cyber security Crossword Puzzles
NASS 2015-07-01
Unidad 1 ¡Vamos de viaje! Español 2 2022-09-22
Weird words 2020-09-29
Spanish Airport 2022-10-06
Food defense 2023-05-30
Food defense 2023-05-30
Review Vocab_7/3/2023 2023-07-03
g 2024-05-16
My home is my castle 2023-10-09
jdchiu 2024-04-21
CIMUN XV 2014-01-20
Across
- One of the six main organs of the UN, and is charged with the maintenance of international peace and security.
- CIMUN has 20 of these.
- Committee that promotes international economic and social cooperation.
- The vested power or constitutional right of one country to refuse approval of measures proposed by another country in the Security Council.
- One of the six main organs of the UN, and the only one in which all members have equal representation. One of its powers is to oversee the budget of the UN.
- You must use this to participate, not your hand.
- A means of solving a problem or dealing with a difficult situation.
Down
- A title given to the principal administrator of some organizations, most notably the United Nations.
- Month when the UN was created.
- This organization was replaced by the UN after its failure.
- A person who represents a country in a Model UN simulation.
- A fundamental aspect to being a good delegate (starts with L).
- An official legislative or other assembly whose duty includes maintaining order and security, and is also the Master of Ceremony of CIMUN.
- CIMUN has 4 of these and are the most important part of this event.
14 Clues: CIMUN has 20 of these. • Month when the UN was created. • You must use this to participate, not your hand. • This organization was replaced by the UN after its failure. • A person who represents a country in a Model UN simulation. • A fundamental aspect to being a good delegate (starts with L). • CIMUN has 4 of these and are the most important part of this event. • ...
PT IO.net Crosswords 2024-10-22
Across
- Allows renting computing power for __ tasks.
- Individuals or ___ can use the platform to rent resources.
- IO Worker offers globally scalable and ___ resources.
- Key security feature for monitoring access and performance.
Down
- A key task focus for IO Worker (___ Learning).
- IO Worker enables individuals to generate ___.
- Users can monitor resource ___.
- Type of hardware resource rented (___ or CPU).
- Maintains full control over rented ___.
- A key trait of ___ platforms like IO Worker.
10 Clues: Users can monitor resource ___. • Maintains full control over rented ___. • Allows renting computing power for __ tasks. • A key trait of ___ platforms like IO Worker. • A key task focus for IO Worker (___ Learning). • IO Worker enables individuals to generate ___. • Type of hardware resource rented (___ or CPU). • IO Worker offers globally scalable and ___ resources. • ...
CS II Extra Credit Crossword 2025-02-03
Across
- An acronym used for the order of operations.
- These confirm the identity and authenticity of websites.
- These accounts are responsible for security updates.
- Backs up everything on your computer.
Down
- The data type for whole numbers.
- A list that cannot be changed.
- The data type for decimal numbers.
- These address and fix security vulnerabilities.
- A set of agreed upon rules and permissions.
- A program that replicates and spreads malicious code.
10 Clues: A list that cannot be changed. • The data type for whole numbers. • The data type for decimal numbers. • Backs up everything on your computer. • A set of agreed upon rules and permissions. • An acronym used for the order of operations. • These address and fix security vulnerabilities. • These accounts are responsible for security updates. • ...
A Modest Proposal 2022-04-08
14 Clues: Beg, Pester • Huge, Enormous • Gifts, Charity • Sadness, Sorrow • Injustice, Wrong • Mockery, Ridicule • Garments, Apparel • Overload, Overfill • Security, Guarantee • Basics, Fundamentals • Calculation, Counting • Disgraceful, Shameful • Nutriment, Nourishment • Accountable, Chargeable
Al-Asma Al-Husna 2014-12-28
14 Clues: The just • The king • The light • The judge • All loving • All seeing • The creator • All knowing • All hearing • The forgiver • The generous • Most merciful • The rewarding • Peace, Security
Vigilance Awareness Week Crossword challenge - 2023 2023-10-30
14 Clues: - न्याय (Nyay) • - कांड (Kaand) • - जाँच (Jaanch) • - नैतिक (Naitik) • – निवारण (nivaaran) • – शिकायत (Shikaayat) • – सुरक्षा (suraksha) • – मेहनती (mehanatee) • - नैतिकता (Naitikta) • - जवाबदेही (Javabdehi) • – प्रवर्तन (Pravartan) • - ईमानदारी (Imaandaari) • - पारदर्शिता (Paardarshita) • - भ्रष्टाचार (bhrashtachar)
MFEC 2022 2022-03-14
Across
- judgement making
- necessary
- digital currency
- our strategic partner
- collection of investments
- our strategic partner
- database
- environmental friendly
- technology related to finance
- collecting data
Down
- data security
- one of our motto
- synergy partner
- what is this event?
- measuring data
- a type of crypto
- trading mechanism
- our strategic partner
- original crypto
- our strategic partner
20 Clues: database • necessary • data security • measuring data • synergy partner • original crypto • collecting data • judgement making • one of our motto • digital currency • a type of crypto • trading mechanism • what is this event? • our strategic partner • our strategic partner • our strategic partner • our strategic partner • environmental friendly • collection of investments • technology related to finance
Escuela Trabajos 2025-09-23
Across
- – Director / Directora
- – Secretario / Secretaria
- – Cocinero / Cocinera
- – Consejero / Consejera
- – Estudiante
- – Bibliotecario / Bibliotecaria
- – Ayudante de maestro
- de autobús
- – Maestro / Maestra
Down
- Guard – Guardia de seguridad
- – Psicólogo / Psicóloga
- Driver – Conductor de autobús/
- – Enfermero / Enfermera
- – Custodio
- Worker – Trabajador social / Trabajadora social
- Principal - Subdirector/ Subdirectora
- – Entrenador / Entrenadora
17 Clues: – Custodio • de autobús • – Estudiante • – Maestro / Maestra • – Cocinero / Cocinera • – Ayudante de maestro • – Director / Directora • – Psicólogo / Psicóloga • – Enfermero / Enfermera • – Consejero / Consejera • – Secretario / Secretaria • – Entrenador / Entrenadora • Guard – Guardia de seguridad • Driver – Conductor de autobús/ • – Bibliotecario / Bibliotecaria • ...
Working conditions 2021-01-17
18 Clues: gig • money • harsh • plant • labour • salary • manager • security • sell abroad • staff member • very precious • covered in dust • make things better • you may find gold there • protects workers' rights • country in Southern Africa • cloth made by hand or machine • receive money for the work you do
Izadora elmore 2014-12-10
Across
- bully someone that bullies online.
- restricted computer network.
- RESOURCE LOCATOR (URL) – Full website address.
- that damages files on computer that receives it.
- renew or revitalize; To reload a webpage on the internet
- a system of connected computers that allows the sharing of files
Down
- OPERATORS–Using keywords such as AND,OR,NOT in web searches
- a list of citations that appear at the end of a paper
- network etiquette; Online manners
- NETWORKSonline communities where people meet, socialize
- a person who secretly gains access to computer files.blog-originally known as Web Log.
- TABS the name for a way to display information on websites.
12 Clues: restricted computer network. • network etiquette; Online manners • bully someone that bullies online. • RESOURCE LOCATOR (URL) – Full website address. • that damages files on computer that receives it. • a list of citations that appear at the end of a paper • NETWORKSonline communities where people meet, socialize • ...
Cybertrafficking Crossword Puzzle 2024-04-23
Across
- I am a person who has been trafficked by another person. Who am I?
- Children can be vulnerable to ___ grooming.
- Aspect of trafficking that does not need to be present in order for a situation to be considered child trafficking.
- The emoji cherries means ___.
- The emoji for Dug Use.
