cyber security Crossword Puzzles
Social Security Benefits 2021-03-31
Across
- Used to determine social security eligibility. Can earn a maximum of 4 per year.
- Benefits that help the old, survivors, and disabled
- Provided by Social Security administration that is a record of money earned every year
- an asset that is purchased with the hope that it will generate income or appreciate in value at some point in the future.
Down
- Medical insurance for the old, survivors, and disabled that has a reduce price or is free
- The age in which you collect full retirement benefits
- Social security and Medicare taxes
- 67 for those born after 1960.
- The time when a person stops working
9 Clues: 67 for those born after 1960. • Social security and Medicare taxes • The time when a person stops working • Benefits that help the old, survivors, and disabled • The age in which you collect full retirement benefits • Used to determine social security eligibility. Can earn a maximum of 4 per year. • ...
Foreign Travel Crossword Puzzle 2024-03-20
Across
- Government organization that oversees collateral activity with Boeing Defense.
- Who with a clearance is required to report foreign travel.
- The Facility Security Officer for the Boeing Puget Sound Site?
- Locations considered outside the United States of America
Down
- Days you must report your foreign travel prior to your trip.
- Northern country you can do a day trip to without 30 day notice.
- Southern country you can do a day trip to without 30 day notice.
- Boeing security system where foreign travel is reported.
- Job title of the individual who has overall security responsibility for the entire site.
9 Clues: Boeing security system where foreign travel is reported. • Locations considered outside the United States of America • Who with a clearance is required to report foreign travel. • Days you must report your foreign travel prior to your trip. • The Facility Security Officer for the Boeing Puget Sound Site? • ...
Peanuts 2024-02-07
15 Clues: bird • D-minus • gambler • pianoman • dirty one • loud talker • spiky haired • ben FRANKLIN • smarty pants • bossy person • blanket thief • charlie brown • sally's best friend • naturally curly hair • mr. security blanket
RU ITEC411 - Crime and Security (Ch 5) 2022-10-11
Across
- A false website that convinces people to enter personal information
- The act of changing data to make it unreadable to others to protect the privacy of the information
- An act by criminals to gain access to computers illegally
- Malicious software that will lock computers and/or lock/encrypt files and require payment to have them unlocked
- An attack that hackers use to overload websites with repetitively request for information
- Sending scam emails to trick people into giving away person information
- An in-person use of hacking involving manipulation someone into giving away personal information or private information about a company
- Websites that lure hackers to observe their actions
- Nickname for hackers who attempt to purposefully do damage
- Characteristics involving DNA such as fingerprints, voice, and face structures
Down
- A blanket term for all different types of malicious software and viruses
- Software that allows a person to gain access to software by passing the normal security measures
- Malicious software installed on a computer to observe user’s actions
- A law to protect computers under federal government jurisdiction (ABBR)
- The use of hacking with political motivations
- Nickname for hackers who only do so to help improve security
- The act of gathering personal details to impersonate someone else
- A public written statement attacking a person’s character
- A person or team of people who take the role of a hacker and try to get through security measures
- A malicious computer program that attaches itself to software and can spread itself
20 Clues: The use of hacking with political motivations • Websites that lure hackers to observe their actions • An act by criminals to gain access to computers illegally • A public written statement attacking a person’s character • Nickname for hackers who attempt to purposefully do damage • Nickname for hackers who only do so to help improve security • ...
Stanley's The (Avigilon) Office Crossword 2023-08-16
Across
- Ability to scan a QR code to see a list of users for the video intercom.
- When looking to better understand the path of people or vehicles in a space, it may be beneficial to use this feature
- Wireless Camera that is manually adjustable and includes temperature and humidity sensors
- How many routing profiles come with the VIP without charge?
- Gym membership management integration that enables simple and automated user management.
- What the Aware platform detects after a couple weeks of learning.
- Ability to add layers of security to unlock doors
- These are a great option when you want to add a failsafe or additional security for strict security spaces.
- This feature requires an additional license and can be great for parking garages or slow streets.
- Hardware Warranty period for the majority of our alta access control hardware
- This is free to users and allows them to integrate Avigilon Alta with other software solutions.
- How many Outbound ports are required to be open for Alta Access?
Down
- Ability to look for specific events based on time, appearance, etc. without needing to scrub through hours of footage.
- Patented Technology to allow for seamless and reliable unlocks with Alta Access.
- Technology used to analyze video footage for insights
- Destination Dispatch Technology that integrates with Alta Access
- Typically used in apartments, executive offices, and classrooms.
- Technology that helps reduce bandwidth for Alta Cameras.
- These cameras have a long cylindrical shell and are meant to be seen.
- Alta Access is OSDP Compliant (T/F)
20 Clues: Alta Access is OSDP Compliant (T/F) • Ability to add layers of security to unlock doors • Technology used to analyze video footage for insights • Technology that helps reduce bandwidth for Alta Cameras. • How many routing profiles come with the VIP without charge? • Destination Dispatch Technology that integrates with Alta Access • ...
Financial Fundamentals 2025-05-27
Across
- Regulates business activities within own boundaries; intrastate commerce
- Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
- Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
- Form of debt security, essentially a loan made by an investor to a borrower
- Where the tax rate increases along with the amount
- Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
- The debts or financial obligations that a person or company owes to others
- Tax where everyone pays the same amount
- A rise in the general level of prices (consumer price index)
- Tax based on purchases
Down
- The cost of borrowing money
- Businesses and other organizations which sell items, pay expenses, and borrow to finance business operations
- Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
- _____ are consumers and households who make purchases, save, innvest, and pay taxes
- Employment taxes such as Social Security
- Taxed based on land and buildings
- Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
- Ability to convert an investment to cash for full value; includes items like demand doposits, CDs, Treasury bills, and money market funds
- Regulates banks
- Regulates stock markets
- County boards; city or town councils; services for an orderly society
- Insures bank deposits
- Potential of a investment; Default
23 Clues: Regulates banks • Insures bank deposits • Tax based on purchases • Regulates stock markets • The cost of borrowing money • Taxed based on land and buildings • Potential of a investment; Default • Tax where everyone pays the same amount • Employment taxes such as Social Security • Where the tax rate increases along with the amount • ...
The Bad Guys 1 2022-12-09
Across
- The dogs were all locked up in maximum __________.
- It is one of Mr. Wolf's aliases.
- They all have a __________ rap sheet.
- What animal was the security guard?
- The gang wants to _________ the cat in the tree.
- Who is the leader of The Good Guys Club?
Down
- Where is Mr. Piranha from?
- Everyone keeps mistaking Mr. Piranha for this
- The gang all have a bad __________
- Mr. Wolf throws Mr. Piranha through what?
- What do the gang want to be?
- Mr. Snake ate all of these at Mr. Ho's Pet Store.
12 Clues: Where is Mr. Piranha from? • What do the gang want to be? • It is one of Mr. Wolf's aliases. • The gang all have a bad __________ • What animal was the security guard? • They all have a __________ rap sheet. • Who is the leader of The Good Guys Club? • Mr. Wolf throws Mr. Piranha through what? • Everyone keeps mistaking Mr. Piranha for this • ...
Sectors of the Indian Economy 2021-09-21
Across
- Health care centre come under which sector
- In which sector workers do not produce goods
- A large proportion of labourers in India are working in which sector
- DAV group of schools come under which sector
- In which sector workers enjoy job security
- Which sector is also called manufacturing sector
Down
- The activities in Primary, Secondary and Tertiary sector are ____________
- Cotton is a _________ product
- Sustainable development takes care of present and ________
- Which sector is also called agricultural sector
- Job assurance in rural areas
- unorganised sector does not has _____ security
12 Clues: Job assurance in rural areas • Cotton is a _________ product • Health care centre come under which sector • In which sector workers enjoy job security • In which sector workers do not produce goods • DAV group of schools come under which sector • unorganised sector does not has _____ security • Which sector is also called agricultural sector • ...
confidentiality 2025-02-06
Across
- Espionage form of espionage conducted for commercial purposes rather than security;
- information
- set of rules or promises which limits access or places restrictions on certain
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- or Sensitive Data information about an employee prior to employment such as a résumé,
Down
- etc.
- Data records of an employee’s performance on the job such as performance reports,
- insurance information
- in the Workplace keeping employee, customer and client information private
- Data information which may arise from employment-related physicals, drug tests and
- of information
13 Clues: etc. • information • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
Final Vocab 2022-05-26
20 Clues: Time. • Large. • Hidden. • Choice. • Fierce. • To buy. • obvious. • Used to. • Homework. • To plant. • Equal to. • Eats meat. • Dinosaurs. • To remove. • Forerunner. • Want to eat. • To understand • Think: Hello, my name is… • To ship to another country. • Security system when a robber is in the house.
