cyber security Crossword Puzzles

The Great Depression 2022-12-01

The Great Depression crossword puzzle
Across
  1. A giant storm that destroyed many farms
  2. For the unemployed
  3. A law made to help out with construction
  4. A group of veterans who want to be paid for working in the army
  5. Gives unemployed people jobs
  6. When jobs are plentiful and the economy expands
  7. A act made to improve nation's highways, rivers and soil while also providing jobs
Down
  1. A agency made to protect security and prevent fraud
  2. When the jobs run low and the economy shrinks
  3. A act made for farmers in means of agriculture
  4. Supervises security
  5. Of the economy by federal spending and job creating
  6. A corp. made for single men who are unemployed
  7. A law made to insure old/disabled people have a healthy life
  8. Of capitalism

15 Clues: Of capitalismFor the unemployedSupervises securityGives unemployed people jobsA giant storm that destroyed many farmsA law made to help out with constructionWhen the jobs run low and the economy shrinksA act made for farmers in means of agricultureA corp. made for single men who are unemployedWhen jobs are plentiful and the economy expands...

COMPUTER LANGUAGE 2025-06-17

COMPUTER LANGUAGE crossword puzzle
Across
  1. type of software protects computers from malicious software
  2. is used in assembly languages(2 words)
  3. network security system that protects networks from unsutharised
  4. of fifth generation computer language
  5. of the high-level language
  6. first instructive computer language
  7. language
Down
  1. of fifty generation computer language(2 word)
  2. kind of language java is
  3. access to computer network security sysem
  4. set of instruction that tells the computer what to do
  5. high level language to low level language and vice versa
  6. storage location of computer memory that stores data
  7. of rules that define structure and formed a programing language
  8. social engineering attack that used to steal user data

15 Clues: languagekind of language java isof the high-level languagefirst instructive computer languageof fifth generation computer languageis used in assembly languages(2 words)access to computer network security sysemof fifty generation computer language(2 word)storage location of computer memory that stores data...

Domestic & International Airports 2019-02-12

Domestic & International Airports crossword puzzle
Across
  1. what country has the most airports in the world - 14,858
  2. where is the worlds widest paved runway at 105m wide
  3. wireless internet access
  4. what do you carry and store your clothing in
  5. where you do you go for prayer
  6. travelling within the country you are in
  7. company located in check in area used to protect luggage
  8. ... exchange
  9. area before departing, accessible to the public
  10. international air transport association
  11. three letter code for new plymouth
  12. where is the longest runway in the world at 5500m long
Down
  1. where is the worlds busiest airport
  2. where is the largest airport in new zealand
  3. area where you go through security and hand over passport
  4. three letter code for blenheim
  5. travelling destination to a different country
  6. where does you luggage come off when entering the flight
  7. three letter code for auckland
  8. where is the worlds oldest airport
  9. where do you go for an injury
  10. abbreviation for aviation security service

22 Clues: ... exchangewireless internet accesswhere do you go for an injurythree letter code for blenheimwhere you do you go for prayerthree letter code for aucklandwhere is the worlds oldest airportthree letter code for new plymouthwhere is the worlds busiest airportinternational air transport associationtravelling within the country you are in...

Infosec Crossword Puzzle Contest 2019-08-29

Infosec Crossword Puzzle Contest crossword puzzle
Across
  1. Malware which presents unwanted advertisements
  2. ___________ is stimuli that has meaning in some context for its receiver
  3. Virtual _________ Network
  4. Successfully exploiting vulnerability is known as
  5. Microsoft Office is an _______ software
  6. Threat X Vulnerability
  7. Technology designed to keep the bad guys out
  8. A terminal emulator / serial console that support SSH
Down
  1. A Software products which provide real-time analysis of security alerts by network hardware and application
  2. Bypassing system’s customary security mechanism
  3. Unplanned disruption or failure of a feature or service
  4. A Weakness in a system
  5. Confidentiality,___________,Availability
  6. The refusal of something requested or desired.
  7. A fraudulent social engineering attempt to obtain sensitive information
  8. Should not be shared / kept open to anyone
  9. Application of investigative analysis on a computer
  10. _______ makes password / passphrase more secure
  11. Malicious software that replicates while moving across information systems
  12. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication

20 Clues: A Weakness in a systemThreat X VulnerabilityVirtual _________ NetworkMicrosoft Office is an _______ softwareConfidentiality,___________,AvailabilityShould not be shared / kept open to anyoneTechnology designed to keep the bad guys outMalware which presents unwanted advertisementsThe refusal of something requested or desired....

IR Basic Terms 2020-09-21

IR Basic Terms crossword puzzle
Across
  1. Promote human welfare
  2. International restriction on small arms
  3. someone fleeing their country
  4. Intervening to solve a dispute
  5. Very powerful and influential nation
  6. managing international relations
  7. A supreme ruler
  8. A penalty for disobeying a law
  9. unlawful use of violence
  10. A temporary suspension in fighting
  11. most basic level of activity
  12. To take things as they are
  13. cooperation of countries to strengthen each of their security
  14. Alliance for combined action
  15. Rules accepted between nations
  16. Less developed industrial base
Down
  1. Agreed on by three or more parties
  2. States may secure their survival
  3. Basic structures and facilities
  4. Weapons capable of widespread death
  5. Philosophy based on liberty
  6. seizure of power
  7. irregular fighting
  8. Mechanical objects are combined into mobile form
  9. a soft boggy area
  10. A decision to do or not do something
  11. Violation of the laws of war

27 Clues: A supreme rulerseizure of powera soft boggy areairregular fightingPromote human welfareunlawful use of violenceTo take things as they arePhilosophy based on libertymost basic level of activityAlliance for combined actionViolation of the laws of warsomeone fleeing their countryIntervening to solve a disputeA penalty for disobeying a law...

Ch. 10 Terminology by Taryn Watford 2014-10-22

Ch. 10 Terminology by Taryn Watford crossword puzzle
Across
  1. deceptive emails or websites to lure personal information
  2. Electronic trespassing and vandalism
  3. Obtaining information illegally often to use people’s credit cards
  4. use of technology as tools to help law enforcement
  5. Malicious network made of bots
  6. any crime committed through the use of computer technology
  7. stealing passwords online through deception
  8. malicious software that spreads through programs
  9. gate that protects internal network from unatuthorized access
  10. malicious software, like viruses or worms
Down
  1. Restrictions for producing publications
  2. Protection through encoding
  3. process of saving data
  4. protecting computer systems form unauthorized and unwanted access
  5. A form of software sabotage that uses computer hosts to reproduce itself
  6. Designed to search for viruses, notify users and then remove viruses
  7. Use of internet or other electronic means to harass an individual
  8. Software robots that collect information on the web
  9. Common security tool used to restrict access
  10. Technology that collects information without user’s consent

20 Clues: process of saving dataProtection through encodingMalicious network made of botsElectronic trespassing and vandalismRestrictions for producing publicationsmalicious software, like viruses or wormsstealing passwords online through deceptionCommon security tool used to restrict accessmalicious software that spreads through programs...

TAAI Weeks 1-4 2018-02-27

TAAI Weeks 1-4 crossword puzzle
Across
  1. What id the airport code for Auckland?
  2. This Nationality Belongs to New Zealand Planes
  3. What is Air New Zealand's hub city?
  4. What company is Airline is MH?
  5. What is ATC?
  6. What is a planes pitch called?
  7. What is the safe movement area between Runway and Apron?
  8. You have to pass security to get here
  9. Where is Cathay Airlines Hub?
  10. What is the Abbreviation for Full Cost Carrier
Down
  1. You check-in here
  2. What is company airline is SQ?
  3. What is KLM's 2 letter code?
  4. Who is in charge of search and rescue in New Zealand waters?
  5. What is the hub country Emirates?
  6. What is the Abbreviation for Low Cost Carrier?
  7. Who is in charge of World Wide Aviation Security?
  8. What is the name of the movement for moving a plane left and right?
  9. What company is CAA's appointed NZ ATC Company?
  10. Alliance Which Airline alliance has 27 Airlines signed?
  11. How many Countries does Virgin have hubs in?

21 Clues: What is ATC?You check-in hereWhat is KLM's 2 letter code?Where is Cathay Airlines Hub?What is company airline is SQ?What company is Airline is MH?What is a planes pitch called?What is the hub country Emirates?What is Air New Zealand's hub city?You have to pass security to get hereWhat id the airport code for Auckland?...

Tech crossword. 2024-04-03

Tech crossword. crossword puzzle
Across
  1. Set of instructions.
  2. Security loop hole.
  3. The computer programs.
  4. Small computer/tech.
  5. Information sharing.
  6. Network security.
  7. AI.
  8. Yet another markup language.
  9. Device for prosesing data.
  10. Main operating system of a computer.
  11. The inner parts of a computer.
  12. Cross-site scripting.
  13. Language for websites.
  14. Universal Serial Bus.
  15. Online protection.
  16. Development of a computer.
Down
  1. Mashines following a set a rules/code to work/move.
  2. Biological measurements .
  3. Melting plastic in a mashine to from shapes given to it by a computer.
  4. A way to communicate to the computer.
  5. A procedure or rules that should be carried out if need be.
  6. Larger storage unit.
  7. Person to computer interaction.
  8. Unit of storage for a computer.
  9. The main system software.
  10. Secure communication.
  11. Online storage.
  12. Headset for video game usage, or surgary.
  13. A place for online storage.
  14. Wireless Fidelity.

30 Clues: AI.Online storage.Network security.Wireless Fidelity.Online protection.Security loop hole.Set of instructions.Larger storage unit.Small computer/tech.Information sharing.Secure communication.Cross-site scripting.Universal Serial Bus.The computer programs.Language for websites.Biological measurements .The main system software....

el viaje 2024-05-06

el viaje crossword puzzle
Across
  1. to stay
  2. to pack
  3. cruise (ship)
  4. jungle
  5. to take off
  6. accident
  7. security measures
  8. low season
  9. front desk
  10. to miss the flight
  11. included
  12. ruins
  13. high season
  14. port
  15. recommendable; advisable
  16. to reserve
  17. to reduce speed
  18. single room
  19. notice; warning
  20. excursion; tour
  21. campground
  22. to cancel
  23. adventure
  24. safety; security
  25. traffic jam
  26. to visit; to go around
  27. to return
  28. waves
  29. to sail
  30. itinerary
  31. on board
  32. to fasten the seatbelt
  33. to land
Down
  1. to stay (to lodge)
  2. compass
  3. de aduanas customs agent
  4. adventurer
  5. round-trip ticket
  6. high quality
  7. tourism
  8. traveler
  9. boarding card
  10. tour guide
  11. to unfasten the seatbelt
  12. destination
  13. delayed
  14. scuba diving
  15. to take a vacation
  16. room service
  17. to be full
  18. seatbelt
  19. expired
  20. to take a trip
  21. to change (planes/trains)
  22. insurance
  23. valid
  24. hostel
  25. passport
  26. border
  27. arrival
  28. island

61 Clues: portruinsvalidwavesjunglehostelborderislandto staycompassto packtourismdelayedexpiredarrivalto sailto landaccidenttravelerincludedseatbeltpassporton boardinsuranceto canceladventureto returnitineraryadventurerlow seasonfront desktour guideto be fullto reservecampgroundto take offdestinationhigh seasonsingle roomtraffic jamhigh qualityscuba diving...

Online Banking and Mobile Phones 2025-02-06

Online Banking and Mobile Phones crossword puzzle
Across
  1. Personal identification number
  2. Short Message Service
  3. Enables access to the wireless web
  4. the banking used to access financial institutions
  5. The most usual music file format on the web
  6. brick-and-____ banks are banks that don't have physical branches
  7. two-factor ____, the simultaneous use of at least two different devices for better security
  8. security ____ are microchip-based devices that has to be typed by the user
  9. brick-and-____ banks are tradirional banks
  10. ____ authentication is a method of identifying the user of a bang account
Down
  1. ____ banking synonyme of online banking
  2. In the 1990s, 2G mobiles introduced ____ transmission
  3. This allows people to talk without holding the handset
  4. Global System for Mobile
  5. Types of phones that offer a high-speed data transfer capability
  6. A synonym for Mobile
  7. ____ Generation phones started in the 1980s
  8. ____ banking is when you perform banking transactions usually on the internet
  9. Universal Mobile Telecommunications
  10. A type of smart card that contains the user's information
  11. Transaction authorization number

21 Clues: A synonym for MobileShort Message ServiceGlobal System for MobilePersonal identification numberTransaction authorization numberEnables access to the wireless webUniversal Mobile Telecommunications____ banking synonyme of online bankingbrick-and-____ banks are tradirional banksThe most usual music file format on the web...

Investing - Sienna Nowotny 2025-03-25

Investing - Sienna Nowotny crossword puzzle
Across
  1. age to take out minimum from IRA
  2. age to get social security
  3. comes out tax free
  4. social security and medicare tax
  5. strategy investing your money in equal amounts
  6. pools money from large group of investors
  7. meant for short term goals
  8. retirement, survivor, and disability benefits
  9. small cap stocks or foreign exchange stocks
  10. network of exchanges
  11. collection of stocks, bonds, or other assets
  12. unit of ownership in company
Down
  1. holding company owning subsidiaries
  2. retirement managed by employer
  3. willingness to accept loss when investing
  4. large cap stocks or stocks with strong financials
  5. type of mutual fund following a benchmark index
  6. availability of cash or how quickly an asset can be converted to cash
  7. investing all money you have at one time
  8. a loan from the buyer
  9. the amount you can put in IRA per year
  10. CEO of Berkshire Hathaway
  11. government medical health plan
  12. transferring old retirement funds to a new company’s plan
  13. working with company for amount of time

25 Clues: comes out tax freenetwork of exchangesa loan from the buyerCEO of Berkshire Hathawayage to get social securitymeant for short term goalsunit of ownership in companyretirement managed by employergovernment medical health planage to take out minimum from IRAsocial security and medicare taxholding company owning subsidiaries...

Empowering Women: The Impact of the New Deal Puzzle 2025-01-27

Empowering Women: The Impact of the New Deal Puzzle crossword puzzle
Across
  1. Places where women worked during the New Deal era.
  2. Help provided to families through policies like Aid to Dependent Children.
  3. A symbol of women's strength during WWII.
  4. Organizations advocating for better working conditions.
  5. Roles women took on thanks to New Deal advancements.
  6. Employment opportunities created by the New Deal for women.
  7. The president behind the New Deal policies.
  8. Women joined this in large numbers during the New Deal.
  9. The job often associated with Rosie.
  10. Skill-building opportunities offered to women.
Down
  1. Benefits women gained from New Deal policies.
  2. A key goal of New Deal policies for all.
  3. Chances for women to grow and succeed under New Deal programs.
  4. Initiatives like the WPA and CCC.
  5. Payment for work that improved for women during this time.
  6. To give women strength and confidence to succeed.
  7. The fight for fairness and equal rights.
  8. First Lady who championed women’s rights.
  9. Relating to community and societal benefits.
  10. Protection provided through Social Security.