- Gender most likely to be trafficking for labour exploitation.
Down
- ___ settings helps to protect sensitive information from strangers.
- ___ are criminal activities carried out using digital technologies.
- Human trafficking is a form of_______ slavery.
- Element of human trafficking.
- _____ scams are messages that try to trick you into providing sensitive information.
- Gender most likely to be trafficked for sexual exploitation.
12 Clues: The emoji for Dug Use. • Element of human trafficking. • The emoji cherries means ___. • Children can be vulnerable to ___ grooming. • Human trafficking is a form of_______ slavery. • Gender most likely to be trafficked for sexual exploitation. • Gender most likely to be trafficking for labour exploitation. • ...
PPKN KELOMPOK 5 2025-02-22
Across
- Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
- Contoh sikap yang baik di lingkungan sekolah adalah?
- Negara Kesatuan Republik Indonesia di singkat menjadi?
- Sebutan lain dari kata serangan (Siber) adalah?
- Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
- Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
Down
- Pernyataan bersama, merupakan pengertian dari kata?
- Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
- Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
- Sebutan lain dari tantangan dari luar?
- Toleransi juga mengandung makna?
- Sebutan lain dari tantangan dari dalam?
12 Clues: Toleransi juga mengandung makna? • Sebutan lain dari tantangan dari luar? • Sebutan lain dari tantangan dari dalam? • Sebutan lain dari kata serangan (Siber) adalah? • Pernyataan bersama, merupakan pengertian dari kata? • Contoh sikap yang baik di lingkungan sekolah adalah? • Negara Kesatuan Republik Indonesia di singkat menjadi? • ...
Chapter 11 Credit and Debt 2013-03-19
Across
- a primary party that agrees to pay off a debt just as the debtor would have
- a type of loan that is backed up by property that the creditor can take if the loan is not repaid
- this type of loan does not require any collateral and has higher interest
- a piece of property that is used as security interest
- when you receive something now, but pay later
- what lenders want in case the borrower does not pay
Down
- paying with this saves money when buying a car and puts you in a better position to negotiate for a lower price
- a fee you must pay to the party lending you money
- a second party that agrees to pay of a debt only if debtor defaults
- this is done to a security interest so that it is against the claims of other creditors
- sells goods on lends money to the debtor
- in order to get this, lenders will look at your credit history, income, and assets to decide whether or not you’re a good credit risk
- failure to make payments for a loan on time
- person who buys the goods from the creditor
14 Clues: sells goods on lends money to the debtor • failure to make payments for a loan on time • person who buys the goods from the creditor • when you receive something now, but pay later • a fee you must pay to the party lending you money • what lenders want in case the borrower does not pay • a piece of property that is used as security interest • ...
Jasmine Lee 2020-10-16
5 Clues: DOZ class • Family of ambition • Acronym for one of their majors • Number of people in your big's class • ___ and cyber operations (their other major)
Suffix -ity 2017-05-26
Test-5: People 2021-11-09
oral anglais 2024-12-18
site 2025-07-12
Crossword Puzzle 2022-12-21
Cyber Safety Crossword 2013-11-03
Across
- A response to a post
- Being mean or harassing a person online
- Where you can talk to others online
- You use this to get into private things
- A software downloaded onto you computer without you knowing
Down
- A mail message online
- A pretend name to protect others you don't know knowing your real name
- A place were cyberbullying happens a lot
- A website of your own
- An update or message
10 Clues: A response to a post • An update or message • A mail message online • A website of your own • Where you can talk to others online • Being mean or harassing a person online • You use this to get into private things • A place were cyberbullying happens a lot • A software downloaded onto you computer without you knowing • ...
Cyber Safety Challenge 2024-08-11
Across
- This is a trick that fools you and gets your information. What is it?
- Getting a text message asking for your personal information is called what?
- This hides in your computer and can mess up your files. What is it?
- Receiving a phone call asking for your personal information is called what?
- A strong one keeps your accounts safe. What is it?
Down
- This type of attack locks your computer and demands money to unlock it.
- What should you pay close attention to when checking an email for signs of phishing?
- If you see something wrong with your work email or computer, who should you tell?
- What part of a website address should you check to see if it's legitimate?
- Most cyberattacks start with a mistake made by whom?
10 Clues: A strong one keeps your accounts safe. What is it? • Most cyberattacks start with a mistake made by whom? • This hides in your computer and can mess up your files. What is it? • This is a trick that fools you and gets your information. What is it? • This type of attack locks your computer and demands money to unlock it. • ...
Cyber Quiz Practice 2025-08-20
Across
- What is the act of pretending to be someone else online?
- Which component is responsible for a robot's movement?
- What is the full form of WLAN?
- What term describes an incident where sensitive data is accessed or stolen without authorisation?
Down
- The process of breaking an image into parts is called?
- What is the shortcut key to insert a track change in MS Word?
- What is the length of IPv6 address?
- Who invented electric motor in 1873?
- Which Indian state government has partnered with Google Cloud to launch a digital platform for agriculture using AI and Beacon technology?
- What small file stores information about user preferences online?
10 Clues: What is the full form of WLAN? • What is the length of IPv6 address? • Who invented electric motor in 1873? • The process of breaking an image into parts is called? • Which component is responsible for a robot's movement? • What is the act of pretending to be someone else online? • What is the shortcut key to insert a track change in MS Word? • ...
¡Vamos de viaje! 2022-07-25
19 Clues: gate • flight • arrival • airport • bus stop • to board • departure • passenger • train station • baggage claim • tourist office • to take a taxi • to get in line • monitor; screen • flight attendant • to go through customs • to go through security • to check one’s luggage • Can you please tell me where is?
Crossword - Voltedge 2019-09-05
Across
- Tool currently used for onboarding
- Company wide EHS system of record
- Tool replacing Oracle HR
- Portal to view security emergency contact and other security info
- Source data for deriving dollar thresholds
Down
- Measure based on the deviations of individual scores from the mean
- Final numerical metric of Compliance Analytics
- One of the focus areas of EHS
- CDA application is hosted here
- Deep learning architecture used in CDA application
10 Clues: Tool replacing Oracle HR • One of the focus areas of EHS • CDA application is hosted here • Company wide EHS system of record • Tool currently used for onboarding • Source data for deriving dollar thresholds • Final numerical metric of Compliance Analytics • Deep learning architecture used in CDA application • ...
Crossword Puzzle 2024-10-16
Across
- A secure way to connect to the internet
- A harmful software designed to damage systems
- the act of keeping software up to date
- manipulated video or audio that appears real
- Deepfake videos often use this type of technology
Down
- A type of software that prevents malware
- Nike Chief Information Security Officer
- A digital criminal
- A term for unsolicited emails
- A strong, unique code used for account security
10 Clues: A digital criminal • A term for unsolicited emails • the act of keeping software up to date • A secure way to connect to the internet • Nike Chief Information Security Officer • A type of software that prevents malware • manipulated video or audio that appears real • A harmful software designed to damage systems • A strong, unique code used for account security • ...
Cyber Space Safety 2013-11-03
Across
- Abuse of technology and the internet
- Software that is harmful to your computer by, spreading cookies and making copies of itself
- A series of secret letter or numbers that unlock a computer etc.
- Internet software on Apple appliances
Down
- Mail that is sent using technology and the internet
- Using information from the internet and not referencing it in your bibliography
- A weblog that is on the internet, often a diary or journal
- A harmful software program that erases your computer and gives it problems
- An advertisement that often appears on top of another window
- Wireless internet on technology
10 Clues: Wireless internet on technology • Abuse of technology and the internet • Internet software on Apple appliances • Mail that is sent using technology and the internet • A weblog that is on the internet, often a diary or journal • An advertisement that often appears on top of another window • A series of secret letter or numbers that unlock a computer etc. • ...
