cyber security Crossword Puzzles

Health 2025-05-13

Health crossword puzzle
Across
  1. adding a regular physical activity into daily life
  2. keeping your body healthy by showering, wearing deodorant,and brushing your teeth.
  3. people who are related to you and you can rely on
  4. a key step in having good physical health
  5. people you can rely on when things are bad
  6. the state of being healthy in physical mental and social
  7. the state of being ill
Down
  1. state of complete physical, mantal, and social well-being.
  2. provides essential nutrients for maintaining and improving overall health
  3. the condition of being physically fit and healthy.
  4. how you feel and your emotions.
  5. sadness, happiness, anger
  6. eating health and getting enough sleep.
  7. people who bully online
  8. your friend and family relationships.

15 Clues: the state of being illpeople who bully onlinesadness, happiness, angerhow you feel and your emotions.your friend and family relationships.eating health and getting enough sleep.a key step in having good physical healthpeople you can rely on when things are badpeople who are related to you and you can rely on...

CM-BCMS 2025-04-04

CM-BCMS crossword puzzle
Across
  1. Harmful software that infiltrates and disrupts systems
  2. A sudden event causing disruption or harm to operations
  3. Fraudulent phone calls designed to extract sensitive details
  4. Analyzing potential risks to prepare for future challenges
  5. A critical situation requiring urgent decision-making
  6. Framework ensuring operations continue despite challenges.
  7. Potential actions that compromise digital safety
  8. A technique used to take advantage of system vulnerabilities
  9. Interconnected systems for sharing resources and information
  10. A state of readiness to effectively manage crises
  11. The process of converting information into secure code
Down
  1. Verifying a user’s identity to ensure security
  2. The capacity to adjust quickly to changing situations
  3. Steps taken to reduce the impact of potential risks
  4. Restoring critical business operations after a crisis
  5. The ability to adapt and recover during disruptions
  6. A security barrier protecting networks from external threats

17 Clues: Verifying a user’s identity to ensure securityPotential actions that compromise digital safetyA state of readiness to effectively manage crisesSteps taken to reduce the impact of potential risksThe ability to adapt and recover during disruptionsThe capacity to adjust quickly to changing situations...

Crossword Puzzle on Cybersecurity 2026-01-20

Crossword Puzzle on Cybersecurity crossword puzzle
Across
  1. Umbrella term for malicious software.
  2. Code or technique used to take advantage of a vulnerability.
  3. Fraudulent attempt to obtain sensitive information through deception.
  4. Malicious program that records keystrokes.
  5. Unknown vulnerability with no available patch.
  6. Security technique that executes programs in an isolated environment.
  7. Process of verifying a user's identity.
  8. One-way process used to securely store passwords.
  9. A weakness that can be exploited by an attacker.
  10. Harmful component delivered by malware.
Down
  1. Security device that filters network traffic based on rules.
  2. Technique used to protect data by converting it into unreadable form.
  3. Malware designed to hide itself and maintain privileged access.
  4. Malware that encrypts files and demands payment.
  5. Group of compromised systems controlled remotely.
  6. Defines what an authenticated user is allowed to do.
  7. Unauthorized attempt to access a system.

17 Clues: Umbrella term for malicious software.Process of verifying a user's identity.Harmful component delivered by malware.Unauthorized attempt to access a system.Malicious program that records keystrokes.Unknown vulnerability with no available patch.Malware that encrypts files and demands payment.A weakness that can be exploited by an attacker....

Español 2014-10-06

Español crossword puzzle
Across
  1. death
  2. snake
  3. difficult
Down
  1. sad
  2. ambiguity
  3. happy
  4. safety/security
  5. faith
  6. danger
  7. love
  8. easy

11 Clues: sadloveeasydeathhappyfaithsnakedangerambiguitydifficultsafety/security

Confidentiality test 2025-02-06

Confidentiality test crossword puzzle
Across
  1. Data records of an employee’s performance on the job such as performance reports,
  2. or Sensitive Data information about an employee prior to employment such as a résumé,
  3. of espionage conducted for commercial purposes rather than security;
  4. involves individuals hired to steal trade secrets, new products or
  5. actions, supervisory notations
  6. in the Workplace keeping employee, customer and client information private
Down
  1. work history, date of birth, social security number, criminal record,
  2. religion, etc.
  3. information
  4. insurance information
  5. Espionage
  6. Data information which may arise from employment-related physicals, drug tests and

12 Clues: Espionageinformationreligion, etc.insurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orof espionage conducted for commercial purposes rather than security;work history, date of birth, social security number, criminal record,...

IR - Module 1 2024-12-05

IR - Module 1 crossword puzzle
Across
  1. US and ----- were the superpowers emerged after WWII
  2. The period from 1945-1991
  3. The IGO formed after WW 2
  4. This level of IR analysis states that single countries can influence IR
  5. The process of managing / governing people in a place.
  6. The treaty to punish Germany is
  7. The relationship between nation states is called
  8. The second name of the person behind systems theory.
  9. Promote peace and security among nations, Kill evils in the society.
  10. Looting one country by another country is
Down
  1. Treaty of ---- was signed on 1648
  2. ..... conference was held in 1919 Jan
  3. The process of making slaves and setting empire is called
  4. The treaty to end war on Spanish succession was ..... treaty.
  5. Germany, Austria-Hungary, Italy
  6. German ruler during WW I
  7. Nation security is a matter of importance and selfishness
  8. This level of IR analysis says that a single person can influence in IR

18 Clues: German ruler during WW IThe period from 1945-1991The IGO formed after WW 2Germany, Austria-Hungary, ItalyThe treaty to punish Germany isTreaty of ---- was signed on 1648..... conference was held in 1919 JanLooting one country by another country isThe relationship between nation states is calledUS and ----- were the superpowers emerged after WWII...

Diary Of A Wimpy Kid 2024-04-11

Diary Of A Wimpy Kid crossword puzzle
Across
  1. what did Greg want to do for Christmas?
  2. what did mom and dad always do?
  3. what did Greg want to swim with at the beach
  4. What kept Greg awake?
  5. What did Greg think he swallowed in the water?
  6. Who helped Greg escape security?
  7. How did the Heffley's get to Isla de corales?
  8. What did Manny steal from the beach?
  9. What happened to the banana raft?
Down
  1. When did the Heffley's leave their home?
  2. How did they find out about the resort?
  3. what did the Heffleys steal from the security to run away?
  4. when should have the Heffley's left to get to the airport
  5. what would Greg rather do then go on vacation?
  6. who is the author?
  7. what did the Heffley's grab the wrong of
  8. What kind of animal was at the resort bar?
  9. Who is the main character?

18 Clues: who is the author?What kept Greg awake?Who is the main character?what did mom and dad always do?Who helped Greg escape security?What happened to the banana raft?What did Manny steal from the beach?How did they find out about the resort?what did Greg want to do for Christmas?When did the Heffley's leave their home?...

vocab 2023-01-25

vocab crossword puzzle
Across
  1. where securities are created,
  2. a digital system that matches buyers and sellers looking to trade securities in the financial markets.
  3. a security—usually a bond or a preferredstock stock that can be converted into a different security—typically shares of the company's common stock.
  4. A class of stock that is granted certain rights that differ from common stock.
  5. a pooled collection of assets that invests in stocks, bonds, and other securities.
  6. securities that are not listed on a major exchange in the United States and are instead traded via a broker-dealer network
  7. funds that trade on exchanges, generally tracking a specific index.
  8. provide liquidity and depth to markets and profit from the difference in the bid-ask spread.
  9. A type of tradeable asset, or security, that equates to ownership in a company.
  10. You have a capital gain if you sell the asset for more than your adjusted basis.
  11. A group of 500 companies whose average daily share prices are used to calculate an index of the day's security prices.
  12. the annual income an investor can expect to receive while holding a particular bond.
  13. The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
  14. a group or basket of securities, derivatives, or other financial instruments that represents and measures the performance of a specific market, asset class, market sector, or investment strategy.
  15. when a private company becomes public by selling its shares on a stock exchange.
  16. a real estate metric that indicates the value of a mutual fund or an exchange-traded fund
  17. where those securities are traded by investors.
  18. a price-weighted index that tracks 30 large, publicly-owned companies trading on the New York Stock Exchange and the Nasdaq.
Down
  1. the rate of return on a bond investment.
  2. An individual can become an accredited investor if he or she has a net worth of over $1M, alone or with a spouse.
  3. date the moment in time when the principal of a fixed income instrument must be repaid to an investor
  4. The practice of spreading your investments around so that your exposure to any one type of asset is limited.
  5. the process companies use to raise money by selling securities to a limited number of potential investors.
  6. a forum where securities like bonds and stocks are purchased and traded.
  7. A filing with the SEC making required disclosures in connection with the registration of a security, a securities offering or an investment company under federal securities laws.
  8. used by governments or companies to raise money by borrowing from investors.
  9. Your lender verifies your income, assets, debt and property details in order to issue final approval for your loan.
  10. a sale or equity shares or debt securities by an organization to the public in order to raise funds for the company.

28 Clues: where securities are created,the rate of return on a bond investment.where those securities are traded by investors.funds that trade on exchanges, generally tracking a specific index.a forum where securities like bonds and stocks are purchased and traded.used by governments or companies to raise money by borrowing from investors....

Agility 2017 2017-04-24

Agility 2017 crossword puzzle
Across
  1. The worlds first search engine for internet-connect devices
  2. A mechanism whereby a brwoser uses a raw data channel to communicate with a server
  3. F5 REST API Framework
  4. Software used to disrupt a computer and/or gather sensitive data
  5. revolutionary new purpose built security appliance "DDoS hybrid _______"
  6. How unique am I? can my device be distinguished from others?
  7. This very conference
  8. "______ IT" the people who provision Apps and Services without authorisation
  9. How Websafe makes data unintelligible for the fraudsters
  10. Moving multiple Point solutions on to F5 Application Services Fabric
  11. The key management tool on the journey to the Private cloud
  12. Where to store objects for future use
  13. F5's event driven scripting language
  14. What film inspired the naming of F5?
  15. How to get a non-routable protocol over a routed network
  16. A fundemental principle of security to be able to see all your application traffic
  17. An arbitrary number that may only be used once
  18. Leverage machine learning and Data analysis for a new type of DoS mitigation
  19. "App _________" used to dramatically simplify the deliver of services to public cloud apps
  20. American in exile in Russia
  21. "______ authentication" allows a second level of access through APM
  22. used to speed up deployments and streamline operations
  23. The key you don't want anyone to have
Down
  1. "_____engineering" exploits layer 8
  2. F5 Developer community
  3. The best way to secure data in transit
  4. The worlds most programmable cloud ready ADC
  5. The most destruptive botnet created to date
  6. The layer of the OSI model that hackers love to exploit
  7. hackers newest minions are what type of device
  8. How to protect past sessions against future compromises of keys
  9. A combination of multiple Clouds or Consumption models
  10. A free webservice offered by Qualys to check your websites SSL security
  11. Delivering business requirements through infrastructure automation
  12. Ensure point in time data integrity
  13. Using Code to automate tasks
  14. Protects LDNS servers from Cach poisoning and MITM attacks
  15. A secure Key exchange methodology conceptualized by Ralph Merkle
  16. The query response type offered by F5 DNS Express
  17. The key you want everyone to have
  18. F5's all new purpose built security appliances
  19. Journalist recently hit with record DDoS
  20. Unique hardware performance flexibility in the new iSeries appliances
  21. Market leading Cloud-based Application Services Platform
  22. An network built on top of another network
  23. Maximise security strength while minimising key length
  24. Best known form of digital currency
  25. Don't get stung by their App Sec top 10
  26. ASM's automagical system to ensure only human web access "________ Bot Defence"
  27. The algorithm use to disguise data or code
  28. The collaboration of programmers and IT administrators
  29. An attack designed to disrupt the availability of systems or services

