengingkaran • Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi • ...
Cyber Consulting Crossword 2025-12-03
Across
- Something we don't have enough of in Cyber.
- These lead (hopefully) to sales.
- Some have too little, some have too much.
- A tool recently upgraded and finally useful.
- Where you sit when your answer to nr 1 is nill.
Down
- One wants a lot of this.
- A tool they want us to use.
- What do we save the world with, one at a time?
- Someone who often comments "pls fix".
- The floor on a ship and what we work on.
10 Clues: One wants a lot of this. • A tool they want us to use. • These lead (hopefully) to sales. • Someone who often comments "pls fix". • The floor on a ship and what we work on. • Some have too little, some have too much. • Something we don't have enough of in Cyber. • A tool recently upgraded and finally useful. • What do we save the world with, one at a time? • ...
Cloud Computing Concepts 2021-09-10
Across
- Cloud security threat
- AAA security architecture
- is a general term for the delivery of hosted services over the Internet.
- is a high-performance computer used for large-scale computing purposes
- Types include horizontal and vertical.
Down
- Risk Management Processes
- Second risk Management Processes
- means creating a virtual version of a device or
- also known as VMM
- Saas,Paas,Iaas
10 Clues: Saas,Paas,Iaas • also known as VMM • Cloud security threat • Risk Management Processes • AAA security architecture • Second risk Management Processes • Types include horizontal and vertical. • means creating a virtual version of a device or • is a high-performance computer used for large-scale computing purposes • ...
prison security crossword puzzle 2025-04-23
Across
- Type of camera used for surveillance
- A scheduled event for checking inmates
- A common method to restrict inmate movement
- Technology used to track movement
Down
- A high-security area within a prison
- a person imprisoned
- The highest level of prison security
- Guards use this to maintain order
- A unit used to isolate violent inmates
- The outermost barrier of a prison
10 Clues: a person imprisoned • Guards use this to maintain order • The outermost barrier of a prison • Technology used to track movement • Type of camera used for surveillance • A high-security area within a prison • The highest level of prison security • A scheduled event for checking inmates • A unit used to isolate violent inmates • A common method to restrict inmate movement
The Health Effects of Screen Time 2025-10-29
Across
- Physical inactivity or lack of movement
- Body part often strained by poor posture
- Type of light that can disturb sleep
- Eye discomfort caused by staring at screens too long
- Bullying. Online behavior that can harm others emotionally
Down
- Taking a break every 20 minutes to rest your eyes
- Feeling of worry or nervousness often linked to too much screen time
- Hormone that helps regulate sleep
- Time Time spent using phones, TVs, and computers,
9 Clues: Hormone that helps regulate sleep • Type of light that can disturb sleep • Physical inactivity or lack of movement • Body part often strained by poor posture • Taking a break every 20 minutes to rest your eyes • Eye discomfort caused by staring at screens too long • Time Time spent using phones, TVs, and computers, • ...
Thanksgiving 2023-11-21
Across
- Kids in school often dress up as this group of people for a school play
- Sometimes this fruit is carameled, crumbled, or pied
- Thanksgiving always falls on this day
- _________ Monday
Down
- ________ potato
- They put on the parade with balloons and floats and holiday cheer
- Avoid this type of pie if you have a nut allergy
- This is a bird people eat sometimes fried
8 Clues: ________ potato • _________ Monday • Thanksgiving always falls on this day • This is a bird people eat sometimes fried • Avoid this type of pie if you have a nut allergy • Sometimes this fruit is carameled, crumbled, or pied • They put on the parade with balloons and floats and holiday cheer • Kids in school often dress up as this group of people for a school play
Encryption 2022-01-10
Across
- Organisation responsible for UK cyber defence
- Person responsible for the first substitution cipher
- Code used during WW1/2 comprising dots and dashes
- Decoding machine used at Bletchley Park during
Down
- An algorithm for performing encryption and
- Type of analysis used to determine how often letters appear
- An encryption method used by the ancient
7 Clues: An encryption method used by the ancient • An algorithm for performing encryption and • Organisation responsible for UK cyber defence • Decoding machine used at Bletchley Park during • Code used during WW1/2 comprising dots and dashes • Person responsible for the first substitution cipher • Type of analysis used to determine how often letters appear
safety internet 2023-11-29
Across
- safety its a safety internet for childern
- grooming use the child to take drugs
- the blakmale do it
Down
- files they appear a email and when you click it te stole yours files
- bylling they do it on internet bad guys
- its a software how take your files
- parents give it to childern
- talking they do it men how do to take pictures of you
8 Clues: the blakmale do it • parents give it to childern • its a software how take your files • grooming use the child to take drugs • bylling they do it on internet bad guys • safety its a safety internet for childern • talking they do it men how do to take pictures of you • files they appear a email and when you click it te stole yours files
Bagaimana membuat konten positif untuk melawan cyberbullying 2025-05-23
Across
- platform yang tepat untuk membagikan konten positif adalah....
- sebelum membuat konten positif kita perlu menentukan....
- konten konten di media sosial biasanya....
Down
- Untuk membuat konten yang bagus memerlukan visual yang....
- bahasa yang tepat untuk menyampaikan konten positif adalah....
- dalam konten positif sertakan ..... bertindak untuk mencegah cyber bullying
- konten positif biasanya membagikan pengalaman......
7 Clues: konten konten di media sosial biasanya.... • konten positif biasanya membagikan pengalaman...... • sebelum membuat konten positif kita perlu menentukan.... • Untuk membuat konten yang bagus memerlukan visual yang.... • bahasa yang tepat untuk menyampaikan konten positif adalah.... • platform yang tepat untuk membagikan konten positif adalah.... • ...
ECC CROSSWORD 2024-09-21
Across
- Who you call for RMH Code blues and traumas
- Knowing where an officer is on Omnigo
- Resource you use when needing to know a downtime procedure
- Our CAD
- Where you find the mass casualty procedure
- New process emailed out on 9/21
- Call type for a security standby
- Where you send out emergencies
Down
- An email shared throughout the department
- An area where you send out informacast notifications that are not tiles
- Where you communicate with security
- You're made aware of these in your emails when you read and respond to them
- A pop up for reminders in Omnigo
13 Clues: Our CAD • Where you send out emergencies • New process emailed out on 9/21 • A pop up for reminders in Omnigo • Call type for a security standby • Where you communicate with security • Knowing where an officer is on Omnigo • An email shared throughout the department • Where you find the mass casualty procedure • Who you call for RMH Code blues and traumas • ...