ENA5 revision 2023-01-17
33 Clues: huhu • elin • paine • nivel • hermo • liite • turva • neste • rohkea • vapaus • kysely • taapero • epäilys • elvytys • sisäinen • tutkimus • taulukko • muuttuja • arviolta • aikakausi • kustantaja • tajuissaan • selkäranka • vaikuttaja • puolueeton • osallistuja • vanhentunut • jälkeläinen • johtopäätös • hyvin pieni • helpottunut • keinotekoinen • epäluotettava
Henry V Act V Vocabulary 2023-02-27
Across
- leaving no opportunity for denial
- restricting
- certainty
- common people from ancient Rome
- harvest; cultivation
- consistency
- uncultivated
- damaged
- approve
Down
- obstacle; hindrance
- call to mind
- make greater
- majestic
- wedding
- attempt; strive
- security certainty
- surrounded
- general sense or meaning
- obscurities; uncertainties
- from one side to the other
20 Clues: wedding • damaged • approve • majestic • certainty • surrounded • restricting • consistency • call to mind • make greater • uncultivated • attempt; strive • security certainty • obstacle; hindrance • harvest; cultivation • general sense or meaning • obscurities; uncertainties • from one side to the other • common people from ancient Rome • leaving no opportunity for denial
Unit 15 and 16 2023-03-13
Across
- kohver
- õpipoiss
- loeng
- sadam
- trahv
- tegelik
- sihtkond
- padi
- deklareerima, kuulutama
- turvalisus, julgeolek
- pagas
- vahekäik
- käsipagas
- ilmnema
- aksessuaar, tarvik, lisavarustus
- ülemere
Down
- pardapääse
- meditsiiniline
- reisiterminal
- ürgne loodus
- mehaanik
- rabav, jahmatav
- sissekäik
- lomp,loik
- kirurg
- noortehotell
- toll
- kellegile kallale norima
- kandik
29 Clues: padi • toll • loeng • sadam • trahv • pagas • kohver • kirurg • kandik • tegelik • ilmnema • ülemere • õpipoiss • mehaanik • sihtkond • vahekäik • sissekäik • lomp,loik • käsipagas • pardapääse • ürgne loodus • noortehotell • reisiterminal • meditsiiniline • rabav, jahmatav • turvalisus, julgeolek • deklareerima, kuulutama • kellegile kallale norima • aksessuaar, tarvik, lisavarustus
Hackers, Scams and Online Safety 2023-04-21
20 Clues: boss • secret • trading • be aware • positive • bullseye • ___ gaurd • shape math • line of ___ • to fish with • to give back • virtual mail • male cow - y • where you see • to instill fear • to prevent entry • opposite of light • chocolate chip ___ • wood, opposite of out • something that explodes
Selfie Horror Story 2023-03-31
30 Clues: lugn • anta • brev • scen • spår • konto • störa • radera • trösta • försök • direkt • kränkt • orolig • anonym • reklam • livlina • nyligen • svarade • formulär • liknande • tillgång • lösenord • säkerhet • databrott • ladda upp • omedelbart • förbryllad • allvarligt • slutade tänka på • out with umgås med
ON THIS PAGE 2016-02-14
Across
- ........ Page
- Levin ....... School
- Safe And Secure .........
- ....... 40 Units
- Security ....... Entry
- ......Your Imagination
- ........ With Me
- Paper ......
- Open 24 .......
- ........ Chronicle
- Georgies Wigs & Hair ......
- Great read
Down
- Secure Self .........
- ....... $50 Paper Plus
- Old Kimberley ........ Grounds
- Some ....... Apply
- Shape ......
- WINZ Subsidies ........
- 20 ........ Avenue
- Early ....... Education
- 0800 00 .......
- ...... Just Love It
22 Clues: Great read • Shape ...... • Paper ...... • ........ Page • Open 24 ....... • 0800 00 ....... • ....... 40 Units • ........ With Me • Some ....... Apply • 20 ........ Avenue • ........ Chronicle • ...... Just Love It • Levin ....... School • Secure Self ......... • ....... $50 Paper Plus • Security ....... Entry • ......Your Imagination • WINZ Subsidies ........ • Early ....... Education • ...
Leccion 5 Deck 1 2018-02-28
23 Clues: Island • Welcome • Lodging • Expired • Tourist • To sail • Traveler • Regresar • Passport • Accident • Itinerary • La ruinas • Peligroso • To be full • Campground • To take off • To take a trip • El adventurero • Excursion; tour • Safety; security • De (buena) catergoría • El cinturón de seguridad • El servicio de habitación
basketball 2023-08-29
Across
- Opponent analysis
- Captures moments
- Technical aspects
- Venue management
- PR interactions
- Logistics planning
- Gear organization
- Online presence
- Venue assistance
- Team transportation
- Ball management
Down
- Game commentary
- AV equipment
- Spiritual support
- Data analysis
- Public address
- Safety enforcement
- Team promotion
- Ticket and merch
- Game officiating
- Physical conditioning
21 Clues: AV equipment • Data analysis • Public address • Team promotion • Game commentary • PR interactions • Online presence • Ball management • Captures moments • Venue management • Ticket and merch • Game officiating • Venue assistance • Opponent analysis • Spiritual support • Technical aspects • Gear organization • Safety enforcement • Logistics planning • Team transportation • Physical conditioning
zz 2024-04-10
Across
- - Stock symbol
- - Noise-making toy
- - Blood specialist
- - Motor City
- - Variant of element
- - Stuffed dough
- - Multiplicative factor
- - Heart partition
- - Mythical creature
Down
- - Measurement unit
- - Small, agile dinosaur
- - Early recording device
- - Hovering raptor
- - Tectonic segment
- - Southern staple
- - Image unit
- - Loan security
- - Polearm
- - Indigenous Arctic people
- - Idle sketching
20 Clues: - Polearm • - Motor City • - Image unit • - Stock symbol • - Loan security • - Stuffed dough • - Idle sketching • - Hovering raptor • - Southern staple • - Heart partition • - Measurement unit • - Tectonic segment • - Noise-making toy • - Blood specialist • - Mythical creature • - Variant of element • - Small, agile dinosaur • - Multiplicative factor • - Early recording device • ...
nieprzewidywalny szczegół 4 2024-08-18
20 Clues: silently • he added • undecided • go ahead! • otherwise • she smiled • addressing • comfortable • she continued • to add (perf) • to try (impf) • to add (impf) • to try (perf) • security guard • they were trying • to address (impf) • to address (perf) • to persuade (perf) • to persuade (impf) • taking off clothes
Those Secret Coders, man 2024-10-16
28 Clues: runa • neyð • hrós • mjög • kynna • ætlun • villa • leysa • slétta • öryggi • blekkja • framlag • gljúfur • kynning • senda út • eyðimörk • dulkóðað • hugrekki • rannsókn • áríðandi • hæfileiki • verðskulda • bandalags- • ganga í her • dulmálafræði • í auknum mæli • samanstanda af • endast lengur en…
Browsing safely 2025-06-18
Across
- illegal entry into a computer system
- act of harassing someone using a internet
- criminal activity used to harm someone with a internet connection
- it scans,prevent and destroy viruses
- the receiver of a message is fooled
- it can carry out cyber extortion
- prevents unauthorised access
- a program or a set of programs
Down
- fraudsters pretend to bank or financial organisation
- unethical hackers who steal personal information and do fraudulent tasks
- two step authentication involves this word and your password
- act of sending an email to mislead him to steal his information
- antivirus developed by
- an impression created when you visit a website
- a major threat for people who use internet for online shopping,cash transactions and bank services
15 Clues: antivirus developed by • prevents unauthorised access • a program or a set of programs • it can carry out cyber extortion • the receiver of a message is fooled • illegal entry into a computer system • it scans,prevent and destroy viruses • act of harassing someone using a internet • an impression created when you visit a website • ...
Tek ko (Part 4: Tek ko and Ryan mo) 2023-03-15
Across
- "Traffic ____"; due to large volume of vehicles
- color of a retriever or the arches of Mcdo symbol
- One of the off-shore provinces of Bicol
- Denoting or served in a cheese-flavoured white sauce
- ___ and the Bear; Russian animated series
- The great white shark in Finding Nemo
- A dozen
- Brand of toy blocks
- ___ me-not; bright purple flowers
- animal symbol of USA
- Ebony and ___; collab hits of McCartney and Wonder
- 'XLV - XXV' in Arabic numerals
- Chair and Director of UQ Cyber Security at the University of Queensland, Australia
- Talk at length, typically about trivial matters
- The second letter of the Hebrew alphabet
- Volleyball player position
- Powdered chocolate drink
- Rene ____; tennis great with grand slams in French and US Open and Wimbledon from 1925-1929
- .."Oh, __ __ __ more today than yesterday".. by the Spiral Starecase
- Originally called as Facebook chat
- Day-Lewis or Craig or Padilla
- one of two children or animals born at the same birth
- word attached with gin, tail, seed or bud
Down
- Grass in Kankanaey
- Continuing without pausing
- An enthusiastic devotee of a specified thing or activity (eg drugs)
- other word for logo, trademark, label or emblem
- month of Santacruzan
- Philippine jasmine
- App for free calls and messaging
- ___ Fools' Day
- Shangrila or Marina Bay Sands or The Peninsula
- a number that looks like infinity
- City and municipal seat in Baja California Sur, on the West Coast of Mexico
- Domingo de ___; First bishop of the Philippines
- Rudy ___; Filipino actor or Spanish NBA player
- Square of 5 and 1
- Spanish name meaning "destroyed by horses"
- summit or highest point
- Bacon in Spanish
- ..."__ __ __ like the sun misses the flower..."; Letter in the film A Knight's Tale
- Month named after Julius Caesar
- French name meaning harvester or guardian
- sides of a square or the Evangelists or lucky leaf clover
- Just Got ___ by Joe Boxers
- The Philippine ___; broad sheet with tag line "Truth Shall Prevail"
- a defender, protector, or keeper (eg angel)
- ___-kagi; A variant of the weapon whose shape has four iron nails like bear claws attached to a metal ring
48 Clues: A dozen • ___ Fools' Day • Bacon in Spanish • Square of 5 and 1 • Grass in Kankanaey • Philippine jasmine • Brand of toy blocks • month of Santacruzan • animal symbol of USA • summit or highest point • Powdered chocolate drink • Continuing without pausing • Volleyball player position • Just Got ___ by Joe Boxers • Day-Lewis or Craig or Padilla • 'XLV - XXV' in Arabic numerals • ...