52 Clues: This very conferenceF5 REST API FrameworkF5 Developer communityAmerican in exile in RussiaUsing Code to automate tasksThe key you want everyone to have"_____engineering" exploits layer 8Ensure point in time data integrityBest known form of digital currencyF5's event driven scripting languageWhat film inspired the naming of F5?...

jada's crossword 2021-06-24

jada's crossword crossword puzzle
Across
  1. the use of words
  2. somebody that knows about someone being bullied but does not do anything
Down
  1. an emotional bond between people
  2. somebody that continuously hurts someone or their feelings
  3. the use of bullying online
  4. A different word for feelings

6 Clues: the use of wordsthe use of bullying onlineA different word for feelingsan emotional bond between peoplesomebody that continuously hurts someone or their feelingssomebody that knows about someone being bullied but does not do anything

engineer 2021-10-26

engineer crossword puzzle
Across
  1. the principles of Mechanics and Materials science for analysis, design, manufacturing,
  2. of analysis methods and the development of systems to ensure products or services
  3. to find the best safe performance balance,
  4. a detailed study of engineering to the design, development and maintenance of software.
  5. assures that engineered systems provide acceptable levels of safety.
  6. helps with their service
  7. monitors everything
  8. engineer
  9. engineer
  10. Administer and resolve all technical maintenance issues.
  11. manufacturing processes by studying product requirements
Down
  1. an engineering discipline for applying scientific know-how to a component, product, plant, or process
  2. helps with network
  3. the branch of engineering that deals with the technology of electricity.
  4. does everything on computer
  5. an engineer who designs and maintains roads, bridges, dams, and similar structures.
  6. does maintenance
  7. solves solutions
  8. the position of the frontend engineer focuses on making websites friendly and functional to its user
  9. helps with uniforms

20 Clues: engineerengineerdoes maintenancesolves solutionshelps with networkmonitors everythinghelps with uniformshelps with their servicedoes everything on computerto find the best safe performance balance,Administer and resolve all technical maintenance issues.manufacturing processes by studying product requirements...

Collocations 2023-04-06

Collocations crossword puzzle
Across
  1. updates
  2. technical support
  3. security measures
  4. to tickets
  5. issues
Down
  1. user requests
  2. software systems
  3. errors
  4. systems
  5. customer complaints
  6. troubleshooting
  7. problems

12 Clues: errorsissuesupdatessystemsproblemsto ticketsuser requeststroubleshootingsoftware systemstechnical supportsecurity measurescustomer complaints

Puzzle 2014-01-07

Puzzle crossword puzzle
Across
  1. programme
  2. stuff
  3. to issues
  4. is also important
  5. more stuff
  6. yellow brick
  7. systems
Down
  1. seas
  2. is important
  3. first
  4. advice
  5. skies

12 Clues: seasfirststuffskiesadvicesystemsprogrammeto issuesmore stuffis importantyellow brickis also important

Dan sigurnijeg interneta 2022-02-11

Dan sigurnijeg interneta crossword puzzle
Across
  1. Koja je kratica short message service?
  2. Djevojke često koriste internet radi...
  3. Koja je kratica Internacionalne policijske asocijacije?
  4. O kojoj su mreži djeca ovisna?
  5. Kako se na engleskom zove nasilje na internetu?
Down
  1. Koja je kratica online igre s velikim brojem igrača?
  2. Koja je kratica programa i seek you?
  3. Koja mreža je svjetska komunikacijska mreža?
  4. Koji predmet je prva stvar koju ljudi pogledaju ujutro i zadnja prije nego odu na spavanje?
  5. Kome se trebamo obratiti ako se naiđemo u cyber bullingu?

10 Clues: O kojoj su mreži djeca ovisna?Koja je kratica programa i seek you?Koja je kratica short message service?Djevojke često koriste internet radi...Koja mreža je svjetska komunikacijska mreža?Kako se na engleskom zove nasilje na internetu?Koja je kratica online igre s velikim brojem igrača?Koja je kratica Internacionalne policijske asocijacije?...

perundungan 2022-08-24

perundungan crossword puzzle
Across
  1. gangguan kecemasan dan perasaan ketakutan yang berlebih
  2. bentuk perundungan melalui kata-kata yang menyakitkan
  3. perasaan tidak percaya diri, tidak aman, dan keraguan
  4. orang pertama yang memperkenalkan konsep bullying pada tahun 1973
  5. tekanan psikologis akibat peristiwa kelam masa lalu
Down
  1. tipe kepribadian yang menyukai waktu dan energi untuk sendiri.
  2. bentuk perundungan melalui jejaring sosial
  3. kata asal Bullying dalam bahasa Inggris
  4. penindasan oleh kaum superior dengan sengaja Sosial bentuk perundungan dengan pengucilan dan intimidasi

9 Clues: kata asal Bullying dalam bahasa Inggrisbentuk perundungan melalui jejaring sosialtekanan psikologis akibat peristiwa kelam masa lalubentuk perundungan melalui kata-kata yang menyakitkanperasaan tidak percaya diri, tidak aman, dan keraguangangguan kecemasan dan perasaan ketakutan yang berlebih...

Bullying Ward 2 2025-05-05

Bullying Ward 2 crossword puzzle
Across
  1. Someone who does mean things to someone less powerful than them.
  2. This type of verbal bullying makes someone feel unsafe.
  3. Sending someone mean messages over and over.
  4. Repeatedly excluding someone to be mean.
  5. Hurtful words are used in this type of bullying.
Down
  1. Someone who watches the bullying but doesn't help.
  2. This type of bullying can hurt someone's body.
  3. Someone who is helpful toward the person being bullied.
  4. The person who someone tries to bully.

9 Clues: The person who someone tries to bully.Repeatedly excluding someone to be mean.Sending someone mean messages over and over.This type of bullying can hurt someone's body.Hurtful words are used in this type of bullying.Someone who watches the bullying but doesn't help.This type of verbal bullying makes someone feel unsafe....

Economist CBCIS Crossword 2018-11-16

Economist CBCIS Crossword crossword puzzle
Across
  1. Economist "?", morning briefing from the editors. Delivered to your smartphone or inbox before breakfast.
  2. Our data design agency, located in Stratford, London.
  3. A technique used by criminals to trick you into giving them your username and password
  4. Economist "?", expresses The Economist's globally curious outlook in the form of short, mind-stretching documentaries.
  5. We use Two-"?" authentication as an extra layer of security.
  6. "?" News Club, run by The Economist Foundation, bringing young people together across the UK to talk about current affairs.
Down
  1. New regulation implemented in 2018 for general data protection.
  2. Business unit acquired by The Economist in 2006, Connecting the global treasury community for over 25 years
  3. EIU, also known as The Economist "?" Unit
  4. "?"security@economist.com, the address too reach to should you require security advice.
  5. James "?", founder of The Economist in 1843.

11 Clues: EIU, also known as The Economist "?" UnitJames "?", founder of The Economist in 1843.Our data design agency, located in Stratford, London.We use Two-"?" authentication as an extra layer of security.New regulation implemented in 2018 for general data protection.A technique used by criminals to trick you into giving them your username and password...

gameshop 2014-05-19

gameshop crossword puzzle
Across
  1. puzzle seller
  2. e.g. rent-a-cops
  3. ex. Chucky Cheese
  4. tree hugger?
  5. a rubrik wheel-runner?
  6. go ballistic
  7. express
  8. discharge
  9. score
Down
  1. manure
  2. about to be
  3. chaos
  4. a continuous transporter
  5. loose change
  6. Florence and the _____
  7. hereditary

16 Clues: chaosscoremanureexpressdischargehereditaryabout to betree hugger?loose changego ballisticpuzzle sellere.g. rent-a-copsex. Chucky Cheesea rubrik wheel-runner?Florence and the _____a continuous transporter

DUST BOWL 2015-03-04

DUST BOWL crossword puzzle
Across
  1. bowl drought
  2. purchase
  3. Roosevelt
  4. holder
  5. soup
  6. trust
Down
  1. Steinbeck
  2. security
  3. firesidechat
  4. d Roosevelt
  5. scare

11 Clues: souptrustscareholdersecuritypurchaseSteinbeckRooseveltd Rooseveltfiresidechatbowl drought

~Food Insecurity~ 2021-11-19

~Food Insecurity~ crossword puzzle
Across
  1. What is your teachers last name?
  2. Food insecurity happens often during what time of year?
  3. During the pandemic, food insecurity in households ---------.
  4. What meal do most schools provide for free or at a low cost?
Down
  1. How can high food security households help struggling households?
  2. How many categories of food security are there?
  3. What do you need in order to buy food?
  4. What type of food security is when you do not have any problems getting food?

8 Clues: What is your teachers last name?What do you need in order to buy food?How many categories of food security are there?Food insecurity happens often during what time of year?What meal do most schools provide for free or at a low cost?During the pandemic, food insecurity in households ---------....

Social Security Administration 2021-02-09

Social Security Administration crossword puzzle
Across
  1. stuff you do at a job
  2. hard work, often physical
  3. the economic crisis of the 1930s
Down
  1. jobs given to artists to paint
  2. Programs to support the good of the people
  3. breakfast food
  4. the kind of people most likely to receive social security
  5. month that Social Security was signed into law
  6. The President during the 1930s
  7. The program signed into law by President Roosevelt in 1935

10 Clues: breakfast foodstuff you do at a jobhard work, often physicaljobs given to artists to paintThe President during the 1930sthe economic crisis of the 1930sPrograms to support the good of the peoplemonth that Social Security was signed into lawthe kind of people most likely to receive social security...

Information Risk Management Date:07/07/2015 2015-07-06

Information Risk Management                           Date:07/07/2015 crossword puzzle
Across
  1. Potential cause of unwanted event
  2. form of identity management
  3. means of managing risk
  4. combination of likelihood of an event and its impact
  5. weakness of an asset that can be exploited
  6. measure of the effect of a security event
Down
  1. earthquake is a ________ threat
  2. checking whether the organization has required controls is _____________ audit
  3. secretly collect sensitive or classified information
  4. information security program is aligned to _____________ of organization

10 Clues: means of managing riskform of identity managementearthquake is a ________ threatPotential cause of unwanted eventmeasure of the effect of a security eventweakness of an asset that can be exploitedcombination of likelihood of an event and its impactsecretly collect sensitive or classified information...

Basic Terminologies 2016-06-14

Basic Terminologies crossword puzzle
Across
  1. form of identity management
  2. weakness of an asset that can be exploited
  3. information security program is aligned to _____________ of organization
  4. means of managing risk
  5. measure of the effect of a security event
Down
  1. checking whether the organization has required controls is _____________ audit
  2. Potential cause of unwanted event
  3. secretly collect sensitive or classified information
  4. combination of likelihood of an event and its impact
  5. earthquake is a ________ threat

10 Clues: means of managing riskform of identity managementearthquake is a ________ threatPotential cause of unwanted eventmeasure of the effect of a security eventweakness of an asset that can be exploitedsecretly collect sensitive or classified informationcombination of likelihood of an event and its impact...

National Security Crossword 2025-10-22

National Security Crossword crossword puzzle
Across
  1. SECURITY Law that helps keep Hong Kong safe.
  2. The rule makers who decide if the law has been broken.
  3. Opposite of danger.
Down
  1. People who follow rules.
  2. Something that is against the law.
  3. To protect or keep safe.
  4. A place where people live and follow laws.
  5. Rules that everyone must __________.
  6. A feeling when you are safe.
  7. What you should always do with laws.

10 Clues: Opposite of danger.People who follow rules.To protect or keep safe.A feeling when you are safe.Something that is against the law.Rules that everyone must __________.What you should always do with laws.A place where people live and follow laws.SECURITY Law that helps keep Hong Kong safe.The rule makers who decide if the law has been broken.