Intro to Law, Public service, and safety 2021-12-20
Across
- criminal activities that are run by groups and are carried on a large scale
- provides protection against threats to a users privacy and security
- the level that sheriff departments are on
Down
- security provided by a person, other than a public service, to protect or guard people
- the study around the nature of fire
- 12 people sworn to give a verdict in a legal case
- protects and defends the united states against foreign intelligence and enforce the criminal laws in the US
- to ask a higher court to review a decision by a judge
- taking someone's property unlawfully and by force
- the criminal act of deliberately setting fire to property
10 Clues: the study around the nature of fire • the level that sheriff departments are on • 12 people sworn to give a verdict in a legal case • taking someone's property unlawfully and by force • to ask a higher court to review a decision by a judge • the criminal act of deliberately setting fire to property • ...
Radio Calls 2025-06-22
Across
- who you should call if you need a break while in the RF
- on channel 6, you can find GE, Conservation Education, and this
- code security will use if they are looking for a lost child
- what channel should you always keep the radio on
- code Security will use if they are looking for an adult
Down
- what do you call an animal that is floating sideways in an exhibit
- what channel should you call if you need a first responder
- call for this if you need to discreetly call for a supervisor
- the power knob is also used to control what
- what channel number is facilities on if it's the weekend
10 Clues: the power knob is also used to control what • what channel should you always keep the radio on • who you should call if you need a break while in the RF • code Security will use if they are looking for an adult • what channel number is facilities on if it's the weekend • what channel should you call if you need a first responder • ...
Cloud Computing Concepts 2021-09-10
Across
- Cloud security threat
- Risk Management Processes
- Saas,Paas,Iaas
- is a general term for the delivery of hosted services over the Internet.
Down
- AAA security architecture
- also known as VMM
- is a high-performance computer used for large-scale computing purposes
- means creating a virtual version of a device or resource.
- Second risk Management Processes
- Types include horizontal and vertical.
10 Clues: Saas,Paas,Iaas • also known as VMM • Cloud security threat • AAA security architecture • Risk Management Processes • Second risk Management Processes • Types include horizontal and vertical. • means creating a virtual version of a device or resource. • is a high-performance computer used for large-scale computing purposes • ...
We are not afraid ... If we can all be together 2022-08-24
21 Clues: rose • deal • huge • burst • moved • rough • deadly • stopped • find out • find out • exercise • improving • improving • come across • a sea journey • caught firmly • a nautical mile • travelling by sea • making sharp noise • back part of the ship • the horizontal pieces of iron or wood for security.
Spanish Travel Vocab 2022-11-29
20 Clues: gate • ticket • flight • luggage • airport • arrival • to board • suitcase • passport • to travel • passenger • to travel • departure • travel agent • boarding pass • to take a taxi • to get in line • to confirm a flight • to go through security • to call someone by phone
Unit 2 crossword puzzle 2022-02-04
14 Clues: 2+2=4 • Photo • atklāt • potions • izgudrot • Einstine • bioloģija • pele(dators) • Solar sistem • lietotājvārds • stars and moon's • gudrais telefons • *******(security) • jumping(not on the moon)
Cybersecurity 2025-10-13
Across
- Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.)
- Kejadian apabila penyerang berjaya menceroboh dan mengakses data sensitif. (An incident where an attacker successfully accesses sensitive data.)
- Perisian yang direka untuk mengesan, mencegah, dan membuang perisian jahat. (Software designed to detect and remove malicious programs.)
- Individu yang cuba mendapat akses tanpa kebenaran ke dalam sistem komputer. (Individual who seeks unauthorized access to a system.)
- Membenarkan pengguna mencipta sambungan yang selamat ke rangkaian lain melalui Internet. (Creates a secure connection over the Internet.)
- Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.)
- Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.)
- Gabungan aksara rahsia yang digunakan untuk melindungi akaun anda. (Secret string of characters to protect your account.)
Down
- Sistem keselamatan rangkaian yang memantau dan mengawal trafik masuk dan keluar. (Network security system that monitors and controls traffic.)
- Cubaan menipu mangsa melalui e-mel palsu untuk mencuri maklumat sensitif. (Scam attempt, often via email, to steal sensitive info.)
- Kemas kini kod yang dikeluarkan oleh pemaju untuk membetulkan bug atau security vulnerability. (Code update to fix bugs or a security vulnerability.)
- Kaedah keselamatan yang memerlukan dua jenis pengesahan berbeza. (Security method requiring two different forms of verification.)
- Proses menukar data biasa kepada kod yang sukar dibaca untuk keselamatan. (Process of converting data into an unreadable code.)
- Malware yang secara senyap memantau aktiviti pengguna dan mencuri data. (Malware that secretly monitors user activity.)
- Salinan data yang disimpan di tempat lain, digunakan jika data asal hilang atau rosak. (Copy of data kept elsewhere for recovery.)
15 Clues: Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.) • Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.) • Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.) • ...
Teka-Teki Mata Pelajaran Bimbingan Konseling (BK) 2024-10-05
Across
- perlakuan bully yang berupa pukulan, tendangan, tamparan dan segala bentuk kekerasan yang dapat melukai fisik secara langsung
- singkatan Penyakit Menular Seksual
- Gunung Vesuvius terletak di negara?