Cyber Bullying feelings 2022-05-10
Across
- When you have no one to talk to
- When you feel like something will harm you
- Another word for mad
- Being scared of something
- The feeling like there is no hope
- The feeling like you need a break
Down
- You feel this way when someone laughs at you
- The feeling that you have done something wrong
- The opposite of Happy
- Feeling very low
10 Clues: Feeling very low • Another word for mad • The opposite of Happy • Being scared of something • When you have no one to talk to • The feeling like there is no hope • The feeling like you need a break • When you feel like something will harm you • You feel this way when someone laughs at you • The feeling that you have done something wrong
Cyber/Digital Literacy 2024-11-06
Across
- Type of crime that uses computers or networks harm.
- It is use protect your personal information
- It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
- Type of malware that can make copies of itself and spread automatically across computers in a network.
- typing targeted keywords about a subject into a search engine.
Down
- Bullying that takes place online using your smartphone, tablet and computer
- Who's actively participate in cyberspace and the online community offered through the internet
- An example of computer virus
- Refers to the trail of data you leave when using the internet.
- Assessing the credibility, reliability, and relevance of the information found online.
10 Clues: An example of computer virus • It is use protect your personal information • Type of crime that uses computers or networks harm. • Refers to the trail of data you leave when using the internet. • typing targeted keywords about a subject into a search engine. • Bullying that takes place online using your smartphone, tablet and computer • ...
Cyber Awareness Week 2025-09-23
Across
- When someone manipulates an email that tricks you into doing something against your better judgement
- An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
- Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- A person who uses uses malicious tactics to gain unauthorised access to systems and data
- Harmful computer programs used by hackers to steal information, gain access or lock your device
- The address of a webpage (acronym)
- Should be long, complex and not contain any personally identifiable information (like your dogs name)
- Widely used technology that allows for the wireless connection between a device and a router
- Never click on a ___ in an email unless you are sure that it's genuine
10 Clues: The address of a webpage (acronym) • Never click on a ___ in an email unless you are sure that it's genuine • A person who uses uses malicious tactics to gain unauthorised access to systems and data • Widely used technology that allows for the wireless connection between a device and a router • ...
Golis 1c 2024-02-27
Across
- ogólny termin określający złośliwe oprogramowanie
- wysyłanie innym osobom przez internet lub telefon swoich intymnych zdjęć lub filmów
- obejmuje wszystkie rodzaje złośliwego oprogramowania
- zasady zachowania, które odpowiadają na pytanie: jak zachowywać się w internecie
- nieautoryzowane działanie polegające na naruszaniu zabezpieczeń systemów informatycznych
- przemoc z użyciem urządzeń elektronicznych
- skrót od fear of missing out
- kontekście cyber odnosi się do zdalnych technik i narzędzi w celu uzyskania nieautoryzowanego dostępu do systemów komputerowych
Down
- zamierzona i konsekwentna formuła przekazu informacji
- jeden z najpopularniejszych typów ataków opartych o wiadomości e-mail lub SMS
- zaawansowana technika manipulacji z użyciem multimedii
- jedna z metod połowu ryb polega na ciągnięciu wędką przynęty na lince lub żyłce za łodzią
- niechciane wiadomości
13 Clues: niechciane wiadomości • skrót od fear of missing out • przemoc z użyciem urządzeń elektronicznych • ogólny termin określający złośliwe oprogramowanie • obejmuje wszystkie rodzaje złośliwego oprogramowania • zamierzona i konsekwentna formuła przekazu informacji • zaawansowana technika manipulacji z użyciem multimedii • ...
A Modest Proposal 2022-04-08
14 Clues: Beg, Pester • Huge, Enormous • Gifts, Charity • Sadness, Sorrow • Injustice, Wrong • Mockery, Ridicule • Garments, Apparel • Overload, Overfill • Security, Guarantee • Basics, Fundamentals • Calculation, Counting • Disgraceful, Shameful • Nutriment, Nourishment • Accountable, Chargeable
PLACES AT ASCHOOL 2025-03-18
Across
- Field Lapangan Olahraga
- Ruang Kelas
- Kamar Mandi
- Yard Halaman Sekolah
- Room Ruang Komputer
- Kantin
- Room Ruang Guru
- Taman Bermain
- Gedung Olahraga
Down
- Laboratorium
- Room Mushola
- Hall Aula Sekolah
- Room Ruang Kesehatan
- Perpustakaan
- Area Area Loker
- Office Ruang Kepala Sekolah
- Room Ruang Musik
- Area TempatParkir
- Post Pos Keamanan
- Room Ruang Seni
20 Clues: Kantin • Ruang Kelas • Kamar Mandi • Laboratorium • Perpustakaan • Taman Bermain • Gedung Olahraga • Room Mushola • Room Ruang Guru • Area Area Loker • Post Pos Keamanan • Area TempatParkir • Hall Aula Sekolah • Room Ruang Komputer • Room Ruang Musik • Room Ruang Seni • ...
¡Vamos de viaje! 2022-07-25
19 Clues: gate • flight • airport • arrival • to board • bus stop • departure • passenger • baggage claim • train station • tourist office • to get in line • to take a taxi • monitor; screen • flight attendant • to go through customs • to go through security • to check one’s luggage • Can you please tell me where is?
Financial Math Crossword 2021-09-17
Across
- an employee benefit plan that gives workers ownership interest in the company
- a number in the format 000-00-0000, unique for each individual, used to track Social Security benefits and for other identification purposes
- a type of business insurance coverage that helps pay for medical expenses and rehabilitation
- any government system that provides monetary assistance to people with an inadequate or no income
- 2 times the normal pay
- the form that benefits are in
- most employers offer this
- FICA
- a base period or reference period is a point in time used as a reference point for comparison with other periods
- a sum of money paid to a patentee for the use of a patent or to an author or composer for each copy of a book sold or for each public performance of a work
- paid twice a month
- when you work at a job covered by social security you must pay
- paychecks are automatically deposited electronically into bank account
- may include maternity, paternity, and adoption leave
- covers all members of the immediate family for health care bills
- compensation that an employee recieves from an employer after retirement
Down
- covers only the employee
- the tax levied on both employers and employees to fund the Social Security program.
- overtime rate; 1.5 times
- salespeople, authors, musicians
- paid a set amount for each hour they work
- government program that offers benefits to eligible employees who have been become unemployed
- paid every two weeks
- a limit on the amount of your earnings that is taxed by Social Security
- any type of employment in which a worker is paid a fixed piece rate for each unit produced or action performed, regardless of time
- the process of determining retirement income goals
- total pay
- lowest hourly rate that can be paid to an employee
- 3 times the normal pay
- extra hours
- days when an employee is paid for taking time off
- greater than the hourly rate for the regular hours
- employees work only a specific number of hours per week
- workers paid according to the amount of items produced
- is a federal employment tax that funds a portion of the Medicare insurance program
35 Clues: FICA • total pay • extra hours • paid twice a month • paid every two weeks • 2 times the normal pay • 3 times the normal pay • covers only the employee • overtime rate; 1.5 times • most employers offer this • the form that benefits are in • salespeople, authors, musicians • paid a set amount for each hour they work • days when an employee is paid for taking time off • ...