Cold War in Europe 2021-05-05

Cold War in Europe crossword puzzle
Across
  1. U.S. would provide aid to any country fighting communism.
  2. Leader of the Soviet Union during WWII and cold war
  3. Churchill's description of invisible barrier
  4. U.S.policy to stop the spread of communism.
  5. Stalin uses East European countries his buffer
  6. East European collective security agreement
Down
  1. Meeting of the Big Three to discuss post-war europe
  2. United States economic assistance plan for Europe.
  3. willingness to go to the brink of war
  4. Nation New International Organization to keep peace
  5. West European collective security organization
  6. U.S. President at Yalta.

12 Clues: U.S. President at Yalta.willingness to go to the brink of warU.S.policy to stop the spread of communism.East European collective security agreementChurchill's description of invisible barrierWest European collective security organizationStalin uses East European countries his bufferUnited States economic assistance plan for Europe....

Chapter 5 Sonia Hernandez Flores 2019-02-15

Chapter 5 Sonia Hernandez Flores crossword puzzle
Across
  1. income - an income tax system that imposes tax
  2. - Done, Produced, or occurring every 2 weeks.
  3. - Provides the information of your employer needs to determine
  4. - An individual's Total Gross income minus specific deductions
Down
  1. include social security, Medicare
  2. - amount of money received after a period of time
  3. -subtraction
  4. Reports - An employees's annual wages and the other amount of taxes withheld
  5. - Used to report interest income
  6. - Taxes to fund the social security
  7. pay - of the types of deductions that may be subtracted from
  8. pay - amount payed after removed taxes.

12 Clues: -subtraction- Used to report interest incomeinclude social security, Medicare- Taxes to fund the social securitypay - amount payed after removed taxes.- Done, Produced, or occurring every 2 weeks.income - an income tax system that imposes tax- amount of money received after a period of time...

confidentiality test 2025-02-06

confidentiality test crossword puzzle
Across
  1. religion, etc.
  2. work history, date of birth, social security number, criminal record,
  3. involves individuals hired to steal trade secrets, new products or
  4. or Sensitive Data information about an employee prior to employment such as a résumé,
  5. of information
  6. information
  7. Data records of an employee’s performance on the job such as performance reports,
  8. Data information which may arise from employment-related physicals, drug tests and
  9. insurance information
Down
  1. actions, supervisory notations
  2. in the Workplace keeping employee, customer and client information private
  3. set of rules or promises which limits access or places restrictions on certain
  4. Espionage form of espionage conducted for commercial purposes rather than security;

13 Clues: informationreligion, etc.of informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,in the Workplace keeping employee, customer and client information private...

confidentiality test 2025-02-06

confidentiality test crossword puzzle
Across
  1. Data records of an employee’s performance on the job such as performance reports,
  2. religion, etc.
  3. in the Workplace keeping employee, customer and client information private
  4. or Sensitive Data
  5. set of rules or promises which limits access or places restrictions on certain
Down
  1. Data information which may arise from employment-related physicals, drug tests and
  2. information
  3. involves individuals hired to steal trade secrets, new products or
  4. Espionage form of espionage conducted for commercial purposes rather than security;
  5. of information
  6. actions, supervisory notations
  7. insurance information
  8. about an employee prior to employment such as a résumé,previous work history, date of birth, social security number, criminal record,

13 Clues: informationreligion, etc.of informationor Sensitive Datainsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orin the Workplace keeping employee, customer and client information privateset of rules or promises which limits access or places restrictions on certain...

Unit 4 2025-06-09

Unit 4 crossword puzzle
Across
  1. bully
  2. aunt
Down
  1. part (in)
  2. network

4 Clues: auntbullynetworkpart (in)

Unit 11 2023-05-10

Unit 11 crossword puzzle
Across
  1. order
  2. ewww slay 💅
  3. landslide
  4. insane wise
  5. bodyguards
  6. truth
  7. appeal
  8. confirm to risk
Down
  1. picky
  2. real
  3. cuddle
  4. to look

12 Clues: realorderpickytruthcuddleappealto looklandslidebodyguardsewww slay 💅insane wiseconfirm to risk

High Five 5 kpl 3 2024-10-01

High Five 5 kpl 3 crossword puzzle
Across
  1. passi
  2. vetolaukku
  3. lippu
  4. matkalaukku
  5. passintarkastus
  6. lähtöselvitys
  7. reppu
Down
  1. tarkastuskortti
  2. nimilappu
  3. lompakko
  4. turvatarkastus
  5. lähtöportti

12 Clues: passilippureppulompakkonimilappuvetolaukkumatkalaukkulähtöporttilähtöselvitysturvatarkastustarkastuskorttipassintarkastus

unit 7 2022-10-06

unit 7 crossword puzzle
Across
  1. a federal executive department of the United States government tasked with the enforcement of federal law
  2. one of two agencies that supply deposit insurance to depositors in American depository institutions
  3. domestic intelligence and security service of the United States
  4. the federal executive department responsible for developing and executing federal laws related to farming, forestry, rural economic development, and food.
  5. American scientific and regulatory agency within the United States Department of Commerce that forecasts weather
Down
  1. provides the military forces needed to deter war, and to protect the security of the United States
  2. the revenue service for the United States federal government
  3. an intergovernmental military alliance between 30 member states
  4. agency of the United States Department of Homeland Security
  5. the combination of communications and collaboration technologies.

10 Clues: agency of the United States Department of Homeland Securitythe revenue service for the United States federal governmentan intergovernmental military alliance between 30 member statesdomestic intelligence and security service of the United Statesthe combination of communications and collaboration technologies....

Childcare Software Security and Privacy: Safeguarding Children’s Data 2025-10-16

Childcare Software Security and Privacy: Safeguarding Children’s Data crossword puzzle
Across
  1. Ensuring personal and health information of children and families is protected.
  2. U.S. law that limits access to student records and protects education data.
  3. A review that checks if security and privacy measures are working properly.
  4. What parents must give to allow collection or sharing of their child’s information.
  5. Regularly saving data so it can be recovered if a breach or system failure occurs.
Down
  1. A security method that keeps children’s data safe by turning it into a code.
  2. An incident when unauthorized users access children’s private information.
  3. A security step where staff provide more than a password to access sensitive information.
  4. Law requiring childcare software to get parental consent before collecting children’s information online.
  5. The personal, health, and attendance information childcare software collects and stores.

10 Clues: An incident when unauthorized users access children’s private information.U.S. law that limits access to student records and protects education data.A review that checks if security and privacy measures are working properly.A security method that keeps children’s data safe by turning it into a code....

society 2025-11-12

society crossword puzzle
Across
  1. vero
  2. huumeet
  3. vähemmistö
  4. vammainen
  5. tasa-arvo
  6. rikollisuus
Down
  1. työtön
  2. rasisimi
  3. hyvän tekeväisyys
  4. sosiaaliturva
  5. maailmanlaajuinen

11 Clues: verotyötönhuumeetrasisimivammainentasa-arvovähemmistörikollisuussosiaaliturvahyvän tekeväisyysmaailmanlaajuinen

crosss 2024-09-04

crosss crossword puzzle
Across
  1. This cloud security model involves splitting data into encrypted parts that are stored in different locations, ensuring that no single provider has access to the entire dataset.
  2. What feature in AWS allows setting permissions for a user based on specific circumstances such as the user's IP address or the time they are accessing the service
  3. feature allows the enforcement of specific security policies, like requiring multi-factor authentication, for API interactions based on user actions and origins?
  4. mechanism ensures secure and temporary access to resources without storing long-term credentials, particularly in cross-account situations
  5. What AWS service provides protection against distributed denial-of-service (DDoS) attacks and integrates with CloudFront and Route 53?
Down
  1. Technique that spreads data across multiple servers to enhance security and reliability
  2. threat intel dashboard
  3. Azure interface for applications auditing adherence, Logs, exceptions, and custom diagnostics to fortify security oversight
  4. A method used to ensure that cloud users can only access resources they are authorized for
  5. Cloud service that offers firewalls, DDoS protection, and other network security measures

10 Clues: threat intel dashboardTechnique that spreads data across multiple servers to enhance security and reliabilityCloud service that offers firewalls, DDoS protection, and other network security measuresA method used to ensure that cloud users can only access resources they are authorized for...

Ethical hacking 2025-11-02

Ethical hacking crossword puzzle
Across
  1. Hidden entry point into a system bypassing security
  2. Software that secretly monitors user activity
  3. Fraudulent attempt to obtain sensitive information via email
  4. Process of converting data into a coded format
  5. Security barrier that controls incoming and outgoing network traffic
  6. Malicious software designed to harm or exploit devices
  7. Tool that records keystrokes to steal information
  8. Self-replicating program that infects computers
Down
  1. Malware disguised as legitimate software
  2. Malware that locks files until a payment is made
  3. Weakness in a system that can be exploited by hackers
  4. Person who gains unauthorized access to systems
  5. Process of gathering information about a target system
  6. Testing method used to find vulnerabilities in a system
  7. Malware that spreads across networks without user action

15 Clues: Malware disguised as legitimate softwareSoftware that secretly monitors user activityProcess of converting data into a coded formatPerson who gains unauthorized access to systemsSelf-replicating program that infects computersMalware that locks files until a payment is madeTool that records keystrokes to steal information...

November newsletter 2025-08-26

November newsletter crossword puzzle
Across
  1. - What we're preventing this November
  2. - Animal associated with this month's full moon
  3. - The red, papaver by another name
  4. - Repeated thrice, followed by a moment of silence.
  5. - A calendar misnomer, this month's name comes from the Latin word for 9.
  6. - What people do on Black Friday & Cyber Monday
  7. - The team at the center of this edition
  8. - The Royal Canadian Military Institute is on this Toronto Avenue
Down
  1. - What you show when you thank a coworker for their efforts.
  2. - Commonly grown in November
  3. - What will be shone on each team at ULMA
  4. - Our employee newsletter
  5. - This bird takes short, shuffling steps... just like you should when it's slippery
  6. - a puzzle with vertical and horizontal squares
  7. - goggles, masks and gloves, for short.
  8. - ______, sealed, delivered

16 Clues: - Our employee newsletter- ______, sealed, delivered- Commonly grown in November- The red, papaver by another name- What we're preventing this November- goggles, masks and gloves, for short.- The team at the center of this edition- What will be shone on each team at ULMA- Animal associated with this month's full moon...

Gregory 2026-03-25

Gregory crossword puzzle
Across
  1. to go through the counting process
  2. seat number
  3. check in luggage
  4. security
  5. queue
  6. the passport
  7. from of identity
Down
  1. the name
  2. departure time
  3. to board Now
  4. show
  5. boarding time
  6. wait
  7. automatic
  8. flight number

15 Clues: showwaitqueuethe namesecurityautomaticseat numberto board Nowthe passportboarding timeflight numberdeparture timecheck in luggagefrom of identityto go through the counting process

October 2020 Newsletter Crossword Puzzle 2020-10-05

October 2020 Newsletter Crossword Puzzle crossword puzzle
Across
  1. A cyber attacker uses a powerful computer to try every word in what vocabulary reference book to see if the word is a password.
  2. A tool used to discover passwords.
  3. A type of password based cyberattack where the attacker uses your credentials that were released as a data breach and uses it for other accounts is called a (blank) stuffing.
  4. The practice of (blank) engineering is when social tactics are used to gain information from people or get people to do things they would not normally do.
Down
  1. Hardware that has wireless sensors which transmit data from one place to another over the internet.
  2. A cyber attacker uses a powerful computer to test every combination of letters, numbers, and characters to hack a password.
  3. A word, phrase or string of characters that are private for an authorized user and allow access to a computer system or service.
  4. The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other.
  5. Virtual communities or networks that use interactive computer technology to promote creating and sharing ideas, career interests, photos, information, and other forms of expression.
  6. U.S. Department of Agriculture’s Personal Identity Verification (PIV) card for access to federal facilities and computers.