20 Clues: Initiatives like the WPA and CCC.The job often associated with Rosie.A key goal of New Deal policies for all.The fight for fairness and equal rights.A symbol of women's strength during WWII.First Lady who championed women’s rights.The president behind the New Deal policies.Relating to community and societal benefits....

Computer Languages and Browsing Safely 2025-06-03

Computer Languages and Browsing Safely crossword puzzle
Across
  1. : Popular programming language used for mobile and desktop apps.
  2. : Server-side scripting language mainly used in web development.
  3. : Stylesheet language used for designing websites.
  4. : Used to create interactive effects on web pages.
  5. : A security system that controls incoming and outgoing traffic.
  6. : A mix of letters, numbers, and symbols that’s hard to guess.
  7. : Markup language for creating web pages.
  8. : A scam where fake websites or emails try to steal information.
  9. : A browser mode that doesn’t save history or cookies.
Down
  1. : Software that protects your computer from malware.
  2. : Installing new software versions to fix bugs and security issues.
  3. : Extension of C with object-oriented features.
  4. : A block-based language for young learners.
  5. : Harmful software designed to damage or steal data.
  6. : Language used to manage and query databases.
  7. : A general-purpose, low-level programming language.
  8. : Tool that secures your internet connection and protects privacy.
  9. : Apple's language for iOS and macOS development.
  10. : The act of navigating through the internet.
  11. : A high-level programming language often used by beginners.

20 Clues: : Markup language for creating web pages.: A block-based language for young learners.: The act of navigating through the internet.: Language used to manage and query databases.: Extension of C with object-oriented features.: Apple's language for iOS and macOS development.: Stylesheet language used for designing websites....

Elevate your potential 2024-09-30

Elevate your potential crossword puzzle
Across
  1. Board game and West End Show (5)
  2. Panorama perhaps, for small weight (9)
  3. The answer might be dissolved in a liquid (8)
  4. broadcast the fitness of Jumbo perhaps (13)
  5. Watch for fingers with no hands (7)
  6. Slim down the agreement (8)
  7. Something to ask mystic meg (6)
  8. Not out - at home learnt to shuffle (8)
  9. Hear a West End Show, host of Dstl information (5)
  10. Pb (4)
Down
  1. Sounds like a lift in New York perhaps, without the alternative (7)
  2. A twister called Monty (6)
  3. Song by Gloria Gaynor "I will ..." finished early with proficiency (13)
  4. Cryptography organisation rings the bell (6)
  5. I fancy Bertie is concealing a kind of crime (5)
  6. Might be found in bad attitudes (3)
  7. Something new, a work of fiction maybe (5)
  8. Computing for waste recycling (8)
  9. A difference that can be shocking (9)

19 Clues: Pb (4)A twister called Monty (6)Slim down the agreement (8)Something to ask mystic meg (6)Board game and West End Show (5)Computing for waste recycling (8)Might be found in bad attitudes (3)Watch for fingers with no hands (7)A difference that can be shocking (9)Panorama perhaps, for small weight (9)Not out - at home learnt to shuffle (8)...

DINES 2020-05-23

DINES crossword puzzle
Across
  1. menagerie
  2. type of fruit
  3. belly button
  4. large spider
  5. currency unit
Down
  1. twelve
  2. majestic
  3. place a bet
  4. fastener
  5. notion
  6. female relative
  7. bird of prey
  8. security device

13 Clues: twelvenotionmajesticfastenermenagerieplace a betbelly buttonbird of preylarge spidertype of fruitcurrency unitfemale relativesecurity device

8 Cyber Security Tips for Remote Work 2022-01-12

8 Cyber Security Tips for Remote Work crossword puzzle
Across
  1. Screen
  2. and programs
  3. Scam
Down
  1. environment
  2. Information
  3. and network

6 Clues: ScamScreenenvironmentInformationand networkand programs

ISG's Security Summit Crossword Puzzle 2021-10-04

ISG's Security Summit Crossword Puzzle crossword puzzle
Across
  1. This acronym allows associates to use one's personally owned device, rather than being required to use an officially provided device.
  2. The acronym for information about individuals that can be used to trace a person’s identity, such as full name, birth date, biometric data, social security number, etc.
  3. _________ _________ and Disaster Recovery would allow Lowe’s to reduce the risk of data loss, reputational harm, and improve operations when dealing with the effects of significant unexpected events.
  4. An access control model that restricts system access to authorized users based on job function(s).
  5. This type of security describes measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
  6. This type of social engineering, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a typically secured area.
  7. A form of malware that encrypts a victim’s files in exchange for money. Usually, the victim receives instructions of what and how to pay to gain their access back.
  8. Technology policies, ___________ , and procedures define the parameters that associates must understand, acknowledge, and abide by to reduce risk to Lowe’s.
  9. Lowe’s _______ _____ policy defines accepted practices, responsibilities and procedures for Lowe’s associates, non-associates and third parties using Lowe’s owned devices and who are authorized to work at home or a designated alternative work site.
Down
  1. Unique physical characteristics, such as fingerprints, facial recognition, etc. that can be used for automated identification.
  2. ______ ______ ___________ software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
  3. A classification level for documents designed to only be distributed within Lowe’s and is also used in the Azure Information Protection labels.
  4. Scammer prey on innocent ________ ____________, especially around holiday time, while making Internet purchases using a web browser or a mobile app to try to gain access to their credit cards and sensitive personal information.
  5. Cybercriminals use this type of social engineering attack to impersonate high profile executives in an organization (e.g. CEO, CFO, etc.) hoping to leverage their authority to gain access to sensitive data or money.
  6. A weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries within a computer system.
  7. Identity and _________ __________is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
  8. Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________.
  9. ______ ________ refers to the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks (e.g. Yammer).
  10. _________________@lowes.com and the Report Phish button in Outlook are the correct places for Lowe’s associates to report suspicious emails.
  11. An acronym for volatile memory within a computer that holds active processes, data, and applications.

20 Clues: An access control model that restricts system access to authorized users based on job function(s).An acronym for volatile memory within a computer that holds active processes, data, and applications.Lowe’s Security Operations Center (SOC) is now referred to as the Information Security ________ ________....

English 2025-12-10

English crossword puzzle
Across
  1. A weakness that can be exploited.
  2. Long-term storage of old files.
  3. The way a system or user acts.
  4. A request for information from a database.
  5. A system on which applications can run.
  6. Connected computers that share data.
  7. A direct instruction given to a computer.
  8. Instructions written for computers.
  9. A person or system chosen for attack.
  10. A step taken to solve a problem.
  11. Accidental or unlawful release of information.
  12. A piece of hardware used in computing.
  13. A place where data is kept.
  14. To protect from harm or attacks.
  15. Continuous flow of data.
  16. Converting information into a secure code.
  17. Related to investigating cyber incidents.
  18. The right to keep personal data protected.
  19. The current condition of a system.
  20. A formal rule or guideline.
  21. A mistake or problem in a system.
  22. Someone who monitors or watches activity.
  23. Information stored or processed by computers.
  24. The chance that something bad may happen.
  25. An action taken after an incident.
  26. Unauthorized entry into a system.
  27. Protection against threats or attacks.
  28. To follow the path of an action or data flow.
  29. Use of technology to perform tasks without human input.
  30. A written record of actions or events.
  31. Permission to use or enter a system.
  32. Learning skills or knowledge.
  33. A simplified digital structure used to predict or analyze.
  34. A set of rules for communication.
  35. Monitoring to make sure rules are followed.
  36. A break in security where data is exposed.
  37. A specific area or internet address space.
  38. A part of a larger software system.
Down
  1. Official rule made by authorities.
  2. A tool that blocks unwanted network traffic.
  3. A formal review of systems or processes.
  4. Programs used by a computer.
  5. Searching for threats inside a network.
  6. Proof of an event or action.
  7. Related to money or cost.
  8. Numerical information used for analysis.
  9. Following laws, rules, or standards.
  10. Information sent from one place to another.
  11. A call for data or a service.
  12. A prediction based on information.
  13. The ability to manage or direct something.
  14. Belief that someone or something is reliable.
  15. Measurements used to evaluate performance.
  16. To watch or track activity.
  17. A user identity in a system.
  18. Studying information to understand it.
  19. A computer that provides resources to others.
  20. A set of connected computer components.
  21. A risk or danger.
  22. Too much data or activity for a system to handle.
  23. Something unusual that may signal a problem.
  24. The path data takes to reach a destination.
  25. To check a system for issues or threats.
  26. A saved copy of data in case of loss.
  27. A document describing an event or findings.
  28. A sign that danger or problems may occur.
  29. An event that disrupts normal operations.
  30. Delay in data communication.
  31. A connection point in a network.
  32. A secret code to access a system.
  33. A tool used to explore or test a system.
  34. Rules about what is morally right or wrong.
  35. Records of system activities.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.A user identity in a system.Delay in data communication.A call for data or a service.Learning skills or knowledge.Records of system activities....

Science Project 2020-11-18

Science Project crossword puzzle
Across
  1. Homework
  2. Solar Power Plants
  3. Doors
Down
  1. Detention
  2. Knowledge
  3. Principal
  4. Generators
  5. Teachers
  6. Buses
  7. Professer
  8. Security Guards

11 Clues: BusesDoorsTeachersHomeworkDetentionKnowledgePrincipalProfesserGeneratorsSecurity GuardsSolar Power Plants

Social Security Act 2023-11-08

Social Security Act crossword puzzle
Across
  1. 5.old or aging
  2. 3.when an individual completes application for social security benefits
  3. 2.someone who receives social security benefit
Down
  1. 4. someone who is at the age where they do not have a job and receive social security benefits
  2. 1.when you challenge application or benefit by the social security administration
  3. 6.an appeal normally in front of a judge which decides if they are eligible for social security benefits

6 Clues: 5.old or aging2.someone who receives social security benefit3.when an individual completes application for social security benefits1.when you challenge application or benefit by the social security administration4. someone who is at the age where they do not have a job and receive social security benefits...

corporate finance 2021-02-05

corporate finance crossword puzzle
Across
  1. basis In preparation of financial statements
  2. An entity created by law
  3. A special form of ownership having a fixed periodic
  4. The purest and most basic form of corporate ownership
  5. The sale of either bonds or stocks to the general public
  6. An entity created by law by two or more people
  7. The chance that actual outcomes may differ from those expected.
  8. The science and art of managing money
  9. The firm’s chief financial manager
  10. The lowest price at which a security is offered for sale
Down
  1. Income earned through the sale of a firm’s goods or services.
  2. A market that establishes correct prices for the securities
  3. A firm’s taxes divided by its taxable income
  4. firm's chief accountant
  5. Long-term debt instrument used by business and government to
  6. The highest price offered to purchase a security
  7. The market in which the buyer and seller are not brought
  8. Groups such as employees
  9. Financial market in which preowned securities
  10. The rate at which additional income is taxed.

20 Clues: firm's chief accountantAn entity created by lawGroups such as employeesThe firm’s chief financial managerThe science and art of managing moneyA firm’s taxes divided by its taxable incomebasis In preparation of financial statementsFinancial market in which preowned securitiesThe rate at which additional income is taxed....

Travel Vocabulary 2020-04-03

Travel Vocabulary crossword puzzle
Across
  1. in the airport
  2. security agent
  3. carry-on baggage
  4. flight
  5. in the train station
  6. to take off (airplane)
  7. boarding pass
  8. safety belt
  9. platform (train)
  10. suitcase
  11. ticket window
  12. on time
  13. arrival
  14. counter (check-in)
  15. seat
  16. event ticket
  17. baggage claim
  18. bunk bed
  19. to give
  20. to turn
  21. to go through security
  22. aisle
  23. controller (train ticket)
  24. first class
  25. to miss (a flight)
  26. to board
  27. passenger
  28. window
  29. sleeping car
  30. trip/travel
  31. connection
Down
  1. luggage
  2. delayed
  3. to get/obtain
  4. to see
  5. ticket (number 2)
  6. to hope
  7. waiting room
  8. departure
  9. ticket
  10. flight attendant
  11. customs
  12. coach (plane)
  13. car wagon/train car
  14. luggage screening
  15. to go straight
  16. international airport
  17. to check luggage/to put on plane
  18. train stop
  19. gate
  20. second class
  21. passport
  22. visa
  23. to land
  24. layover

55 Clues: seatgatevisaaisleflightto seeticketwindowluggagedelayedto hopecustomson timearrivalto giveto turnto landlayoversuitcasebunk bedpassportto boarddeparturepassengertrain stopconnectionsafety beltfirst classtrip/travelwaiting roomevent ticketsecond classsleeping carto get/obtainboarding passticket windowcoach (plane)baggage claimin the airport...

Marvel 2020-05-18

Marvel crossword puzzle
Across
  1. Died saving the people of Asgard
  2. Hates having ears touched
  3. Long time foes of Kree empire(3,7)
  4. Scott Langs cellmate
  5. Helps Howard Stark create SHIELD(5,6)
  6. Nickname of Timothy Dugan
  7. Friend of Thor
  8. Had mind stone in forehead
  9. Scientific sister of Tchalla
  10. Bruce Banners alter ego
  11. Surname of SHIELD agent who helped design Capt America shield
  12. Where Bucky finds sanctuary
  13. King Laufeys son
  14. Assists Thor defeat Hela
  15. Dora Milaje Security chief
  16. Odins oldest child
Down
  1. Dr Erik Selvig joined SHIELD to study this
  2. Maya Hansen created this
  3. Pin up boy of US military(7,7)
  4. Co founder of X-Con security
  5. Queen of Asgard
  6. Surname of Howard Starks business partner
  7. One of Thanos adopted children
  8. Hydra Leader
  9. First name of agent Natasha Romanoff alias at Stark Industries
  10. King of Asgard
  11. Military rank held by Nick Fury
  12. Avenging archer
  13. Librarian of Kamar Taj
  14. Smallest Avenger

30 Clues: Hydra LeaderFriend of ThorKing of AsgardQueen of AsgardAvenging archerSmallest AvengerKing Laufeys sonOdins oldest childScott Langs cellmateLibrarian of Kamar TajBruce Banners alter egoMaya Hansen created thisAssists Thor defeat HelaHates having ears touchedNickname of Timothy DuganHad mind stone in foreheadDora Milaje Security chief...