Chapter 12 Vocab 2017-04-20
Across
- technology that uses physical characteristics to authenticate
- the most popular asymmetric encryption
- a feature that follows instructions from a special file when new media is inserted
- a LAN that uses radio waves to transmit data between wireless data
- a feature that can be used to encrypt data
- a attack that uses multiple computers to create a large amount of requests to a network server
- a type of malware that records every keystroke made by a user
- the set of rules that governs the delivery of data over a network
- the most popular hashing algorithm
- a feature that allows new media to connect to the computer easily
- a type of hardware that allows connections to peripherals without effort
- a cheat or loophole
- a limited type of text that is at the most basic form
- a old function that takes a message and makes it 128 bits long
- a protocol for receiving email by downloading it from a computer
- a company that provides internet security and has a red color
- a subnetwork that provides services to an untrusted network
Down
- a malware that breaches the security of a computer that appears harmless
- a feature that allows you to encrypt an entire hard drive
- a company that deals with online security
- a person that breaks into code and firewalls with malicious intent
- data that is transmitted or stored without an encryption
- a Windows module that is also used for administration of system settings
- a type of computer made from Lenovo
- a request that is the initial communication to establish a TCP connection
- a company that provides internet security and has a green color
- a protocol that enables devices to add themselves into a network without user interaction
- a malware that replicates itself so it can spread to other computers
- a computer company that made the ThinkPad
- a service that translates URLs to IP addresses that can be exploited to make directions imposter servers
- a MMC file with tools used to create automatic tasks
- the use of radio waves to real and capture data on a tag on hardware
- a type of attack that intercepts data transfer through a network
33 Clues: a cheat or loophole • the most popular hashing algorithm • a type of computer made from Lenovo • the most popular asymmetric encryption • a company that deals with online security • a computer company that made the ThinkPad • a feature that can be used to encrypt data • a MMC file with tools used to create automatic tasks • ...
Chapter 6-8 2024-03-31
Across
- software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
- a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
- a phishing attack aimed at a high-value individual like a CEO
- notification sent by an authentication server to a mobile device associated with a user
- control which users, groups, or services can perform an action on a file
- software that provides protection against computer viruses and many other forms of malware
- measurements of the unique characteristics of an individual
- extra information that describes data, like location information or author information
- the process of adding geographical identification to a device
- a type of malware disguised as legitimate software such as a game or a utility application
- is the act of a user claiming an identity
- an authentication method that uses only one authentication factor to verify a claimed identity
- intelligence derived from publicly available information on an individual or organization
- a case of unauthorized computer access
Down
- a protected environment where suspicious files can be run
- A standardized set of rules for formatting and processing data
- security principle that ensures information is only disclosed or made available to authorized users
- the act of verifying or proving a user's claim to an identity
- aspect of a computer that can be used to breach security
- the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
- special codes used to decode data
- the act of granting a user access to a system resource
- security principle that ensures information is accessible by authorized users whenever required
- emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
- security principle that ensures information is only modified in an authorized manner
- a threat actor who gains unauthorized access to a high-value target for an extended period of time
- a physical device assigned to a user that can generate a unique code
- achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
- any software developed to compromise the confidentiality, integrity, or availability of data
- the most common form of a breach
30 Clues: the most common form of a breach • special codes used to decode data • a case of unauthorized computer access • is the act of a user claiming an identity • the act of granting a user access to a system resource • aspect of a computer that can be used to breach security • a protected environment where suspicious files can be run • ...
Government Abbreviations 2025-12-12
Across
- provides the military forces of the U.S.
- aids local agencies that provide homes for low-income families
- publishes official government publications to congress, federal agencies, etc.
- investigates and enforces justice upon individuals guilty of the most serious crimes
- preserves government records; manages the Presidential Library
- a group of senior military leaders in the Department of Defense
- oversees security exchanges and deals, etc; prevents fraud
- collects, evaluates, and disseminates valuable information to safeguard national security
- works to understand and predict changes in climate, weather, and ocean coasts
- brings liquidity to the housing market (Fannie Mae)
- provides mortgage insurance on homes and hospital loans
- prevents and controls diseases
- safeguards the ‘Allies’ freedom and security by political and military means
- plans and coordinates federal transportation projects
- provides liquidity, stability, and affordability in the housing market (Freddie Mac)
- protects people, wildlife, and fish in the Arctic
- supervises the conduct of financial firms; ensures compliance with required standards
- provides mail services
- enforces law and investigates criminal activity
- works to improve the security of the U.S.
- regulates civil aviation and space transportation
- provides benefits for Veterans and/or their families
- enhances the health and well-being of Americans by providing services and advances in the sciences underlying medicine, public health, etc.
- oversees national health, education, and welfare programs
Down
- maintains stability and confidence in the nations financial system
- represents public school teachers and other staff in educational settings
- enforces federal laws; establishes justice
- governs all commercial transactions in the U.S.
- examines how taxpayer dollars are spent
- esponsible for U.S. space exploration, aeronautics research, etc.
- provides support to entrepreneurs and small businesses
- expands funding for mortgages that are insured/ guaranteed by other federal agencies
- regulates interstate and international communication
- secures communications between law enforcement authorities and their counterparts
- conducts and supports medical research
- protects Americans from diseases and investigates how to prevent them
- manages the Tennessee river for navigation and flood control
- protects public health by assuring the safety of human and veterinary drugs, etc.
- enforces the National Labor Relations Act
- coordinates federal response to disasters
- provides information relating to U.S. food, agriculture, etc.
- delivers packages
- enforces federal tax laws
- provides a broad portfolio of transportation, e-commerce, and business services
44 Clues: delivers packages • provides mail services • enforces federal tax laws • prevents and controls diseases • conducts and supports medical research • examines how taxpayer dollars are spent • provides the military forces of the U.S. • enforces the National Labor Relations Act • coordinates federal response to disasters • works to improve the security of the U.S. • ...
ISMS and QMS Crossword Puzzle 2023-04-01
Across
- Consulting activity designed to add value, review the process and improve the operations
- Cause a factor that cause an issue or nonconformance and should be permanently eliminated through process improvements
- Action of developing one's skill or knowledge that relates to specific competencies
- Practice a method or procedure or technique that has generally accepted as superior to other known alternatives
- breach a security incident in which malicious insiders or external attackers gain unauthorized access to confidential data or sensitive information
- Ensure that information and resource are available to those who need them
- unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security
- Action to eliminate the detected issue or nonconformity
- Mentor POC from PA team who facilitates the function and delivery team for getting betterment in their deliverables
- Making information accessible only to those authorized to use it
Down
- Ensure that information are in format that are true and corrects to its original purpose
- Plan attempts to decrease the chances of a risk occurring, or decrease the impact of the risk if it occurs.
- A weakness that might be exploited
- Plan that explains the steps to take after the identified risk occurs, in order to reduce its impact.
- Judgement of the quality about something;
- unauthorized person gains physical access to an off-limits
- Possibility that a threat exploits a vulnerability, leading to an adverse impact
- Action Action to eliminate the cause of nonconformity and prevent the recurrence
- Learnt The documented information that reflects both negative and positive experiences from the project
19 Clues: A weakness that might be exploited • Judgement of the quality about something; • Action to eliminate the detected issue or nonconformity • unauthorized person gains physical access to an off-limits • Making information accessible only to those authorized to use it • Ensure that information and resource are available to those who need them • ...
Fly away crossword ! 2019-10-22
14 Clues: aigle • épuisé • valise • bagage • fatigué • enfants • drapeau • aéroport • passeport • lag décalage horaire • hostess hôtesse de l'air • officer agent des douanes • officer agent des douanes • attendant hôtesse de l'air
Bullying 2021-06-03
Across
- someone who does not ignore if someone is getting bullied
- how you should feel online
- its a type of bullying online
- trail of data you create while using the Internet
- a place where you can get cyber bullied
Down
- physical or mental suffering by someone
- frighten because of someone, especially in order to make them do what one wants.
- when someone is pressuring you to do something
8 Clues: how you should feel online • its a type of bullying online • physical or mental suffering by someone • a place where you can get cyber bullied • when someone is pressuring you to do something • trail of data you create while using the Internet • someone who does not ignore if someone is getting bullied • ...