- menyukai sesama jenis disebut
- contoh perilaku bullying fisik
- nama kaum nabi Luth
- nama penduduk yang tinggal di sekitar Gunung Vesuvius
- perilaku bullying yang dilakukan melalui sarana elektronik
Down
- perlakuan bully melalui pengabaian, pengucilan dan penghindaran
- faktor penyebab bullying
- contoh perilaku bullying lisan
- perasaan yang muncul akibat bullying
- faktor penyebab terjadinya bullying dari rumah
- suatu tindakan agresif yang berulang yang dilakukan dengan tujuan mengganggu/menyakiti orang lain
- perlakuan bully yang berupa kata-kata yang tidak baik
- kemampuan untuk memahami dan berbagi perasaan, pikiran, dan pengalaman orang lain
- perasaan belas kasih dan sayang yang muncul ketika seseorang melihat orang lain mengalami kesedihan, masalah, atau kemalangan
- singkatan bimbingan konseling
18 Clues: nama kaum nabi Luth • faktor penyebab bullying • menyukai sesama jenis disebut • singkatan bimbingan konseling • contoh perilaku bullying lisan • contoh perilaku bullying fisik • singkatan Penyakit Menular Seksual • Gunung Vesuvius terletak di negara? • perasaan yang muncul akibat bullying • faktor penyebab terjadinya bullying dari rumah • ...
airport 2024-03-15
Privacy Crossword 2024 2024-10-13
Across
- The Great ____ is a 2019 documentary about the Cambridge Analytica scandal and explores the misuse of personal data and its impact on political campaigns.
- 2015 Oscar-winning documentary about whistleblower Edward Snowden as he exposes US government surveillance programs and privacy violations
- The division Tom Cruise leads in “Minority Report”, where 3 psychics predict crimes before they happen.
- 2018 Cardi B album, Invasion of _______, featuring hits like “I Like It’ and ‘Bodak Yellow”
- Sandra Bullock’s 1995 film where her identity is erased and replaced with a criminal history after uncovering a program capable of altering data. (2 words)
- Author of the dystopian novel about totalitarian surveillance adapted into Richard Burton’s final film role (1984).
- Term for digital resistance, often involving cyber disruption, as portrayed by fsociety in the tv series, “Mr. Robot”.
- Michael Jackson’s 10th and final studio album featuring the song “Privacy”
- Name of the AI companion that forms a bond with a lonely writer in the 2013 film, “Her”.
- 1974 thriller starring Gene Hackman as Harry Caul who is consumed by a recording, foreshadowing debates on privacy and security. (2 words)
- Funky group whose 1977 song "Watching You" blends danceable grooves with themes of surveillance and paranoia
Down
- Monitoring of online activities and cell phone usage, as explored in the 2013 documentary “Terms and Conditions May Apply”
- 1981 hit song by American duo Hall & Oates about someone always watching like a detective. (2 words)
- The ____ is a thriller film where Mae Holland (Emma Watson) joins a groundbreaking experiment that pushes the boundaries of privacy, ethics, and personal freedom.
- Social media platform central in the 2010 movie, The Social Network, that highlights the importance of privacy and safeguarding personal information
- Leader of Oceania or 1999 Dutch reality tv show format where contestants are watched 24/7. (2 words)
- The ______ Show is a film about a man, played by Jim Carrey, whose entire life is televised without his knowledge.
- 1997 dystopian film starring Ethan Hawke as Vincent Freeman where society is divided by genetic makeup, raising ethical questions about privacy and opportunity.
- Artist behind the 1984 hit “Somebody’s Watching Me”
- The Police frontman, whose haunting lyrics in “Every Breath You Take” reflect obsession, possessiveness, and surveillance.
20 Clues: Artist behind the 1984 hit “Somebody’s Watching Me” • Michael Jackson’s 10th and final studio album featuring the song “Privacy” • Name of the AI companion that forms a bond with a lonely writer in the 2013 film, “Her”. • 2018 Cardi B album, Invasion of _______, featuring hits like “I Like It’ and ‘Bodak Yellow” • ...
protection 2024-11-25
Across
- Applied to the skin to shield it from UV rays.
- Worn to support injured body parts or prevent further harm.
- Installed on doors to keep intruders out.
- Worn by knights to stay safe in combat.
- A person who watches over and defends someone or something.
- Worn to cover the face and avoid inhaling harmful particles.
- A special place in cars for children to stay safe while traveling.
- Footwear designed to shield feet in harsh environments.
- The upper covering of a house that shields from weather.
- A lotion that prevents skin damage from UV rays.
- A barrier that marks boundaries and prevents entry.
- A safety strap used in vehicles to secure passengers.
- Worn on the head to prevent injury during biking or construction.
- An enclosure used to keep animals safe or confined.
- Used to slow a descent during a fall from great heights.
- Worn to improve vision and sometimes block sunlight.
- A state of being free from harm or risk.
- A medical procedure to build immunity against diseases.
- Used in battles to block attacks.
- Keeps a boat steady and prevents drifting.
Down
- A small craft used to escape danger at sea.
- Used to shield oneself from rain or sun.
- A stronghold built to defend against attacks.
- A safe place of refuge or rest.
- A bird's home that provides safety for eggs.
- A place that offers safety from elements or danger.
- Eye gear that guards against dust or chemicals.
- A digital barrier to secure networks from cyber threats.
- A layer worn to keep warm and prevent cold exposure.
- An act of saving someone from harm or danger.
- Handwear used to prevent injuries or contamination.
- A sheet used to cover and secure items from weather or damage.
- A system that alerts you to potential danger or intrusion.
- Worn to safeguard the chest area, often bulletproof in security roles.
- Used in sports or to catch objects while keeping them contained.
- A device that activates to prevent fires from spreading.
- A secure room used to store valuable items.
- A physical object that restricts access or movement.
- Extra material added to reduce impact during falls or hits.
39 Clues: A safe place of refuge or rest. • Used in battles to block attacks. • Worn by knights to stay safe in combat. • Used to shield oneself from rain or sun. • A state of being free from harm or risk. • Installed on doors to keep intruders out. • Keeps a boat steady and prevents drifting. • A small craft used to escape danger at sea. • ...
III L - crossword 2 M. Zastawnik; J. Leśniak 2015-04-27
Goverment 2022-12-18
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Hannah Gacutan 2022-12-07
14 Clues: Order • Policy • System • System • College • Agencies • Security • Agreement • Appointees • Sanctioning • Bureaucracy • Corporations • Service System • Service Workers
Sophia Madison American Government Sub Crossword Puzzle 2022-12-07
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Executive Branch, Presidency 2022-12-06
14 Clues: Order • Policy • System • System • College • Security • Agencies • Agreement • Appointees • Bureaucracy • Sanctioning • Corporations • Service System • Service Workers
Internetkriminalität 2023-11-10
Across
- Der ... rekonstruiert das Originalgesicht.