Web Ethics and Safety 2023-08-22
Across
- a person who looks for other people in order to use, control, or harm them in some way.
- the action or practice of sending sexually explicit photographs or messages via mobile phone.
- the unauthorized use or reproduction of another's work.
- a phone with access to a cellular radio system so it can be used over a wide area, without a physical connection to a network; a mobile phone.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- (of software) designed to detect and destroy computer viruses.
- the condition of being protected from or unlikely to cause danger, risk, or injury.
- the systematic investigation into and study of materials and sources in order to establish facts and reach new conclusions.
- a dishonest scheme; a fraud.
- the unauthorized use or reproduction of another's work.
- a person who uses computers to gain unauthorized access to data.
- a person who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
Down
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- (of a device) having or operating with the aid of many small components, especially microchips and transistors, that control and direct an electric current.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a device that forwards data packets to the appropriate parts of a computer network.
- existing, occurring, or carried on between two or more nations.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- the practice of taking someone else's work or ideas and passing them off as one's own.
- the state of being free from danger or threat.
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- a danger or risk.
25 Clues: a danger or risk. • a dishonest scheme; a fraud. • the state of being free from danger or threat. • the unauthorized use or reproduction of another's work. • the unauthorized use or reproduction of another's work. • (of software) designed to detect and destroy computer viruses. • existing, occurring, or carried on between two or more nations. • ...
Investment Course Lesson 24 2023-03-22
Across
- A measurement of effectiveness regarding the company’s ability to make a profit for shareholders
- shows how two moving averages in a particular security are related
- control in order to lower risk
- When a stock is first introduced to a market the banks offer it at a price per share that they have determined to be based on its intrinsic worth
- also known as a hedge ratio
- when the price of a security moves contrary to other data.
Down
- an intangible asset
- patterns during different business environments or situations
- having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others.
- A type of security based on the ownership of real estate
- net profit divided by the number of outstanding common shares
11 Clues: an intangible asset • also known as a hedge ratio • control in order to lower risk • A type of security based on the ownership of real estate • when the price of a security moves contrary to other data. • patterns during different business environments or situations • net profit divided by the number of outstanding common shares • ...
Spring 2024 Firm Meeting 2024-03-12
Across
- something PWA advisors help client protect
- one approach our tax controversy team takes with the IRS
- with x, a tax credit for manufacturing or product improvement Development see x
- investigating, often in fraud or legal situations
- a service that several departments have in their names
- where most of the firm’s new business is originated
- Managed blank Technology
- something BayBridge Real Estate Capital helps clients manage, find or refinance
- clue
- a type of business that gives back to the community, we do their taxes and audits
- an area of tax that especially impacts clients with operations in multiple states
- planning how PWA creates a comprehensive approach
- part of the name of several affiliates
- what many of our MST services entail
- a charity event the firm teams have contributed $2 million to since it started 14 years ago
- an activity that often uses talents from a variety of departments
- clue
- present blank analysis
- an area that helps HNW people manage their financial lives
Down
- what every company and high net worth family needs
- a lifechanging client event we can help with from planning to tax preparation to estate planning
- a governmental agency that scares of our clients but not us
- a specialty area of PWA
- a software platform MST helps implement at companies
- a type of entity that provides tax benefits for manufacturers and distributors that expert products
- a special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- an acronym for solving repetitive tasks with robotics
- tax one of the firm’s key service areas
- diversity, equity and blank
- firm members speak in practice in more than this many languages
- estate the area of tax services BPB is probably most famous for
- the largest group in the firm and a typical entry point for multiple services
- how our HR departments help clients
- clue
- a special type of audit for public companies
- what we all aspire to do
- a core value brought to life by our participation in the DCC and Bounce Back from Cancer
- an acronym for a special type of insurance that is tax mitigation tool
- clue
- assessment what assurance and cyber teams often do
40 Clues: clue • clue • clue • clue • present blank analysis • a specialty area of PWA • Managed blank Technology • what we all aspire to do • diversity, equity and blank • how our HR departments help clients • what many of our MST services entail • part of the name of several affiliates • tax one of the firm’s key service areas • something PWA advisors help client protect • ...
investment strats 2022-11-21
Across
- money for real estate, equipment, and so on
- bank account used by depositors to accumulate money for future use
- for profit businesses that sell insurance products
- allow customers to pay for purchases and withdraw cash
- a document guaranteeing payment of a specific amount of money
- financial institution that is involved in trading securities in financial markets
- prearranged amount of credit that is available for business to use as needed
- people who do the work
- bank account that allows bank owners to make deposits, write checks, withdraw money
- a financial investment issues by cooperation, government, or other organization
- long term business
- equals one vote
- security that pays interest over terms of ten to thirty years
- largest category of deposit institution
- deposit insurance in case of bank failure
- financial institution that provides services for businesses
- nation uses to provide and manage money for itself
- customers are required to apply for this
Down
- people who buy shares of stock
- financial institution that makes money by using loans
- central bank of USA
- online banks allow
- nonprofit financial institutions that privately owned and provides banking services
- financial institution that accepts money from customers
- lend money to the business in return of rate of interest
- banking regulations must comply with
- security that matures in a year or less
- financial institution that offers savings and loan services
- established in 1913
- regular payment made from a customers bank account to a vendor or supplier
30 Clues: equals one vote • online banks allow • long term business • central bank of USA • established in 1913 • people who do the work • people who buy shares of stock • banking regulations must comply with • security that matures in a year or less • largest category of deposit institution • customers are required to apply for this • deposit insurance in case of bank failure • ...
English Crossword Puzzle 2025-09-26
Across
- the activity of a person or group of people who travel outside their place of residence temporarily for recreational, business, educational, cultural, or other purposes, and utilize the facilities available at the destination.
- antonyms of departed.
- travel activity list.
- the synonyms of booking/registration.
- profession that arranges tickets and hotels.
- the passenger had checked ___ two heavy suitcases at the counter.
- documents required to enter another country.
- tourism with the aim of learning.
- historical buildings which are generally places of worship or religious relics from the Hindu-Buddhist period.
- tourism that emphasizes nature conservation.
- a unified system consisting of the use of airspace, aircraft, airports, air transportation, flight navigation, safety and security, the environment, and supporting facilities.
- they passed ___ security check.
- connecting bridge from the airport terminal to the aircraft door.
Down
- the synonyms of lead.
- a person who travels to a place outside his/her place of residence for the purpose of vacation, recreation, business or other temporary purposes is called ___
- what kind of tourism is included in the zoo?
- the stage in air travel where passengers begin to board the aircraft to occupy their reserved seats.
- the tourist took photos ___ the performance.
- document used as proof of payment for credit transactions.
- the tourist had all documents ready like ID, visa, and ___
- the antonym of "international" in tourist.
- they completed the ___ at the counter before going to security.
- the synonyms of baggage/suitcase/bag.
- she booked the seat and received the ___ for the trip.
- the synonyms of lodging.
25 Clues: the synonyms of lead. • antonyms of departed. • travel activity list. • the synonyms of lodging. • they passed ___ security check. • tourism with the aim of learning. • the synonyms of booking/registration. • the synonyms of baggage/suitcase/bag. • the antonym of "international" in tourist. • what kind of tourism is included in the zoo? • ...
Investing - Liza Howe 2026-03-19
Across
- Only invest what you are willing to ____
- contributions are made post tax
- Availability of cash or the ease with which an asset can be converted to cash
- Sum of money saved or made available for a particular purpose
- Collection of stocks, bonds, or other assets that trades on a stock exchange
- investing all your money available at the given time and put it into the market
- If you leave a company that had a 401K, you move your 401K to your new company
- System of recording information in a way that makes it difficult to change, hack, or cheat.
- Money paid to investors for owning stock
- Age to receive full social security benefits
- The total value of a company’s stock.
- 100 largest non financial companies
- 401K contributions are taken out of your paycheck ______ taxes
Down
- A _______ is managed by your employer
- virtual currency that gains value based on scale of community involvement
- currencies that are created and backed by the government
- Before you invest in crypto you must build an _____________, pay off any high interest debt, and have a traditional retirement plan.
- Data is stored on one computer at a bank instead of one central location
- Social Security and Medicare taxes combined
- Loan you give to a company or the government
- Have worked for a certain amount of time with a company
- A digital record of transactions
- Usually paid out when you reach a certain number of _____
- Social security was created by President _________ in 1935
- Each block is connected using a hash or seal
25 Clues: contributions are made post tax • A digital record of transactions • 100 largest non financial companies • A _______ is managed by your employer • The total value of a company’s stock. • Only invest what you are willing to ____ • Money paid to investors for owning stock • Social Security and Medicare taxes combined • Loan you give to a company or the government • ...
Digital Factory 2026-01-12
Across
- Corporate Internet Banking
- Employee-only news hub for the bank
- Core banking concern ensuring data protection.
- Digital platform that allows customers to perform banking transactions remotely
Down
- Agile center used by banks to "manufacture" digital products
- Banking from a phone.
- Replacing sensitive data with non-sensitive equivalents for security. (Apple Pay)
- Bank program for "points"
- Online hub for bank news
- Application that Facilitate Workflows.