Compliance and Safety Crossword Puzzle 2024-07-17

Compliance and Safety Crossword Puzzle crossword puzzle
Across
  1. Cannabis is currently defined as a ______________ 1 drug.
  2. Documentation of recurring tasks and procedures
  3. Visual security requirement required in every state
  4. Rules governing marijuana use
  5. The action or fact of adhering to a wish, command, or rule
  6. Type of cannabis license not yet operational
  7. Visual document demonstrating an employees ability to work at that facility or in that state
  8. Unannounced visit from state regulator
Down
  1. Organization overseeing workplace safety laws
  2. An identified shortcoming in meeting compliance standards
  3. Internal controls used to ensure financial, security, and auditing controls
  4. Destruction of court records related to an arrest
  5. Systematic review to ensure compliance
  6. OH NO, its a mislabeled product! What do you do?
  7. The cannabis version of a travel passport
  8. Public official that monitors compliance
  9. Process of obtaining official permission to operate
  10. Consequence for being non-compliant
  11. Specific steps and tools required to perform a task or job
  12. Official connection to an organization
  13. Official approval of operation

21 Clues: Rules governing marijuana useOfficial approval of operationConsequence for being non-compliantSystematic review to ensure complianceOfficial connection to an organizationUnannounced visit from state regulatorPublic official that monitors complianceThe cannabis version of a travel passportType of cannabis license not yet operational...

Travel-Themed Crossword Puzzle Clues 2025-06-11

Travel-Themed Crossword Puzzle Clues crossword puzzle
Across
  1. An available room in a hotel
  2. To leave one’s own country for travel
  3. A person entering a foreign country must go through this
  4. Paper showing details of a booked flight or hotel
  5. The ability to adapt to changes in plans
  6. sports Thrilling, high-risk recreational activities
  7. Something that draws tourists to a place
  8. Unexpected movement of an aircraft caused by air currents
  9. National origin or citizenship
Down
  1. Free of charge
  2. Bathroom on an airplane
  3. Very flavorful, high-quality food
  4. To move from one mode of transportation to another
  5. An item meant to be used once and thrown away
  6. check Security procedure before boarding a flight
  7. A person who assists guests with services at a hotel
  8. A break between connecting flights
  9. desk The desk where guests check in at a hotel
  10. A printed or digital guide showing a trip's schedule
  11. form A document stating items you are bringing through customs
  12. attentdant A person who serves passengers on a plane

21 Clues: Free of chargeBathroom on an airplaneAn available room in a hotelNational origin or citizenshipVery flavorful, high-quality foodA break between connecting flightsTo leave one’s own country for travelThe ability to adapt to changes in plansSomething that draws tourists to a placeAn item meant to be used once and thrown away...

Week 4 2025-09-18

Week 4 crossword puzzle
Across
  1. who is testing the limits of nato
  2. politician that got assassinated
  3. where did the largest sunflower ever grow?
  4. where did the latest school happen?
  5. what country is planning the biggest security operation for trump to visit them
  6. who did Timothy ramsey shoot?
  7. Where is trump cracking down now?
  8. where did a tornado destroy 3 houses and ruin a bunch of property
Down
  1. A whole truck falls into what
  2. after the death of Charlie Kirk politicians are upgrading what?
  3. Charlies shooter has to pass what kind of test
  4. charlie kirks killer
  5. a deal with what country could keep TikTok active in the US
  6. Tensions are rising between the US and who?
  7. Who does Israel keep attacking
  8. what famous person just turned 70
  9. Schools aren't requiring what for kids to go to school
  10. who does trump threaten
  11. Where is the oldest photo booth still active?
  12. deadly strikes against what country's boats carrying narcotics

20 Clues: charlie kirks killerwho does trump threatenA whole truck falls into whatwho did Timothy ramsey shoot?Who does Israel keep attackingpolitician that got assassinatedwho is testing the limits of natowhat famous person just turned 70Where is trump cracking down now?where did the latest school happen?where did the largest sunflower ever grow?...

RU ITEC411 2025-11-24

RU ITEC411 crossword puzzle
Across
  1. – Unwanted bulk email messages.
  2. – Security system that blocks unauthorized access to a network.
  3. – Legal protection for creative works.
  4. – Deception intended for financial or personal gain.
  5. - Program that attaches to files and spreads when those files are shared.
  6. – (__ of Service) Attack that floods a system with traffic to make it unusable.
  7. – Right to control personal information.
  8. – Process of scrambling data to protect confidentiality.
  9. - Fraudulent emails or websites that trick users into revealing personal information.
Down
  1. – Persistent unwanted monitoring or following online.
  2. – the kind of theft that means stealing personal information to impersonate someone.
  3. – Rules enforced by government to regulate behavior.
  4. – Self-replicating program that spreads independently across networks.
  5. – Harassment or intimidation carried out through digital communication.
  6. – Illegal copying or distribution of software, music, or movies.
  7. – Moral principles guiding responsible technology use.
  8. - Software created to damage, disrupt, or gain unauthorized control of systems.
  9. – Malicious program disguised as legitimate software.
  10. – Measures taken to protect systems and data.
  11. - Person who gains unauthorized access to computer systems.

20 Clues: – Unwanted bulk email messages.– Legal protection for creative works.– Right to control personal information.– Measures taken to protect systems and data.– Rules enforced by government to regulate behavior.– Deception intended for financial or personal gain.– Persistent unwanted monitoring or following online....

Cyber vocab chapter 3 2021-09-28

Cyber vocab chapter 3 crossword puzzle
Across
  1. systems that requires a physical token
  2. user receives through another object
  3. user receives by default
  4. validating a user
  5. standard authentication protocol for all microsoft versions
  6. false amount of rejected users
Down
  1. allows you to share folders
  2. given to a user at a certain location
  3. where false accept and reject rates meet
  4. all possible attack locations
  5. database of all the network resoruces
  6. eliminating vulnerabilities
  7. analysis of a biological feature
  8. identifying measurable patterns in human activity
  9. cycle of different roles

15 Clues: validating a useruser receives by defaultcycle of different rolesallows you to share folderseliminating vulnerabilitiesall possible attack locationsfalse amount of rejected usersanalysis of a biological featureuser receives through another objectgiven to a user at a certain locationdatabase of all the network resoruces...

Unit 3 Cyber World 2024-03-11

Unit 3 Cyber World crossword puzzle
Across
  1. It is a good idea to keep your personal details __________ on the Internet.
  2. __________ scams look like they are from familiar websites to steal our personal information.
  3. Time wanted to get the latest version of the smartphone because it had much better _______ life.
  4. ________________ may try to download malware to your computer.
  5. Nelson updated his antivirus program to protech his comuter against _________.
  6. Jenny is completely ___________ on the video games. She played it all day!
  7. Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
Down
  1. To avoid being a _________ of the scam, always double-check the links and email address.
  2. ________ is a big problem for singers as people download their music without paying for it.
  3. Blind people have special programmes to help them _______ online.
  4. To deal with social media overuse, it is better for you to turn off _____________ on your phone.
  5. Governments usually _______ the data on their websites to protect citizens' information.
  6. We need to set up an anti-________ filter to block those annoying messages.
  7. She's obsessed with the new online novel and can't put it down.
  8. Everyone is posting ________ of themselves with the Chubby Heart in Central.

15 Clues: ________________ may try to download malware to your computer.She's obsessed with the new online novel and can't put it down.Blind people have special programmes to help them _______ online.Jenny is completely ___________ on the video games. She played it all day!It is a good idea to keep your personal details __________ on the Internet....

Cyber Fund OS Vocab 2025-03-06

Cyber Fund OS Vocab crossword puzzle
Across
  1. ethical hacking that tests a system's defenses
  2. OS that controls machines that run specific tasks
  3. devices that aren't computers that connect to the internet
  4. exploits by attackers before others know about the vulnerability
  5. software that controls specific hardware devices connected to a system
  6. command that ends a task immediately
  7. the OS type that covers desktops and laptops
  8. mistakes in code that can create security loopholes
  9. Apple's mobile device OS
Down
  1. older sections of code that haven't been updated or reviewed
  2. virtual machine that runs on a different machine
  3. Google's mobile device OS
  4. external software or plugins integrated with the OS
  5. Microsoft's OS
  6. unauthorized access to confidential data

15 Clues: Microsoft's OSApple's mobile device OSGoogle's mobile device OScommand that ends a task immediatelyunauthorized access to confidential datathe OS type that covers desktops and laptopsethical hacking that tests a system's defensesvirtual machine that runs on a different machineOS that controls machines that run specific tasks...

Networking Concepts & Cyber Ethics 2025-05-22

Networking Concepts & Cyber Ethics crossword puzzle
Across
  1. Computer network enables two or more computers to share what
  2. Process of transforming data into an unreadable code
  3. digital footprint is also known as
  4. Illegal intrusion into a computer system or network
  5. Being aware of the ethical practices
  6. Similar to hub
  7. two or more computers are connected within a small area
Down
  1. It refers to unwanted bulk emails that come from unknown sources
  2. program that disrupts the normal functioning of a computer
  3. Legal act granted by law to the creater for his original work
  4. Nowadays most computer motherboards & laptops have an inbuild
  5. computer network mainly created for an individual person
  6. Device that connects two different types of network with each other
  7. Simplest way to prevent plagorism is through proper___
  8. Each computer in a network

15 Clues: Similar to hubEach computer in a networkdigital footprint is also known asBeing aware of the ethical practicesIllegal intrusion into a computer system or networkProcess of transforming data into an unreadable codeSimplest way to prevent plagorism is through proper___two or more computers are connected within a small area...

Networking and cyber ethics 2025-06-14

Networking and cyber ethics crossword puzzle
Across
  1. clue:This network covers a wide area
  2. clue:Refers to the act of using or imitating the language of fraudulent act and violation
  3. clue:Is a legal right granted by law to the creator for his original work
  4. clue:When a single licenced copy of a software is loaded into many computer contrary to the licence's terms it is called
  5. clue:Refers to crimanal activities that involves the use of computer and network
  6. clue:A security system that prevents unauthorised people from accessing your system and network
Down
  1. clue:Is a computer network created for an individual person
  2. clue:Refers to an illegal intrusion into a computer system or network
  3. clue:Combination of two term's refers to aware of ethical practice is called
  4. clue:Refers to unwanted bulk emails that came from unknown source
  5. clue:Topology requires a single communication line or one main cable
  6. clue:A physical attach a Computer to a network
  7. clue:Topology,all the nodes is the network are connected in a circular manner
  8. clue:A computer network that is mainly created for individual person
  9. clue:The computer in a network can communicate with each other as well as work in dependently,each computer in a network is called a

15 Clues: clue:This network covers a wide areaclue:A physical attach a Computer to a networkclue:Is a computer network created for an individual personclue:Refers to unwanted bulk emails that came from unknown sourceclue:Topology requires a single communication line or one main cableclue:A computer network that is mainly created for individual person...

Numbers 2024-09-23

Numbers crossword puzzle
Across
  1. The best way to send messages on the internet is ________ (5).
  2. _________ (5) is a bad software that can harm your computer.
  3. When someone unauthorizedly sneaks in right after you through a secured door is called as _______ (10).
  4. All Ocrolus employees and contractors are required to comply with the provisions of Information Security ______ (6).
  5. Customer data is classified as Highly ___________(12) and only allowed in approved systems.
Down
  1. Event when someone breaks into your computer is called as _______(8).
  2. You can never _____ (5) your password with anyone.
  3. Please forward any potential phishing emails to __________@xxxxxx.com (8).
  4. To report a security incident please e-mail ________@xxxxxx.com (8).
  5. At all times the system should be kept __________ unless it is used by the intended user(6)

10 Clues: You can never _____ (5) your password with anyone._________ (5) is a bad software that can harm your computer.The best way to send messages on the internet is ________ (5).To report a security incident please e-mail ________@xxxxxx.com (8).Event when someone breaks into your computer is called as _______(8)....

Ethical Hacking 2025-02-04

Ethical Hacking crossword puzzle
Across
  1. A method used to prevent unauthorized access, often involves encrypting data.
  2. A set of principles that guide the actions of ethical hackers.
  3. Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
  4. is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
  5. This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
  6. A term for a person who hacks for personal gain or malicious intent
Down
  1. The act of gaining unauthorized access to systems or networks.
  2. One of the Career in Ethical Hacking
  3. Ethical Hacking Tools
  4. The term for hackers who identify and fix security vulnerabilities to protect systems.

10 Clues: Ethical Hacking ToolsOne of the Career in Ethical HackingThe act of gaining unauthorized access to systems or networks.A set of principles that guide the actions of ethical hackers.A term for a person who hacks for personal gain or malicious intentA method used to prevent unauthorized access, often involves encrypting data....

Types of cyber bullying 2023-10-09

Types of cyber bullying crossword puzzle
Across
  1. comments or posts to upset or fight with others
  2. leaving someone out or uninviting them to online groups and conversations
  3. using someone's account to post inappropriate content
  4. boycotting a person's social media to exclude or isolate
Down
  1. sharing private information like gender or sexual identity online
  2. making a fake account to cyber bully someone
  3. spreading info in public posts or DM's to ruin someone's reputation
  4. sharing someone's personal identity online without permission
  5. sending direct insults online

9 Clues: sending direct insults onlinemaking a fake account to cyber bully someonecomments or posts to upset or fight with othersusing someone's account to post inappropriate contentboycotting a person's social media to exclude or isolatesharing someone's personal identity online without permission...

FNAF security breach characters 2022-10-12

FNAF security breach characters crossword puzzle
Across
  1. You need to vent
  2. are you having fun yet?
  3. Hey little guy
  4. Nighty night
  5. I am the best
  6. welcome to freddy fazbears mega pizzaplex
  7. Next molten freddy
  8. You are my superstar
  9. Come on out
Down
  1. take a map
  2. Hello new friend
  3. Wub Wub Wub
  4. Pizza?
  5. Red light Green Light
  6. Bowling
  7. i always come back
  8. Intruder alert

17 Clues: Pizza?Bowlingtake a mapWub Wub WubCome on outNighty nightI am the bestHey little guyIntruder alertHello new friendYou need to venti always come backNext molten freddyYou are my superstarRed light Green Lightare you having fun yet?welcome to freddy fazbears mega pizzaplex

Department of Homeland Security 2015-08-14

Department of Homeland Security crossword puzzle
Across
  1. Secretary of DHS
  2. Number of Child Agencies under DHS
  3. Where to apply if you want to work for DHS
  4. Month DHS was formed
  5. What kind of branch is the Eagle on the DHS seal holding in its left talon?
  6. Two-level terrorism threat advisory scale currently used by DHS
  7. An agency within DHS which regulates and facilitates international trade, collects import duties, and enforces U.S. regulations. Currently, the largest federal law enforcement agency.
  8. An agency within DHS whose primary purpose is to coordinate and respond to natural disasters that occur within the United States and overwhelm the local resources and authorities of where they occur
Down
  1. Color Coded terrorism threat advisory scale that pre-dated the NTAS
  2. The first Secretary of DHS
  3. Number of Core Missions DHS has according to the QHSR
  4. How many arrows is the Eagle holding in its right talon on the DHS seal?
  5. Number of secretaries DHS has had
  6. Campaign set up to combat human trafficking
  7. Secretary of TSA
  8. A branch of the US Armed Forces that operated under DHS during peace time, but can be transferred to the U.S. Department of the Navy by the President at any time, or by Congress during times of war.
  9. An agency within DHS which has two distinct purposes, one of them being the protection of current and former national leaders and their families.