E-Safety 2017-10-04
Across
- This should never be given out online
- Something which should be changed regularly and kept safe
- The internet should be used...
- Bullying When Social Media is abused it can lead to
Down
- We should avoid talking to these people online
- A type of programme that can cause damage to your files
- We use this to find out information
- Someone who pretends be someone else online
8 Clues: The internet should be used... • We use this to find out information • This should never be given out online • Someone who pretends be someone else online • We should avoid talking to these people online • Bullying When Social Media is abused it can lead to • A type of programme that can cause damage to your files • ...
Don't Be a Bully 2023-06-01
Across
- ____ someone from a group is a form of bullying.
- A bully is identified not how they look, but rather by their ___
- If you see bullying, do not be a _____.
- Bullying can be done by an individual or
- If you are bullied, tell an ___.
- What does the 'H' stand for in 'HERO'?
- The'O' in 'HERO' stands for___ communication.
- Bullies can call you ____.
- Bullies can get you in ___.
Down
- Helping others makes you a __ person.
- Bullying online is called ___ Bullying.
- Bullying can be physical or ___
- What acronym reminds us how to act if you are bullied help.
- What does the 'E' stand for in 'HERO'?
- What does the 'R' stand for in 'HERO'?
- the 'E' in 'SAFE' stands for 'End it ____'.
- This acronym is great to remember if you see bullying occuring
- the'S' in 'SAFE' stands for 'Stand ______
18 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___ • If you are bullied, tell an ___. • Helping others makes you a __ person. • What does the 'E' stand for in 'HERO'? • What does the 'R' stand for in 'HERO'? • What does the 'H' stand for in 'HERO'? • Bullying online is called ___ Bullying. • If you see bullying, do not be a _____. • ...
crossword 2023-05-10
12 Clues: safety • unending • position • protecter • perfection • grand moff • battle ship • truest life • supreme leader • final judgement • true government • required to work
Bullying 2019-09-07
Across
- an unfavorable opinion formed beforehand without knowledge, thought, or reason
- Hurtful comments, posts, images, videos online or messages
- unwelcome sexual advances, verbal or physical
- commonly held ideas about specific groups of people, often negative
- prejudice or discrimination against someone of a different race
- lying, spreading rumors, excluding others on purpose
Down
- to dislike intensely or passionately
- abusing, insulting, or otherwise harming someone on a regular basis
- name-calling, teasing, insults, homophobic or racist remarks
- stubborn and complete intolerance of any belief or opinion that differs from one's own
- hitting, pushing, kicking, or damaging other's property
11 Clues: to dislike intensely or passionately • unwelcome sexual advances, verbal or physical • lying, spreading rumors, excluding others on purpose • hitting, pushing, kicking, or damaging other's property • Hurtful comments, posts, images, videos online or messages • name-calling, teasing, insults, homophobic or racist remarks • ...
Crossword Puzzle (Blade Lucas) 2018-09-21
Across
- Can police see your digital footprint
- What tracks where you are at all times
- Do different devices make different footprints
- You don't have to log in all the time
- What leaves behind your footprint on a web browser
- When do you share personal information
Down
- Can internet providers sell and collect your information
- Most privacy laws focus on what
- What is a digital footprint
- When someone targets and bullies someone on the internet
- It allows someone to follow you around
- What stops people from seeing you location
- Who uses your data and collects it for information about you
13 Clues: What is a digital footprint • Most privacy laws focus on what • Can police see your digital footprint • You don't have to log in all the time • What tracks where you are at all times • It allows someone to follow you around • When do you share personal information • What stops people from seeing you location • Do different devices make different footprints • ...
Health Crossword 2024-02-20
Across
- relating to computers, information technology.
- the period in which adolescents reach sexual maturity and are able to reproduce.
- a special word or code needed to access something.
- wanting/being willing to do something.
- the hormone produces primarily in the testes.
- a small opening/hole in the skin where acne can form.
Down
- believing your abilities can be achieved through hard work and dedication.
- an organ that can create sweat.
- something to put on your armpits to help with smell.
- dirt/oil/dead skin collecting under the skin to make a red bump.
- emotional/mental strain that causes a lot of worry.
11 Clues: an organ that can create sweat. • wanting/being willing to do something. • the hormone produces primarily in the testes. • relating to computers, information technology. • a special word or code needed to access something. • emotional/mental strain that causes a lot of worry. • something to put on your armpits to help with smell. • ...
Grade 4. Life Skills. Bullying 2023-05-05
Across
- Bullying can make you feel...
- The way for others to know what is happening to you...
- When bullies spread false information about you, it is called a ...
- Keep this as evidence for when the bully gets caught...
- Often those who are bullied themselves become...
Down
- A style of bullying is calling you ...
- Staying in these helps you to not face the bully alone
- Bullying is never by mistake but it is done on ...
- A way for the bully to lose interest in you...
- The type of bullying that happens online
- As a victim, bullying is never your...
11 Clues: Bullying can make you feel... • A style of bullying is calling you ... • As a victim, bullying is never your... • The type of bullying that happens online • A way for the bully to lose interest in you... • Often those who are bullied themselves become... • Bullying is never by mistake but it is done on ... • Staying in these helps you to not face the bully alone • ...
Physical Security Crossword 2022-10-17
Across
- Never write these down
- Always keep a ____ workspace.
- Make sure doors to restricted areas are ____.
- Every time you leave your workstation, you should ____ it.
- Prevent ____ by being aware of your surroundings while using devices.
- ____ is a level of data classification.
- See something, say something! Report all security ____.
Down
- Erase and clean this after a presentation.
- ____ is when someone follows you into a location.
- ____ is when you let someone else use your credentials
- Stay ____ and always be on the lookout for security incidents
11 Clues: Never write these down • Always keep a ____ workspace. • ____ is a level of data classification. • Erase and clean this after a presentation. • Make sure doors to restricted areas are ____. • ____ is when someone follows you into a location. • ____ is when you let someone else use your credentials • See something, say something! Report all security ____. • ...
chapter 9-12 2024-05-07
Across
- the practice of conducting negotiations and maintaining relations between nations
- person who has been forced to flee their home country
- a union of nations determined on world peace
- interconnectedness of economies, cultures and societies
- political and economic union of european countries
- international organization made to promote peace, security and cooperation between nations
Down
- maintaining peace and security worldwide
- extreme form of patriotism
- love of one's country
- mutual reliance and cooperation between countries
- formal agreement between warring parties to end hostilities
11 Clues: love of one's country • extreme form of patriotism • maintaining peace and security worldwide • a union of nations determined on world peace • mutual reliance and cooperation between countries • political and economic union of european countries • person who has been forced to flee their home country • interconnectedness of economies, cultures and societies • ...
chapter 9-12 2024-05-07
Across
- the practice of conducting negotiations and maintaining relations between nations
- person who has been forced to flee their home country
- a union of nations determined on world peace
- interconnectedness of economies, cultures and societies
- political and economic union of european countries
- international organization made to promote peace, security and cooperation between nations
Down
- maintaining peace and security worldwide
- extreme form of patriotism
- love of one's country
- mutual reliance and cooperation between countries
- formal agreement between warring parties to end hostilities
11 Clues: love of one's country • extreme form of patriotism • maintaining peace and security worldwide • a union of nations determined on world peace • mutual reliance and cooperation between countries • political and economic union of european countries • person who has been forced to flee their home country • interconnectedness of economies, cultures and societies • ...