10 Clues: Banking from a phone. • Online hub for bank news • Bank program for "points" • Corporate Internet Banking • Employee-only news hub for the bank • Application that Facilitate Workflows. • Core banking concern ensuring data protection. • Agile center used by banks to "manufacture" digital products • ...
transword 103 2018-07-18
23 Clues: beep • days • take • voice • costs • answer • shelter • between • day-care • part-time • coherence • to follow • full-time • responsible • kindergarten • nursing home • nephew, cousin • administrative • duration, length • security, safeguard • field trips, excursions • during the day, daytime • and last but not the least, finally(two words)
transword 103 2018-07-18
23 Clues: days • take • beep • costs • voice • answer • between • shelter • day-care • part-time • to follow • full-time • coherence • responsible • kindergarten • nursing home • administrative • nephew, cousin • duration, length • security, safeguard • during the day, daytime • field trips, excursions • and last but not the least, finally(two words)
Puzzle hoofdstuk 5 2013-04-04
32 Clues: per • kop • hek • kaas • fles • pond • minst • kunst • pakje • leren • Duits • Frans • boete • tonijn • koekje • meestal • cijfers • straffen • bijwonen • wiskunde • techniek • boterham • toegeven • biologie • verdienen • volwassene • spijbelaar • beschrijven • beveiliging • geschiedenis • vegetarische • aardrijkskunde
vocabulary 1 2014-10-12
22 Clues: visa • thing • street • ticket • by car • arrival • by foot • suitcase • departure • buy plane • immigration • travel agent • train station • direct flight • boarding pass • to take a taxi • flight attendant • stopover;layover • recreation center • to land;to touch down • to go through security • currency exchange office
Driver Licensing 2024-01-11
Across
- qmatic
- yellow highlighter
- 90 days
- MVA 148.1
- dangerous action
- security feature
- truck manual
- number of DLKT languages
- violation
- L245
Down
- MV2076
- image capture workstation
- intersection safety camera
- 24 passenger school bus
- reciprocal licence
- MV2075
- account services
- 5/7 roadtest sheet
- no show roadtest sheet
- counter 11 & 12
20 Clues: L245 • MV2076 • qmatic • MV2075 • 90 days • MVA 148.1 • violation • truck manual • counter 11 & 12 • account services • dangerous action • security feature • yellow highlighter • reciprocal licence • 5/7 roadtest sheet • no show roadtest sheet • 24 passenger school bus • number of DLKT languages • image capture workstation • intersection safety camera
On the Go 2 Unit 4 Start 2024-01-09
Across
- sisäänkirjautuminen
- lähteä(esim.lento)
- asemalaituri
- itsepalvelu
- matkustaja
- lento
- istuinpaikka
- satama
- vaunu
- kone
- matkatavarat
- lähtevät
- kolikkoautomaatti
- juna
- matkatavarat
- tulli
Down
- kuulutus
- tarkastus
- saapuvat
- tullata
- turvallisuus
- lautta
- kyltti
- junavirkailija
- matkustamohenkilökunta
- matkalippu
- maihinnousukortti
- portti
- valmis
- matkalaukku
30 Clues: kone • juna • lento • vaunu • tulli • lautta • kyltti • satama • portti • valmis • tullata • kuulutus • saapuvat • lähtevät • tarkastus • matkustaja • matkalippu • itsepalvelu • matkalaukku • asemalaituri • turvallisuus • istuinpaikka • matkatavarat • matkatavarat • junavirkailija • maihinnousukortti • kolikkoautomaatti • lähteä(esim.lento) • sisäänkirjautuminen • matkustamohenkilökunta
Billy Elliot-Crossword 2023-02-28
26 Clues: far • mot • sorg • lønn • dans • bror • kull • jobb • lojal • støtte • ansvar • ulojal • styrke • streik • kollega • grenser • ballett • familie • industri • utdanning • stereotypi • arbeidsledig • konfrontasjon • en som jobber i gruve • trygghet(ordet kan ha flere betydninger) • samfunn/ fellesskap(ordet kan ha flere betydninger)
Kinds of Job 2024-09-03
30 Clues: Guru • Supir • Aktor • Pilot • Hakim • Polisi • Ilmuan • Petani • Dokter • Pelaut • Montir • Pelayan • Tentara • Arsitek • Perawat • Seniman • Pelatih • Penyanyi • Insinyur • Pedagang • Penjahit • Astronot • Pengacara • Carpenter • Juru masak • Fotografer • Tukang roti • Tukang kebun • Petugas keamanan • Pemadam kebakaran
Crossword for Seniors 2023-01-30
24 Clues: Faith • Funds • Worry • Injury • A trip • Concern • Assured • Solitude • Sheltered • relatives • Friendship • Compassion • Assistance • Coxa joint • Well-being • Self-reliant • Keeping level • Accommodation • Buddy or mate • Social security • Medical Personal • Paying attention • The windows to the soul • Hinge between the femur, tibia, patella
OCUPATIONS AND PROFESSIONS 2023-10-09
27 Clues: Guru • Koki • Pilot • Kasir • Penari • Dokter • Polisi • Musisi • Petani • Tentara • Perawat • Arsitek • Nelayan • Insinyur • Karyawan • Pedagang • Astronot • Dokter gigi • Tukang kayu • Tukang roti • Dokter hewan • Tukang kebun • Petugas keamanan • Pekerja kantoran • Pemadam kebakaran • Petugas Kebersihan • guide Pemandu wisata
Call Types 2026-02-10
21 Clues: 417 • 215 • 211 • 484 • 1091B • 273.5 • Hate crime • Holdup alarm • Lewd Conduct • Hate incident • Speed contest • Found juvenile • No supervision • Civil situation • Deceased person • Drunk in public • Citizen flag down • Alcohol in the park • Misdemeanor DV Assault • Residential security check • Health and Safety Violation
Chapter 2 2021-11-30
Across
- a bank account used by depositors to accumulate money for future use
- another type of stock exchange
- those who do the work
- info provided by public companies
- market place where stocks are bought and sold mostly online where there is no central building
- someone who assists you with purchasing stocks and bonds
- central bank of the US
- handles stock sales and purchases
- another name for futures
- type of company where shares can be traded openly
- need to pay for security purchases within three business days or order
- an example of a lender
- establishes and enforces regulations which protect the investing public from unfair practices in the securities markets
- type of bond with the longest maturity
Down
- issues of a stake of ownership in a company
- term generally uses to refer to putting money aside in order to make your money grow
- limited liability for shareholders
- example of low risk/low reward
- buy or sell when the stock reaches a certain price
- biggest stock exchange
- people who lend money to a business for a fixed rate of interest
- type of company where shares are not sold publicly
- a financial statement issued a corporation, government, or other organization
- for sophisticated investors who borrow money to purchase securities
- a security that pays interest over terms ranging from two to ten years
- tax-free bonds
- money for real estate equipment, and others
- document guaranteeing payment of a specific amount of money
28 Clues: tax-free bonds • those who do the work • biggest stock exchange • central bank of the US • an example of a lender • another name for futures • another type of stock exchange • example of low risk/low reward • info provided by public companies • handles stock sales and purchases • limited liability for shareholders • type of bond with the longest maturity • ...
Investment Strategies Chapter 2 2021-11-30
Across
- shares can be traded publicly
- letters assigned to bonds by rating agencies
- a type of debt security that is issued by a firm and sold to investors
- ticker symbol
- preferred dividends not paid in previous periods must be paid before common dividends can be paid
- a security issued by or on behalf of a local authority
- generally fixed like debt based on the par value
- preferred stockholders are paid before common stockholders
- stockholders buy and sell shares of stock from one another with the help of brokers
- the nominal or face value of a stock or bond
- analysis of the companies stock, its price, price movement, trading volume, etc
Down
- taking measures to make money grow
- cash payments declared and paid by corporations to stockholders
- long term bonds sold by the US government
- no specific maturity date
- selling stocks and bonds directly to public investors
- price earnings ratio
- what investing can help you beat
- putting money aside so it will be available when you need it
- money for real estate, equipment, and so on
- analysis of the company itself, its operations, its position within its industry
- The accounting value of the common equity of a corporation as shown on the balance sheet
- an equity security representing the ownership interest in a corporation
- those people that do the work
- type of stock market return
- dollar amount of annual dividend per share
26 Clues: ticker symbol • price earnings ratio • no specific maturity date • type of stock market return • shares can be traded publicly • those people that do the work • what investing can help you beat • taking measures to make money grow • long term bonds sold by the US government • dollar amount of annual dividend per share • money for real estate, equipment, and so on • ...
Investment Unit 2024-03-20
Across
- when value of stocks in the market plummet
- medium of exchange for goods and services
- the max amount of money you put into an IRA yearly
- distribute company earnings to shareholders
- system that makes it hard to track or hack info
- A company might _____ you when you put money into a 401k
- percent of 18-29 year olds who invest in crypto
- age to get extra social security benefits
- to put money into stocks and bonds
- most popular cryptocurrency on the market
- type of currency that only exists online
- factor affects company from inside source
- when you take money out of an account
- age to collect social security benefits
Down
- how big the company is in the stock market
- account where you can put in money to slowly grow
- the amount of money held in an account
- account created for unexpected events/bills
- age to invest in Cryptocurrency
- type of IRA you put money in after it's taxed
- represents ownership of a part of a company
- agreement to provide compensation if damages occur
- regular payment from your job once you retire
- Currency that is backed by the government
- a sum of money saved/made available for you
- offering private corporate shares to public
- represents a loan from the buyer to company
- payroll tax that funds Social Security and Medicare
- you can _______ your 401k funds to a new plan or an investment account
- manages the performance of many securities
30 Clues: age to invest in Cryptocurrency • to put money into stocks and bonds • when you take money out of an account • the amount of money held in an account • age to collect social security benefits • type of currency that only exists online • medium of exchange for goods and services • age to get extra social security benefits • Currency that is backed by the government • ...