10 Clues: A tool used to discover passwords.Hardware that has wireless sensors which transmit data from one place to another over the internet.The (blank) of Things is a concept of connecting a device with an on and off switch to the internet and/or to each other....

7th technology vocab 2 2014-10-13

7th technology vocab 2 crossword puzzle
Across
  1. (on social media sites such as twitter0 A WORD OR PHRASE PRECEDED BY A hash or pound sign (#) and used to identify messages o a specific topic.
  2. a device for storing information on a fixed location with in your computer.
  3. item to used organiseid files into groups.
  4. hypertext markup language. This is the coding language used to create sites on the world wide web.
  5. hardeware and that separates a local area network into two or more parts for security purposes.
  6. graphic interchange format… an efficient method for storing graphics. Gif’s take up a small amount of disk space and can be transmitted quickly.
  7. copy from one computer to another, typically over the internet
  8. commonly known as email. System designed to send messages and attachments elecontecly .
Down
  1. involving questions of right and wrong behavior, following accepted rules of behavior: morally right and good. “what is moral when using technology?
  2. file transfer protocol. A set of rules that allowstwo computers to talk to one another while transferring files from one to the other. This the protocol used when you transfer a file from one computer to another across
  3. the production of printed matter by means of a printer linked to a desktop computer, with special software. The system enables reports, advertising matter, company magazines, etc., to be produced cheaply with a layout and print quality similar to that of typeset books, for xerographic or other reproduction
  4. to set the margins, tabs, front or line spacing in layout of a document.
  5. cyber bullying is the use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner.
  6. make changes to a document or presentation.
  7. starting the computer when its power is turned off. To perform a cold boot if the computer is still running, shut down must me selected from the menu first. Once the machines off, turning it back on performs the cold boot.
  8. a place a database record where a category of information can be entered or located.

16 Clues: item to used organiseid files into groups.make changes to a document or presentation.copy from one computer to another, typically over the internetto set the margins, tabs, front or line spacing in layout of a document.a device for storing information on a fixed location with in your computer....

9/11 and the war on terror 2023-11-03

9/11 and the war on terror crossword puzzle
Across
  1. - ......... Act - A U.S. law enacted to enhance domestic security after 9/11.
  2. - The terrorist organization responsible for the 9/11 attacks.
  3. - ......... Zero - The site of the collapsed World Trade Center buildings in New York City.
  4. - The Immigration and Naturalization Service, part of the U.S. response to 9/11.
  5. - Bin Laden - The leader of Al-Qaeda and mastermind behind the 9/11 attacks.
  6. - The evacuation of U.S. citizens and allies from Afghanistan during the War on Terror.
  7. - Commission - An investigation into the 9/11 attacks and U.S. response.
  8. - Questioning and gathering information from terrorism suspects.
  9. - The Central Intelligence Agency, involved in the War on Terror.
  10. - ........ W. Bush - The U.S. President at the time of the 9/11 attacks.
  11. - ........... Bay - A U.S. detention camp for terrorism suspects in Cuba.
  12. - The individuals who took control of the 9/11 planes to carry out the attacks.
  13. - ............ Responders - The firefighters, police, and emergency personnel who rushed to the 9/11 sites.
  14. - ........... Crimes - Violations of international law during armed conflicts in the War on Terror.
  15. - Weapons of Mass Destruction, a concern in the lead-up to the Iraq War.
  16. - The U.S. Department of Homeland Security, established in response to 9/11.
  17. - Interrogation Techniques - Controversial methods used on terrorism suspects.
  18. - Corpus - A legal principle safeguarding against unlawful detention.
  19. - Efforts to prevent and respond to acts of terrorism.
  20. - The Afghan extremist group that harbored Al-Qaeda and was overthrown by U.S. forces.
Down
  1. - Bin Laden ........... - The U.S. operation that resulted in the death of Osama bin Laden.
  2. - The country where the U.S. initially focused its military efforts in the War on Terror.
  3. - The North Atlantic Treaty Organization, which invoked Article 5 for the first time after 9/11.
  4. - ..... List - A U.S. government watchlist to prevent potential terrorists from boarding flights.
  5. - Measures - Enhancements to airport and border security following 9/11.
  6. - Military strategies employed in response to insurgency and terrorism.
  7. - The arrest and detention of individuals suspected of terrorism.
  8. - The U.S. Department of Defense headquarters, also targeted on 9/11.
  9. - on Terror - The U.S.-led global campaign against terrorism, launched after 9/11.
  10. - Ayman al-Zawahiri, a key figure in Al-Qaeda after the death of Osama bin Laden.
  11. - The use of violence for political or ideological goals, as seen on 9/11.
  12. - .......... 11 - One of the planes that crashed into the World Trade Center.
  13. - ........... Trade Center - The twin towers in New York City that were destroyed on 9/11.
  14. - The month when the 9/11 attacks occurred.
  15. - Sites - Secret detention facilities used in the War on Terror.
  16. - .......... Security - U.S. government efforts to protect the country from terrorism.
  17. - ....... of Evil - A term used to describe countries perceived as a threat in the War on Terror.
  18. - Another country targeted in the aftermath of 9/11 due to perceived weapons of mass destruction.

38 Clues: - The month when the 9/11 attacks occurred.- Efforts to prevent and respond to acts of terrorism.- The terrorist organization responsible for the 9/11 attacks.- Questioning and gathering information from terrorism suspects.- Sites - Secret detention facilities used in the War on Terror....

Listening Insight 2 Unit 11 IT & Internet 2013-07-09

Listening Insight 2 Unit 11 IT & Internet crossword puzzle
Across
  1. a man who fixes things
  2. very bad, awful
  3. keeping something or someone safe
  4. re-arrange the following letters: usobyivlo
  5. a general place or location
  6. instructions for making food
  7. to be unsure of something
  8. fill in the gap: "My computer has a virus because I didn't ____________ the security software"
Down
  1. fill in the gap: "I have a new hand phone, it has many great ____________ such as 4G and a camera"
  2. costs a lot of money
  3. speaking or writing about a particular thing
  4. almost the same as something else

12 Clues: very bad, awfulcosts a lot of moneya man who fixes thingsto be unsure of somethinga general place or locationinstructions for making foodkeeping something or someone safealmost the same as something elsere-arrange the following letters: usobyivlospeaking or writing about a particular thing...

US invasion of Iraq 2023-11-29

US invasion of Iraq crossword puzzle
Across
  1. United Nations Security Council resolution adopted unanimously by the United Nations Security Council on 8 November 2002
  2. The invasion began with U.S. _ dropping precision-guided bombs on a bunker complex in Baghdad
  3. Saddam's younger son
  4. Declaration by George w Bush on may 2003
  5. capital of Iraq
Down
  1. The leader prior to the US invasion of Iraq
  2. Veto power that opposed the invasion
  3. The name of our great teacher
  4. A country said to contain weapons of mass destruction
  5. place where Saddam Hussein's statue was toppled
  6. George _ Bush
  7. Saddam's elder son

12 Clues: George _ Bushcapital of IraqSaddam's elder sonSaddam's younger sonThe name of our great teacherVeto power that opposed the invasionDeclaration by George w Bush on may 2003The leader prior to the US invasion of Iraqplace where Saddam Hussein's statue was toppledA country said to contain weapons of mass destruction...

UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword 2025-10-01

UNIT 4 "HOME AUTOMATION CONTROL SYSTEMS", Crossword crossword puzzle
Across
  1. Keeping watch over an area for security.
  2. Portable computer with a touchscreen.
  3. A tool used to tighten or loosen nuts and bolts.
  4. Device that cools a room.
  5. The process of making devices work automatically.
Down
  1. Device that warms a room.
  2. Technology that simulates human intelligence.
  3. Reasonable in price; not too expensive.
  4. Security system with lenses to record video.
  5. Portable device used to melt metal for joining circuits.
  6. To activate a device, e.g., a light or machine.
  7. A handheld device to make calls and access apps.

12 Clues: Device that warms a room.Device that cools a room.Portable computer with a touchscreen.Reasonable in price; not too expensive.Keeping watch over an area for security.Security system with lenses to record video.Technology that simulates human intelligence.To activate a device, e.g., a light or machine.A tool used to tighten or loosen nuts and bolts....

Security Crossword 2023-03-25

Security Crossword crossword puzzle
Across
  1. What colour will appear in the security system when a veteran is searched?
  2. How many minutes a security member may get promotion after last promotion?
  3. Who is the leader of Security?
  4. What Non-HIA members have access to HIA base through security check?
Down
  1. Who do you contact if someone needs retraining or start over?
  2. What colour will appear in the security system when a HR+ is searched?

6 Clues: Who is the leader of Security?Who do you contact if someone needs retraining or start over?What Non-HIA members have access to HIA base through security check?What colour will appear in the security system when a HR+ is searched?What colour will appear in the security system when a veteran is searched?...

Ehe abstract nouns 2024-10-07

Ehe abstract nouns crossword puzzle
Across
  1. happiness
  2. safety/security
  3. trust
  4. highs and lows (5,3,6)
Down
  1. reality
  2. pressure
  3. values
  4. society
  5. stability
  6. conflict
  7. freedom
  8. lack of independance

12 Clues: trustvaluesrealitysocietyfreedompressureconflicthappinessstabilitysafety/securitylack of independancehighs and lows (5,3,6)

Vocab Fun 2025-02-13

Vocab Fun crossword puzzle
Across
  1. label, organized
  2. picky
  3. foolish and sily
  4. acid
  5. a standard
Down
  1. guide, operate
  2. protection
  3. real
  4. landslide
  5. safe,sure
  6. cuddle
  7. appeal

12 Clues: realacidpickycuddleappeallandslidesafe,sureprotectiona standardguide, operatelabel, organizedfoolish and sily

11.5 Wireless Networking 2023-03-28

11.5 Wireless Networking crossword puzzle
Across
  1. An enhancement that allows multiple antennas to use the same radio frequency
  2. Wireless authentication method that allows for automatic connection between a device and the wireless access point
  3. Secure authentication method for wired and wireless networks
  4. Wireless communication technology that allows two devices to connect to each other over a short distance
  5. Developed by Cisco to address security concerns in RADIUS
  6. Encryption protocol used on most wireless networks today
  7. Wireless authentication method that uses a passphrase to authenticate users
  8. A communication method that allows two-way communication between two devices within a few centimeters of each other
  9. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
  10. One of the strongest encryption protocols based on the Rijndael algorithm
Down
  1. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices
  2. Developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard
  3. Wireless network that requires no authentication
  4. IEEE designation for all wireless networking standards
  5. A method that allows the frequency of the wireless network to be fine-tuned
  6. A method that combines channels into one to increase bandwidth
  7. An open standard protocol used to authenticate users onto a network
  8. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network

18 Clues: Wireless network that requires no authenticationIEEE designation for all wireless networking standardsEncryption protocol used on most wireless networks todayDeveloped by Cisco to address security concerns in RADIUSSecure authentication method for wired and wireless networksA method that combines channels into one to increase bandwidth...