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
SAFER INTERNET 2022-04-04
6 Clues: cybermobbing kann zu ... führen • ein anderes Wort für cybermobbing • du sollst ... für cybermobbing speichern • angebe von persönlichen Informationen im internet • du kannst Leute online ..., um schlimmeres zu verhindern • eine Person mit der du im fall von cybermobbing reden sollst
Electro-Magnetic Spectrum 2012-10-15
8 Clues: cancer treatment • money security technique • light that human eye detect • the range of all radiations • listening to music in my car • security of lagguge at airport • mobile phones and telecomunications • night vision scope used by military
SAPM - Test 2 2012-10-04
Across
- The efficient frontier of risky assets is matched with the utility indifference curves so as to derive ______utility.
- In the APT model formulated by Roll & Ross λ0 is the expected return with______ systematic risk i.e. Risk Free Rate of Return
- In order to find the efficient frontier we need to use _______of securities with one another and their covariance for determining the portfolio risk.
- ______recognizes that factors that are relevant for a particular security in determining the expected returns can be different for different securities.
- _____is a standardized measure of risk because it relates covariance of any asset with the market portfolio to the variance of the market portfolio.
- Thus Expected (Required) Rate of Return for a risky asset is determined by the ______plus a risk premium for the individual asset.
- The covariance of any asset with the market portfolio (Covi,M) is the relevant _____ measure.
- If the alpha of a stock is zero, the stock is properly valued in line with its _______risk.
- Any security with an estimated rate of return that plots ____the SML would be considered underpriced.
- Any security with an estimated rate of return that plots____the SML would be considered overpriced.
- The CAL can be plotted on the risk return graph with ______curve to find the portfolio individual investor would choose.
- If the beta for an asset is above 1.0, the asset has higher risk than the market, which means that it is more _____than the overall market portfolio.
Down
- The return attributable to the firm’s specific factors is referred to as _____and is denoted by (e) in the Arbitrage Pricing Theory (APT) Model.
- If the alpha of a stock is positive, the stock is_______.
- When we say capital markets are in______, it means that all investments are properly priced as per their risk levels.
- The risk measure for an individual risky asset is its _______with the market portfolio.
- Risk Premium is determined by the beta of the asset and the prevailing ____risk premium.
- Market efficiency means absence of _____opportunities in the market.
- The CAPM links the return of the security to a _____factor i.e. market portfolio.
- Rational investor wants to be compensated for any reduction in the purchasing power of money due to____.
20 Clues: If the alpha of a stock is positive, the stock is_______. • Market efficiency means absence of _____opportunities in the market. • The CAPM links the return of the security to a _____factor i.e. market portfolio. • The risk measure for an individual risky asset is its _______with the market portfolio. • ...
Year 9 cybersecurity 1 2024-11-05
Across
- A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
- A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
- A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
- A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
- A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
- Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
- Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
- A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
- The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
- The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
- A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
- A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
- A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
- A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
- A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
- Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
- A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
- A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
- Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
- A fake public Wi-Fi network set up to steal personal information from users who connect to it.
20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it. • Unauthorized access to computer systems or networks, often with the intent to steal or modify data. • The information and data left behind from a user’s online activities, which can be tracked or accessed by others. • ...
Group 1 2024-03-05
13 Clues: fyp • write • protect • microsoft • social media • cloud platform • code translator • web development • operation system • connecting network • programming language • software as a service • application programming interface
Test 2021-10-18
Across
- security professionals in BC are prohibited from carrying any of these while on duty
- situation report
- observe, record and
- We are committed to reducing our carbon Footprint! We are part of the _______ Smart program
- all site orders and previous shift reports
- be sure to change over to your winter
Down
- yourself with the site and risk areas
- findings
- do not speed when responding to an alarm response
- you are to immediately to report these conditions or injuries to your shift supervisor
- security and ___________ is an essential component of the everyday healthcare practice
- log patrol times, vehicle information and
- check equipment! turn on the phone, ____, and pager
13 Clues: findings • situation report • observe, record and • yourself with the site and risk areas • be sure to change over to your winter • log patrol times, vehicle information and • all site orders and previous shift reports • do not speed when responding to an alarm response • check equipment! turn on the phone, ____, and pager • ...
Collateral Management 2025-02-15
Across
- a sum of borrowed money
- UCC
- property owned by a person or company
- a fee charged by the lender and paid by the borrower
- pledge that gives a guarantee of fulfillment
Down
- something to pledge for repayment
- a contract given as security for fulfillment of a contract
- the document a borrow signs when getting a loan
- a document that shows legal ownership of a property or asset
- a situation involving exposure or danger
- a type of loan used to purchase or maintain a home
- the state of being responsible for something
- a right to keep possession of the property belonging to someone else
13 Clues: UCC • a sum of borrowed money • something to pledge for repayment • property owned by a person or company • a situation involving exposure or danger • the state of being responsible for something • pledge that gives a guarantee of fulfillment • the document a borrow signs when getting a loan • a type of loan used to purchase or maintain a home • ...
Digital privacy and security 2024-10-17
Across
- Attacks that often involve fraudulent emails
- A foundation of information
- Options available to customise the privacy of your device
- A longer, more complex password that is meaningful to the user
- Unauthorised access or disclosure of sensitive information
- Process of verifying someone's identity
- The right to control personal information and limit access
Down
- A security method that requires users to provide multiple forms of identity
- Malicious Software designed to harm or disrupt your computer
- The practice of guarding personal data from harm or loss
- To keep safe
- Not having permission or approval
- Small text files stored on your computer by websites you visit
13 Clues: To keep safe • A foundation of information • Not having permission or approval • Process of verifying someone's identity • Attacks that often involve fraudulent emails • The practice of guarding personal data from harm or loss • Options available to customise the privacy of your device • Unauthorised access or disclosure of sensitive information • ...
Terminology cross word 2025-05-05
Across
- The maximum data transfer rate of a network
- A security system that blocks unauthorized access
- A communication endpoint for network connections.
- The arrangement of devices in a network.
- A person managing network systems and security.
- A computer or device requesting services from a server
- A computer providing resources or services to clients.
- A set of rules for data exchange in networks.
Down
- A private, internal network within an organisation.
- A system of connected computers or devices.
- The process of converting data into a secure format.
- A small network within a limited area.
- A unique identifier for devices on a network.
13 Clues: A small network within a limited area. • The arrangement of devices in a network. • The maximum data transfer rate of a network • A system of connected computers or devices. • A unique identifier for devices on a network. • A set of rules for data exchange in networks. • A person managing network systems and security. • A security system that blocks unauthorized access • ...
C5ISR Crossword 2019-07-02
5 Clues: SECARMY top priority • AFC Commanding General • The fifth "C" in C5ISR • New command of the C5ISR Center • Research agreement between Army and private industry/academia
Teachers in the School 2022-09-06
19 Clues: nurse • director • security • custodian • secretary • facilitator • teaches HS Math • Teaches MS Math • nurse assistant • school counselor • education support • teaches HS English • teaches HS English • Teaches MS English • teaches HS Science • Teaches MS Science • Teaches MS English • teaches HS Social Studies • teaches MS Social Studies
Spelling List 12 Homophones 2023-01-03
18 Clues: trash • to cut • estate • method • body part • possessive • transparent • food, roster • function, part • it is or it has • light in coloring • musical instrument • representative sign • security, guarantee • transportation charge • comfort, relieve the sorrow of • put into effect, execute, carry out • put into effect, execute, carry out
Escuela Trabajos 2025-09-23
Across
- Director / Directora
- Secretario / Secretaria
- Cocinero / Cocinera
- Consejero / Consejera
- Estudiante
- Bibliotecario / Bibliotecaria
- Ayudante de maestro
- de autobús
- Maestro / Maestra
Down
- Guard Guardia de seguridad
- Psicólogo / Psicóloga
- Driver, Conductor de autobús/
- Enfermero / Enfermera
- Custodio
- Worker Trabajador social / Trabajadora social
- Principal, Subdirector/ Subdirectora
- Entrenador / Entrenadora
17 Clues: Custodio • Estudiante • de autobús • Maestro / Maestra • Cocinero / Cocinera • Ayudante de maestro • Director / Directora • Psicólogo / Psicóloga • Enfermero / Enfermera • Consejero / Consejera • Secretario / Secretaria • Entrenador / Entrenadora • Guard Guardia de seguridad • Driver, Conductor de autobús/ • Bibliotecario / Bibliotecaria • Principal, Subdirector/ Subdirectora • ...