Business Math Unit 4 Vocab 2025-12-15
Across
- a currency for which the government guarantees the value
- a document guaranteeing payment of a specific amount of money either on demand or within a designated time
- borrower
- lender
- a government backed security payable in a year or less
- property or assets used to secure a loan
- a security with terms of 10-20 years
- a method of payment must be accepted for public and private debts
- the ranking of a credit history on a point scale between 300 and 850
- the government institution that provides insurance for depositors in insured banks
- the process of transferring money from one individual or organization to another
Down
- the annual cost of credit
- a government backed security payable in 2 - 10 years
- a record of a borrower's payment of debt
- debt without collateral
- an agreement between two parties in which one provides goods and services understanding that payment will be made at a later date
- a loan with collateral
- the portion of a loan that is interest, or money paid to the borrower
- a table detailing how much interest and how much of the principle is being paid back every month
- a report that details credit history and financial behavior of companies and individuals
- moving a payment from the account of the payer directly to that amount of the recipient
- the mechanism used by a nation to provide and manage its money
- a general increase in prices and decline in the purchasing power of money
23 Clues: lender • borrower • a loan with collateral • debt without collateral • the annual cost of credit • a security with terms of 10-20 years • a record of a borrower's payment of debt • property or assets used to secure a loan • a government backed security payable in 2 - 10 years • a government backed security payable in a year or less • ...
ACE 2023-06-22
Across
- 16th president of the United States.
- One of the founders of the ACE program.
- One of the principles of war. Enough said.
- Founded by Billy Mitchel in 1947.
- Used for safety in mines and computers.
- One of the principles of war. Place the enemy in a disadvantageous position through the flexible application of combat power.
- Bad for your drink and computer memory.
- The Civil war general that the base of US cyber command is named after.
- 5+5=A in this number system.
- Splinter. Alternatively, a popular red team tool developed by Bishop Fox.
- One of the principles of war. Strike the enemy at a time or place or in a manner for which he is unprepared.
- The hall the ACE interns stay in.
- The location of what is often considered the turning point of the Civil War.
- One of the principles of war. Direct every military operation toward a clearly defined, decisive, and attainable objective.
- Is not an option.
- One of the principles of war. Never permit the enemy to acquire an unexpected advantage.
- Following through with what you say you're going to do. One of the ACE core values.
- What leaders are.
Down
- Common mammal that inhabits Rome.
- Being a master of your craft. One of the ACE core values.
- The name of a hidden website on the ace battlefield.
- Doing what's right, even in the face of personal peril. One of the ACE core values.
- The nation that won the most in 2020 ACE capstone.
- Home of the colosseum.
- One of the principles of war. Seize, retain, and exploit the initiative.
- Operating system used for ACE this summer.
- Second year interns who return to help with the program.
- Superuser do. Alternatively, the name of an adorable corgi.
- & development.
- Number of miles ACE interns run every week.
- 1+1=10 in this number system.
- Programming language made by Google. Used on the ACE battlefield.
- The last step of the PBED.
- One of the principles of war. Defined as: concentrate the effects of combat power at the decisive place and time.
- Giving people what they need, when they need it. One of the ACE core values.
35 Clues: & development. • Is not an option. • What leaders are. • Home of the colosseum. • The last step of the PBED. • 5+5=A in this number system. • 1+1=10 in this number system. • Common mammal that inhabits Rome. • Founded by Billy Mitchel in 1947. • The hall the ACE interns stay in. • 16th president of the United States. • One of the founders of the ACE program. • ...
Vocabulaire Voyage 2016-04-28
20 Clues: aisle • to land • to rent • platform • billboard • round trip • to take off • waiting room • baggage claim • to go through • there is room • ticket window • boarding pass • baggage check • security check • customs officer • check-in counter • to check (luggage) • to get (nous form) • to punch (a ticket)
Spotlight 8 7A I don't believe this! 2017-05-09
31 Clues: jo • koe • kuva • sivu • arvata • viesti • halaus • luvata • suukko • edessä • rehtori • puhelin • juliste • kiusaaja • ulkonäkö • onnistua • molemmat • oppitunti • salaisuus • skandaali • häpeissään • kateellinen • valehtelija • turvallisuus • ilmoitustaulu • suostumus,lupa • roska,pötypuhe • epäystävällinen • persoonallisuus • liittyä seuraan • pyytää anteeksi
Crossword Ch. 9,10,11 2012-12-18
22 Clues: tent • left • slice • carrot • to show • counter • fastened • to stretch • human body • im coming! • to bargain • early riser • to have fun • overhead bin • occasionally • store window • market stall • departure time • takeoff(plane) • tube of toothpaste • to take(shoe size) • to go through security
20pt Crossword 2013-02-13
20 Clues: sled • gears • money • fill up • a person • a liquid • win back • not hurt • a choice • draw back • go beyond • take apart • 2 door car • paved roads • keep guarded • keeping clean • motor or engine • the panel of a car • protect from loosing • one street over anther
Week 6 Spelling 2021-11-19
20 Clues: huge • fortress • agreement • calculate • harmonious • collarbone • attractive • small ring • small group • work together • split asunder • limit, confine • tooth on a wheel • brief and compact • climb by crawling • forming of an idea • that which completes • having a common center • relating to highest point • security given for a loan
Redbridge Tuition - Vocabulary - Similar Meanings 1 2021-12-09
25 Clues: calm • clear • pause • funny • oppose • former • trained • hesitant • argument • scarcity • security • willingly • well-known • unhappiness • self-centred • hopelessness • unrestrained • tire or burn • misty or smoky • impoverishment • musty or unfresh • normal or average • disagree or object • indigenous or local • cheapskate or skinflint
17실력 2023-11-17
26 Clues: 관광 • 비행 • 보험 • 여권 • 비자 • 풍경 • 기념품 • 시차증 • 목적지 • 해외로 • 탑승하다 • 전세계에 • 예약하다 • 신청하다 • 출발하다 • 안전 보안 • 수하물 짐 • 풍경(l-) • 착륙하다 땅 • 수표 점검하다 • 안내원 종업원 • 취소하다 취소 • 일정표 여행일기 • 주장 청구 요구하다 • 지연 연기 연기하다 • 멀리가는 여정 여행
On the Go 2 Unit 4 Start 2023-11-28
Across
- sisäänkirjautuminen
- lähteä(esim.lento)
- asemalaituri
- itsepalvelu
- matkustaja
- lento
- istuinpaikka
- satama
- vaunu
- kone
- matkatavarat
- lähtevät
- kolikkoautomaatti
- juna
- matkatavarat
- tulli
Down
- kuulutus
- tarkastus
- saapuvat
- tullata
- turvallisuus
- lautta
- kyltti
- junavirkailija
- matkustamohenkilökunta
- matkalippu
- maihinnousukortti
- portti
- valmis
- matkalaukku
30 Clues: kone • juna • lento • vaunu • tulli • lautta • kyltti • satama • portti • valmis • tullata • kuulutus • saapuvat • lähtevät • tarkastus • matkustaja • matkalippu • itsepalvelu • matkalaukku • asemalaituri • turvallisuus • istuinpaikka • matkatavarat • matkatavarat • junavirkailija • maihinnousukortti • kolikkoautomaatti • lähteä(esim.lento) • sisäänkirjautuminen • matkustamohenkilökunta
HHSC IT Crossword 2020-07-13
21 Clues: news • DCIO • phone • Blanco • Portal • network • IT guys • support • Reset your • social media • chief of staff • device refresh • all agency news • Risk assessment • virtual meetings • Upload your files to • update your timesheet • you can find it on our • culture and engagement • collection of programs • to access your work computer
22a 2024-06-22
Across
- Supply officer
- Elite infantry
- Expeditionary force
- Training NCOs
- Medical unit
- Heavy weapon operators
- Ground unit officers
- Ground troops
- Communications unit
Down
- Helicopter operator
- Heavy aircraft crew
- Maritime security
- Battlefield builders
- Longrange marksmen
- Cannon crew
- Armored vehicle crew
- Scouting team
- Armed police
- Jet pilot
- Elite naval unit
20 Clues: Jet pilot • Cannon crew • Armed police • Medical unit • Scouting team • Training NCOs • Ground troops • Supply officer • Elite infantry • Elite naval unit • Maritime security • Longrange marksmen • Helicopter operator • Heavy aircraft crew • Expeditionary force • Communications unit • Battlefield builders • Armored vehicle crew • Ground unit officers • Heavy weapon operators
SUMMARY 2023-06-14
Across
- popyt
- giełda papierów wartościowych
- pożyczkodawca
- akcja
- pracodawca
- wypłata pracownika fizycznego
- gospodarstwo domowe
- rynek pracy
- negocjować
- podaż
- ubezpieczenie
- wypłacać (pieniądze)
- podatek
- przedsiębiorca
Down
- pracownik
- hipoteka
- nakładać podatek
- konsument
- nabywać
- papier wartościowy
- rachunek (np. bankowy)
- dotacja
- etyka
- obligacja
- lokata
- rekrutacja
26 Clues: popyt • akcja • etyka • podaż • lokata • nabywać • dotacja • podatek • hipoteka • pracownik • konsument • obligacja • pracodawca • negocjować • rekrutacja • rynek pracy • pożyczkodawca • ubezpieczenie • przedsiębiorca • nakładać podatek • papier wartościowy • gospodarstwo domowe • wypłacać (pieniądze) • rachunek (np. bankowy) • giełda papierów wartościowych • wypłata pracownika fizycznego
Sectors of the Indian Economy 2021-09-21
Across
- Sustainable development takes care of present and ________
- Which sector is also called agricultural sector
- Cotton is a _________ product
- A large proportion of labourers in India are working in which sector
- Which sector is also called manufacturing sector
- The activities in Primary, Secondary and Tertiary sector are ____________
Down
- Job assurance in rural areas
- DAV group of schools come under which sector
- Health care centre come under which sector
- In which sector workers enjoy job security
- In which sector workers do not produce goods
- unorganised sector does not has _____ security
12 Clues: Job assurance in rural areas • Cotton is a _________ product • Health care centre come under which sector • In which sector workers enjoy job security • DAV group of schools come under which sector • In which sector workers do not produce goods • unorganised sector does not has _____ security • Which sector is also called agricultural sector • ...