MEDICAL TERMINOLOGY ³ 2025-05-28

MEDICAL TERMINOLOGY ³ crossword puzzle
Across
  1. الامن
  2. الفنيون
  3. العلاج الطبيعي
  4. التغذية
  5. مدير المشفى
  6. الاداريين
  7. موظف الاستقبال
Down
  1. فني الاشعة
  2. فني المختبر
  3. الفريق المساعد
  4. عمال النظافة
  5. الاختصاصيون

12 Clues: الامنالفنيونالتغذيةالاداريينفني الاشعةفني المختبرالاختصاصيونمدير المشفىعمال النظافةالفريق المساعدالعلاج الطبيعيموظف الاستقبال

Food Security and Biomes 2019-12-11

Food Security and Biomes crossword puzzle
Across
  1. Removing unnecessary water requires this
  2. A major food crop native to the Americas.
  3. These dry places form right next to cold water.
  4. A famous American state that experience a 7 year drought
  5. A major threat in Australia's dry summers.
  6. A dry environment characterised by shifting dunes.
  7. A lot of water is needed to raise this meat.
  8. Plants grow in this
  9. Cleaning these out is important to prevent house fires.
Down
  1. Rainwater carries a tiny amount of this ocean mineral.
  2. If tap water runs out, people often rely on water from these
  3. Food can be grown in these in dry places.
  4. This kind of power captures sunlight
  5. These are used to capture the power of wind
  6. A deep hole dug in the ground to get water
  7. A famous city that is known for its waste
  8. A major food crop that is often turned into bread.

17 Clues: Plants grow in thisThis kind of power captures sunlightRemoving unnecessary water requires thisFood can be grown in these in dry places.A major food crop native to the Americas.A famous city that is known for its wasteA deep hole dug in the ground to get waterA major threat in Australia's dry summers.These are used to capture the power of wind...

Enterprise Information Security Policy 2017-09-06

Enterprise Information Security Policy crossword puzzle
Across
  1. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  2. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  3. Verifying the identity of a user, machine, software component, device, or other entity.
  4. a computer service.
  5. Any type of storage device that can be removed from a computer while the system is running.
  6. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. The physical elements of a computer system
  8. Protected Health Information acronym
  9. A person or persons responsible for supervising people or work.
  10. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
  1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  3. ____ is compromised of 60 standards
  4. _____ implements standards to protect Protected Health Information (PHI).
  5. A Credential established by a sequence of characters used as a secret key for
  6. The set of characteristics by which a Person is definitively recognizable or known.
  7. A piece of Software intended to update an electronic Information Resource.

17 Clues: a computer service.____ is compromised of 60 standardsProtected Health Information acronymThe physical elements of a computer systemA person or persons responsible for supervising people or work._____ implements standards to protect Protected Health Information (PHI).A piece of Software intended to update an electronic Information Resource....

Risks to data security 2016-05-10

Risks to data security crossword puzzle
Across
  1. Part of the virus that causes the damage. (7)
  2. Virus that hides by inserting code between the OS and Anti-virus. (7)
  3. Virus that appears to be something else. (6)
  4. Way of accessing a computer without going through normal security procedures. (4,4)
  5. virus that triggers at a certain time. (4,4)
  6. Malware that replicates in order to infect other computers. (4)
  7. Software designed to cause harm. (7)
  8. Type of virus that can rewrite itself. (11)
  9. Type of virus that stays active in the computers memory. (8)
Down
  1. Type of virus that infects both files and boot records. (11)
  2. Virus that triggers when certain conditions are met. (5,4)
  3. Type of virus that infect the boot record. (4,6)
  4. Ethical hacker. (5,3)
  5. Someone who breaks into systems to carry out illegal and destructive acts. (6)
  6. Type of virus that infects files like Word and Excel documents. (5)
  7. a set of tools to enable a hacker to gain control of a computer. (4,3)
  8. Self replicating software that runs itself in order to infect other programs. (5)

17 Clues: Ethical hacker. (5,3)Software designed to cause harm. (7)Type of virus that can rewrite itself. (11)Virus that appears to be something else. (6)virus that triggers at a certain time. (4,4)Part of the virus that causes the damage. (7)Type of virus that infect the boot record. (4,6)Virus that triggers when certain conditions are met. (5,4)...

Security Plus Chapter 1 2024-02-15

Security Plus Chapter 1 crossword puzzle
Across
  1. Network that moves a product from its creation to the end-user
  2. Safeguard employed within an enterprise to protect the CIA of information
  3. Controls that provide an alternative to normal controls
  4. Businesses that furnish solutions or services to users and organizations
  5. Threat actors who are strongly motivated by philosophical or political beliefs.
  6. no unauthorized person or malicious software has altered the data
  7. unauthorized copying of data
  8. Threat actors who are employed by their own government to carry out attacks.
Down
  1. Software in which no additional processes
  2. pose a threat from the position of a trusted entity
  3. Vulnerability for which there are no days of advanced warning
  4. mitigate or lessen the damage caused by the incident
  5. outsourcing the responsibility of a IT resources
  6. End of a product’s manufacturing lifespan
  7. Process of bypassing corporate approval for technology purchases
  8. Erroneous technology settings.
  9. Individual or entity who is responsible for attacks

17 Clues: unauthorized copying of dataErroneous technology settings.Software in which no additional processesEnd of a product’s manufacturing lifespanoutsourcing the responsibility of a IT resourcespose a threat from the position of a trusted entityIndividual or entity who is responsible for attacksmitigate or lessen the damage caused by the incident...

IT Security Cross Word 2025-03-28

IT Security Cross Word crossword puzzle
Across
  1. A network that connects multiple LANs in a city
  2. Ports used by SIP
  3. Protocol for sharing files
  4. A small network for personal use
  5. A combination of different network types
  6. Devices connected to a central point
  7. A network that covers a small area
  8. Devices connected in a loop
Down
  1. A mix of star and bus networks
  2. Devices connected to many others
  3. Port used by SNMP
  4. Port used by SMB
  5. Protocol for secure communication
  6. Devices connected through one main cable
  7. A network that covers a large area
  8. Protocol for managing networks
  9. Protocol for making internet calls

17 Clues: Port used by SMBPort used by SNMPPorts used by SIPProtocol for sharing filesDevices connected in a loopA mix of star and bus networksProtocol for managing networksDevices connected to many othersA small network for personal useProtocol for secure communicationA network that covers a large areaA network that covers a small area...

Industrial Security Crossword Puzzle 2025-09-23

Industrial Security Crossword Puzzle crossword puzzle
Across
  1. Control- It is the management of keys in a plant or business organization to prevent unauthorize individual access to the
  2. KEYING- is when a lock operates on a master key plus an individual or change key.
  3. — distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
  4. - faithful allegiance to the Philippine government and its duly constitutional authorities;
  5. record- some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
  6. - uprightness in character, soundness of moral principle, freedom from moral delinquencies.
  7. Key- for single lock
  8. KEY SYSTEM - keying system that permits a lock to be opened with a number of unique, individual keys. Often found in apartment building common areas.
  9. Master key- that can open all locks within a particular area or grouping Master key.
  10. periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
Down
  1. - A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
  2. KEY - Genuine key stolen from the owner.
  3. - the ability or tendency to act or to decide with prudence, the habit of wise judgment;
  4. — the sum of traits that have been impresses by nature, education and habit upon the individual.
  5. cabinet-a well constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all time
  6. lock- Can be closed and opened remotely by electronic means.
  7. KEY- is a key used to operate an inexpensive lock by moving it in keyhole until it catches locking belt and unlock mechanism.
  8. in addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
  9. report- a daily report should be made to the person responsible for key control from the personnel department indicating all people who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to insure that the key is recovered.
  10. Control- Defined as the management of keys in a plant or business organizations to prevent unauthorized individual access to the keys.

20 Clues: Key- for single lockKEY - Genuine key stolen from the owner.lock- Can be closed and opened remotely by electronic means.KEYING- is when a lock operates on a master key plus an individual or change key.Master key- that can open all locks within a particular area or grouping Master key....

Crossword Puzzle 2014-05-05

Crossword Puzzle crossword puzzle
Across
  1. man's land disputed ground between the front lines or trenches of two opposing armies
  2. economy authority on economy
  3. he deliberate killing of a large group of people
  4. workers or working-class people
  5. security the cooperation of several countries in an alliance to strengthen the security of each
  6. the reduction or withdrawal of military forces and weapons
  7. camp political prisoners are persecuted
  8. a truce
  9. cocky
  10. legal official
  11. hopping travel from one island to another
Down
  1. Japanese aircraft loaded with explosives and making a deliberate suicidal crash on an enemy target
  2. peace
  3. prepare and organize
  4. a tied out battle
  5. action or process appease
  6. intense military campaign intended to bring about a swift victory
  7. he making of amends for a wrong one has done
  8. the belief or desire of a government or people that a country should maintain a strong military capability
  9. disobedience peaceful form of political politics
  10. russia
  11. slaughter on a mass scale

22 Clues: peacecockyrussiaa trucelegal officiala tied out battleprepare and organizeaction or process appeaseslaughter on a mass scaleeconomy authority on economyworkers or working-class peoplecamp political prisoners are persecutedhopping travel from one island to anotherhe making of amends for a wrong one has done...

Internet Puzzle 2016-02-17

Internet Puzzle crossword puzzle
Across
  1. a hardware device that has multiple Ethernet ports.
  2. A networking device that perform the "traffic directing" functions on the Internet.
  3. A Type of Cord that hooks direct from the modem to customers device.
  4. server that automatically provides an IP address.
  5. Internet without wires.
  6. Translates an IP address to a domain name.
  7. Network Address Translation.
  8. This controls your domain name's website and email settings.
  9. Modem config without NAT.
  10. The owner of a Domain name.
  11. A free service with NPP for email and web.
  12. Redirects a communication request from one address to a Port.
  13. Changing IP Address.
Down
  1. Internet program you use to surf the internet.
  2. The Program the customer goes to set up a Domain Name.
  3. Non changing IP Address.
  4. A tool you use to help guide your calls.
  5. Controls how the modem functions.
  6. Internet output device.
  7. what is before the .com but after the @ symbol?
  8. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

21 Clues: Changing IP Address.Internet without wires.Internet output device.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....

Travel Vocabulary 2020-04-15

Travel Vocabulary crossword puzzle
Across
  1. first class in a plane or train
  2. a ticket
  3. passport
  4. going through customs before entering a country
  5. ticket,luggage,counter, check in
  6. baggage claim
  7. to hope
  8. layover
  9. flight attendent
  10. to go straight
  11. window
  12. visa
  13. suitcase
  14. being on time
  15. controller
  16. platform
  17. bunk
  18. to go through security
  19. flight
  20. security agent
  21. to miss a flight
  22. a passenger
  23. a connection of one flight to another
  24. luggage
  25. a trip or travel
  26. international airport
  27. delayed
  28. stop
  29. luggage screening
Down
  1. waiting room
  2. car wagon
  3. to turn
  4. a seat
  5. boarding pass
  6. sleeping car
  7. second class in a train
  8. gate
  9. to check luggage
  10. safety seat belt
  11. to give
  12. to land
  13. departure
  14. train station
  15. in the airport
  16. to take off
  17. coach on a place
  18. aisle
  19. a ticket
  20. ticket window
  21. carry on luggage
  22. to see
  23. an event ticket
  24. arrival
  25. to get

54 Clues: gatevisabunkstopaislea seatwindowto seeflightto getto turnto hopelayoverto giveto landarrivalluggagedelayeda ticketpassportsuitcasea ticketplatformcar wagondeparturecontrollerto take offa passengerwaiting roomsleeping carboarding passbaggage claimtrain stationbeing on timeticket windowto go straightin the airportsecurity agentan event ticket...