17 Clues: Secretary of DHSSecretary of TSAMonth DHS was formedThe first Secretary of DHSNumber of secretaries DHS has hadNumber of Child Agencies under DHSWhere to apply if you want to work for DHSCampaign set up to combat human traffickingNumber of Core Missions DHS has according to the QHSRTwo-level terrorism threat advisory scale currently used by DHS...

Cyber Attakcs Quiz 2024-06-28

Cyber Attakcs Quiz crossword puzzle
Across
  1. A cyber attack where attackers disguise as a trustworthy entity to steal sensitive information.
  2. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. A type of malware disguised as legitimate software, used to hack into the user's system.
  4. Software that automatically displays or downloads advertising material when a user is online.
  5. Malicious software designed to secretly monitor and collect information from a computer.
Down
  1. A type of surveillance software that records keystrokes to capture sensitive information like passwords.
  2. A Distributed Denial-of-Service attack aimed at disrupting the normal traffic of a targeted server.
  3. A type of malware that encrypts the victim's files, demanding payment for the decryption key.
  4. A type of malicious code that replicates itself and spreads from one computer to another.
  5. A type of malware that replicates itself to spread to other computers without any user intervention.

10 Clues: Software designed to disrupt, damage, or gain unauthorized access to a computer system.A type of malware disguised as legitimate software, used to hack into the user's system.Malicious software designed to secretly monitor and collect information from a computer....

Cyber Warm Up 2024-02-14

Cyber Warm Up crossword puzzle
Across
  1. Holds you captive
  2. Denied
  3. Network protector
  4. Sneaky email
  5. Not what it seems
Down
  1. Saves what you type
  2. Bad software
  3. Like TSL
  4. DoD Network
  5. Like UNIX

10 Clues: DeniedLike TSLLike UNIXDoD NetworkBad softwareSneaky emailHolds you captiveNetwork protectorNot what it seemsSaves what you type

Cyber Awareness Month 2022-10-16

Cyber Awareness Month crossword puzzle
Across
  1. Unsolicited bulk mail
  2. Symbol to look for before
  3. Being harassed or threatened
  4. Trying to steal other people's sensitive
  5. Software Protecting your Computer
  6. We should always choose a strong and
Down
  1. Files sent through EMail
  2. Trying to break into a computer system
  3. Software programs designed to
  4. Device/Software protecting computer/Network

10 Clues: Unsolicited bulk mailFiles sent through EMailSymbol to look for beforeBeing harassed or threatenedSoftware programs designed toSoftware Protecting your ComputerWe should always choose a strong andTrying to break into a computer systemTrying to steal other people's sensitiveDevice/Software protecting computer/Network

career 2023-09-29

career crossword puzzle
Across
  1. A form of security for one and another's self
  2. Person who keeps people following the law
  3. A job that takes years to do
  4. Unexpected situation that needed for action
  5. person who keeps people from fire
Down
  1. Causes burns and makes things charred
  2. in a state of safety and away from harm
  3. A system of rules that should be followed in the government
  4. keeping others away from harm and danger
  5. Doing things are ok with the law
  6. helping or doing work for others

11 Clues: A job that takes years to doDoing things are ok with the lawhelping or doing work for othersperson who keeps people from fireCauses burns and makes things charredin a state of safety and away from harmkeeping others away from harm and dangerPerson who keeps people following the lawUnexpected situation that needed for action...

Catching Flights 2024-05-20

Catching Flights crossword puzzle
Across
  1. the number on your ticket/boarding pass for your chair
  2. you go here to get your ticket, sign in
  3. another word for your plane ticket
  4. the numbered section where your flight will leave
  5. the person who flies your plane
  6. the person who serves you on your plane
  7. a guest on the flight
Down
  1. your international identification
  2. after your flight you grab your suitcase or bags here
  3. you might have to pass this security before entering a country
  4. also known as help desk
  5. a flight has made it to the destination
  6. here you have to scan your body and bags
  7. here you trade currency from euros to yen, dollars, etc
  8. a flight leaves from the starting location

15 Clues: a guest on the flightalso known as help deskthe person who flies your planeyour international identificationanother word for your plane ticketyou go here to get your ticket, sign ina flight has made it to the destinationthe person who serves you on your planehere you have to scan your body and bagsa flight leaves from the starting location...

internet basics 2024-01-18

internet basics crossword puzzle
Across
  1. The buying and selling of goods and services over the internet.
  2. Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
  3. Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
  4. Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
  5. Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
  6. Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
  7. To transfer data from a remote server to a local device over the internet.
  8. Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
  9. Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
  10. Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
  11. Small digital icons or characters used to express emotions or ideas in electronic communication.
  12. Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
  13. Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
  14. A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
  15. A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
  2. To transfer data from a local device to a remote server over the internet.
  3. A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
  4. A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
  5. Media: Online platforms that enable users to create and share content, communicate, and connect with others.
  6. Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
  7. Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
  8. Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
  9. The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
  10. A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
  11. Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
  12. Electronic mail that allows users to send and receive messages and files over the internet.
  13. Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
  14. A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
  15. A global network of interconnected computers that enables the sharing of information and resources.
  16. Uniform Resource Locator, the address used to access a web page or resource on the internet.
  17. A wireless networking technology that allows devices to connect to the internet without the need for physical cables.

32 Clues: The buying and selling of goods and services over the internet.To transfer data from a local device to a remote server over the internet.To transfer data from a remote server to a local device over the internet.A live or pre-recorded seminar, workshop, or presentation conducted over the internet....

Krzyżówka zadanie 2025-12-10

Krzyżówka zadanie crossword puzzle
Across
  1. Use of technology to perform tasks without human input.
  2. A sign that danger or problems may occur.
  3. Information stored or processed by computers.
  4. A request for information from a database.
  5. Accidental or unlawful release of information.
  6. A risk or danger.
  7. A specific area or internet address space.
  8. A user identity in a system.
  9. Related to money or cost.
  10. A tool that blocks unwanted network traffic.
  11. A document describing an event or findings.
  12. The current condition of a system.
  13. Related to investigating cyber incidents.
  14. To check a system for issues or threats.
  15. A computer that provides resources to others.
  16. Too much data or activity for a system to handle.
  17. Numerical information used for analysis.
  18. A saved copy of data in case of loss.
  19. Unauthorized entry into a system.
  20. A piece of hardware used in computing.
  21. A written record of actions or events.
  22. Someone who monitors or watches activity.
  23. A set of rules for communication.
  24. Measurements used to evaluate performance.
  25. A call for data or a service.
  26. Permission to use or enter a system.
  27. Proof of an event or action.
  28. Programs used by a computer.
  29. A person or system chosen for attack.
  30. The ability to manage or direct something.
  31. Long-term storage of old files.
  32. A prediction based on information.
  33. A formal review of systems or processes.
Down
  1. A direct instruction given to a computer.
  2. A formal rule or guideline.
  3. To watch or track activity.
  4. A part of a larger software system.
  5. Official rule made by authorities.
  6. Searching for threats inside a network.
  7. Something unusual that may signal a problem.
  8. Continuous flow of data.
  9. A system on which applications can run.
  10. Instructions written for computers.
  11. An event that disrupts normal operations.
  12. A weakness that can be exploited.
  13. Monitoring to make sure rules are followed.
  14. A secret code to access a system.
  15. To follow the path of an action or data flow.
  16. A mistake or problem in a system.
  17. Information sent from one place to another.
  18. A connection point in a network.
  19. A place where data is kept.
  20. Protection against threats or attacks.
  21. Records of system activities.
  22. To protect from harm or attacks.
  23. Delay in data communication.
  24. The way a system or user acts.
  25. The right to keep personal data protected.
  26. Belief that someone or something is reliable.
  27. A set of connected computer components.
  28. The path data takes to reach a destination.
  29. A simplified digital structure used to predict or analyze.
  30. An action taken after an incident.
  31. Connected computers that share data.
  32. The chance that something bad may happen.
  33. Converting information into a secure code.
  34. Following laws, rules, or standards.
  35. A break in security where data is exposed.
  36. A step taken to solve a problem.
  37. Rules about what is morally right or wrong.
  38. A tool used to explore or test a system.
  39. Studying information to understand it.
  40. Learning skills or knowledge.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.To watch or track activity.A place where data is kept.A user identity in a system.Delay in data communication.Proof of an event or action.Programs used by a computer.Records of system activities.A call for data or a service.Learning skills or knowledge....

PaulinaNatalia 2025-12-10

PaulinaNatalia crossword puzzle
Across
  1. An action taken after an incident.
  2. A place where data is kept.
  3. To protect from harm or attacks.
  4. A tool that blocks unwanted network traffic.
  5. Converting information into a secure code.
  6. The right to keep personal data protected.
  7. A computer that provides resources to others.
  8. A tool used to explore or test a system.
  9. The path data takes to reach a destination.
  10. Programs used by a computer.
  11. A part of a larger software system.
  12. Information sent from one place to another.
  13. A step taken to solve a problem.
  14. A direct instruction given to a computer.
  15. Use of technology to perform tasks without human input.
  16. Learning skills or knowledge.
  17. Following laws, rules, or standards.
  18. A sign that danger or problems may occur.
  19. The way a system or user acts.
  20. Protection against threats or attacks.
  21. Rules about what is morally right or wrong.
  22. Connected computers that share data.
  23. Delay in data communication.
  24. A specific area or internet address space.
  25. A mistake or problem in a system.
  26. Instructions written for computers.
  27. A connection point in a network.
  28. Permission to use or enter a system.
  29. A risk or danger.
  30. Too much data or activity for a system to handle.
  31. Official rule made by authorities.
  32. A system on which applications can run.
  33. Belief that someone or something is reliable.
  34. Information stored or processed by computers.
  35. A prediction based on information.
  36. A document describing an event or findings.
  37. A formal review of systems or processes.
Down
  1. Unauthorized entry into a system.
  2. Related to money or cost.
  3. Continuous flow of data.
  4. Someone who monitors or watches activity.
  5. The ability to manage or direct something.
  6. Something unusual that may signal a problem.
  7. A call for data or a service.
  8. A break in security where data is exposed.
  9. A request for information from a database.
  10. Numerical information used for analysis.
  11. Records of system activities.
  12. A set of connected computer components.
  13. A set of rules for communication.
  14. A secret code to access a system.
  15. Monitoring to make sure rules are followed.
  16. To watch or track activity.
  17. To check a system for issues or threats.
  18. A formal rule or guideline.
  19. Related to investigating cyber incidents.
  20. Long-term storage of old files.
  21. Searching for threats inside a network.
  22. Proof of an event or action.
  23. Measurements used to evaluate performance.
  24. An event that disrupts normal operations.
  25. A weakness that can be exploited.
  26. A written record of actions or events.
  27. The chance that something bad may happen.
  28. A user identity in a system.
  29. A simplified digital structure used to predict or analyze.
  30. Studying information to understand it.
  31. To follow the path of an action or data flow.
  32. The current condition of a system.
  33. Accidental or unlawful release of information.
  34. A person or system chosen for attack.
  35. A saved copy of data in case of loss.
  36. A piece of hardware used in computing.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.Delay in data communication.A user identity in a system.A call for data or a service.Records of system activities.Learning skills or knowledge....

Social Security & Medicare 2022-09-13

Social Security & Medicare crossword puzzle
Across
  1. a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
  2. the amount of income subject to Social Security tax
  3. provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
  4. when someone uses your personal information to open accounts, file taxes, or make purchases under your name
Down
  1. a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
  2. both Social Security tax and Medicare tax
  3. Federal Insurance Contributions Act
  4. the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65

8 Clues: Federal Insurance Contributions Actboth Social Security tax and Medicare taxthe amount of income subject to Social Security taxwhen someone uses your personal information to open accounts, file taxes, or make purchases under your name...

LEGAL PUZZLE - GENERAL 2021-06-17

LEGAL PUZZLE - GENERAL crossword puzzle
Across
  1. The process of resolving disputes through Court is termed as ___________
  2. Investigation done to confirm facts/details of a matter under consideration.
  3. Interim remedy available to the bank in case a client's title has not been mortgaged.
  4. Who has the mandate to cancel Mortgage interests on a title after the client having paid off his or her loan?
  5. ________ amount is money borrowed and expected to be paid back with interest
  6. ___________ Property is that which married couples choose to call a home and that which either of the spouses contribute
  7. __________ Declaration: A legal document containing facts from the Mortgagor and his/her spouse on marital status
  8. The action of taking possession of a mortgaged property when the mortgagor fails to keep up their mortgage payments.
  9. _______ letter is given to a client after repaying the loan to cancel FINCA interest off their security.
  10. How many times can you subtract 10 from 100
  11. __________ is a registrable interest on a logbook.
  12. ___________ of Directors.
  13. A legal document used by the bank to register its interest on a land title.
  14. ________ Title is one that is valid for a specified period of time.
Down
  1. How does a spouse show acceptance of a loan and its terms?
  2. A Registered Proprietor on a Leasehold title can only borrow money when the ____________ in the Agreement provide for it.
  3. a situation in which a person is in a position to derive personal benefit from actions or decisions made in their official capacity.
  4. Delegata potestas non potest _________.
  5. ________ Order is used when a minor is the registered proprietor on the security.
  6. Can a Butabika patient take a loan with FINCA while pledging his Kibanja as security?
  7. _________ Secretary is the custodian of the FINCA Seal.
  8. A person that has a duty to repay someone's loan when s/he fails to pay.
  9. _________ is an interest registered on the title.
  10. _______ is done on securities before a loan is processed.
  11. Decisions to borrow by companies are made through _____________.
  12. What do lawyers wear to Court?
  13. ________ is a word used for security used to secure a loan from a bank.
  14. Tax that must have been paid for 2 financial years before the bank's interests can be registered on the commercial vehicle logbook.
  15. The process through which a company seeks to recover delinquent/non-performing loans.

29 Clues: ___________ of Directors.What do lawyers wear to Court?Delegata potestas non potest _________.How many times can you subtract 10 from 100_________ is an interest registered on the title.__________ is a registrable interest on a logbook._________ Secretary is the custodian of the FINCA Seal._______ is done on securities before a loan is processed....