Confidentiality test 2025-02-06
Across
- religion, etc.
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- insurance information
Down
- actions, supervisory notations
- in the Workplace keeping employee, customer and client information private
- set of rules or promises which limits access or places restrictions on certain
- Espionage form of espionage conducted for commercial purposes rather than security;
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
confidenality 2025-02-06
Across
- Espionage form of espionage conducted for commercial purposes rather than security;
- information
- set of rules or promises which limits access or places restrictions on certain
- work history, date of birth, social security number, criminal record,
- involves individuals hired to steal trade secrets, new products or
- actions, supervisory notations
- or Sensitive Data information about an employee prior to employment such as a résumé,
Down
- etc.
- Data records of an employee’s performance on the job such as performance reports,
- insurance information
- in the Workplace keeping employee, customer and client information private
- Data information which may arise from employment-related physicals, drug tests and
- of information
13 Clues: etc. • information • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • in the Workplace keeping employee, customer and client information private • ...
Chapter 10 Security Plus 2024-03-21
Across
- tool that provides a visual representation of the wireless signal
- uses digital certificates for authentication
- An in-depth examination and analysis of a WLAN site
- usage in contactless payments
- An EAP method designed to simplify the deployment of 802.1x
- web page that is displayed to users when they attempt to access a public network
- accesses unauthorized information from a Bluetooth connection
- A wireless attack in which false deauthentication
Down
- securely tunnels any credential form for authentication using TLS
- sends unsolicited messages to Bluetooth-enabled devices
- The encryption protocol used for WPA2
- standards used to transmit information from tags to a proximity reader
- A framework for transporting authentication protocols
- A wireless technology that uses short-range radio frequency
- An unauthorized AP that allows an attacker to bypass many of the network security
- Intentionally flooding the radio frequency spectrum
- An AP set up by an attacker to mimic an authorized AP
17 Clues: usage in contactless payments • The encryption protocol used for WPA2 • uses digital certificates for authentication • A wireless attack in which false deauthentication • An in-depth examination and analysis of a WLAN site • Intentionally flooding the radio frequency spectrum • A framework for transporting authentication protocols • ...
Security Plus Chapter 6 2024-03-11
Across
- Circumventing the installed built-in limitations on Apple iOS devices
- facilitates communication between devices and the cloud
- coverage area is divided into hexagon-shaped cells
- OS that guarantees real-time applications a certain capability within a specified deadline
- A coding technique for accounting for errors
- make a real-time operating system more resilient to attacks
- Downloading unofficial and unapproved apps
- testing software before the source code is compiled
- refers to integrating security into the application
Down
- The ability to resist attacks
- ensuring timely and reliable access to devices
- instrumentation used for industrial process control
- involves isolating sensitive enterprise data
- Examining code after the source code
- security constraint in which a device’s small size results in low processing
- A system that controls multiple industrial control systems (ICS)
- Tools that allow a device to be managed remotely by an organization
17 Clues: The ability to resist attacks • Examining code after the source code • Downloading unofficial and unapproved apps • involves isolating sensitive enterprise data • A coding technique for accounting for errors • ensuring timely and reliable access to devices • coverage area is divided into hexagon-shaped cells • instrumentation used for industrial process control • ...
Cyber Safety 2022-02-10
7 Clues: How to stay safe online • Never share this online • Do not talk to these people • Don't fall for these online • What is left behind after going online • Can show lots of information in the background • Ensure they are strong so you don't get hacked
Cyber Bullying 2022-03-23
7 Clues: a place to research • Being rude to someone • a source of technolgy • not being kind to someone • something every local place has • online site to send and receive • a way of contacting friends and family
Cyber Mobbing 2016-02-08
Across
- B ... sichern, damit deine Geschichte glaubhaft ist.
- S ... Die beharrliche Verfolgung einer Person.
- D ... Daten einer Person zu verändern, zu löschen oder unbrauchbar zu machen.
Down
- S ... Nutzerinnen/Nutzer die Dich belästigen.
- Die Belästigungen finden rund um die Uhr und im Internet statt.
- B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten.
- N ... Jemand anderen mit Gewalt oder durch gefährliche Drohung zu einer Handlung anstiften.
7 Clues: S ... Nutzerinnen/Nutzer die Dich belästigen. • S ... Die beharrliche Verfolgung einer Person. • B ... sichern, damit deine Geschichte glaubhaft ist. • Die Belästigungen finden rund um die Uhr und im Internet statt. • B ... In der Öffentlichkeit eine Person zu beschimpfen oder zu verspotten. • ...
Cyber Crimes 2017-01-24
7 Clues: online harrasment • floods the bandwidth • Crimes using computers • counterfeiting products • disguising as trustworthy • Program that copies itself • gaining unauthorized access
Cyber Bullying 2021-06-03
7 Clues: When you don't feel safe • How you treat others nicely • People who watch a situation • When you are influenced to do something • When you ask your parent for permission • A place where you can communicate with technology • Communicate with people online and sharing photos
Cyber Test 2024-06-18
Across
- Il processo di codificare le informazioni per proteggerle dagli accessi non autorizzati
- Un metodo di verifica dell'identità che richiede due forme di identificazione
- Programma che registra segretamente le sequenze di tasti premuti su una tastiera
Down
- Tecnica di attacco che utilizza email fraudolente per rubare informazioni sensibili
- Attività illegale di ottenere accesso non autorizzato a sistemi informatici
- Software dannoso progettato per danneggiare o disabilitare computer e sistemi
- Una rete di computer infettati da malware controllati da un singolo attaccante
7 Clues: Attività illegale di ottenere accesso non autorizzato a sistemi informatici • Software dannoso progettato per danneggiare o disabilitare computer e sistemi • Un metodo di verifica dell'identità che richiede due forme di identificazione • Una rete di computer infettati da malware controllati da un singolo attaccante • ...
Cyber Puzzle 2025-01-28
Across
- A secret word or phrase used to access a system.
- A copy of important data to restore in case of loss.
- Someone who tries to break into computer systems.
Down
- A type of malicious software that spreads between computers.
- Unwanted or unsolicited emails.
- A system that protects a network from unauthorized access.
- A fraudulent attempt to steal sensitive information.
7 Clues: Unwanted or unsolicited emails. • A secret word or phrase used to access a system. • Someone who tries to break into computer systems. • A copy of important data to restore in case of loss. • A fraudulent attempt to steal sensitive information. • A system that protects a network from unauthorized access. • ...
Cyber Clues 2025-01-22
Across
- Creating a step-by-step series of commands for a computer to follow
- A character or image that can be created and programmed to move, appear, and make sounds
- Ability to use digital tools effectively
- Simplifying complex problems by removing non- essential details
Down
- A category of blocks (yellow) that starts the event
- Breaking a problem into smaller, manageable parts
- Visual Block-based programming language for young learners
7 Clues: Ability to use digital tools effectively • Breaking a problem into smaller, manageable parts • A category of blocks (yellow) that starts the event • Visual Block-based programming language for young learners • Simplifying complex problems by removing non- essential details • Creating a step-by-step series of commands for a computer to follow • ...
CYBER BULLYING 2026-03-28
Across
- Sharing someone’s private messages or secrets publicly without permission.
- Being deliberately left out of an online group or activity.
- Posting angry, offensive comments in an online chat or discussion.
Down
- Receiving repeated rude or hurtful messages online every day.
- Taking over someone’s account and posting content pretending to be them.
- Gaining someone’s trust online and then using it to expose their secrets.
- Creating or spreading false stories to damage someone’s reputation online.
7 Clues: Being deliberately left out of an online group or activity. • Receiving repeated rude or hurtful messages online every day. • Posting angry, offensive comments in an online chat or discussion. • Taking over someone’s account and posting content pretending to be them. • Gaining someone’s trust online and then using it to expose their secrets. • ...
chapter 9 2015-04-06
Across
- / If an organization asks you to disclose your social security number, but fails to establish a set of procedures and policies for protecting your privacy, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / If an organization asks you to disclose your social security number, yet fails to properly dispose of your private information once it has fulfilled its purpose, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / If an organization asks you to disclose your social security number, yet fails to permit you to opt-out before you provide the information, the organization has likely violated which of the Generally Accepted Privacy Principles? (3words)
- / If an organization asks you to disclose your social security number, but fails to tell you about its privacy policies and practices, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / One way to circumvent the counterfeiting of public keys is by using a ________(2words)
- / Information encrypted with the creator's private key that is used to authenticate the sender is digital_________
Down
- / A process that takes plaintext of any length and transforms it into a short code.
- / _________encryption and hashing are used to create digital signatures.
- / The system and processes used to issue and manage asymmetric keys and digital certificates are known as_______(3words)
- / ______encryption systems use the same key to encrypt communications and to decrypt communications?
- / If an organization asks you to disclose your social security number, but decides to use it for a different purpose than the one stated in the organization's privacy policies, the organization has likely violated which of the Generally Accepted Privacy Principles?
- / _______certificate is a electronic document that certifies the identity of the owner of a
- / In a private key system the sender and the receiver have the same key, and in the public key system they have two ________keys.