Ch. 2 Vocabulary--American Society & It's Values 2020-09-27

Ch. 2 Vocabulary--American Society & It's Values crossword puzzle
Across
  1. expectations of behavior, written or unwritten
  2. money made by a business
  3. institution providing law & order, security,etc
  4. defense against threats to society Nat'l ______
  5. work a person gets paid for from other person
  6. Five parts of all societies
  7. person who participates in an economy by buying
  8. physical products required for survival
  9. form of gov't leader takes power by force
  10. rules of society that all must follow
  11. institution designed to prepare kids for adulthood
Down
  1. items we desire to make things easier
  2. someone makes the same product as you
  3. any place goods or services are exchanged
  4. first institution people belong to
  5. institution which teaches right from wrong
  6. anything accepted as payment for good or service
  7. items produced and sold in society
  8. what someone is willing to pay for a product
  9. system of producing and distributing goods/services
  10. learning to follow rules of society
  11. gov't in which leader inherits position
  12. gov't in which all people share the power

23 Clues: money made by a businessFive parts of all societiesfirst institution people belong toitems produced and sold in societylearning to follow rules of societyitems we desire to make things easiersomeone makes the same product as yourules of society that all must followgov't in which leader inherits positionphysical products required for survival...

h 2022-07-10

h crossword puzzle
Across
  1. Instructional signs posted in the aircraft
  2. lock up latch or stow
  3. check emergency equipment and specific aircraft systems
  4. Customers on a paid fare
  5. 5-17 traveling alone
  6. breathing apparatus while fighting fires
  7. Security directives issued to the aircraft operators
  8. where planes park outside the terminal
  9. require all individuals to display proper identification
  10. predetermined periods of availability
  11. aircraft moves under its own power while on the ground
  12. how to use seatbelts oxygen mask and identify exits
Down
  1. created Nov 19 2001 policies to protect US transportation in airport security
  2. planned time from departure to arrival
  3. paperwork provided to flight attendants by the gate agent
  4. cards located in each seat pocket to explain emergency
  5. revised info to flight attendant manual
  6. frequent flyer program
  7. briefing designed to identify how to use specified emergency equipment
  8. when an aircraft leaves the ground
  9. all aircrafts operation below 10,000 feet
  10. stay overnight at a city other than your base
  11. temporary rule to address a temporary situation

23 Clues: 5-17 traveling alonelock up latch or stowfrequent flyer programCustomers on a paid farewhen an aircraft leaves the groundpredetermined periods of availabilityplanned time from departure to arrivalwhere planes park outside the terminalrevised info to flight attendant manualbreathing apparatus while fighting fires...

Pablo Escobar 2018-02-27

Pablo Escobar crossword puzzle
Across
  1. Aircraft manufacturer (begins with B)
  2. A large building where passengers get on flights and get off flights
  3. Thing you go through to get to Airside
  4. Area before security at an airport, open to general public
  5. Control the roll of the plane
  6. First part of a planes identification code
  7. A flight that leaves the originating country
  8. When a flight is late arriving or taking off
Down
  1. A stop at an airport between flights
  2. Where pilots sit
  3. Main body of the aircraft
  4. Person who flies the plane
  5. Cheapest flight ticket
  6. A flight that starts and finishes in one country
  7. Second part of a planes identification code
  8. An item of identification you need to travel ovrseas
  9. When two or more airlines share a aircraft
  10. You can only carry 3 Ounces or 100 ml of this
  11. What the planes take off of
  12. Area of an airport only available to travelling persons and workers

20 Clues: Where pilots sitCheapest flight ticketMain body of the aircraftPerson who flies the planeWhat the planes take off ofControl the roll of the planeA stop at an airport between flightsAircraft manufacturer (begins with B)Thing you go through to get to AirsideWhen two or more airlines share a aircraftFirst part of a planes identification code...

Tech crossword. 2024-04-03

Tech crossword. crossword puzzle
Across
  1. Set of instructions.
  2. Security loop hole.
  3. The computer programs.
  4. Small computer/tech.
  5. Information sharing.
  6. Network security.
  7. AI.
  8. Yet another markup language.
  9. Device for prosesing data.
  10. Main operating system of a computer.
  11. The inner parts of a computer.
  12. Cross-site scripting.
  13. Language for websites.
  14. Universal Serial Bus.
  15. Online protection.
  16. Development of a computer.
Down
  1. Mashines following a set a rules/code to work/move.
  2. Biological measurements .
  3. Melting plastic in a mashine to from shapes given to it by a computer.
  4. A way to communicate to the computer.
  5. A procedure or rules that should be carried out if need be.
  6. Larger storage unit.
  7. Person to computer interaction.
  8. Unit of storage for a computer.
  9. The main system software.
  10. Secure communication.
  11. Online storage.
  12. Headset for video game usage, or surgary.
  13. A place for online storage.
  14. Wireless Fidelity.

30 Clues: AI.Online storage.Network security.Wireless Fidelity.Online protection.Security loop hole.Set of instructions.Larger storage unit.Small computer/tech.Information sharing.Secure communication.Cross-site scripting.Universal Serial Bus.The computer programs.Language for websites.Biological measurements .The main system software....

My Virtual Self 2024-12-29

My Virtual Self crossword puzzle
Across
  1. a secret string used for authentication
  2. the place where something or someone is situated
  3. advancements in scientific knowledge and applications
  4. personal and not shared with the public
  5. to disturb or break continuity
  6. to depend on someone or something
  7. protection against threats or danger
  8. to concentrate on a task or subject
  9. to dominate or assume control
  10. data that provides knowledge or insight
  11. implements that assist in completing tasks
  12. an advantage in a competitive situation
  13. to breach security systems
  14. a device used for mechanical work
Down
  1. to converse with others using language
  2. skills developed through practice or training
  3. immediate without any delay
  4. to enhance or make better
  5. access always connected without interruption
  6. to lengthen or increase in duration
  7. to disrupt or obstruct a process
  8. media platforms for online social interactions
  9. relating to technology that uses binary code
  10. to require something as necessary
  11. an ID used to identify a user
  12. the act of stealing someone's property

26 Clues: to enhance or make betterto breach security systemsimmediate without any delayan ID used to identify a userto dominate or assume controlto disturb or break continuityto disrupt or obstruct a processto depend on someone or somethingto require something as necessarya device used for mechanical workto lengthen or increase in duration...

Kevin Luu's Crossword. 2025-03-07

Kevin Luu's Crossword. crossword puzzle
Across
  1. Starting amount of money invested or borrowed.
  2. A process that cycles letting you to borrow money to a certain limit, repay it, and borrow again.
  3. A loan that allows someone to buy property.
  4. Payment schedule that happens twice a month.
  5. Something that has value currently or in the future.
  6. Someone that offers/provide money.
  7. A process credit that can be use repeatedly.
  8. 80% of Americans gets into it.
  9. Someone fake who gains money through dirty methods.
Down
  1. Increase in value.
  2. Additional cost that is charged for borrowing money.
  3. Assets pledged by a borrower to a lender as security.
  4. Borrowed money that is to be paid back with interest.
  5. Someone who doesn't pay a loan or debt.
  6. Earning returns (interest).
  7. Someone who borrows a loan.
  8. The right to claim a security interest.
  9. Ownership in an asset or company.
  10. A percentage of money you earn back for making a purchase.
  11. The ability to receive a loan but also leads to debt.

20 Clues: Increase in value.Earning returns (interest).Someone who borrows a loan.80% of Americans gets into it.Ownership in an asset or company.Someone that offers/provide money.Someone who doesn't pay a loan or debt.The right to claim a security interest.A loan that allows someone to buy property.Payment schedule that happens twice a month....

study 2025-04-09

study crossword puzzle
Across
  1. the money from the Social security act was used to pay monthly____ to retired people
  2. gave jobs to over 2 million people
  3. on October 24, 1929 investors sold almost 13 ____ shares
  4. Many____ were forced to work
  5. Punished dishonest stockbrokers
  6. a reason why the dust bowl was caused (wind)
  7. a market to buy, sell, and share stocks
  8. Most people from _____ moved to California during the dust bowl
  9. People____ when they were unable to pay they're loans
  10. borrowed money from banks
  11. set a minimum wage policy and abolished child labor
Down
  1. the Social security act placed taxes on employers and ____
  2. Severe economic crisis in 1929
  3. called shanty towns
  4. Migrant workers moved here
  5. Thought the market would improve by itself
  6. this would ensure banks had enough money to give back to you
  7. A reason why the dust bowl was caused(water)
  8. An organization that helped people during the Great Depression
  9. market crashed on black _____

20 Clues: called shanty townsborrowed money from banksMigrant workers moved hereMany____ were forced to workmarket crashed on black _____Severe economic crisis in 1929Punished dishonest stockbrokersgave jobs to over 2 million peoplea market to buy, sell, and share stocksThought the market would improve by itselfa reason why the dust bowl was caused (wind)...

political acronyms 2025-06-16

political acronyms crossword puzzle
Across
  1. Governing body of the Democratic Party.
  2. Even the teacher used it for that crosswords !
  3. Domestic intelligence and security in the U.S.
  4. Body tasked with reducing US government spending and cutting jobs.
  5. Oversees international trade rules.
  6. Political leader of the executive branch in the U.S.
  7. Military alliance of North American and European countries.
  8. Public healthcare system, politically sensitive issue in the UK.
  9. The highest court in the U.S.
Down
  1. Public service broadcaster (often central to political debates on media bias and funding)in the UK.
  2. Politically charged in policy and workplace contexts.
  3. Federal agency enforcing immigration laws in the U.S.
  4. Emerging economies bloc challenging the West.
  5. Federal law enforcement and legal body in the U.S.
  6. The main conservative political party in the U.S.
  7. UN health agency (key in pandemic responses).
  8. Political and economic union of European countries.
  9. Major party advocating Scottish independence.
  10. Non-profit, often active in advocacy.
  11. Global organization for peace, security, and cooperation.

20 Clues: The highest court in the U.S.Oversees international trade rules.Non-profit, often active in advocacy.Governing body of the Democratic Party.Emerging economies bloc challenging the West.UN health agency (key in pandemic responses).Major party advocating Scottish independence.Even the teacher used it for that crosswords !...

Chapter 5 - Crime and Security 2025-11-12

Chapter 5 - Crime and Security crossword puzzle
Across
  1. requiring users to do multiple authentications checks
  2. ensuring systems are available
  3. the use of computers or networks to perform unethical activity
  4. ensuring private data remains private
  5. the process of transforming data into secret code to prevent theft
  6. process where security professionals report vulnerabilities within the system
  7. psychological feelings and characteristics for an individual
  8. the state of being protected or safe
  9. not likely to cause harm
  10. ensuring data is not changed without correct authentication
Down
  1. the process of proving something is true
  2. automated measurements to discover physical or behavioral characteristics
  3. a method to bypass regular authentication. Usually used by law enforcement
  4. the use of hacking to hurt or benefit a political cause
  5. the state of being exposed and the potential of being harmed
  6. the process of simulating cyberattacks on a system
  7. people who can help protect the digital world
  8. individuals that will be using the system created
  9. an act that is considered shameful or wrong
  10. irresponsible or destructive action performed by a criminal

20 Clues: not likely to cause harmensuring systems are availablethe state of being protected or safeensuring private data remains privatethe process of proving something is truean act that is considered shameful or wrongpeople who can help protect the digital worldindividuals that will be using the system created...

SPHE Crossword 2021-11-03

SPHE Crossword crossword puzzle
Across
  1. what could happen if bullying escalates
  2. talking behind somebody’s back
  3. where bullying often happens the most
  4. the type of bullying when you use your words to hurt someone
  5. who you tell if you are being bullied in school
  6. what you might get if you hold in things for to long
  7. how you make people feel when you point out their flaws
  8. the type of bullying that happens online
Down
  1. To constantly annoy or hurt someone
  2. when you spread fake news about someone
  3. practices to maintaining health
  4. best place to find fake news
  5. what you are if you post on social media for your job
  6. False or untrue
  7. How you might feel if you were being bullied
  8. treat people with .....
  9. what you tell the bully when they are bullying you
  10. What you are if you are being bullied
  11. to leave someone out

19 Clues: False or untrueto leave someone outtreat people with .....best place to find fake newstalking behind somebody’s backpractices to maintaining healthTo constantly annoy or hurt someonewhere bullying often happens the mostWhat you are if you are being bulliedwhen you spread fake news about someonewhat could happen if bullying escalates...