- Das Hautmotiv für Cyberkriminelle ist ...
- Deep ... ist eine Methode, durch die KI lernt
- Es gibt auch ... Eiinsatzmöglichkeiten von Deep Fakes.
- Beim Face-Swapping-Verfahren wird das ... einer Zielperson in das eines Angreifers eingefügt.
- Konvertieren bedeutet ...
Down
- Der ... erkennt alle Gesichtsaudrücke auf einem Bild
- Die deutsche Bezeichnung für Cyber Crime lautet...
- Die Zahlen der Internetkriminalität sind weiltweit am ...
- Deep Fakes sind Fotos, ... und Audios, die mithilfe von KI verändert wurden.
- Um Fotos, Videos und Audios manipulieren zu können, muss man Datenmaterial in hoher ... haben.
- Manipulierte Videos von ... können zu Rufschädigung führen.
- Von Deep Fakes gehen zahlreiche ... aus.
- Fake News werden häufig eingesetzt, um die ... der Bevölkerung zu manipulieren.
14 Clues: Konvertieren bedeutet ... • Von Deep Fakes gehen zahlreiche ... aus. • Das Hautmotiv für Cyberkriminelle ist ... • Der ... rekonstruiert das Originalgesicht. • Deep ... ist eine Methode, durch die KI lernt • Die deutsche Bezeichnung für Cyber Crime lautet... • Der ... erkennt alle Gesichtsaudrücke auf einem Bild • Es gibt auch ... Eiinsatzmöglichkeiten von Deep Fakes. • ...
U03 - CSE-CH6 2024-03-14
Across
- (7,8) with this defence method if cyber criminals penetrate one layer, they still have to contend with several more layers with each layer being more complicated than the previous one.
- (9,5,2,11,5) combines multiple physical hard drives into a single logical unit to provide data redundancy and improve performance.
- (9,11) An organization should not reveal any information that cyber criminals can use to figure out what version of the operating system a server is running or the type of equipment it uses.
- (7,7) is typically the router that provides devices access to the rest of the network or to the Internet.
- refers to changing the controls and procedures at different layers.
Down
- (8,4) a network protocol used with network switches that prevents loops on a network when switches interconnect via multiple paths.
- involves reducing the severity of the loss or the likelihood of the loss from occurring.
- (5,15) as part of an IT asset management system, an organization specifies the acceptable IT assets that meet its objectives
- (5,10) includes a complete inventory of hardware and software.
- (4,8) is the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- (4,5) means that systems and services are available 99.999%
- (4,12) incorporates Fault Tolerance, System Resiliency, and Elimination or reduction of single-points of failure
- (6,5,2,7) can be a specific piece of hardware, a process, a specific piece of data, or even an essential utility.
- (8,6) with approach is used to reduces the possibility of a threat to data and information. An organization should restrict access so that users only have the level of access required to do their job.
14 Clues: (4,5) means that systems and services are available 99.999% • (5,10) includes a complete inventory of hardware and software. • refers to changing the controls and procedures at different layers. • involves reducing the severity of the loss or the likelihood of the loss from occurring. • ...
Teka-Teki Silang tentang Perundungan 2022-10-05
Across
- Memberikan kritikan yang pedas di media sosial termasuk kejahatan
- Perilaku tidak menyenangkan baik secara verbal, fisik, sosial
- Seseorang/kelompok yang melihat terjadinya kasus perundungan
- Salah satu lembaga pengaduan dan rujukan terhadap kasus perundungan
Down
- Salah satu dampak yang dialami korban bullying
- Tindakan/cara yang dilakukan agar seseorang tidak membully
- Salah satu upaya pencegahan untuk menghindari perbuatan bully
- Salah satu tempat yang sering terjadinya perilaku bullying
- Salah satu dampak yang dialami saksi bullying
- Perilaku memukul, menampar, menendang merupakan jenis bullying secara
10 Clues: Salah satu dampak yang dialami saksi bullying • Salah satu dampak yang dialami korban bullying • Tindakan/cara yang dilakukan agar seseorang tidak membully • Salah satu tempat yang sering terjadinya perilaku bullying • Seseorang/kelompok yang melihat terjadinya kasus perundungan • Salah satu upaya pencegahan untuk menghindari perbuatan bully • ...
Crossword 2021-07-21
Across
- Acronym for Service-Now.
- What code hosting platform is permitted to have an exception?
- Password protected.
- What region is currently being migrated and requesting a large number of exceptions?
- How does the exceptions team assist users after their emails have been quarantined (Valid Bus justification only).
Down
- Type of Removable Media.
- What VOIP application does the Bank permit usage of via browser only?
- Reid Director of Cyber Operations MGL.
- Length of time (In months) for approved BCP printed exception requests.
- What does an unhappy user do?
10 Clues: Password protected. • Type of Removable Media. • Acronym for Service-Now. • What does an unhappy user do? • Reid Director of Cyber Operations MGL. • What code hosting platform is permitted to have an exception? • What VOIP application does the Bank permit usage of via browser only? • Length of time (In months) for approved BCP printed exception requests. • ...
kesehatan mental dan bullying 2024-01-24
Across
- apa saja contoh gangguan kesehatan mental?
- apa yang menyebabkan seseorang remaja mengalami gangguan kesehatan mental?
- mengucilkan seseorang dalam suatu kelompok termasuk dalam salah satu jenis bullying?
- contoh cyber bullying yg dilakukan disosmed salah satunya adalah melalui?
- salah satu ciri ciri upaya pengendalian emosi adalah?
Down
- sebutkan satu jenis bullying?
- mengapa bullying itu bisa terjadi, karena pembully tersebut merasa?
- salah satu tanda seseorang mengalami gangguan kesehatan mental?
- apa saja contoh bullying yang bisa terjadi di sekolah?
- salah satu akibat dari kesehatan mental yaitu?