daily routines 2023-03-20
Across
- televizyon izlemek
- resim yapmak
- izin
- giyinmek
- güvenlik
- oyun oynamak
- kahvaltı yapmak
- okula gitmek
- akşam yemeği yemek
- bisiklete binmek
- uyumak
Down
- yemek pişirmek
- yataktan kalkmak
- öğle yemeği yemek
- müzik dinlemek
- araba sürmek
- servis aracı
- dişleri fırçalamak
- asansor
- yol
- büyük kapı
- saçları taramak
- ödev yapmak
- yol
- yatak yapmak(düzeltmek)
- asansör
26 Clues: yol • yol • izin • uyumak • asansor • asansör • giyinmek • güvenlik • büyük kapı • ödev yapmak • resim yapmak • araba sürmek • servis aracı • oyun oynamak • okula gitmek • yemek pişirmek • müzik dinlemek • saçları taramak • kahvaltı yapmak • yataktan kalkmak • bisiklete binmek • öğle yemeği yemek • televizyon izlemek • dişleri fırçalamak • akşam yemeği yemek • yatak yapmak(düzeltmek)
Vamos de viaje 2021-09-17
31 Clues: car • rich • gate • plane • wants • fancy • claim • hotel • train • screen • ticket • travel • flight • customs • baggage • arrival • station • country • airport • security • passport • suitcase • to board • itinerary • departure • to travel • passenger • bathing suit • to take a taxi • to call someone • flight attendant
OTG 3 Unit 7 Know 2022-04-30
Across
- silitysrauta
- lawnmower robottiruohonleikkuri
- panel ohjauspaneeli
- switch valokatkaisin
- conditioner ilmastointilaite
- termostaatti
- nettikamera
- navigaattori
- pistorasia
- system turvajärjestelmä
- ruuvimeisseli
- car sähköauto
- töpseli
Down
- tuuletin
- rack kuivausteline
- panel aurinkopaneeli
- blinds sälekaihtimet
- drill porakone
- lämpöpatteri
- dish satelliittilautanen
- moped sähkömopo
- vasara
- vacuum cleaner robotti-imuri
- johto
- headphones langattomat kuulokkeet
- machine ompelukone
- board silityslauta
- irrottaa pistoke; ottaa töpseli seinästä
28 Clues: johto • vasara • töpseli • tuuletin • pistorasia • nettikamera • silitysrauta • lämpöpatteri • termostaatti • navigaattori • ruuvimeisseli • car sähköauto • drill porakone • moped sähkömopo • rack kuivausteline • machine ompelukone • board silityslauta • panel ohjauspaneeli • panel aurinkopaneeli • blinds sälekaihtimet • switch valokatkaisin • system turvajärjestelmä • dish satelliittilautanen • ...
Jobs and Professions 2023-08-10
Across
- - Prepares coffee
- Officer - Enforces laws
- Guard - Ensures safety
- - Treats illnesses
- Collector - Collects trash
- Driver - Drives taxis
- - Fights fires
- Salesperson - Sells products
- - Cleans facilities
- - Handles transactions
Down
- - Cares for patients
- - Serves in restaurants
- Attendant - Assists passengers
- - Repairs vehicles
- - Educates students
- Driver - Delivers goods
- Driver - Drives buses
- Carrier - Delivers mail
- - Greets visitors
- - Styles hair
20 Clues: - Styles hair • - Fights fires • - Prepares coffee • - Greets visitors • - Repairs vehicles • - Treats illnesses • - Educates students • - Cleans facilities • - Cares for patients • Driver - Drives buses • Driver - Drives taxis • Guard - Ensures safety • - Handles transactions • - Serves in restaurants • Officer - Enforces laws • Driver - Delivers goods • Carrier - Delivers mail • ...
Shopiflex - Part One 2024-03-06
Across
- Say Cheese
- Security
- Make communication easier
- Large Updates
- Test and test again
- Buzz Buzz Buzz
- CEO
- Your eyes only
- Check here before reaching out
Down
- Oh no it's happening
- shop_id=
- www.
- Customers Thoughts
- Tracking Traffic
- Location Location Location
- The Minutes
- Released twice a year
- Efficient typing tool
- Failed domain purchase
- Login here
20 Clues: CEO • www. • shop_id= • Security • Say Cheese • Login here • The Minutes • Large Updates • Buzz Buzz Buzz • Your eyes only • Tracking Traffic • Customers Thoughts • Test and test again • Oh no it's happening • Released twice a year • Efficient typing tool • Failed domain purchase • Make communication easier • Location Location Location • Check here before reaching out
5a 2024-06-21
Across
- Licensed pilot
- In charge of the deck
- Sharpshooter
- Grenade specialist
- Radar technician
- Infantry soldier
- Scout and sniper
- Steers the ship
- Guard post
Down
- Security role
- Artillery rank
- Skilled mechanic
- Keeps guard
- Directs the course
- Air force lieutenant
- Submarine technician
- Air cargo manager
- Assists the pilot
- Communications expert
- Ammunition technician
20 Clues: Guard post • Keeps guard • Sharpshooter • Security role • Artillery rank • Licensed pilot • Steers the ship • Skilled mechanic • Radar technician • Infantry soldier • Scout and sniper • Air cargo manager • Assists the pilot • Directs the course • Grenade specialist • Air force lieutenant • Submarine technician • In charge of the deck • Communications expert • Ammunition technician
personal safety 2024-11-13
Across
- good, well, not toxic
- trait, characteristic
- in person
- carefully watch
- talk, converse
- application to become companions
- tiktok,instagram
- warning sign
- isolation, peace
- bad, unwell, toxic
- place,site
Down
- protection,security
- harmful person
- dependable person
- comrade, companion
- connection, association
- description of person
- gather,socialize
- agreement, permission
- electronically connected
- code
21 Clues: code • in person • place,site • warning sign • harmful person • talk, converse • carefully watch • gather,socialize • tiktok,instagram • isolation, peace • dependable person • comrade, companion • bad, unwell, toxic • protection,security • good, well, not toxic • trait, characteristic • description of person • agreement, permission • connection, association • electronically connected • ...
Hacer un Viaje 2025-01-22
26 Clues: key • gate • room • rate • cheap • plane • screen • flight • ticket • luggage • arrival • to stay • elevator • passport • security • expensive • to cancel • departure • front desk • to reserve • reservation • cola to get in line • ida y vuelta round trip • de embarque boarding pass • el equipaje to check luggage • una maleta to pack a suitcase
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
VR crossword 2023-05-08
6 Clues: a form of vr • a relaxed form of vr • a immersive form of vr • when you get sick of vr • completely pulling a person into technology • a type of technology which lets you go places in your own home
Difficult Level 2022-08-16
Across
- Refers to the maximum volume of information transmitted over an internet connection within a given amount of time
- A network security device that controls all traffic from your network and blocks any unauthorized access through a series of security rules
- A protocol that enables voice communication online or over the Internet instead of using a phone line
- The conversion of data into code for security and privacy
- Brief intermittent delays when transferring data online
Down
- A means of connecting a computer to a WiFi network using a wired connection
- A fraudulent activity involving someone pretending to be someone else online to obtain personal data or deploy the malware into the victim's device
- Extensible Markup Language
- A protocol that allows transferring of files remotely from one server/system to another
- The process of solving complex computer science problems
- It is the amount of time data takes to pass from one network to another
- Refers to the unlicensed copying and distribution of any intellectual property with copyright
12 Clues: Extensible Markup Language • Brief intermittent delays when transferring data online • The process of solving complex computer science problems • The conversion of data into code for security and privacy • It is the amount of time data takes to pass from one network to another • A means of connecting a computer to a WiFi network using a wired connection • ...