Information Assurance Crossword Puzzle 2023-12-01

Information Assurance Crossword Puzzle crossword puzzle
Across
  1. Many corporate data centers and high-end desktops use purpose-built chipsets. The security reviews and patch releases for these solutions are often not as rigorous as mass-market products, making them easy targets for hackers.
  2. Metrics must be quantifiable, measured in concrete numbers, such as the number of successful phishing attempts or percentage reduction in system downtime.
  3. Metrics should be realistic and attainable within the existing resources and capabilities of the organization, ensuring that data can be collected accurately.
  4. Relates to the underlying technological infrastructure supporting information assurance.
  5. The process of designating information as having a certain level of sensitivity, such as Unclassified, Confidential, Secret, or Top Secret.
  6. IDSs use a combination of signature-based and anomaly-based detection.
  7. The frequency of metric reporting should be timely, aligning with the rate of change expected from the underlying data or the goals they represent. For example, real-time reporting for active security incidents.
Down
  1. IDSs can generate false positives, which are alerts that are triggered by legitimate activity. False positives can be time-consuming and costly to investigate.
  2. Ensures the originator of a message or transaction may not later deny action
  3. Why has the policy been created and how does the company benefit?
  4. A repeatable metric should have a clear and consistent definition, allowing different staff members to gather and report data in the same manner, ensuring uniformity in measurement.
  5. This policy outlines the organization's overall security goals and objectives. It also defines the specific security controls that must be implemented to protect the organization's assets.
  6. Proving the genuineness of facts or documents.
  7. Who is held accountable for the proper implementation of the policy?
  8. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
  9. Keeping information secret or private.
  10. Ensuring information can be used or obtained when needed.
  11. A statement of who issued the policy and how that person has the authority to define and enforce the policy.
  12. IDSs need to be tuned to the specific environment in which they are deployed. This can be a complex and time-consuming process.
  13. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity

20 Clues: Keeping information secret or private.Proving the genuineness of facts or documents.Ensuring information can be used or obtained when needed.Why has the policy been created and how does the company benefit?Who is held accountable for the proper implementation of the policy?IDSs use a combination of signature-based and anomaly-based detection....

Information Assurance 2023-12-05

Information Assurance crossword puzzle
Across
  1. Information Assurance involves measures that protect and defend both information and information systems.
  2. Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
  3. ensures that information remains in its original form; information remains true to the creators intent
  4. Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
  5. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
  6. Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
  7. Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
  8. These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
  9. The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
  1. ensures the disclosure of information only to those persons with authority to see it.
  2. Information Assurance is concerned with safeguarding information from both malicious and accidental threats
  3. Some older hardware may not be able to support newer security software and solutions.
  4. Hardware can take years to develop, and resolving security issues often require more than a quick patch.
  5. Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
  6. It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
  7. Most IoT device and robotics manufacturers don’t have dedicated security experts.
  8. Many corporate data centers and high-end desktops use purpose-built chipsets.
  9. The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
  10. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
  11. Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.

20 Clues: Many corporate data centers and high-end desktops use purpose-built chipsets.Most IoT device and robotics manufacturers don’t have dedicated security experts.Some older hardware may not be able to support newer security software and solutions.ensures the disclosure of information only to those persons with authority to see it....

15.1 crossword puzzle 2024-05-08

15.1 crossword puzzle crossword puzzle
Across
  1. what EFT stands for; a transfer of money from one bank account to another
  2. to exchange one good or service for another good or service
  3. cards allows customers to pay for purchases directly from their checking accounts
  4. a type of security that pays interest over terms ranging from two to ten years
  5. a document guaranteeing payment of a specific amount of money
  6. a type of security that pays interest over terms of ten to thirty years
  7. the process of transferring money from one individual or organization to another
  8. anything of value that is accepted in return for goods and services
  9. a security that matures in a year or less
  10. a function of money in the economy in which it is a common measure of the worth or price of a good or service
  11. coins or banknotes that must be accepted for all debts
Down
  1. a system by which a government provides money in a country's economy
  2. the concept that the value of a dollar today is worth more than the value of a dollar in the future
  3. a financial investment issued by that government, a corporation, or other oganizations
  4. a function of money in the economy in which it can be saved and used at a later date
  5. paper money and coins
  6. a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
  7. short for The Federal Reserve System
  8. a property of money in which it is able to be divided into smaller units
  9. a property of money in which people are able to carry money
  10. a plastic card that allows the holder to make credit purchases up to an authorized amount
  11. another word for money
  12. comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
  13. any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
  14. a property of money in which it is made of a strong and lasting material
  15. a property of money in which it is authentic money immediately recognizable
  16. a property of money in which it maintains its value over time in order for it to be widely accepted

27 Clues: paper money and coinsanother word for moneyshort for The Federal Reserve Systema security that matures in a year or lesscoins or banknotes that must be accepted for all debtsto exchange one good or service for another good or servicea property of money in which people are able to carry money...

Privacy Act CHC 31 2024-09-12

Privacy Act CHC 31 crossword puzzle
Across
  1. Agencies must not keep health information for too long. They can only keep it for as long as is necessary for any lawful purpose of use.
  2. a word describing the collection of health information by misrepresenting the purpose of collecting the information
  3. blank officer is responsible for ensuring agency complies with the act and work with PCO when it investigates complaints
  4. a person's blank has a full or a degree of access to and control over that person's health information - examples of these are parent / guardian / executor of estate
  5. Health Act blank require all health information held by providers to be retained for 10 years from the last encounter with the patient unless transferred to another doctor or to the patient.
  6. two words describing doctors, nurses, pharmacists, health insurers, hospitals, primary health organisations, ACC and the Ministry of Health
  7. the code allows care practitioners to disclose health information to a blank caregiver
  8. examples of blank information are medical and treatment history or information about donations of organs or blood
  9. blank is a professional method of disposal for printed health information
  10. blank security is the confidentiality agreements with staff and contractors, document tracking and footprinting, staff training
Down
  1. the code requires agencies to reasonable security safeguards to protect the information and prevent blank access
  2. It stipulates that agencies must ensure that personal information is up-to-date, and complete when used
  3. code applies to health information about blank individual
  4. health agencies can disclose information if this is necessary to prevent or lessen a blank threat to public health or public safety
  5. a key concept wherein health agencies need to let patients know how their information is going to be used and disclosed so the patients can make decisions about whether to provide it.
  6. two words meaning when someone who should not have access to personal information sees it, intentionally or by accident
  7. blank security is the use of technology and virtual media like email, laptops and portable storage devices, passwords
  8. blank security is the entry controls, positioning of whiteboards and computer terminals, locked filing cabinets and storage rooms
  9. Health Act regulations require all health information to be retained for blank years from the last encounter unless patient is transferred.
  10. collection of health information or data should be for a blank purpose

20 Clues: code applies to health information about blank individualcollection of health information or data should be for a blank purposeblank is a professional method of disposal for printed health informationthe code allows care practitioners to disclose health information to a blank caregiver...

Chapter 2 Crosswords 2025-11-14

Chapter 2 Crosswords crossword puzzle
Across
  1. A financial investment issued by a corporation, government, or other organization
  2. ___ institution - a financial institution that accepts money from customers and deposits into the customers account
  3. ____ system - the mechanism a nation uses to provide and manage money for itself
  4. People who lend money to the business in return for a contracted rate of interest or return for their investment.
  5. ___ order - you buy or sell when the stock reaches a certain price
  6. ___ bill - a security that matures in a year or less
  7. Establishes and enforces regulations which protect the investors from unfair practices in the security market
  8. ___ order - buying or selling a certain amount of shares of the stock at the best current available price and you assume your order will be executed as soon as possible
  9. a nonprofit financial institution
  10. ____ policy - action taken to manage supply of money and interest rates
  11. Stockbrokers earn their salaries from _______ based sales
  12. people who buy shares of stock in the company
  13. Pooled group of securities that track performance
  14. An equity instrument carrying ownership interest
  15. ___ capital market - selling stocks and bonds directly to public investors
  16. Pooled investment vehicle (Long & Short). Invest in a spectrum of assets typically with a sector focus
Down
  1. ____ capital market - stockholders buy and sell shares of stock from another with the help of brokers
  2. ___ analysis - an analysis of the company's stock, its price, price movement, trading volume, etc.
  3. Money for real estate, equipment, and so on
  4. ___ fund- A kind of mutual fund that invests in highly liquid, near-term instruments
  5. ___ order - you order to buy or sell an order at a specific price changes to a market order when the specific price is reached
  6. ___ bank - a financial institution that provides services for businesses
  7. ___ analysis - an analysis of the company itself, its operations, its position within its industry
  8. a sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
  9. National associations security dealers automated quotes
  10. ___ fund - pooled group of securities that track performance of indices benchmarks
  11. someone who assists you with purchasing stocks and bonds
  12. ___ accounts - investors who use their own money to purchase securities
  13. money Online banking allows ____
  14. ___ accounts - investors who borrow money to purchase securities
  15. A debt instrument with a promise to pay back the money with interest

31 Clues: money Online banking allows ____a nonprofit financial institutionMoney for real estate, equipment, and so onpeople who buy shares of stock in the companyAn equity instrument carrying ownership interestPooled group of securities that track performance___ bill - a security that matures in a year or less...

Chapter 2 Crossword 2025-11-17

Chapter 2 Crossword crossword puzzle
Across
  1. someone who assists you with purchasing stocks and bonds.
  2. People who lend money to the business in return for a contracted rate of intrest
  3. Limited liability for shareholders
  4. Your order to buy or sell an order at a specific price changes to a market order when the specific price is reached.
  5. A mechanism a nation uses to provide and manage money for itself
  6. Is the official currency
  7. Shares can be traded openly
  8. You want to buy or selll a certain number of shares of stock aat the best current available price and you assume your order will be executed as soon as possible.
  9. A document guarenteeing payment of a specific amount of money
  10. Money is deposited directly into a customer's checking account
  11. Is a written order for the bank to pay a specific amount to the person or organization to which the check is written
  12. People who buy shares of stock in the company
  13. Generally fixed, like debt; based on the par value
  14. Vast majority of U.S. corporations are private
Down
  1. Is a document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
  2. is a financial investment issued by a corporation, government, or other organization
  3. Is a security that matures in a year or less
  4. Is a bank account that allows the account owner to make deposits
  5. Is anything of value that is accepted in return for goods and services
  6. You want to buy or sell when the stock reaches a certain price.
  7. Money for real estate equipment,and so on
  8. Help keep the federal government operating.
  9. Describe the relationship between risk and return
  10. Those people who do the work.
  11. Is a security that pays interest over terms of ten to thirty years
  12. Is a prearranged amount of credt that is available for a business to use as needed
  13. allow customers to pay for purchases and withdraw cash
  14. the final document that discloses financial information about the company.
  15. is a security that pays interest over terms ranging from two to ten years
  16. is a bank account used by depositors to accumulate money for future use

30 Clues: Is the official currencyShares can be traded openlyThose people who do the work.Limited liability for shareholdersMoney for real estate equipment,and so onHelp keep the federal government operating.Is a security that matures in a year or lessPeople who buy shares of stock in the companyVast majority of U.S. corporations are private...

At the airport 2019-04-25

At the airport crossword puzzle
Across
  1. Sitz
  2. Abflug
  3. Ankunft
  4. Sicherheitskontrolle
  5. Gepäckausgabe
  6. abheben
Down
  1. Reisepass
  2. Bordkarte
  3. Abflugschalter
  4. Flugbegleiter
  5. Flugsteig
  6. buchen

12 Clues: SitzAbflugbuchenAnkunftabhebenReisepassBordkarteFlugsteigFlugbegleiterGepäckausgabeAbflugschalterSicherheitskontrolle

🌼🌞Unit🔆🌟11🫥🌝 2023-05-11

🌼🌞Unit🔆🌟11🫥🌝 crossword puzzle
Across
  1. to make sure
  2. silly
  3. a landslide
  4. truth
  5. protection
  6. to cuddle
Down
  1. to plan
  2. choosy
  3. achievable
  4. to order
  5. tangy
  6. an appeal

12 Clues: sillytangytruthchoosyto planto orderan appealto cuddleachievableprotectiona landslideto make sure

🌼🌞Unit🔆🌟11🫥🌝 2023-05-11

🌼🌞Unit🔆🌟11🫥🌝 crossword puzzle
Across
  1. truth
  2. silly
  3. to order
  4. to cuddle
  5. tangy
  6. a landslide
Down
  1. to make sure
  2. protection
  3. an appeal
  4. achievable
  5. choosy
  6. to plan

12 Clues: truthsillytangychoosyto planto orderan appealto cuddleprotectionachievablea landslideto make sure

chapter 16 2022-01-18

chapter 16 crossword puzzle
Across
  1. feeling good
  2. safe
  3. on own
  4. clear
  5. change
  6. heavy load
  7. no waste
Down
  1. take care of
  2. fancy
  3. feeling bad
  4. affect
  5. carry out

12 Clues: safefancyclearon ownaffectchangeno wastecarry outheavy loadfeeling badtake care offeeling good

Mixed: Intermediate/Advanced 82 2024-02-08

Mixed: Intermediate/Advanced 82 crossword puzzle
Across
  1. Ballot paper
  2. Taxi stand [__________ de taxis]
  3. Award
  4. Database [3w]
  5. Defendant
  6. Pot
Down
  1. Security check [________ __ seguridad, 2w]
  2. Fan
  3. Inquisition
  4. Drum
  5. Iris
  6. Saucepan

12 Clues: FanPotDrumIrisAwardSaucepanDefendantInquisitionBallot paperDatabase [3w]Taxi stand [__________ de taxis]Security check [________ __ seguridad, 2w]

On line Security 2015-05-05

On line Security crossword puzzle
Across
  1. card/ shopping
  2. google
  3. guard
  4. secret
Down
  1. online
  2. theft/ robber
  3. chatting/ facebook
  4. yum
  5. firefighter
  6. ware/ spy
  7. games

11 Clues: yumguardgamesonlinegooglesecretware/ spyfirefightertheft/ robbercard/ shoppingchatting/ facebook

MI review 2023-05-19

MI review crossword puzzle
Across
  1. Bargaining Agreement
  2. compensation
  3. Procedures
  4. Policy Tort
  5. Pay Rule
Down
  1. Security
  2. contract
  3. Plan
  4. Covenant
  5. compensation
  6. pay
  7. Discharge
  8. at Will

13 Clues: payPlanat WillSecuritycontractCovenantPay RuleDischargeProceduresPolicy TortcompensationcompensationBargaining Agreement

IFS 2022-07-30

IFS crossword puzzle
Across
  1. An asset but not security
  2. An asset as well as security
  3. Securities provided to the bank in exchange of loan
  4. All financial assets are not _
  5. regulates the stock exchange business
Down
  1. a platform thatfacilitates the exchange of financial assets
  2. An acknowledgement of Debt
  3. resources of a country.
  4. a promise by a borrower to pay a lender their principal and usually interest on a loan.
  5. minimum percentage of cash, gold, and other securities, before lending loans to customers
  6. a system that mobilizes and usefully allocates
  7. a security that represents the ownership of a fraction of the issuing corporation.

12 Clues: resources of a country.An asset but not securityAn acknowledgement of DebtAn asset as well as securityAll financial assets are not _regulates the stock exchange businessa system that mobilizes and usefully allocatesSecurities provided to the bank in exchange of loana platform thatfacilitates the exchange of financial assets...