10 Clues: sebutkan satu jenis bullying? • apa saja contoh gangguan kesehatan mental? • salah satu akibat dari kesehatan mental yaitu? • salah satu ciri ciri upaya pengendalian emosi adalah? • apa saja contoh bullying yang bisa terjadi di sekolah? • salah satu tanda seseorang mengalami gangguan kesehatan mental? • ...
Digital Citizenship Puzzle 2020-09-30
Across
- Something used to try and leak you personal information.
- Someone who is being cyber bullied.
- To rate something using its aspects.
- A place online that connects people from anywhere.
- A program that invades your device and causes problems.
Down
- When your private information is stolen and used.
- A fake name that you use on an app, game, or website.
- A word or phrase that locks something.
- Inventions that were created to solve problems.
- Pretending you're someone who you are not.
10 Clues: Someone who is being cyber bullied. • To rate something using its aspects. • A word or phrase that locks something. • Pretending you're someone who you are not. • Inventions that were created to solve problems. • When your private information is stolen and used. • A place online that connects people from anywhere. • A fake name that you use on an app, game, or website. • ...
Informatika Kelompok 5 Kelas X.B ( Hubungan AI & IoT ) 2024-08-01
Across
- Istilah untuk pengumpulan dan pertukaran data oleh perangkat loT
- Kondisi di mana Al membantu mengatur energi di gedung- gedung kota
- Data yang dikumpulkan oleh perangkat loT
- Kota di Spanyol yang menerapkan konsep kota pintar
Down
- Aspek yang harus diperhatikan untuk melindungi data pribadi pengguna
- Sistem yang mengendalikan suhu secara otomatis di rumah pintar
- Masalah keamanan terkait integrasi AI dan IoT
- Tantangan utama dalam integrasi Al dan loT selain keamanan
- Jenis kendaraan yang menggunakan AI untuk beroperasi tanpa pengemudi
- Proses identifikasi pola dalam data oleh AI
10 Clues: Data yang dikumpulkan oleh perangkat loT • Proses identifikasi pola dalam data oleh AI • Masalah keamanan terkait integrasi AI dan IoT • Kota di Spanyol yang menerapkan konsep kota pintar • Tantangan utama dalam integrasi Al dan loT selain keamanan • Sistem yang mengendalikan suhu secara otomatis di rumah pintar • ...
Were you listening? 2024-06-26
Across
- what type of attack happened to the NHS
- what was the Y6 play about
- which book got 5 stars in the book review
- where are people pooping in a river
- what is one of the 3 words for the school entrance
Down
- what time of day was the 2nd Y6 play
- roughly how many children are in the school
- who did England draw 0-0 to
- what is the recipe for
- which football team did the prince of wales visit
10 Clues: what is the recipe for • what was the Y6 play about • who did England draw 0-0 to • where are people pooping in a river • what time of day was the 2nd Y6 play • what type of attack happened to the NHS • which book got 5 stars in the book review • roughly how many children are in the school • which football team did the prince of wales visit • ...
TTS KONSEP MEDIA DIGITAL_NIMAS HADI ANGESTI 2025-03-12
Across
- Sistem keamanan yang digunakan untuk melindungi data digital
- Jaringan komputer global yang menghubungkan pengguna di seluruh dunia
- Proses belajar mengajar yang dilakukan melalui platform digital
- Perusahaan teknologi yang mendominasi industri komunikasi global
- Media komunikasi berbasis internet yang memudahkan komunikasi jarak jauh
Down
- Hak cipta,privasi,plagiarisme,hoaks,cyber crime merupakan etika dalam
- Pengembangan teknologi untuk mengotomatiskan pekerjaan manusia
- Perangkat lunak yang berfungsi untuk melindungi komputer dari virus
- Sektor industri yang berkembang pesat karena adanya globalisasi dan teknologi
- Sistem berbasis teknologi yang memungkinkan pengiriman pesan instan
10 Clues: Sistem keamanan yang digunakan untuk melindungi data digital • Pengembangan teknologi untuk mengotomatiskan pekerjaan manusia • Proses belajar mengajar yang dilakukan melalui platform digital • Perusahaan teknologi yang mendominasi industri komunikasi global • Perangkat lunak yang berfungsi untuk melindungi komputer dari virus • ...
Technology 2025-05-05
Across
- Writing code to create software or applications.
- The physical parts of a computer system.
- Protection of internet-connected systems from cyber threats.
- The use of scientific knowledge for practical purposes.
- A mobile phone with advanced features and internet access.
Down
- Programs and operating information used by a computer.
- A software program designed for a specific task on devices.
- A global network connecting millions of computers worldwide.
- A group of interconnected computers or devices.
- An electronic device that processes data and performs tasks.
10 Clues: The physical parts of a computer system. • A group of interconnected computers or devices. • Writing code to create software or applications. • Programs and operating information used by a computer. • The use of scientific knowledge for practical purposes. • A mobile phone with advanced features and internet access. • ...
ethics 2023-05-05
Across
- you could get an _________ fine if you break the computer misuse act
- when you get a lot of emails
- _____ is when you start arguments with people and post nasty messages
- when you receive an email trying to steal information
Down
- when you watch what people are typing by _______ their computer
- weather something is right or wrong
- a way of bullying online
- you need a strong _________ to keep your data safe
- a way of sending a virtual message
- when a bully shares information about you
10 Clues: a way of bullying online • when you get a lot of emails • a way of sending a virtual message • weather something is right or wrong • when a bully shares information about you • you need a strong _________ to keep your data safe • when you receive an email trying to steal information • when you watch what people are typing by _______ their computer • ...
Technology Words 2026-01-16
Across
- Shortcuts to apps you have at the bottom of your screen
- The key to make your computer brighter
- messaging a classmate rude comments
- someone who pretends to be someone else
- The button that makes the volume go down
- A example for a domain
Down
- The key for searching things
- The key that makes your volume go down
- The button that makes you exit out of something
- The key to make your sound go up
10 Clues: A example for a domain • The key for searching things • The key to make your sound go up • messaging a classmate rude comments • The key to make your computer brighter • The key that makes your volume go down • someone who pretends to be someone else • The button that makes the volume go down • The button that makes you exit out of something • ...