Biometrics Are Not Better 2025-10-25
Across
- avoided or gone around a rule, system, or security measure.
- taking advantage of a weakness or vulnerability for personal gain or to cause harm.
- accessed or broken into a computer system or network without permission.
- the process of recognizing or proving who someone is, often by using documents or biometrics.
- writing that is based on real events, people, and facts rather than imagination.
Down
- incidents where security or trust is broken, often involving unauthorized access to information.
- relating to the measurement of unique physical characteristics, such as fingerprints or facial recognition, used for identification.
- a comparison showing how two different things are similar in some way to help explain an idea.
- the author’s position or viewpoint on a topic, supported by reasons and evidence.
- a statement or opinion that can be supported with evidence; part of an argument.
- weaknesses that can be exploited or taken advantage of by others, often in systems or defenses.
- protection of information, property, or people from danger, loss, or unauthorized access.
12 Clues: avoided or gone around a rule, system, or security measure. • accessed or broken into a computer system or network without permission. • a statement or opinion that can be supported with evidence; part of an argument. • writing that is based on real events, people, and facts rather than imagination. • ...
Transformation Technology Operations Strategy 2022 2022-09-19
Across
- and culture
- 2024
- and Technology
- Oriented
- and Compliant
- platform
- and prosperity
- Principle Output that defines the bank
Down
- Principle Output that defines the bank
- and efficiency
- for Good
- scale in mass
- and operational excellence
- of Working
- sustainability industry
- Top 3 brands across our footprint
- Effective Efficient
- data and security
- management
- delivery performance
20 Clues: 2024 • for Good • Oriented • platform • of Working • management • and culture • scale in mass • and Compliant • and efficiency • and Technology • and prosperity • data and security • Effective Efficient • delivery performance • sustainability industry • and operational excellence • Top 3 brands across our footprint • Principle Output that defines the bank • Principle Output that defines the bank
Word within the word list 31-33 words 2014-10-01
19 Clues: see • beginner • make soft • bad noise • talkative • talkative • very loudly • thought to be • not believing • self-centered • heated dispute • wander through • easily persuaded • speech to oneself • pledge as security • talking in circles • massive and uniform • covering many things • force of million tons of dynamite
OpenText Cybersecurity Portfolio 2023-09-11
7 Clues: Threat Detection • Digital Forensics • Backup and Recovery • Data Protection and Privacy • Endpoint and Email Security • Application and API Security • Identity and Access Management
Compliance Week 2019-10-29
การพัฒนาบุคลิกภาพ หน่วยที่ 2 2024-01-08
H3B Watching 2 2025-12-08
Only Takes A Second 2022-10-28
Across
- Scammers want you to feel a sense of _______
- If you see something, say something! Report all security __________
- Take sensitive conversations somewhere _________
- ______is when someone follows you into and area
- When you leave, you should _______ your workstation
- Make sure doors to restricted areas are ________
Down
- Stay_______ and be on the lookout for security problems
- What is a level of data classification______
- Always keep a _______ workspace
- Don't ever write your ________ down
- Everyone must use their own ___________ to access restricted areas
11 Clues: Always keep a _______ workspace • Don't ever write your ________ down • What is a level of data classification______ • Scammers want you to feel a sense of _______ • ______is when someone follows you into and area • Take sensitive conversations somewhere _________ • Make sure doors to restricted areas are ________ • When you leave, you should _______ your workstation • ...
DCFC English Ministry Fair 2024-09-07
Across
- The minimum age for Baptism at DCFC
- Name of the instrument that the most members play
- What day of the week does the Prayer Ministry take place?
- The Deacon of the College Ministry’s Chinese Name
- Day of the week that family CG meets
Down
- A 9-letter word for “security”
- Location of the upcoming mission trip in October
- Hello in Chinese
- Password from Children’s Ministry
- The “A” in PAC
- Name of the next book of the Bible Adult Sunday School will study
11 Clues: The “A” in PAC • Hello in Chinese • A 9-letter word for “security” • Password from Children’s Ministry • The minimum age for Baptism at DCFC • Day of the week that family CG meets • Location of the upcoming mission trip in October • Name of the instrument that the most members play • The Deacon of the College Ministry’s Chinese Name • ...
CompTIA Network+ (009) Ch. 12 2025-04-04
Across
- Technology using multiple antennas for Wi-Fi.
- Visual map of Wi-Fi signal strength.
- Improved Wi-Fi security standard with forward secrecy.
- Interference from adjacent Wi-Fi channels.
- MAC address of a wireless access point.
- Pushes clients to less crowded Wi-Fi bands.
Down
- Unauthorized wireless access point.
- Disconnects users by exploiting Wi-Fi management frames.
- Security protocol for wireless networks using AES.
- Name identifying a wireless network.
10 Clues: Unauthorized wireless access point. • Visual map of Wi-Fi signal strength. • Name identifying a wireless network. • MAC address of a wireless access point. • Interference from adjacent Wi-Fi channels. • Pushes clients to less crowded Wi-Fi bands. • Technology using multiple antennas for Wi-Fi. • Security protocol for wireless networks using AES. • ...
Escuela Trabajos 2025-09-23
Across
- Guard, Guardia de seguridad
- de autobús
- Worker, Trabajador social / Trabajadora social
- Bibliotecario / Bibliotecaria
- Consejero / Consejera
- Enfermero / Enfermera
- Maestro / Maestra
- Psicólogo / Psicóloga
Down
- Director / Directora
- Principal, Subdirector/ Subdirectora
- Entrenador / Entrenadora
- Ayudante de maestro
- Estudiante
- Driver, Conductor de autobús/
- Cocinero / Cocinera
- Secretario / Secretaria
- Custodio
17 Clues: Custodio • de autobús • Estudiante • Maestro / Maestra • Ayudante de maestro • Cocinero / Cocinera • Director / Directora • Consejero / Consejera • Enfermero / Enfermera • Psicólogo / Psicóloga • Secretario / Secretaria • Entrenador / Entrenadora • Guard, Guardia de seguridad • Bibliotecario / Bibliotecaria • Driver, Conductor de autobús/ • Principal, Subdirector/ Subdirectora • ...
HPA 2014-06-20
Across
- civil engineer
- structure engineers northern california
- legal
- pacific dermatology
- security consultant
- occupational environmental medicine
- rad tech
- commercial real estate
- pediatric dermatology
- financial services
- orthopaedic tech
Down
- forensic witness
- commercial real estate development
- structural engineers california
- redox biology
- retirement
- orthopaedic assistant
- sport psych
- thoracic medicine
- public protection
- dermatology
- addiction medicine
22 Clues: legal • rad tech • retirement • sport psych • dermatology • redox biology • civil engineer • forensic witness • orthopaedic tech • thoracic medicine • public protection • financial services • addiction medicine • pacific dermatology • security consultant • orthopaedic assistant • pediatric dermatology • commercial real estate • structural engineers california • commercial real estate development • ...
vocabulary 1 2014-10-12
22 Clues: thing • by car • ticket • street • arrival • by foot • suitcase • CD player • buy plane • immigration • travel agent • boarding pass • train station • baggage claim • direct flight • to take a taxi • flight attendant • stopover;layover • recreation center • to land;to touch down • to go through security • currency exchange office