Daily Bulldog - Phish and Whistle 2023-07-22

Daily Bulldog - Phish and Whistle crossword puzzle
Across
  1. Whistles when the water is ready
  2. Malicious software
  3. Large or small mouth, fishermen are all about this fish?
  4. What used to run on the Whistlestop Trail
  5. Porcupine's favorite place to hike?
  6. Provides high speed internet
  7. Laugh Out Loud
  8. Alliance leading the rebuilding of trestle bridge of Sandy River
  9. scam where attackers deceive people into revealing sensitive information
  10. Coach of the The Franklin County 13U All-Star team
Down
  1. Lead singer of Phish
  2. Actress who asked, "You know how to whistle, don't you Steve?"
  3. person who informs about illegal activity
  4. Jennifer Anavi Davies set the world record for this type of whistling in 2010(25 hr,30 min, 5 sec)
  5. type of crime committed with computers and networks
  6. Cheap type of whistle?
  7. Singer-songwriter who wrote "Fish and Whistle"
  8. Colorful type of cold water game fish
  9. Canned spiced meat or sometimes it clogs up your inbox

19 Clues: Laugh Out LoudMalicious softwareLead singer of PhishCheap type of whistle?Provides high speed internetWhistles when the water is readyPorcupine's favorite place to hike?Colorful type of cold water game fishperson who informs about illegal activityWhat used to run on the Whistlestop TrailSinger-songwriter who wrote "Fish and Whistle"...

R&D Engineering Bootcamp 2019-11-18

R&D Engineering Bootcamp crossword puzzle
Across
  1. VMware NSX as the Foundation for the ________ Cloud Network
  2. Cloud__________ Business Unit
  3. IT Priority: Transform __________ and Security
  4. Lets you run multiple operating systems and applications on a single server
  5. IT Priority: _______ the Cloud Journey
  6. Networking and ____________ Business Unit
  7. _________services augment one or more logical networks and/or connect multiple logical networks together​.
  8. product and ______ Services
  9. The'P' in our EPIC2 Values
Down
  1. Software that runs as the operating system of the ESX system
  2. good companies solve problems. Great companies create_________.
  3. How many dogs does Jenn have?
  4. A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
  5. IT Priority: Empowering the ______ Workspace
  6. VMware's beloved CEO
  7. Software_______data Center
  8. ________is VMware’s software-defined storage solution.
  9. ________ agility is the ability to process information with ease, speed & optimize mental flexibility

18 Clues: VMware's beloved CEOSoftware_______data CenterThe'P' in our EPIC2 Valuesproduct and ______ ServicesHow many dogs does Jenn have?Cloud__________ Business UnitIT Priority: _______ the Cloud JourneyNetworking and ____________ Business UnitIT Priority: Empowering the ______ WorkspaceIT Priority: Transform __________ and Security...

Chapter 13 2016-04-22

Chapter 13 crossword puzzle
Across
  1. the account that employer payroll taxes are recorded
  2. amounts withheld until paid
  3. information needed to prepare Form 941
  4. the column total used for Medicare Tax Payable
  5. amounts recorded in the general journal are posted individually to
  6. a national program for unemployment benefits
  7. reports the prior year's earnings and payroll taxes withheld
  8. the column total used for Social Security Tax Payable
Down
  1. the payment of payroll taxes to the government
  2. shows taxes owed to the government
  3. a state program for unemployment benefits
  4. total earnings minus total deductions
  5. employers must furnish by January 31
  6. does not have a tax base
  7. how frequently a business must deposit payroll taxes
  8. total of gross earnings
  9. the total used for Employee Income Tax Payable
  10. the total is the salary expense

18 Clues: total of gross earningsdoes not have a tax baseamounts withheld until paidthe total is the salary expenseshows taxes owed to the governmentemployers must furnish by January 31total earnings minus total deductionsinformation needed to prepare Form 941a state program for unemployment benefitsa national program for unemployment benefits...

IT Security Policy - Risk Management 2014-07-29

IT Security Policy - Risk Management crossword puzzle
Across
  1. Organization's willingness to accept risk
  2. identifies applicable regulatory requirements regarding information security
  3. Used to evaluate and document process maturity for a given area
  4. risk mitigation strategy designed to reduce/eliminate threat
  5. Level of risk after security measures are applied
Down
  1. Systematic evidence based evaluation
  2. Process of managing, directing, controlling and influencing organizational decisions, actions and behaviours
  3. Provides expert leadership
  4. Risk assessment methodology
  5. Assigning risk

10 Clues: Assigning riskProvides expert leadershipRisk assessment methodologySystematic evidence based evaluationOrganization's willingness to accept riskLevel of risk after security measures are appliedrisk mitigation strategy designed to reduce/eliminate threatUsed to evaluate and document process maturity for a given area...

Developing the Security Program Crossword 2020-07-10

Developing the Security Program Crossword crossword puzzle
Across
  1. ____ Organziations have 1 part-time manager
  2. What do employers look at when hiring
  3. ____ Organizations have internal Infosec Groups
  4. Who is the top InfoSec officer?
  5. ___ Charts are used to manage projects
Down
  1. PMBoK is a project management _____
  2. _____ Organizations have only one security admin
  3. ____ Is a series of projects
  4. What program is designed to reduce security breaches by employees?
  5. What department does InfoSec struggle with?

10 Clues: ____ Is a series of projectsWho is the top InfoSec officer?PMBoK is a project management _____What do employers look at when hiring___ Charts are used to manage projects____ Organziations have 1 part-time managerWhat department does InfoSec struggle with?____ Organizations have internal Infosec Groups_____ Organizations have only one security admin...

Foreign Policy 2023-05-22

Foreign Policy crossword puzzle
Across
  1. Decreased interest of America's military involvement in Vietnam
  2. handles security issues within the United States
  3. Because of America's isolationism WWI ____.
  4. Handles security internationally
  5. Atlantic Free Trade Agreement Free trade zone between the US, Canada, and Mexico
Down
  1. Main ambassador of the United States
  2. The opposite of isolationism
  3. No involvement in global issues
  4. The US did not directly fight in this
  5. Global Organization and administrators trade agreements

10 Clues: The opposite of isolationismNo involvement in global issuesHandles security internationallyMain ambassador of the United StatesThe US did not directly fight in thisBecause of America's isolationism WWI ____.handles security issues within the United StatesGlobal Organization and administrators trade agreements...

Cybersecurity Fundamentals Chapter 2 Part 2 2022-11-24

Cybersecurity Fundamentals Chapter 2 Part 2 crossword puzzle
Across
  1. requires a set of checks before allowing a device to connect to a network.
  2. allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
  3. programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
  4. shift the technology component from the organization to the cloud provider.
Down
  1. run inside a virtual environment with a pre-packaged
  2. includes the implementation of authentication and encryption.
  3. appliances that are installed within the network faculties.
  4. secure virtual network that uses the public network.
  5. provides virtualized computing resources over the Internet.
  6. developed a comprehensive framework to guide information security management.

10 Clues: run inside a virtual environment with a pre-packagedsecure virtual network that uses the public network.appliances that are installed within the network faculties.provides virtualized computing resources over the Internet.includes the implementation of authentication and encryption....

Exiting Prison 2013-12-11

Exiting Prison crossword puzzle
Across
  1. Claim that a mistake was made in a court decision.
  2. Determining parole after one third of the sentence has been served. (2 words)
  3. To guarantee the honesty of someone working with money.
  4. Penitentiary for a sentence of less than two years.
  5. Being excused for a crime.
  6. Term for prison services.
  7. Custody under constant guard.
Down
  1. An early release.
  2. Release as outlined by the law.
  3. Low level security.
  4. This can make it hard to leave the country. (2 words)
  5. The highest level of security.
  6. Prison for those serving longer sentences.
  7. Clause that allows those serving long sentences to apply for parole. (2 words)
  8. Custody that allows inmates to work and have some access to the community.

15 Clues: An early release.Low level security.Term for prison services.Being excused for a crime.Custody under constant guard.The highest level of security.Release as outlined by the law.Prison for those serving longer sentences.Claim that a mistake was made in a court decision.Penitentiary for a sentence of less than two years....

Friday Game v1.1 2023-06-23

Friday Game v1.1 crossword puzzle
Across
  1. Remote server storage and computing.
  2. A powerful computer that provides resources to other computers on a network.
  3. Domain Name System - translates domain names to IP addresses.
  4. A security measure that requires two different forms of identification.
  5. Identity and access management service for Microsoft 365.
  6. A directory service used in Windows environments.
  7. Common wired networking technology.
Down
  1. Microsoft's cloud-based productivity suite.
  2. A unique numerical label assigned to each device connected to a computer network.
  3. Microsoft's email server and collaboration platform.
  4. A network security device that monitors and controls incoming and outgoing network traffic.
  5. Wireless Local Area Network.
  6. Dynamic Host Configuration Protocol - assigns IP addresses automatically
  7. Secure connection over a public network.
  8. Device that forwards data packets between computer networks

15 Clues: Wireless Local Area Network.Common wired networking technology.Remote server storage and computing.Secure connection over a public network.Microsoft's cloud-based productivity suite.A directory service used in Windows environments.Microsoft's email server and collaboration platform.Identity and access management service for Microsoft 365....

Application MOS 2025-05-28

Application MOS crossword puzzle
Across
  1. This MOS deals with the disposal of explosive hazards
  2. The MOS designation for Cyber Network Defender
  3. Special Forces Military Occupational Specialty designation
  4. Critical roles demanding rigorous vetting, training, and advanced skills
Down
  1. MOS responsible for Army retention and soldier career management
  2. Regulation number detailing the Army Retention Program
  3. The structured process soldiers undergo for specialized roles
  4. Term for exceeding allowable time in a specific rank, risking separation

8 Clues: The MOS designation for Cyber Network DefenderThis MOS deals with the disposal of explosive hazardsRegulation number detailing the Army Retention ProgramSpecial Forces Military Occupational Specialty designationThe structured process soldiers undergo for specialized rolesMOS responsible for Army retention and soldier career management...

The Cold War 2022-04-29

The Cold War crossword puzzle
Across
  1. National Aeronautics and Space Administration.
  2. Another name for Taiwan.
  3. War dominated international relations from the late 1940's to the collapse of the Soviet Union.
  4. Buffer states.
  5. European Recovery Program.
  6. The German Democratic Republic
  7. __Bank (International Bank).
  8. North Atlantic Treaty Organization abbreviation.
  9. ___ Council was given the responsibility of maintaining international security.
Down
  1. Doctorine in which the President asked Congress to assist the free people of Greece and Turkey against "totalitarian" regimes.
  2. ___ Policy prevented Soviet expansion without starting a war.
  3. The Federal republic of Germany.
  4. British Prime minister
  5. __ Curtain was used to refer to the division between U.S allies and Soviet allies.
  6. A military alliance for the defense of the Communist States of Eastern Europe.
  7. The founding of the United ___ in the fall 1945.

16 Clues: Buffer states.British Prime ministerAnother name for Taiwan.European Recovery Program.__Bank (International Bank).The German Democratic RepublicThe Federal republic of Germany.National Aeronautics and Space Administration.The founding of the United ___ in the fall 1945.North Atlantic Treaty Organization abbreviation....