Bab 3 2025-09-08
Across
- BULLYING bentuk pelanggaran hak
- hak yang didapat setiap manusia
- perilaku yang memperlakukan seseorang secara beda
- ketentuan mengenai hal dan kewajiban warga negara bersifat
Down
- salah satu upaya yang dapat dilakukan oleh negara untuk mencegah kasus pelanggaran hak adalah
- merupakan tindakan semena-mena berupa menyakiti, mempersulit atau melenyapkan seseorang
- warga negara saling mengetahui hak dan kewajibannya secara tepat dan
- mempromosikan kampanye anti pelanggaran hak dan pengingkaran
- UUD NRI tahun 1945 berperan sebagai hukum
- Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi
10 Clues: BULLYING bentuk pelanggaran hak • hak yang didapat setiap manusia • UUD NRI tahun 1945 berperan sebagai hukum • perilaku yang memperlakukan seseorang secara beda • ketentuan mengenai hal dan kewajiban warga negara bersifat • mempromosikan kampanye anti pelanggaran hak dan pengingkaran • Hak atas pembangunan ini pun dinyatakan kembali melalui deklarasi • ...
TTS Bullying/Perundungan 2025-09-11
Across
- Bentuk bullying yang terjadi secara online, melalui media sosial atau pesan
- Perilaku agresif yang disengaja dan berulang yang dilakukan oleh seseorang atau sekelompok orang
- Jenis bullying yang melibatkan gosip atau pengucilan sosial.
- Seseorang yang melakukan tindakan bullying
- Orang yang menyaksikan tindakan bullying tapi tidak berpartisipasi
Down
- Seseorang yang menjadi target perilaku bullying
- Dampak psikologis jangka panjang pada korban bullying
- Sikap meremehkan atau mengejek orang lain
- Jenis bullying yang melibatkan kontak fisik, seperti memukul atau menendang
- Perasaan takut yang dialami korban bullying
10 Clues: Sikap meremehkan atau mengejek orang lain • Seseorang yang melakukan tindakan bullying • Perasaan takut yang dialami korban bullying • Seseorang yang menjadi target perilaku bullying • Dampak psikologis jangka panjang pada korban bullying • Jenis bullying yang melibatkan gosip atau pengucilan sosial. • ...
Networking Fundamentals 2025-11-23
Across
- Any given set of rules.
- Inefficient compared to switches due to collisions
- Uses IP addresses to route data between different networks (LAN to WAN)
- An advanced form of a bridge with multiple ports
- Regenerates and amplifies weak signals to extend network range
Down
- Email, chat, and video conferencing.
- Allows wireless devices (smartphones, laptops, IoT devices) to connect to a wired network
- Stands for Modulator/Demodulator
- Uses MAC addresses to forward data only to the intended segment.
- Protects against hackers, malware, and cyber threats
10 Clues: Any given set of rules. • Stands for Modulator/Demodulator • Email, chat, and video conferencing. • An advanced form of a bridge with multiple ports • Inefficient compared to switches due to collisions • Protects against hackers, malware, and cyber threats • Regenerates and amplifies weak signals to extend network range • ...
Cybercongress Workshop '21 2021-07-17
Across
- TIL a lot of internet slangs.
- IIRC you mentioned that you’re busy this weekend.
- I’m your human search engine. You can ask me AMA.
Down
- WIP dude, we’re still promoting the cyber congress.
- Please don’t disturb me. I’m going AFK.
- DAE feel like everyday’s the same?
- I don't have a lot of IRL friends.
- INB4 Mumbai Indians wins this year’s IPL.
8 Clues: TIL a lot of internet slangs. • DAE feel like everyday’s the same? • I don't have a lot of IRL friends. • Please don’t disturb me. I’m going AFK. • INB4 Mumbai Indians wins this year’s IPL. • IIRC you mentioned that you’re busy this weekend. • I’m your human search engine. You can ask me AMA. • WIP dude, we’re still promoting the cyber congress.
IT-Security - Datenschutz/ Datensicherheit 2016-01-29
Across
- Wie nennt man Personen die in Computersysteme eindringen?
- Hintertür die Angreifer durch Viren oder Trojaner öffnen!
- Was versteckt sich in einem scheinbar nützlichem Programm
- Wird mit Hilfe von elektronischen Medien gestärkt!
Down
- Wie kannst du deine Daten doppelt sichern?
- Was ist als Programm in ein Dokument eingebettet?
- Wie heißen die Programme, die Tastatureingaben mitprotokollieren?
- Was schützt den Computer vor Zugriffe von außen?
8 Clues: Wie kannst du deine Daten doppelt sichern? • Was schützt den Computer vor Zugriffe von außen? • Was ist als Programm in ein Dokument eingebettet? • Wird mit Hilfe von elektronischen Medien gestärkt! • Wie nennt man Personen die in Computersysteme eindringen? • Hintertür die Angreifer durch Viren oder Trojaner öffnen! • ...
VIBE Activity II Energizer Crossword 2022-08-18
Across
- Condition of market when economy is receding and most stocks are declining in value
- The month of Eid al-Adha
- Cyber attack that attempts to steal your money, or your identity, and personal information
- The framework that upholds Maqasid Shariah principle
Down
- Commitment to safeguard ESG
- Assets must be greater than ………?
- The first protection in Maqasid Shariah
- Where does wuquf take place?
8 Clues: The month of Eid al-Adha • Commitment to safeguard ESG • Where does wuquf take place? • Assets must be greater than ………? • The first protection in Maqasid Shariah • The framework that upholds Maqasid Shariah principle • Condition of market when economy is receding and most stocks are declining in value • ...
e safety 2019-03-04
7 Clues: of a website • it to your self • bullying=online bullying • will probably use it loads • messages and photos which sent in a flirty way • fake link or a link that will give you a viris • fun of someone online through a embarrassing photo or video
Tantangan Kecil 2023-08-08
Across
- mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying
- salah satu dampak negatif bully
- sisi negatif gawai
- perangkat elektronik seperti hp, laptop, dan tablet disebut juga...
Down
- manfaat gawai adalah sebagai alat...