Crossword 8 2018-11-30

Crossword 8 crossword puzzle
Across
  1. A type of risk response strategy whereby the project team acts to reduce the probability of occurrence or impact of a risk.
  2. The process of comparing two sets of records (usually balances of two accounts) and ensuring that they match at the end of a particular accounting period.
  3. Interest accumulation
  4. Social Security Number
  5. Type of testing to determine how well the system is protected against unauthorized access by internal or external entities.
Down
  1. Adding interest to the principal balance
  2. An authentication process in which the user provides two means of identification.
  3. A process of monitoring specific project results to determine whether they comply with relevant standards.
  4. A unique identifier used in place of the borrower's social security number
  5. A business that collects payments on a loan and performs other administrative tasks associated with maintaining a loan portfolio.
  6. A court order directing that money or property of a third party be seized to satisfy a debt.
  7. Accepting less than full payment.

12 Clues: Interest accumulationSocial Security NumberAccepting less than full payment.Adding interest to the principal balanceA unique identifier used in place of the borrower's social security numberAn authentication process in which the user provides two means of identification....

Security Bytes - March 2024 2024-02-28

Security Bytes - March 2024 crossword puzzle
Across
  1. A person who uses computers to gain unauthorised access to data.
  2. A network device that forwards data packets between computer networks
  3. Security techniques that use biological data for authentication.
  4. An encryption-based Internet security protocol
  5. A number of internet connected devices each of which is running one or more bots
Down
  1. a piece of software designed to update a computer program or its supporting data to fix or improve it.
  2. No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
  3. Software designed to detect and destroy computer viruses
  4. A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
  5. Highlighted policy in march security bytes newsletter
  6. A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
  7. The practice of protecting systems, networks and programs from digital attacks

12 Clues: An encryption-based Internet security protocolHighlighted policy in march security bytes newsletterSoftware designed to detect and destroy computer virusesA person who uses computers to gain unauthorised access to data.Security techniques that use biological data for authentication....

daves crossworde puzzle is better then yours (lottie) 2021-11-03

daves crossworde puzzle is better then yours (lottie) crossword puzzle
Across
  1. what electronic you are using right now
  2. comes beofre the word safety
  3. opposite of danger ig
Down
  1. people who hack into computers
  2. a secret code you set

5 Clues: a secret code you setopposite of danger igcomes beofre the word safetypeople who hack into computerswhat electronic you are using right now

InternetPuzzle 2016-02-17

InternetPuzzle crossword puzzle
Across
  1. server that automatically provides an IP address.
  2. Modem config without NAT.
  3. what is before the .com but after the @ symbol?
  4. Network Address Translation.
  5. Non changing IP Address.
  6. A free service with NPP for email and web.
  7. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
  8. A tool you use to help guide your calls.
  9. A Type of Cord that hooks direct from the modem to customers device.
  10. Changing IP Address.
  11. Internet without wires.
Down
  1. The Program the customer goes to set up a Domain Name.
  2. The owner of a Domain name.
  3. Controls how the modem functions.
  4. Redirects a communication request from one address to a Port.
  5. Translates an IP address to a domain name.
  6. Internet program you use to surf the internet.
  7. a hardware device that has multiple Ethernet ports.
  8. A networking device that perform the "traffic directing" functions on the Internet.
  9. Internet output device.
  10. This controls your domain name's website and email settings.

21 Clues: Changing IP Address.Internet output device.Internet without wires.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....

Vriendjes van de dag 2013-10-27

Vriendjes van de dag crossword puzzle
Across
  1. kapitein
  2. landbouwwerktuig
  3. bemanning
  4. dekwash slang
  5. uitstulping van de boeg
  6. vrouw van jorg
  7. dop op waaier
  8. scheepshoorn
  9. plaats aan boord
  10. vloedgolf
  11. plaats in Singapore
  12. navigatiemiddel
  13. tandenbalk
  14. plaatsbepalingssysteem
  15. logboek
  16. Hi-Fog
  17. onderwater schone
  18. lable printer
  19. meetinstrument
  20. under water pump
  21. beunoverloop
  22. implosie
  23. zeehond
  24. windzijde
  25. PMS
  26. uitvinder van de windschaal
  27. hospitaal
  28. venster
  29. eva
  30. eigenaar
  31. plastificeren
  32. zee rover
  33. emmer
  34. verstuiver
  35. duizend kilo
Down
  1. electronische kaart
  2. latwerk
  3. spie
  4. luchttol
  5. onderwaterblok/zuigbuis
  6. safe working load
  7. spoelwater
  8. rood
  9. lock out tag out
  10. schuurborstel
  11. mannelijk vertier
  12. Ship security officer
  13. dekkraan
  14. verrekijker
  15. MLC
  16. keuken
  17. communicatie middel dat niet werkt
  18. Callsign
  19. gereedschap
  20. bootje
  21. stuurboord
  22. afsluiter
  23. slaapkamer
  24. hijswerktuig
  25. topdek
  26. stuk
  27. kluis
  28. kompasfout
  29. declaration of security
  30. vloeibaar lekkers
  31. pressureliner
  32. schrijfvloeistof
  33. meertouw
  34. stuur
  35. hijswerktuig

70 Clues: MLCPMSevaspieroodstukkluisstuuremmerkeukenHi-FogbootjetopdeklatwerklogboekzeehondvensterkapiteinluchttoldekkraanCallsignimplosieeigenaarmeertouwbemanningvloedgolfafsluiterwindzijdehospitaalzee roverspoelwatertandenbalkstuurboordslaapkamerkompasfoutverstuiververrekijkergereedschapscheepshoornbeunoverloophijswerktuighijswerktuigduizend kilo...

corporate finance 2021-02-05

corporate finance crossword puzzle
Across
  1. The firm’s chief financial manager
  2. The chance that actual outcomes may differ from those expected.
  3. A market that establishes correct prices for the securities
  4. The science and art of managing money
  5. An entity created by law
  6. A firm’s taxes divided by its taxable income
  7. The sale of either bonds or stocks to the general public
  8. firm's chief accountant
  9. The highest price offered to purchase a security
  10. Long-term debt instrument used by business and government to
  11. The market in which the buyer and seller are not brought
Down
  1. A special form of ownership having a fixed periodic
  2. Financial market in which preowned securities
  3. The rate at which additional income is taxed.
  4. The lowest price at which a security is offered for sale
  5. An entity created by law by two or more people
  6. Groups such as employees
  7. basis In preparation of financial statements
  8. Income earned through the sale of a firm’s goods or services.
  9. The purest and most basic form of corporate ownership

20 Clues: firm's chief accountantGroups such as employeesAn entity created by lawThe firm’s chief financial managerThe science and art of managing moneybasis In preparation of financial statementsA firm’s taxes divided by its taxable incomeFinancial market in which preowned securitiesThe rate at which additional income is taxed....

RU ITEC411 - Crime and Security 2023-10-17

RU ITEC411 - Crime and Security crossword puzzle
Across
  1. A concealed entry point in communication systems
  2. Enhanced account security using multiple steps(acronym)
  3. This law places restrictive measures on information.
  4. Covert software that gathers user data
  5. Retail corporation affected by a major data breach in 2007.
  6. Legislation protecting intellectual property.
  7. Proving one's identity
  8. A United States federal law that governs unauthorized access to computer systems and data
  9. Deceptive cybersecurity trap for hackers.
  10. Activist use of hacking for social or political causes
  11. This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
  1. False statements harming one's reputation.
  2. False spoken statements harming reputation.
  3. This process transforms information into a coded form to protect it from unauthorized access
  4. Using unique physical features for identification
  5. Malicious software that replicates and infects
  6. system is used in retail to process transactions, record sales, and manage inventory(acronym.
  7. Ethical hacking for security assessment.
  8. Deceptive online tactic to steal personal information
  9. U.S. law for wiretaps and law enforcement access

20 Clues: Proving one's identityCovert software that gathers user dataEthical hacking for security assessment.Deceptive cybersecurity trap for hackers.False statements harming one's reputation.False spoken statements harming reputation.Legislation protecting intellectual property.Malicious software that replicates and infects...

Travel Vocabulary 2020-04-03

Travel Vocabulary crossword puzzle
Across
  1. in the airport
  2. security agent
  3. carry-on baggage
  4. flight
  5. in the train station
  6. to take off (airplane)
  7. boarding pass
  8. safety belt
  9. platform (train)
  10. suitcase
  11. ticket window
  12. on time
  13. arrival
  14. counter (check-in)
  15. seat
  16. event ticket
  17. baggage claim
  18. bunk bed
  19. to give
  20. to turn
  21. to go through security
  22. aisle
  23. controller (train ticket)
  24. first class
  25. to miss (a flight)
  26. to board
  27. passenger
  28. window
  29. sleeping car
  30. trip/travel
  31. connection
Down
  1. luggage
  2. delayed
  3. to get/obtain
  4. to see
  5. ticket (number 2)
  6. to hope
  7. waiting room
  8. departure
  9. ticket
  10. flight attendant
  11. customs
  12. coach (plane)
  13. car wagon/train car
  14. luggage screening
  15. to go straight
  16. international airport
  17. to check luggage/to put on plane
  18. train stop
  19. gate
  20. second class
  21. passport
  22. visa
  23. to land
  24. layover

55 Clues: seatgatevisaaisleflightto seeticketwindowluggagedelayedto hopecustomson timearrivalto giveto turnto landlayoversuitcasebunk bedpassportto boarddeparturepassengertrain stopconnectionsafety beltfirst classtrip/travelwaiting roomevent ticketsecond classsleeping carto get/obtainboarding passticket windowcoach (plane)baggage claimin the airport...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. nationally reconized financially sound company
  2. a system of recording info
  3. biggest financial fraud in US history
  4. when a large number of people withdraw their deposits
  5. age to start investing
  6. you can only put up to $7,000 per year
  7. president who created social security
  8. measures the proformance of multiple companies
  9. when the market is high
  10. mortgage backed by securities
  11. retirement plan managed by your employer
  12. tells us how big the company is in the stock market
  13. age to collect social security
Down
  1. federal deduction from each paycheck
  2. a virtual currency
  3. you can do this whith your 401k funds to your new company's 401k plan
  4. currencies that are created and backed by the government
  5. example of an investment fund
  6. secured in the possesion or assigned to a person
  7. bought and sold throughout the day
  8. at 67 you can collect this
  9. when the market is low
  10. money saved for a purpose

23 Clues: a virtual currencyage to start investingwhen the market is lowwhen the market is highmoney saved for a purposea system of recording infoat 67 you can collect thisexample of an investment fundmortgage backed by securitiesage to collect social securitybought and sold throughout the dayfederal deduction from each paycheck...

CROSSWORD 2023-08-07

CROSSWORD crossword puzzle
Across
  1. Malicious software.
  2. Distributed, secure ledger.
  3. Malicious software.
  4. Unique biological identifiers.
  5. Internet-based data storage and computing.
  6. Computer providing services to clients.
  7. Computing based on quantum mechanics.
  8. Enhanced reality with computer-generated elements.
  9. Data protection using a code.
  10. Decentralized digital currency.
  11. Single-layer carbon material.
  12. Information and facts.
  13. Name of the first commercial video game ever released
  14. A widely used open-source operating system based on the Linux kernel.
  15. Simulated or computer-generated.
  16. Set of steps to solve a problem.
  17. Manipulating materials at a tiny scale.
Down
  1. of Things Interconnected smart devices.
  2. A cloud computing service offered by Amazon Web Services (AWS) for scalable storage.
  3. Unit of digital storage, 1 billion bytes.
  4. Computer security expert.
  5. Learning AI learning from data.
  6. A popular version control system used by developers to track changes in their codebase.
  7. Unauthorized access to systems.
  8. Mobile device with advanced features.
  9. Simulated intelligence.
  10. Network security barrier.
  11. Global network of connected devices.
  12. Writing code for computers.
  13. Application Programming Interface.

30 Clues: Malicious software.Malicious software.Information and facts.Simulated intelligence.Computer security expert.Network security barrier.Distributed, secure ledger.Writing code for computers.Data protection using a code.Single-layer carbon material.Unique biological identifiers.Learning AI learning from data.Unauthorized access to systems....

Cloud Deployment Crossword Puzzle 2025-03-07

Cloud Deployment Crossword Puzzle crossword puzzle
Across
  1. Storing data in fixed-sized chunks, ideal for databases.
  2. Stores data as objects with metadata.
  3. Software that creates and manages virtual machines.
  4. Organizing data into a hierarchical structure like a local file system.
  5. Moving a powered-off server to a new environment.
  6. Ability to scale resources up or down as needed.
  7. Calculating expenses related to cloud migration and usage.
  8. A software-based simulation of a physical computer.
  9. Adding extra layers of security to logins.
  10. Identifying which applications should be migrated first.
  11. Assigning CPU, memory, and storage dynamically.
  12. Ability to scale resources up or down as needed.
  13. Creating backup copies to prevent data loss.
Down
  1. Part of the workload stays on-premises while others move to the cloud.
  2. Moving a running virtual machine without downtime.
  3. Allowing users to log in once for multiple apps.
  4. Ensuring compliance and safety during migration.
  5. Identity and Access Management in cloud security.
  6. Evaluating current infrastructure before cloud migration.
  7. Assigning permissions based on user roles.
  8. Running applications in isolated environments.
  9. Lifting and shifting applications to the cloud.
  10. Evaluating current infrastructure before migration.
  11. Restricting access for high-privilege accounts.

24 Clues: Stores data as objects with metadata.Assigning permissions based on user roles.Adding extra layers of security to logins.Creating backup copies to prevent data loss.Running applications in isolated environments.Lifting and shifting applications to the cloud.Assigning CPU, memory, and storage dynamically....

THE FAMILY 2025-05-26

THE FAMILY crossword puzzle
Across
  1. : A feeling of great respect and approval.
  2. : The state of begin linked or joined together
  3. : Security is the feeling of being safe and protected.
  4. : a feeling or sorrow or unhappiness
  5. : A sense of being part of something
  6. : A sense of reassurance or relaxation.
  7. : Happiness is a state of feeling joyful and content.
  8. : Confidence in the reliability or honesty of someone or something Sadness
  9. : Confidence in a positive outcome.
  10. : A deep feeling of affection, care, and connection toward someone or something.
Down
  1. The felling of sadness when expectations are not met
  2. : a strong felling of displeasure or hostility.
  3. : Something that makes life easier or less painfull
  4. : A sense of dissatisfaction when things don’t go as planned
  5. : The act of thinking about potential problems
  6. : A sentimental longing for the past
  7. : a felling of admiration for someone or something
  8. : Joy is a feeling of great happiness and delight.
  9. : A felling of thankfulness and appreciation.
  10. : A felling of satisfaction and self respect

20 Clues: : Confidence in a positive outcome.: A sentimental longing for the past: A sense of being part of something: a feeling or sorrow or unhappiness: A sense of reassurance or relaxation.: A feeling of great respect and approval.: The act of thinking about potential problems: The state of begin linked or joined together...

safety and secruity 2025-06-05

safety and secruity crossword puzzle
Across
  1. At the end of an aircraft
  2. reversers At rear of engine
  3. The body of the aircraft located between the two wings
  4. The main building where passengers check in
  5. A person with responsibility to manage the traffic on the ramp
  6. The area of the airport where security checks are conducted
  7. The process of moving an aircraft
  8. Straight and off to each side of the aircraft
  9. Where the aircraft gets serviced
  10. That is at the end of an aircraft
Down
  1. Area where aircraft is packed/loaded and unloaded
  2. Fitted to the wings
  3. A document used to board the plane
  4. Located on the wings closest to the fuselage
  5. The bridge connecting to aircraft and terminal
  6. The area where the public can access an airport terminal
  7. The path aircraft uses to move on the ground
  8. The area where passengers can relax and wait for there flights
  9. The area where the aircraft take off and land
  10. The area where passengers can purchase there duty free goods

20 Clues: Fitted to the wingsAt the end of an aircraftWhere the aircraft gets servicedThe process of moving an aircraftThat is at the end of an aircraftA document used to board the planereversers At rear of engineThe main building where passengers check inLocated on the wings closest to the fuselageThe path aircraft uses to move on the ground...