- / If an organization asks you to disclose your date of birth and your address, but refuses to let you review or correct the information you provided, the organization has likely violated which of the Generally Accepted Privacy Principles?
14 Clues: / _________encryption and hashing are used to create digital signatures. • / A process that takes plaintext of any length and transforms it into a short code. • / One way to circumvent the counterfeiting of public keys is by using a ________(2words) • / _______certificate is a electronic document that certifies the identity of the owner of a • ...
UNIT 11 2023-02-23
September 2021 Newsletter Crossword Puzzle 2021-08-30
Across
- A password attack that attempts to guess passwords using a powerful computer.
- A malicious program that replicates itself in the infected computer’s memory and spreads.
- A type of authentication that combines two or more credentials such as what one knows (a password), what one has (PIV), and/or what the user is (biometric verification).
- A cyberattack that uses a list of usernames from a data breach and a list of the top used passwords to test a large number of accounts until the accounts are accessed.
- A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure.
- A password cannot be reused by a Forest Service employee that was used in the last <how many> passwords.
Down
- A type of password attack where the cyber attacker uses a stuffing approach with usernames and passwords obtained from a data breach to access other accounts.
- A cyber attacker uses a strong computer to try every word in a type of vocabulary/reference book to guess a password.
- A type of malware that is installed on a user’s computer without their knowledge to monitor the user’s computer and activity to collect information.
- A string of characters that protect access to your computer and software applications from unauthorized users.
10 Clues: A password attack that attempts to guess passwords using a powerful computer. • A malicious program that replicates itself in the infected computer’s memory and spreads. • A chain of 3 - 4 words that are easy to remember, but long and complex enough to be secure. • ...
Greydi Lizbeth-Grade 6-ity or y 2021-03-15
14 Clues: lesión • popular • mayoria • forever • madurez • humedad • capacity • resources • humanidad • oportunidad • citizenship • resbaladizo • opposite of division • in the bank they have a guardian so that is having __________.
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security provides ____ by including anti-theft tools to locate, lock, and wipe lost or stolen devices. (Starts with s)
- Trend Micro Mobile Security provides ____ controls to manage children's device usage and restrict access to inappropriate content
- Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m)
Down
- Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v)
- Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission
- Trend Micro Mobile Security provides safe ____ features to protect users from online threats while browsing the internet. (Starts with s)
6 Clues: Trend Micro Mobile Security provides malware scanning and detection to find ____ (Starts with v) • Trend Micro Mobile Security provides web browsing protection to block ____ websites and phishing attempts (Starts with m) • Trend Micro Mobile Security provides privacy scanning to identify apps that my be accessing ____ information without permission • ...
Globalisasi Bidang Kriminalitas (Najla Meuthya Okri F2.5) 2024-09-17
Across
- penyalahgunaan informasi untuk mendapatkan keuntungan yang tidak sah
- kejahatan yang tidak melibatkan korban
- proses kriminalitas yang pelaku mulai melaksanakan aksi kriminalitas yang telah direncanakan
- proses yang melibatkan pemalsuan uang dan dokumen secara ilegal
- Aktivitas kriminalitas yang melibatkan perdagangan manusia
- gejala terjadi nya kriminalitas perdagangan internasional merupakan bentuk dari bidang
- Sistem hukum internasional yang mengatur peradilan terhadap kejahatan transnasional
Down
- proses menjual atau mendistribusikan narkoba secara ilegal
- organisasi internasional yang berupaya memberantas kriminalitas global
- penggunaan internet untuk mengirim spam atau virus untuk tujuan jahat
- Tahap pertama dari kriminalitas
- istilah untuk penipuan yang dilakukan dengan mengelabui orang melalui medsos
- teori kriminalitas yang dikemukakan oleh Emile durkheim
- jenis kejahatan yang dilakukan di dunia Maya
- singkatan yang umum digunakan untuk globalisasi kriminalitas dalam konteks internasional
15 Clues: Tahap pertama dari kriminalitas • kejahatan yang tidak melibatkan korban • jenis kejahatan yang dilakukan di dunia Maya • teori kriminalitas yang dikemukakan oleh Emile durkheim • proses menjual atau mendistribusikan narkoba secara ilegal • Aktivitas kriminalitas yang melibatkan perdagangan manusia • proses yang melibatkan pemalsuan uang dan dokumen secara ilegal • ...
Software engineer's essentials 2026-02-05
Across
- AI-created fake images, videos, or audio
- Rules and processes for managing systems or organizations
- Actions taken to protect against threats
- Ability to control your own technology and data
- Releasing a system or feature to users
- Ability of a system to learn or reason
- Fake emails or messages used to steal user data
- Software designed to harm or exploit a system
Down
- Cyber attacks that use AI to automate or improve attacks
- Safety rules that limit what an AI system can do
- Data used to authenticate a user
- Controlled or executed by code
- The part of code that carries out the main action
- Secretly collecting sensitive information
- Unauthorized use or violation of rules
15 Clues: Controlled or executed by code • Data used to authenticate a user • Releasing a system or feature to users • Ability of a system to learn or reason • Unauthorized use or violation of rules • AI-created fake images, videos, or audio • Actions taken to protect against threats • Secretly collecting sensitive information • Software designed to harm or exploit a system • ...
Security 2014-03-04
5 Clues: being recognised via your iris • being recognised via your voice • being recognised via your fingers • being recognised via unique features • selective restrcition of access to a resource
Security 2022-05-16
Across
- An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on. What is this type of attack called?
- In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD
Down
- You should not just check identity, you should also confirm
- when a container runs in this mode, it is granted most system capabilities available on the host
- After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called?
5 Clues: You should not just check identity, you should also confirm • when a container runs in this mode, it is granted most system capabilities available on the host • In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD • ...
Security 2022-09-09
5 Clues: Example of Abstract Role • default access available to all users • Manage application security in your Oracle Applications Cloud • represent the individual duties that users with those job can perform • Controls access to user interfaces and actions needed to perform the tasks of a job
Security 2022-09-09
5 Clues: Example of Abstract Role • default access available to all users • Manage application security in your Oracle Applications Cloud • represent the individual duties that users with those job can perform • Controls access to user interfaces and actions needed to perform the tasks of a job
Security of the Believer 2025-06-13
Across
- Nothing can separate us from the ____ __ ___ (Romans 8:39)
- By hearing and believing, we are given _____ life (John 5:24)
- We are NOT saved through these (Ephesians 2:9)
- The best thing we can do when we have doubts is ____ to God
- The title of our book is "Your life as a _______"
- All that come to Jesus will in no way be ____ ___ (John 6:37)
- We are saved THROUGH this (Ephesians 2:8)
Down
- We are saved BY this (Ephesians 2:8)
- This is when you are not sure about something
- This is anything we do that is wrong and contrary to what God wants
- This is another gift from God through Jesus (Page 11)
- This is who paid the death penalty for our sins
- This is the gift God gives us when we believe and ask forgiveness (Page 11)
- Death is not an accident; it is an ________ (Page 13)
- This is who we studied about in Bible School this week.
- The wages of sin is ______ (Romans 6:23)
- When we confess, God is ______ and just to forgive us (1 John 1:9)
17 Clues: We are saved BY this (Ephesians 2:8) • The wages of sin is ______ (Romans 6:23) • We are saved THROUGH this (Ephesians 2:8) • This is when you are not sure about something • We are NOT saved through these (Ephesians 2:9) • This is who paid the death penalty for our sins • The title of our book is "Your life as a _______" • ...
Cyber Crossword Puzzle v3.1 2020-09-21
Across
- A collection of information that is organized so that it can easily be accessed, managed and updated
- A form of malware that can replicate and spread without the need for human or system interaction. Think of it as malware on autopilot
- gaining unauthorized logical access to sensitive data by circumventing a system's protections
- Never share your _________ with another person
- encrypted form of the message being sent
- The process of converting information or data into a code
- sequence of eight bits
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
Down
- A type of malware that can secretly record a user’s keystrokes and send them to an unauthorised third party
- approval, permission, or empowerment for someone or something to do something
- stripping one llayer's headers and passing the rest of the packet up to next higher layer
- process of confirming the correctness of the claimed identity
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
- Used to describe hacking activity carried out for a political, ethical or societal end
- Files placed on your computer to allow websites to remember details
15 Clues: sequence of eight bits • encrypted form of the message being sent • Never share your _________ with another person • The process of converting information or data into a code • process of confirming the correctness of the claimed identity • Files placed on your computer to allow websites to remember details • ...
Unit 3 Cyber World 2024-03-11
Across
- Everyone is posting ________ of themselves with the Chubby Heart in Central.
- Nelson updated his antivirus program to protech his comuter against _________.
- __________ scams look like they are from familiar websites to steal our personal information.
- Mr wong set up a firewall to block _________ access for his home network because he was worried about cybercrime.
- To avoid being a _________ of the scam, always double-check the links and email address.
- We need to set up an anti-________ filter to block those annoying messages.
- Time wanted to get the latest version of the smartphone because it had much better _______ life.
Down
- It is a good idea to keep your personal details __________ on the Internet.
- ________________ may try to download malware to your computer.
- Jenny is completely ___________ on the video games. She played it all day!
- To deal with social media overuse, it is better for you to turn off _____________ on your phone.
- Blind people have special programmes to help them _______ online.
- She's obsessed with the new online novel and can't put it down.
- Governments usually _______ the data on their websites to protect citizens' information.
- ________ is a big problem for singers as people download their music without paying for it.
15 Clues: ________________ may try to download malware to your computer. • She's obsessed with the new online novel and can't put it down. • Blind people have special programmes to help them _______ online. • Jenny is completely ___________ on the video games. She played it all day! • It is a good idea to keep your personal details __________ on the Internet. • ...