- bentuk perundungan melalui media elektronik
- Perilaku penindasan atau kekerasan yang dilakukan dengan tujuan menyakiti fisik dan mental
7 Clues: sisi negatif gawai • salah satu dampak negatif bully • manfaat gawai adalah sebagai alat... • bentuk perundungan melalui media elektronik • perangkat elektronik seperti hp, laptop, dan tablet disebut juga... • mengalami luka dan sakit pada bagian tubuh merupakan dampak... bullying • ...
TEKA TEKI SILANG 2022-12-14
Across
- Perundungan di dunia maya disebut juga ..... bullying
- Perundungan dalam bahasa inggris
- Perundungan dapat berdampak di bidang akademis, sosial, fisik dan .....
- Orang yang melakukan tindakan berempati ketika terjadi perundungan
Down
- Istilah penonton dalam perundungan
- Salah satu contoh perundungan fisik
6 Clues: Perundungan dalam bahasa inggris • Istilah penonton dalam perundungan • Salah satu contoh perundungan fisik • Perundungan di dunia maya disebut juga ..... bullying • Orang yang melakukan tindakan berempati ketika terjadi perundungan • Perundungan dapat berdampak di bidang akademis, sosial, fisik dan .....
Security Portfolio Cross Word 2020-11-25
Across
- nasty hacker think lee van clef
- Palo Alto 2020 Network Firewalls leader
- "we see" our new security campaign
- My computer has a worm and now I ____
Down
- the "C" in CIA
- nice hacker think lone ranger
- extremely accurate 90s movie about network security
- yellow bird, former employee
- critical partner, recent IPO
9 Clues: the "C" in CIA • yellow bird, former employee • critical partner, recent IPO • nice hacker think lone ranger • nasty hacker think lee van clef • "we see" our new security campaign • My computer has a worm and now I ____ • Palo Alto 2020 Network Firewalls leader • extremely accurate 90s movie about network security
Results Oriented 2014-06-05
19 Clues: stop • Offer • Calls • way to • educate • federal • One call • offering • May I have • Enter data • proficiency • proceed with • charge of $2.40 • Free payment option • Company and Customer • Social Security Number • unnecessary Field trips • with legal requirements • Cust can call to check account balance
SN43004FP Chapter 3.1 2022-10-19
Across
- Account with no password and is disabled be default
- Group that manages shares, backs up files, and shuts down the computer
- Group used only for e-mail applications and is not security-enabled
Down
- Group that can manage the server
- Group that can manage the forest
- Built-in account with full control and cannot be deleted
- Group that can manage the domain
- Group used to assign rights and permissions and is security-enabled
8 Clues: Group that can manage the server • Group that can manage the forest • Group that can manage the domain • Account with no password and is disabled be default • Built-in account with full control and cannot be deleted • Group used to assign rights and permissions and is security-enabled • Group used only for e-mail applications and is not security-enabled • ...
week 1 be cyber smart 2021-09-21
Cyber Law 2021-09-05
Across
- digital___ is the productivity platform that some experts regard as the third industrial revolution
- wrote Code and Other Laws of Cyberspace
- according to lessig there are ___ distinct but interdependent constraints that regulate behavior in the physical world.
- the conversion of analogue data into digital form
Down
- cyber____ is the belief that individuals should be at liberty to pursue their own tastes and interests online.
- Shawn Fanning created the____
- ____Regulation works by utilising feedback
7 Clues: Shawn Fanning created the____ • wrote Code and Other Laws of Cyberspace • ____Regulation works by utilising feedback • the conversion of analogue data into digital form • digital___ is the productivity platform that some experts regard as the third industrial revolution • ...
Cyber Vocab 2021-12-09
Across
- accountable for who has access to information assets
- a means of securing digital data using one or more mathematical techniques
- a technique used to validate the authenticity and integrity of a message, software or digital document
Down
- a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- refers to a program or code that takes advantage of a security weakness in an application or system.
- are exchanged between two parties
- not identical on both sides of a central line
7 Clues: are exchanged between two parties • not identical on both sides of a central line • accountable for who has access to information assets • a means of securing digital data using one or more mathematical techniques • refers to a program or code that takes advantage of a security weakness in an application or system. • ...
CYBER BULLYING 2024-07-25
7 Clues: the web we share • being safe online • a witness who ignores the bully • someone who control a certain thing • someone who stand up for the victim • a code you make to secure your information • when a hateful person does mean things online
Crossing Cyber 2023-07-27
Across
- It is a way of communicating amongst one another around the world along with expressing oneself through this
- It is a way of insulting or taking control of one's feelings and toying with them
- A type of advancement into society that helps to perform tasks for humans entertainment and/or convenience
Down
- The act of doing something illegal
- A word or phrase that has the ability of hurting a person mentally or emotionally
- A technological device that helps one to do work with a digital means
- The act of invading through one's software and leaking, invading or messing one's personal information
7 Clues: The act of doing something illegal • A technological device that helps one to do work with a digital means • A word or phrase that has the ability of hurting a person mentally or emotionally • It is a way of insulting or taking control of one's feelings and toying with them • ...
Cyber Wellness 2023-02-01
7 Clues: Think before you p_____ • respect peoples o________ • i_________ is needed to do work • we unlock your phone p___________ • info do not reveal your p________I____ • we cannot share our home a______ to others • our personal p____________ is not suppose to be share
Cyber attacks 2023-05-26
Across
- AI-enabled attacks occur when a threat actor uses AI to assist in an attack
- is a blanket term for any kind of computer software with malicious intent.
- is the act of intimidating, threatening, or coercing people online through the use of digital or electronic methods such as social media, email, text messages, or blog posts
Down
- The term vandalism describes the deliberate act of damaging or destroying another person or company's property without their permission.
- theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- a data breach exposes confidential, sensitive, or protected information to an unauthorized person.
- is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM), or messages posted to a discussion group or forum.
7 Clues: is a blanket term for any kind of computer software with malicious intent. • AI-enabled attacks occur when a threat actor uses AI to assist in an attack • a data breach exposes confidential, sensitive, or protected information to an unauthorized person. • ...
cyber safety 2023-05-22
7 Clues: A disease. • Type of bulling. • Copying someone's work. • Online fights using electronic messages • Sending nasty, mean, and insulting messages. • When someone steals your personal information. • Talking someone into revealing their secrets and sharing them online.