Responsible Use Agreement 2025-08-21

Responsible Use Agreement crossword puzzle
Across
  1. Repeated online intimidation or threats
  2. Activity of tracking user behavior for safety or security
  3. Legal protection for original content like music or writing
  4. Institution responsible for enforcing this agreement
  5. Group of connected devices and systems
  6. Sending files to the internet or cloud storage
  7. Watching videos in real time over the internet
  8. Laptops, phones, tablets — all are types of this
Down
  1. Cruel or repeated online behavior toward someone
  2. Sharing someone’s private info or photo without permission violates this
  3. A unique identifier used to log into school systems
  4. Permission required to share someone’s personal content or image
  5. The worldwide network of computers
  6. Formal method of online communication at school
  7. Online content blockers to protect students from inappropriate content
  8. Secret word that keeps your account safe
  9. Systems in place to protect data and prevent hacking
  10. Platforms like TikTok, Instagram, and Snapchat
  11. Presenting someone else’s work as your own
  12. Short term for Artificial Intelligence

20 Clues: The worldwide network of computersGroup of connected devices and systemsShort term for Artificial IntelligenceRepeated online intimidation or threatsSecret word that keeps your account safePresenting someone else’s work as your ownPlatforms like TikTok, Instagram, and SnapchatSending files to the internet or cloud storage...

Thinking About the Future - Crossword 2025-09-19

Thinking About the Future - Crossword crossword puzzle
Across
  1. Level of needs for confidence and recognition
  2. Level of needs for creativity and purpose
  3. Fixed yearly amount of pay
  4. Hourly rate of pay
  5. Force that drives choices and actions
  6. Person with broad, adaptable skills
  7. Short-term work mainly for income
  8. Essentials for survival and well-being
  9. Psychologist known for hierarchy of needs
  10. Expert with deep focus in one area
  11. Extras that bring comfort or fun
  12. Uncertainty with chance of failure or reward
  13. Level of needs including shelter and security
  14. Satisfaction from short- or long-term rewards
Down
  1. Level of needs including food, water, rest
  2. Level of needs involving friends and relationships
  3. Following what excites and fulfills you
  4. Long-term work path with growth and fulfillment
  5. Blending work, health, and personal life
  6. Motivation from passion or enjoyment
  7. Pay earned from sales or business brought in
  8. Choosing based on stability and income
  9. Stability and predictability in a career
  10. Motivation from rewards like money or praise
  11. Safe, easy, predictable zone

25 Clues: Hourly rate of payFixed yearly amount of paySafe, easy, predictable zoneExtras that bring comfort or funShort-term work mainly for incomeExpert with deep focus in one areaPerson with broad, adaptable skillsMotivation from passion or enjoymentForce that drives choices and actionsChoosing based on stability and income...

Test 2025-12-01

Test crossword puzzle
Across
  1. Short-range wireless communication
  2. Repetition of steps in a loop
  3. Data transfer limit on a network
  4. Distributes traffic across multiple servers
  5. Language famous for “write once, run anywhere”
  6. Converts data into unreadable form for security
  7. Malicious software designed to harm systems
  8. Set of rules for data communication
  9. Software that manages virtual machines
  10. Stores and manages network resources
  11. Creates virtual versions of computers or OS
  12. Process of finding and fixing errors
Down
  1. Platform for hosting code repositories
  2. Connects computers worldwide
  3. Distributed, tamper-proof ledger technology
  4. Step-by-step procedure for solving a problem
  5. Translates source code into machine code
  6. Ability of a system to handle growth
  7. Filters incoming and outgoing network traffic
  8. Lightweight isolated environment for applications
  9. Small independent deployable software component
  10. Secret key used for login/security
  11. One-way transformation of data
  12. The design structure of a computer system
  13. Time delay in data transmission

25 Clues: Connects computers worldwideRepetition of steps in a loopOne-way transformation of dataTime delay in data transmissionData transfer limit on a networkShort-range wireless communicationSecret key used for login/securitySet of rules for data communicationAbility of a system to handle growthStores and manages network resources...

Presidents 2015-02-13

Presidents crossword puzzle
Across
  1. created social security
  2. assassinated by Booth
  3. was an inventor
Down
  1. ended debt
  2. father of the nation
  3. assassinated while campaining
  4. created Homeland Security

7 Clues: ended debtwas an inventorfather of the nationassassinated by Boothcreated social securitycreated Homeland Securityassassinated while campaining

15.1 crossword puzzle 2024-05-08

15.1 crossword puzzle crossword puzzle
Across
  1. what EFT stands for; a transfer of money from one bank account to another
  2. to exchange one good or service for another good or service
  3. cards allows customers to pay for purchases directly from their checking accounts
  4. a type of security that pays interest over terms ranging from two to ten years
  5. a document guaranteeing payment of a specific amount of money
  6. a type of security that pays interest over terms of ten to thirty years
  7. the process of transferring money from one individual or organization to another
  8. anything of value that is accepted in return for goods and services
  9. a security that matures in a year or less
  10. a function of money in the economy in which it is a common measure of the worth or price of a good or service
  11. coins or banknotes that must be accepted for all debts
Down
  1. a system by which a government provides money in a country's economy
  2. the concept that the value of a dollar today is worth more than the value of a dollar in the future
  3. a financial investment issued by that government, a corporation, or other oganizations
  4. a function of money in the economy in which it can be saved and used at a later date
  5. paper money and coins
  6. a function of money in the economy in which it is needed for exchange of goods and services needed by individuals, businesses, and governments
  7. short for The Federal Reserve System
  8. a property of money in which it is able to be divided into smaller units
  9. a property of money in which people are able to carry money
  10. a plastic card that allows the holder to make credit purchases up to an authorized amount
  11. another word for money
  12. comprises the Federal Reserve's actions and communications to promote maximum employment, stable prices, and moderate long-term interest rates
  13. any national bank, State bank, banking association, or trust company that is a member of the Federal Reserve System
  14. a property of money in which it is made of a strong and lasting material
  15. a property of money in which it is authentic money immediately recognizable
  16. a property of money in which it maintains its value over time in order for it to be widely accepted

27 Clues: paper money and coinsanother word for moneyshort for The Federal Reserve Systema security that matures in a year or lesscoins or banknotes that must be accepted for all debtsto exchange one good or service for another good or servicea property of money in which people are able to carry money...

CN-120 Linux Server Fundamentals Key Terms Week 1 2023-05-01

CN-120 Linux Server Fundamentals Key Terms Week 1 crossword puzzle
Across
  1. Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered
  2. Programming object that can resolve the truth value of a condition, sch as whether one variable is equal to another
  3. A non-interactive process that runs in the background to support an OS or application function such as Plug-and-play, the print spooler, and DHCP. Also known as daemon
  4. One of several fully functional operating systems and members of the Linux family that run the Linux kernel, GNU software, and additional components. Also known as a Linux distribution
  5. System component providing a command interpreter by which the user can use a kernel interface and operate the OS
  6. A human-readable name that identifies a network host
  7. The fundamental security goal of keeping information and communications private and protecting them from unauthorized access
  8. The fundamental security goal of insuring that computer systems operate continuously and that authorized persons can access data that they need
  9. Security settings that control access to objects including file system items and network resources
  10. The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications
Down
  1. The local administrative account on a Linux system, typically named root
  2. A low-level piece of code responsible for controlling the rest of the operating system
  3. An operating system virtualization deployment containing everything required to run a service, application, or microservice
  4. A reference to a specific location on a file system
  5. The property by which a user is allowed to apply and modify the permissions of a file or directory
  6. Software program that has been executed and is running in system memory
  7. A method of validating a particular entity's or individual's unique credentials
  8. A program that runs in the background without the need for human intervention. Also known as a service
  9. Identifier for a value that can change during program execution
  10. Series of simple or complex commands, parameters, variables, and other components stored in a text file and processed by a shell interpreter
  11. The theoretically indecipherable fixed-length output of the hashing process. Also known as hashed value
  12. Command-line text editor that extends the original vi software

22 Clues: A reference to a specific location on a file systemA human-readable name that identifies a network hostCommand-line text editor that extends the original vi softwareIdentifier for a value that can change during program executionSoftware program that has been executed and is running in system memory...

CyberCrossWord 2022-05-20

CyberCrossWord crossword puzzle
Across
  1. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  2. Assures that a system performs its intended function in an unimpaired manner
  3. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  4. Preserving authorized information access, or disclosure
  5. The conversion of plaintext data into unintelligible form
  6. A potential security harm to an asset
  7. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. An attempt to alter system resources or affect their operation
  9. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  10. Weakness in an information system
  11. Assures that information and programs are changed only in a specified and authorized manner
  12. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  13. A decoy system designed to lure a potential attacker away from critical systems
  14. Assures that systems work promptly and service is not denied to authorized users
  15. Assures that a system performs its intended function in an unimpaired manner
Down
  1. A plastic card that can store and process data
  2. Confidentiality, integrity, and availability
  3. Key A temporary encryption key used between two principals
  4. Function used to protect passwords that are stored in the local database
  5. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  6. The process of verifying an identity by or for a system
  7. Assures that private information is disclosed to unauthorized individuals
  8. Program that can replicate itself and send copies from computer to computer across network connections
  9. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. Guarding against improper information modification or destruction
  11. Attack An attempt to learn or make use of information from the system that does not affect system resources
  12. A program that takes over another computer and it's used to launch attacks
  13. A random value that is concatenated with a password
  14. The output of an encryption algorithm; the encrypted form of a message or data
  15. Code embedded in a program that copies itself and performs unwanted function

30 Clues: Weakness in an information systemA potential security harm to an assetConfidentiality, integrity, and availabilityA plastic card that can store and process dataA random value that is concatenated with a passwordThe process of verifying an identity by or for a systemPreserving authorized information access, or disclosure...

Chapter 6-8 Crossword 2024-03-28

Chapter 6-8 Crossword crossword puzzle
Across
  1. the act of granting a user access to a system resource
  2. extra information that describes data, like location information or author information
  3. measurements of the unique characteristics of an individual
  4. a phishing attack aimed at a high-value individual like a CEO
  5. is the act of a user claiming an identity
  6. the most common form of a breach
  7. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  8. a physical device assigned to a user that can generate a unique code
  9. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  10. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  11. the act of verifying or proving a user's claim to an identity
  12. a type of malware disguised as legitimate software such as a game or a utility application
  13. security principle that ensures information is only modified in an authorized manner
  14. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  15. software that provides protection against computer viruses and many other forms of malware
Down
  1. aspect of a computer that can be used to breach security
  2. a case of unauthorized computer access
  3. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  4. security principle that ensures information is only disclosed or made available to authorized users
  5. security principle that ensures information is accessible by authorized users whenever required
  6. the process of adding geographical identification to a device
  7. any software developed to compromise the confidentiality, integrity, or availability of data
  8. A standardized set of rules for formatting and processing data
  9. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  10. notification sent by an authentication server to a mobile device associated with a user
  11. a protected environment where suspicious files can be run
  12. intelligence derived from publicly available information on an individual or organization
  13. control which users, groups, or services can perform an action on a file
  14. special codes used to decode data
  15. an authentication method that uses only one authentication factor to verify a claimed identity

30 Clues: the most common form of a breachspecial codes used to decode dataa case of unauthorized computer accessis the act of a user claiming an identitythe act of granting a user access to a system resourceaspect of a computer that can be used to breach securitya protected environment where suspicious files can be run...

Payment Card Industry and Security 2024-04-10

Payment Card Industry and Security crossword puzzle
Across
  1. The process of securely storing cardholder data after a transaction has been authorized (11 letters)
  2. Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
  3. A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
  4. Dividing networks or systems into distinct sections to enhance security (18 letters)
  5. A practice of restricting access to cardholder data only to those who require it (13 letters)
  6. The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
  7. Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
  8. Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
  9. Established rules or procedures for communication and data exchange (17 letters)
  10. This document outlines security requirements for organizations that handle cardholder information (3 letters)
  11. Illicit practice of capturing payment card data from legitimate transactions (15 letters)
  12. Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
  13. The process of securely destroying or rendering cardholder data unusable (16 letters)
  14. The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
  1. A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
  2. Term for a system or process that logs and monitors activities within a network or system (9 letters)
  3. Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
  4. This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
  5. The process of making cardholder data unreadable using cryptographic methods (10 letters)
  6. Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
  7. A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
  8. Established rules or principles governing behavior or actions (16 letters)
  9. Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
  10. The act of deliberately tricking a person or system into revealing confidential information (8 letters)
  11. Term for an unauthorized individual gaining access to cardholder data (10 letters)
  12. Wallets Electronic systems for storing and managing payment information securely (12 letters)

26 Clues: Established rules or principles governing behavior or actions (16 letters)Flaws or weaknesses in systems that can be exploited by attackers (15 letters)Established rules or procedures for communication and data exchange (17 letters)Systems Mechanisms employed to thwart potential threats or attacks (13 letters)...

Block 8 Investments 2022-11-21

Block 8 Investments crossword puzzle
Across
  1. account is a bank account used by depositors to accumulate money for future use.
  2. bank is a financial institution that provides services for businesses.
  3. account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
  4. someone who assists you with purchasing stocks and bonds.
  5. bond is a security that pays interest over terms of ten to thirty years.
  6. accounts that need to pay for security purchases within three business days of order.
  7. capital market selling stocks and bonds directly to public investors.
  8. institution is a financial institution that does not accept deposits.
  9. firm is a financial institution that is involved in trading securities in financial markets.
  10. company is a financial institution that makes money by issuing loans; loan company.
  11. is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
  12. deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
  13. note is a security that pays interest over terms ranging from two to ten years.
  14. accounts for sophisticated investors who borrow money to purchase securities.
Down
  1. is a document guaranteeing payment of a specific amount of money; payer named on document.
  2. Transaction Documents that are confirmation statements are issued after the sale of stocks.
  3. are required to apply for Credit cards.
  4. union is a nonprofit financial institution that is privately owned and provides banking services for its members.
  5. the document that discloses financial information about the company and is filed with the SEC.
  6. cards allow customers to pay for purchases and withdraw cash.
  7. system is the mechanism a nation uses to provide and manage money for itself.
  8. capital market stockholders buy and sell shares of stock from one another with the help of brokers.
  9. it is against the law for investors to act on this kind of information.
  10. Corporations where shares can be traded openly.
  11. Federal Reserve System is the _____ bank of united states.
  12. Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
  13. bill is a security that matures in a year or less.
  14. banks are largest category of deposit institution.
  15. is a financial investment issued by a corporation, government, or other organization.
  16. companies are for-profit businesses that sell insurance products.