Cyber ethics crosswords 76 2025-05-28
Across
- Name used to log into websites or apps
- Secret code to access an account
- Name used to log into a system
- Breaking into a system without permission
- Online bulling or harassment
- rules of right and wrong behavior online
- Blocks unauthorized access to a network
Down
- Software that secretly gathers your information
- theft Stealing someone's personal or confidential data
- Fake emails to steal personal data
- Keeping your personal information safe
- Harmful software that damages systems
- Scrambling data to prevent unauthorized access
- program that spreads and corrupts files
- Protects against harmful programs
- A trick to steal your data or money
16 Clues: Online bulling or harassment • Name used to log into a system • Secret code to access an account • Protects against harmful programs • Fake emails to steal personal data • A trick to steal your data or money • Harmful software that damages systems • Name used to log into websites or apps • Keeping your personal information safe • program that spreads and corrupts files • ...
Loss Prevention 2024-10-17
Across
- The process of reducing inventory loss
- Training employees on policies and procedures
- A type of theft involving employees
- This device is often used to catch shoplifters
Down
- To inform authorities about theft
- The act of stealing goods from a store
- Loss due to theft, error, or fraud
- A strategy used to deter theft
- A suspicious behavior often seen in thieves
- Security tags used to deter theft
10 Clues: A strategy used to deter theft • To inform authorities about theft • Security tags used to deter theft • Loss due to theft, error, or fraud • A type of theft involving employees • The act of stealing goods from a store • The process of reducing inventory loss • A suspicious behavior often seen in thieves • Training employees on policies and procedures • ...
Foxtrot | Crossword 2024-09-03
8 Clues: Tests on patients • Asylum Security team • Patient Transfer zone • Area with patient cells • Special Operations team • Keycard that opens all doors • Responds in case of emergencies • More dangerous patients are placed here
The Kieronasaurus Krossword 2018-01-03
Across
- Notice, Choice, Onward transfers, Access< Security, Data integrity, Enforcement
- Data collected by you yourself.
- An information classification expressed as numbers only.
- Triad
- Defined as direct physical threat to a country, but could also be a threat to financial security.
- amount of data protection principles.
- footprint Any traceable action you or others take on the internet
- Computer hardware that cannot be moved
Down
- Attack on a business's servers not only impacts on the business or individual it holds data for
- Announcements or adverts. Small amounts of information sent easily.
- the ability to change the displayed content.
- The amount of information that can be held.
- Raw facts and figures.
- Canada's data protection legislation.
- The language that websites are written in
- A closed, private network within a building or company.
16 Clues: Triad • Raw facts and figures. • Data collected by you yourself. • Canada's data protection legislation. • amount of data protection principles. • Computer hardware that cannot be moved • The language that websites are written in • The amount of information that can be held. • the ability to change the displayed content. • ...
Unit4 2020-12-31
Moritz Quiz 2021-02-01
TUGAS BK 2024-02-05
Across
- bullying yang melibatkan penggunaan kata-kata untuk menyakiti, merendahkan, atau mengintimidasi seseorang adalah bullying Verbal
- mencegah bullying dengan cara menerapkan Edukasi
- dalam media sosial Cyber bullying
- bullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi
- lain dari bullying Perundungan
Down
- mengancam, mempermalukan, mengganggu, memberi panggilan nama, merendahkan, intimidasi, memaki, dan menyebarkan gosip buruk disebut Bullying
- pelaku bullying Bullies
- penelitian bullying Olweus
- bully berasal dari bahasa Inggris
- satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain Iri
10 Clues: penelitian bullying Olweus • pelaku bullying Bullies • bully berasal dari bahasa Inggris • dalam media sosial Cyber bullying • lain dari bullying Perundungan • bullying yang menyebabkan peningkatan dan penurunan suasana hati Depresi • ...
Bullying Crossword Ward 2025-02-03
Across
- Someone who is helpful toward the person being bullied.
- This type of bullying can hurt someone's body.
- Sending someone mean messages over and over.
- The person who someone tries to bully.
Down
- This type of verbal bullying makes someone feel unsafe.
- Someone who does mean things to someone less powerful than them.
- Hurtful words are used in this type of bullying.
- Repeatedly excluding someone to be mean.
- Someone who watches the bullying.
9 Clues: Someone who watches the bullying. • The person who someone tries to bully. • Repeatedly excluding someone to be mean. • Sending someone mean messages over and over. • This type of bullying can hurt someone's body. • Hurtful words are used in this type of bullying. • This type of verbal bullying makes someone feel unsafe. • ...
Security 2024-06-05
Across
- new versions of software that are released by the software vendor.
- a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account.
Down
- a copy of your data that is stored in a safe location.
- a type of social engineering attack where attackers try to trick users into revealing personal information, such as their usernames, passwords, or credit card numbers.
- a type of software that is designed to harm a computer system.
5 Clues: a copy of your data that is stored in a safe location. • a type of software that is designed to harm a computer system. • new versions of software that are released by the software vendor. • a secret word or phrase that is used to verify the identity of a user and grant them access to a computer system or account. • ...
STOP BULLYING 2023-10-19
5 Clues: online bullying • Uses words to hurt someone • Using force to hurt someone • Hurt someone else's relationship • Uses their body to hurt someone else
M7 Crossword Puzzle 2024-10-22
Across
- The process of converting data into a code to prevent unauthorized access.
- Rights Management (DRM) Technologies that control the use of digital content, preventing unauthorized distribution.
- on Security Investment (ROSI) A calculation that compares the value gained from security measures with the cost.
- A copy of data stored separately to prevent loss in case of a system failure.
- Rights granted to users to perform specific actions, such as reading or editing files.
- A system that monitors and controls incoming and outgoing network traffic to protect against threats.
- Actions taken to reduce risk or lessen the impact of potential threats.
Down
- A legal right that gives the creator of an original work exclusive rights to its use and distribution.
- A symbol, word, or phrase legally registered to represent a company or product.
- Account Control (UAC) A security feature in Windows that requires administrative approval before making changes.
- Breach The unauthorized access and retrieval of sensitive information.
- Visualization The graphical representation of data to make it easier to understand.
- Assessment The process of identifying and evaluating risks to minimize potential harm.
- An exclusive right granted for an invention, providing protection for a limited period.
- The process of setting up software on a device.
- Availability Ensures systems remain operational without downtime.
- Tolerance Technology that ensures a system remains operational even if part of it fails.
17 Clues: The process of setting up software on a device. • Actions taken to reduce risk or lessen the impact of potential threats. • The process of converting data into a code to prevent unauthorized access. • A copy of data stored separately to prevent loss in case of a system failure. • A symbol, word, or phrase legally registered to represent a company or product. • ...
unit 3 vocab cyber 2021-09-28
Across
- an attempt by hackers to damage or destroy a computer network or system
- users cycle through different roles
- allow user to share folders
- those a user receives through another object, such as a group
- Physical token inserted into a computer’s USB port
- user can be granted additional rights to data beyond what is allowed by assigned access level
- type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
Down
- type of malware that spreads copies of itself from computer to computer
- process of validating a user
- a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs
- those a user receives by default at a lower level
- measurement and analysis of a biological feature
- denying an authorized biometric credential
- those a user is given at a specific location
- when far and frr are equal
15 Clues: when far and frr are equal • allow user to share folders • process of validating a user • users cycle through different roles • denying an authorized biometric credential • those a user is given at a specific location • measurement and analysis of a biological feature • those a user receives by default at a lower level • Physical token inserted into a computer’s USB port • ...
Cyber Unit 15 Test 2025-04-11
Across
- Overwhelming a server with traffic, in short
- ___ force attack: trial-and-error password cracking method
- Social engineering tactic involving made-up scenarios
- Self-replicating malware that spreads without needing a host file
- Software that filters out unwanted junk in your inbox
- Umbrella term for all malicious software
- Software that detects and removes hidden surveillance tools
- Digital barriers that block unauthorized access
Down
- Secretly gathers data on you without consent
- Malware disguised as legitimate software
- Network of hijacked computers under remote control
- Software that protects your system from malicious programs
- Infected computer controlled remotely, like the undead
- Malicious code that replicates by attaching to clean files
- Annoying pop-ups and promos installed with free apps
15 Clues: Malware disguised as legitimate software • Umbrella term for all malicious software • Overwhelming a server with traffic, in short • Secretly gathers data on you without consent • Digital barriers that block unauthorized access • Network of hijacked computers under remote control • Annoying pop-ups and promos installed with free apps • ...
Immigration 2025-08-29
14 Clues: bot • søke • stans • utsatt • bestå av • folketrygd • skaffe seg • stå overfor • presidentmakt • fødselsattest • rettskjennelse • få tilgang til • arbeidstillatelse • oppholdstillatelse
bullying crossword 2014-06-05
Across
- the person who is being mean to the victim
- when things are said that arnt true
- attacking the victim and contact with the victim
- making someone feel as they have to do what you tell them to do
- threatening someone or making them scared enough to make them do what you want
- hitting or hurting someone
- when you call someone names.
Down
- the person who is getting bullied
- when its done through social media
- when you leave someone out of the group
- a person who is watching but doesnt do anything about it
- is a crime
- groups that hep you with bullying
- when its done face to face
- : use of words that upset the victim
15 Clues: is a crime • when its done face to face • hitting or hurting someone • when you call someone names. • the person who is getting bullied • groups that hep you with bullying • when its done through social media • when things are said that arnt true • : use of words that upset the victim • when you leave someone out of the group • the person who is being mean to the victim • ...