Cyber techniques 2024-11-18
Across
- Examining server and network records to trace unauthorized access
- Working across borders to catch international cybercriminals.
- A phrase used to describe how investigators trace stolen money
- Collaborating with social media and telecom companies for metadata.
Down
- Identifying patterns of suspicious online behavior using Artificial Intelligence
- Recovering lost or hidden data from digital devices
- Analyzing the behavior and tactics of suspects
7 Clues: Analyzing the behavior and tactics of suspects • Recovering lost or hidden data from digital devices • Working across borders to catch international cybercriminals. • A phrase used to describe how investigators trace stolen money • Examining server and network records to trace unauthorized access • ...
cyber ethics 2025-05-21
Across
- it refers to an illegal intrusion into a computer
- it refers to being aware of the ethical practiceswhile using internet
- it is also known as digital dossier
- a licence or copyright is required to copy the genuine programs
Down
- it refers to unwanted bulk emails that come from unknown sources
- it refers to criminal activites that involves the use of internet
- it refers to using the language and thoughts of another person
7 Clues: it is also known as digital dossier • it refers to an illegal intrusion into a computer • it refers to using the language and thoughts of another person • a licence or copyright is required to copy the genuine programs • it refers to unwanted bulk emails that come from unknown sources • it refers to criminal activites that involves the use of internet • ...
Computer Professions and Cyber crimes 2022-03-28
Across
- - a technique of tricking a user into clicking on something different from what the user perceives. (deprecated attack)
- - A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
- - is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- - is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
- - is gaining unauthorized access to a computer system via another user's legitimate connection.
- - is an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later.
- gap (networking) - It is a network security measure used on one or more computers to ensure the physical isolation of a secure computer network from unsecured networks, such as the public Internet or an unsecured local area network.
- - attack in which a person or a program successfully identifies as another by falsifying a data.
- (computing) - is a method of bypassing normal authentication procedures, usually through a network connection such as the Internet.
- - is the theft of money from the card to your card, account, account in the payment system, as well as the purchase of goods using someone else's credit card. Most often, carders use cash withdrawals, the purchase of branded clothing or electronics.
- – it refers to any video in which faces have been either swapped or digitally altered, with the help of AI.
- - is the area of development that refers to the server-side development. It focuses on databases, scripting, and website architecture.
- - is the area of development that refers to the client-side development. It is the development of the graphical user interface of a website.
- (horse) - is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.
Down
- - Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
- - when a person builds an online relationship with a young person and tricks or pressures him/ her into doing a sexual act.
- request forgery (CSRF) - a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. (also deprecated)
- slicing - attack in which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
- - A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web.
- - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.
- - is a cyberattack in which spam emails, or other forms of communication, are sent en masse, with the intention of tricking recipients into doing something that undermines their security or the security of the organization they work for.
- - is a set of computer programs, usually malicious, designed to provide access to a computer or an area of its software that is otherwise prohibited.
- (denial of service attack) - is a cyberattack in which a criminal wants to make a computer or network resource inaccessible to users by disrupting the services of a host connected to the network. Denial of service is usually achieved by filling a resource with redundant requests to overload systems and prevent legitimate requests from being executed.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.
27 Clues: - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies. • - is gaining unauthorized access to a computer system via another user's legitimate connection. • - attack in which a person or a program successfully identifies as another by falsifying a data. • ...
1.01 key terms 2023-09-09
14 Clues: needs- • needs- • growth- • changes- • of pride- • perspective- • fulfillment- • adjustments- • actualization- • continuations- • and acceptance- • in relationships- • responsibilities- • and security needs-
econ 2021-09-30
Across
- Exchange- the act of buyers
- Economy- an economic system
- the activity or condition of competing.
- Equity- is the concept or idea of fairness in economics
- a thing that motivates or encourages one to do something.
- Wage- lowest remuneration
- the total monetary or market value of all the finished goods and services
Down
- Stability-is a goal of monetary
- general rise in the price level
- Freedom- fundamental right of every human
- Motive- he desire for financial gain
- Sovereignty- he situation in an economy
- Security- Social Security Administration is an independent agency of the U.S.
- Income- investment approach focused on preservation of capital and income
14 Clues: Wage- lowest remuneration • Exchange- the act of buyers • Economy- an economic system • Stability-is a goal of monetary • general rise in the price level • Motive- he desire for financial gain • the activity or condition of competing. • Sovereignty- he situation in an economy • Freedom- fundamental right of every human • ...
Crossword Puzzle 2023-01-12
Across
- any remaining debt at a specific time.
- periodic interest payment that the bondholder receives during the time between purchase date and maturity date.
- ratio of the dividends to the number of shares.
- the current price of a stock at which it can be sold.
- assets used to secure the loan.
- a mortgage on a movable property.
- a method of paying a loan on installment basis, usually of equal amount at regular intervals.
- a security that gives the owner the right to receive a predetermined amount in a certain future date called maturity date.
- a place where stocks can be brought or sold.
Down
- of the annual dividend per share and the market value per share.
- a security that gives the holder ownership of a portion of a company's income that might be distributed.
- the assets, property, and resources owned by someone or something; wealth.
- money or a line of credit a business or individual gives to another business for its startup or operations.
- a loan to one or more individuals for household, family, or other personal expenditures.
- share in the company's profit.
- a financial term used to describe the nominal or dollar value of a security, as stated by its issuer.
- a thing that is borrowed, especially a sum of money that is expected to be paid back with interest.
- the amount of which the right to receive the face value at maturity date is brought.
- a loan, secured by collateral, that the borrower is obliged to pay at specific terms.
- a place where people deposit money.
20 Clues: share in the company's profit. • assets used to secure the loan. • a mortgage on a movable property. • a place where people deposit money. • any remaining debt at a specific time. • a place where stocks can be brought or sold. • ratio of the dividends to the number of shares. • the current price of a stock at which it can be sold. • ...
Travel Vocab 2022-11-29
18 Clues: gate • ticket • flight • arrival • bus stop • suitcase • departure • bathing suit • baggage claim • travel agency • train station • to get in line • to take a trip • identification • monitor; screen • to pack a suitcase • to confirm a flight • to go through security