30 Clues: are required to apply for Credit cards.Corporations where shares can be traded openly.bill is a security that matures in a year or less.banks are largest category of deposit institution.someone who assists you with purchasing stocks and bonds.Federal Reserve System is the _____ bank of united states....

Investment strategies 2022-11-21

Investment strategies crossword puzzle
Across
  1. note is a security that pays interest over terms ranging from two to ten years.
  2. Corporations where shares can be traded openly.
  3. company is a financial institution that makes money by issuing loans; loan company.
  4. is a financial investment issued by a corporation, government, or other organization.
  5. cards allow customers to pay for purchases and withdraw cash.
  6. account is a bank account used by depositors to accumulate money for future use.
  7. accounts for sophisticated investors who borrow money to purchase securities.
  8. it is against the law for investors to act on this kind of information.
  9. bill is a security that matures in a year or less.
  10. is a document guaranteeing payment of a specific amount of money; payer named on document.
  11. bank is a financial institution that provides services for businesses.
  12. is a written order for the bank to pay a specific amount to the person or organization to which the check is written.
  13. Transaction Documents that are confirmation statements are issued after the sale of stocks.
  14. union is a nonprofit financial institution that is privately owned and provides banking services for its members.
  15. capital market selling stocks and bonds directly to public investors.
  16. capital market stockholders buy and sell shares of stock from one another with the help of brokers.
Down
  1. Corporations are a Vast majority of U.S. corporations and shares are not sold publicly.
  2. system is the mechanism a nation uses to provide and manage money for itself.
  3. firm is a financial institution that is involved in trading securities in financial markets.
  4. the document that discloses financial information about the company and is filed with the SEC.
  5. bond is a security that pays interest over terms of ten to thirty years.
  6. are required to apply for Credit cards.
  7. deposits are a type of EFT transaction; money is deposited directly into a customer’s checking account.
  8. companies are for-profit businesses that sell insurance products.
  9. someone who assists you with purchasing stocks and bonds.
  10. Federal Reserve System is the _____ bank of united states.
  11. institution is a financial institution that does not accept deposits.
  12. account is a bank account that allows the account owner to make deposits, write checks, and withdraw money.
  13. accounts that need to pay for security purchases within three business days of order.
  14. banks are largest category of deposit institution.

30 Clues: are required to apply for Credit cards.Corporations where shares can be traded openly.bill is a security that matures in a year or less.banks are largest category of deposit institution.someone who assists you with purchasing stocks and bonds.Federal Reserve System is the _____ bank of united states....

FICA Taxes 2024-09-12

FICA Taxes crossword puzzle
Across
  1. the amount of income subject to Social Security tax
  2. both Social Security tax and Medicare tax
  3. a percentage of each worker's salary taken out of each paycheck, up to a set maximum amount per year for Social Security benefits
  4. a nine-digit number used by government keeps records of the amounts that you have paid to Social Security and Medicare
Down
  1. provides income for people after they retire, pays benefits to disabled workers, pays death benefits to surviving family members
  2. the nation's largest health insurance program for people 65 years of age and older and some disabled people under age 65
  3. when someone uses your personal information to open accounts, file taxes, or make purchases under your name
  4. Federal Insurance Contributions Act

8 Clues: Federal Insurance Contributions Actboth Social Security tax and Medicare taxthe amount of income subject to Social Security taxwhen someone uses your personal information to open accounts, file taxes, or make purchases under your name...

Global Security Culture Program 2025-09-18

Global Security Culture Program crossword puzzle
Across
  1. Zones The main content of the second activity.
  2. levels Security measure distributed based on job role
  3. The process by which all individuals and objects are screened going into and out of the Red Zone. - CICO
Down
  1. Force Open An alarm that will be triggered when someone opens a door without receiving "access granted" (green light)
  2. Zone Security Zone that inside building, out side secured data hallCustomer Data The MOST important asset within our Red Zone data hallBreakaway connector Safety mechanism to prevent choking/strangulation hazard
  3. Zone Security Zone that inside fence line, outside building
  4. Amazon data centers use the what system to securely manage physical keys, which can control access permissions and track key usage history.
  5. Risk Media Bin Keys belongs to which Key Risk Matrix.

8 Clues: Zones The main content of the second activity.Risk Media Bin Keys belongs to which Key Risk Matrix.levels Security measure distributed based on job roleZone Security Zone that inside fence line, outside buildingThe process by which all individuals and objects are screened going into and out of the Red Zone. - CICO...

Mr. Lewin's Computer Security Crossword 2014-10-21

Mr. Lewin's Computer Security Crossword crossword puzzle
Across
  1. A person who intentionally breaks into computer systems illegally, or just somebody who knows a lot about the details of how computers and networks work.
  2. Malicious (bad) software. Any software that is designed to do things that you wouldn't want it to.
  3. A secret phrase or word used to confirm somebody's identity.
  4. A procedure for verifying the identity of a user or machine before giving access to a computer system.
  5. A program that has had its security features removed, or a program designed to remove the security features of another program.
  6. A website or e-mail that pretends to be from someone you trust (like a bank, or a friend) to trick you into revealing your password or other account information.
  7. A program that records all the keys being pressed by a user. Can be used by hackers, but also common in businesses and schools.
  8. Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam.
Down
  1. A program used to track the user's actions or preferences. Usually the goal is to collect information that can be sold to other companies.
  2. A "hole" in a security system, often used to allow remote access to a system. Sometimes these are made by programmers on purpose, but they can also be the result of a virus.
  3. Software that controls what data is allowed to travel between your computer and the outside world.
  4. A program that can copy itself automatically, without requiring direct human action, usually by mass e-mailing itself out to an infected user's contacts.
  5. An attempt to break through a security system designed to protect a computer.
  6. A program that looks like useful software, but hides something bad (usually a virus) inside.
  7. Data that has been modified so that meaninful information looks like random, meaningless 1s and 0s.
  8. A behaviour of a program that the designers did not intend, especially one that causes the program to crash, or creates an opening for hackers.
  9. A program that can copy itself by “infecting” other programs.
  10. A network of computers, infected by a virus that allows them to be remotely controlled by a hacker

18 Clues: A secret phrase or word used to confirm somebody's identity.A program that can copy itself by “infecting” other programs.An attempt to break through a security system designed to protect a computer.Unwanted e-mail sent to a lot of people at once, usually for advertising, or for a scam....

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
  2. A bridge between two networks that connects using different protocols.
  3. A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
  4. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  5. A firewall setting that separates LAN of an organization from the external network.
  6. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  7. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  8. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  9. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
  1. Protocol that is meant for uploading and downloading files.
  2. A bundle of programs that is designed to bombard users with advertisements.
  3. A computer program that keeps a log of your keystrokes on your keyboard.
  4. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  5. A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
  6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

16 Clues: Protocol that is meant for uploading and downloading files.A bridge between two networks that connects using different protocols.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements....

travel vocab 2022-11-29

travel vocab crossword puzzle
Across
  1. arrival
  2. bathing suit
  3. suitcase
  4. airport
  5. monitor
  6. to confirm a flight
Down
  1. to check ones luggage
  2. departure
  3. to pack a suitcase
  4. to travel
  5. passport
  6. flight
  7. roundtrip ticket
  8. to go through security

14 Clues: flightarrivalairportmonitorpassportsuitcasedepartureto travelbathing suitroundtrip ticketto pack a suitcaseto confirm a flightto check ones luggageto go through security

social media 2020-03-31

social media crossword puzzle
Across
  1. media platform
  2. unknown people
  3. meeting people
  4. popular media
  5. idols
  6. year old
  7. mass communication
Down
  1. secure
  2. and conditions
  3. another word for talking
  4. humans
  5. no public attention
  6. global computer network
  7. world

14 Clues: worldidolssecurehumansyear oldpopular mediamedia platformand conditionsunknown peoplemeeting peoplemass communicationno public attentionglobal computer networkanother word for talking

A Modest Proposal 2022-04-08

A Modest Proposal crossword puzzle
Across
  1. Security, Guarantee
  2. Disgraceful, Shameful
  3. Garments, Apparel
  4. Injustice, Wrong
  5. Nutriment, Nourishment
  6. Huge, Enormous
  7. Overload, Overfill
  8. Beg, Pester
Down
  1. Accountable, Chargeable
  2. Calculation, Counting
  3. Mockery, Ridicule
  4. Sadness, Sorrow
  5. Gifts, Charity
  6. Basics, Fundamentals

14 Clues: Beg, PesterGifts, CharityHuge, EnormousSadness, SorrowInjustice, WrongMockery, RidiculeGarments, ApparelOverload, OverfillSecurity, GuaranteeBasics, FundamentalsCalculation, CountingDisgraceful, ShamefulNutriment, NourishmentAccountable, Chargeable

mfec 2022-03-20

mfec crossword puzzle
Across
  1. data security
  2. measuring data
  3. collecting data
  4. database
  5. one of our motto
  6. environmental friendly
  7. what is this event?
  8. a type of crypto
  9. synergy partner
Down
  1. our strategic partner
  2. judgement making
  3. our strategic partner
  4. our strategic partner
  5. collection of investments
  6. necessary
  7. original crypto
  8. our strategic partner
  9. digital currency
  10. trading mechanism
  11. technology related to finance

20 Clues: databasenecessarydata securitymeasuring dataoriginal cryptocollecting datasynergy partnerjudgement makingdigital currencyone of our mottoa type of cryptotrading mechanismwhat is this event?our strategic partnerour strategic partnerour strategic partnerour strategic partnerenvironmental friendlycollection of investmentstechnology related to finance

Some important words for the exam 2022-01-25

Some important words for the exam crossword puzzle
Across
  1. saying nasty things to people on the internet is called cyber...
  2. teenagers use social media a lot, so their media ... is high
  3. you cut food with it
  4. a lot of churches have a clock on their ...
  5. a hotdog is a ... in a bread roll
  6. Instagram, Whatsapp, Facebook, Tik-tok are all social ...
  7. you can drink from it
Down
  1. not nice, nit friendly
  2. it's black and you can make a fire with it
  3. people singing together in a group
  4. a legendary creature in fantasy stories
  5. it makes food taste sweet
  6. students carry their books in it
  7. to make somebody angry
  8. calling other people 'dumbass' is bad ...
  9. at the start of the school-year getting up early was hard for me, but now I'm ... to it

16 Clues: you cut food with ityou can drink from itnot nice, nit friendlyto make somebody angryit makes food taste sweetstudents carry their books in ita hotdog is a ... in a bread rollpeople singing together in a groupa legendary creature in fantasy storiescalling other people 'dumbass' is bad ...it's black and you can make a fire with it...

My Topologies 2022-06-24

My Topologies crossword puzzle
Across
  1. ___________ is hidden software that monitors and collects information about you and your surfing habits.
  2. Within cyber security a weakness that can compromise a system is known as a _______
  3. What tool is used to get through a vulnerability other than the key
  4. In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
  5. A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
  6. the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
  7. involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
  8. ____ _________ is when two or more servers have the same information stored on it
  9. A ________ virus is a program that you are tricked into installing because you thought the application did something useful
  10. another term used to describe Eavesdropping attacks
  11. ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
  1. A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
  2. What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
  3. With a _________________ the hacker uses multiple systems to attack a single target system
  4. the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
  5. type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
  6. _______ is the concept of ensuring that system will continue to function after a disaster.
  7. Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
  8. What is used when an attacker compromises the network or system through social interaction with an individual

19 Clues: another term used to describe Eavesdropping attacksWhat tool is used to get through a vulnerability other than the key____ _________ is when two or more servers have the same information stored on itWithin cyber security a weakness that can compromise a system is known as a _______...

A Dog Day Afternoon 2019-03-06

A Dog Day Afternoon crossword puzzle
Across
  1. Ravishing Redhead
  2. Mexican State
  3. Turner's Hooch
  4. The Crime Dog
  5. Firehouse Favorite
  6. Deutschland Herder
  7. Security Guard
  8. Speed King
  9. Peek-a-boo Hairdo
Down
  1. Beethoven Pedigree
  2. Sled Propeller
  3. Yellow Go Getter
  4. Lassie Lineage
  5. PA State Dog
  6. Georgia's Uga
  7. Pampered Pooch
  8. Snoopy is One
  9. Gives Directions

18 Clues: Speed KingPA State DogMexican StateThe Crime DogGeorgia's UgaSnoopy is OneSled PropellerTurner's HoochLassie LineagePampered PoochSecurity GuardYellow Go GetterGives DirectionsRavishing RedheadPeek-a-boo HairdoBeethoven PedigreeFirehouse FavoriteDeutschland Herder

The Egypt Game-2 2021-10-07

The Egypt Game-2 crossword puzzle
Across
  1. with each other
  2. doubt or nervousness
  3. protection
  4. unbelief or sorrow
  5. old or ancient relic
  6. bow or obey
  7. fits or seizures
  8. decode
  9. very loud
Down
  1. trade
  2. visit by ghosts
  3. awkward
  4. Egyptians made paper with the form of grass
  5. helper
  6. annoyed
  7. Egyptian garment, possibly seamless
  8. information
  9. likely

18 Clues: tradehelperlikelydecodeawkwardannoyedvery loudprotectionbow or obeyinformationvisit by ghostswith each otherfits or seizuresunbelief or sorrowdoubt or nervousnessold or ancient relicEgyptian garment, possibly seamlessEgyptians made paper with the form of grass

word study lesson 2022-03-07

word study lesson crossword puzzle
Across
  1. 3
  2. 1
  3. 4
  4. 2
  5. 5
Down
  1. 9
  2. 10
  3. 8
  4. 6
  5. 7

10 Clues: 93814627510

random 2022-03-10

random crossword puzzle
Across
  1. 7
  2. 1
  3. 8
  4. 3
  5. 6
Down
  1. 5
  2. 10
  3. 9
  4. 2
  5. 4

10 Clues: 75921843610

a million dollars in a mattress 2014-07-21

a million dollars in a mattress crossword puzzle
Across
  1. קנה
  2. מזרן
  3. גילה
  4. ביטחון
  5. בנדיבות
  6. מערכת
Down
  1. שומרים
  2. פרופורציה
  3. החלטה
  4. חסכונות

10 Clues: קנהמזרןגילההחלטהמערכתשומריםביטחוןבנדיבותחסכונותפרופורציה