Vocabulary pg72 2024-04-17

Vocabulary pg72 crossword puzzle
Across
  1. mark left by a foot
  2. person who is convicted of a crime
  3. instrument or device used for attack or defense
  4. police officer whose job is to get evidence about crime
  5. find the answer or explanation for something
  6. place for keeping people accused of a crime
  7. act instance of robbing
Down
  1. which tends to prove or disprove something
  2. impression of the markings of the finger
  3. guard-a uniformed guard employed to maintain security
  4. inspect or look at officially so as to judge something
  5. capture a person
  6. follow rapidly in order to overtake pursue
  7. examine the particulars of something carefully
  8. officer-a policeman or policewoman
  9. unlawful killing of a person
  10. seize a person by legal authority

17 Clues: capture a personmark left by a footact instance of robbingunlawful killing of a personseize a person by legal authorityperson who is convicted of a crimeofficer-a policeman or policewomanimpression of the markings of the fingerwhich tends to prove or disprove somethingfollow rapidly in order to overtake pursue...

Topaz #13 2018-01-15

Topaz #13 crossword puzzle
Across
  1. The B in BSR stands for
  2. Type of fluid we use to drill the 8 1/2" section
  3. What does the D stand for in SLB D&M
  4. The F in FMS stands for
  5. You can get this when plugging AC vents
  6. One of the BHA parts in the WBCU run - Well ________
  7. Who supplies the liner hanger
  8. Name for the platform used on jackups when drilling in open water
Down
  1. The O in LO stands for
  2. Where Pak Rido is from
  3. What does the D in TvD charts stand for.
  4. Person who collects cuttings for the Geologist
  5. PCINO rep that used to play in a rock band!
  6. Canrig TDS are made in
  7. Cyber cementer presented about what on Sunday
  8. PCINO Mat co

16 Clues: PCINO Mat coThe O in LO stands forWhere Pak Rido is fromCanrig TDS are made inThe B in BSR stands forThe F in FMS stands forWho supplies the liner hangerWhat does the D stand for in SLB D&MYou can get this when plugging AC ventsWhat does the D in TvD charts stand for.PCINO rep that used to play in a rock band!...

Topaz.#13 2018-01-16

Topaz.#13 crossword puzzle
Across
  1. The B in BSR stands for
  2. Cyber cementer presented about this on Sunday
  3. Who brings the cuttings to the Gelogist
  4. Canrig TDS is designed in what country
  5. PCINO Mat Co
  6. What does the D stand for in SLB D&M
  7. The F in FMS stands for
  8. PCINO rep that was in a rock band
Down
  1. What does the O in LO stand for
  2. Where is Pak Rido from
  3. You can get this from plugging AC vents
  4. One of the BHA parts in WBCU run Well _______
  5. Who supplies the liner hanger to PCINO
  6. Name for the platform used when open water drilling
  7. What type of fluid did we drill the 8 1/2" section with
  8. What does the D in TvD charts stand for

16 Clues: PCINO Mat CoWhere is Pak Rido fromThe B in BSR stands forThe F in FMS stands forWhat does the O in LO stand forPCINO rep that was in a rock bandWhat does the D stand for in SLB D&MWho supplies the liner hanger to PCINOCanrig TDS is designed in what countryYou can get this from plugging AC ventsWho brings the cuttings to the Gelogist...

Burbank High School 2022-05-27

Burbank High School crossword puzzle
Across
  1. Cameras
  2. Something To Connect With
  3. S
  4. to hold on
  5. What's The Time
  6. Board
  7. Do Not Touch
  8. School Full Name
Down
  1. To Walk on
  2. p
  3. Shorten
  4. in Sight Beam
  5. Mask
  6. To Open
  7. l
  8. Something To Watch
  9. S

17 Clues: pSlSMaskBoardCamerasShortenTo OpenTo Walk onto hold onDo Not Touchin Sight BeamWhat's The TimeSchool Full NameSomething To WatchSomething To Connect With

gameshop 2014-05-19

gameshop crossword puzzle
Across
  1. ex. Chucky Cheese
  2. e.g. rent-a-cops
  3. about to be
  4. a rubrik wheel-runner?
  5. tree hugger?
  6. discharge
  7. manure
  8. chaos
  9. hereditary
  10. express
Down
  1. Florence and the _____
  2. a continuous transporter
  3. puzzle seller
  4. loose change
  5. go ballistic
  6. score

16 Clues: chaosscoremanureexpressdischargehereditaryabout to beloose changego ballistictree hugger?puzzle sellere.g. rent-a-copsex. Chucky CheeseFlorence and the _____a rubrik wheel-runner?a continuous transporter

Foucault-Security, Territory 2025-06-17

Foucault-Security, Territory crossword puzzle
Across
  1. The 18th-century city used as an example of security technology in urban planning, focusing on managing circulation and future growth.
  2. Foucault uses the historical exclusion of people with this disease as an example of a binary, juridico-religious power division.
  3. Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.
  4. The space of security, where uncertain elements unfold and circulation of causes and effects is managed, combining natural and artificial givens.
  5. A multiplicity of individuals existing biologically within their material surroundings, serving as both object and subject of security mechanisms.
Down
  1. The apparatus of power that calculates costs and probabilities, operating within optimal averages rather than strict prohibitions.
  2. The type of theoretical discourse that Foucault categorically advises against engaging in.
  3. A mechanism of power characterized by surveillance, correction, and the structuring of individuals within closed, artificial spaces.
  4. This historical epidemic's regulations, involving strict partitioning and home inspections, are an example of a disciplinary system.
  5. A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space.

10 Clues: The type of theoretical discourse that Foucault categorically advises against engaging in.Foucault's term for the set of mechanisms by which the human species' biological features became a political strategy.A 17th-century town, built from scratch in the form of a Roman camp, serving as Foucault's example of a disciplinary space....

cyber world vocabulary 2022-11-23

cyber world vocabulary crossword puzzle
Across
  1. อุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Address
  2. ซอฟต์แวร์ที่ติดตั้งมากับอุปกรณ์โดยที่ผู้ใช้ไม่รับรู้ เป้าหมายหลักของซอฟต์แวร์นี้คือขโมยข้อมูลส่วนตัวหรือข้อมูลลับ
  3. คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไร
  4. ระบบรักษาความปลอดภัยหรือระบบยืนยันตัวเองแบบ 2 ขั้นตอน นอกจากใส่ Username/Email และรหัสที่ถูกต้องแล้ว ผู้ใช้ต้องใส่ข้อมูลเพิ่มตัว
  5. คอมพิวเตอร์ที่ติด Malware และรอรับคำสั่งจากแฮกเกอร์เพื่อนำไปใช้ในทางที่ไม่ดี เช่น DDoS วิธีป้องกันคืออัปเดตซอฟต์แวร์อย่างสม่ำเสมอและใช้ Firewall
Down
  1. การเรียกค่าไถ่ของผู้ร้ายในวงการ IT จะทำด้วยการล็อคคอมพิวเตอร์และไฟล์ของเหยื่อ เพื่อแลกกับการใช้งานคอมพิวเตอร์และไฟล์อีกครั้ง ผู้ใช้งานจะต้องจ่ายเงินค่าไถ่ตามที่ผู้ร้ายกำหนด
  2. การโจรกรรมข้อมูลส่วนตัว โดยทำการปลอมแปลงอีเมลให้เหมือนกับอุตสาหกรรมที่มีความน่าเชื่อถือ เช่น ธนาคารหรือบริษัทโทรคมนาคม ภายในอีเมลจะอธิบายให้เหยื่อกดลิ้งค์ที่ให้มาและกรอกข้อมูลส่วนตัว
  3. เทคนิคที่แฮคเกอร์ใช้ซ่อนตัวตน โดยอาจหลอกเหยื่อว่าต้นทางของการแฮคมาจากจุด B แต่ที่จริงมาจากจุด A หรือการปลอมเว็บไซต์ขึ้นมาเพื่อหลอกให้เหยื่อใส่ข้อมูลส่วนตัวลงไป
  4. ระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)
  5. การใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุด

10 Clues: คอมพิวเตอร์ที่ติด Malware และกลายเป็นส่วนหนึ่งของ Botnet เรียกว่าอะไรอุปกรณ์ที่ปิดบังตัวตนของผู้ใช้อินเทอร์เน็ต โดยทำการปิดที่อยู่หรือ IP Addressการใช้ Botnet หลายๆ เครื่อง เพื่อโจมตีเป้าหมายในเวลาเดียวกันและทำให้เว็บไซต์ล่มในที่สุดระบบป้องกันที่มีหน้าที่หลักคือเบี่ยงเบนแฮคเกอร์จากคอมพิวเตอร์และข้อมูลที่มีมูลค่า (โถน้ำผึ้งเพื่อล่อให้หมีมากิน)...

Englisch Cyber Words 2024-04-18

Englisch Cyber Words crossword puzzle
Across
  1. blocks malicious incoming requests from your network
  2. self-replicating computer virus
  3. graphical processing unit
  4. host of services across the internet
Down
  1. input device for typing
  2. long term for app
  3. process of creating ethernet cables
  4. old storage device. Other word for diskette
  5. short term for central-processing-unit
  6. credential scamming via email

10 Clues: long term for appinput device for typinggraphical processing unitcredential scamming via emailself-replicating computer virusprocess of creating ethernet cableshost of services across the internetshort term for central-processing-unitold storage device. Other word for disketteblocks malicious incoming requests from your network

Cyber safety crossword 2023-05-22

Cyber safety crossword crossword puzzle
Across
  1. fights on messages with angry language.
  2. online bulling
  3. excluding someone from an online group.
  4. pretending to be someone else
  5. someone stealing and copying someone else's work
Down
  1. a sickness for computers
  2. Repeated and intense harassment online
  3. Talking someone into revealing their secrets
  4. Sharing someone's secrets online.
  5. Repeatedly sending mean messages

10 Clues: online bullinga sickness for computerspretending to be someone elseRepeatedly sending mean messagesSharing someone's secrets online.Repeated and intense harassment onlinefights on messages with angry language.excluding someone from an online group.Talking someone into revealing their secretssomeone stealing and copying someone else's work

Common Cyber Terms 2023-04-24

Common Cyber Terms crossword puzzle
Across
  1. Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
  2. A type of network layer firewall
  3. A weakness in software programs that can be exploited
  4. Provides additional, revised or updated code for an operating system or application
  5. Used to gain unauthorised access to a computer or a network
Down
  1. Uses asymmetric key encryption
  2. An attack requiring a carrier file to self-replicate
  3. Gives a hacker remote access to, and control over, a computer or network
  4. Verify the identity of a user
  5. Encrypted parts of the internet that are not indexed by search engines

10 Clues: Verify the identity of a userUses asymmetric key encryptionA type of network layer firewallAn attack requiring a carrier file to self-replicateA weakness in software programs that can be exploitedUsed to gain unauthorised access to a computer or a networkEncrypted parts of the internet that are not indexed by search engines...

Cyber Awareness Week 2025-09-23

Cyber Awareness Week crossword puzzle
Across
  1. When someone manipulates an email that tricks you into doing something against your better judgement
  2. An authentication method that requires the user to provide two or more verification factors to gain access to a system or resource
  3. Hardware or software that acts as a barrier and filter between an internal network and another network (such as the internet)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. A person who uses uses malicious tactics to gain unauthorised access to systems and data
  2. Harmful computer programs used by hackers to steal information, gain access or lock your device
  3. The address of a webpage (acronym)
  4. Should be long, complex and not contain any personally identifiable information (like your dogs name)
  5. Widely used technology that allows for the wireless connection between a device and a router
  6. Never click on a ___ in an email unless you are sure that it's genuine

10 Clues: The address of a webpage (acronym)Never click on a ___ in an email unless you are sure that it's genuineA person who uses uses malicious tactics to gain unauthorised access to systems and dataWidely used technology that allows for the wireless connection between a device and a router...

Cyber Crime Crossword 2025-10-10

Cyber Crime Crossword crossword puzzle
Across
  1. hackers use this to find out every key pressed
  2. The act of trying to gain personal information from victims
  3. these people perform cyber attacks
  4. Hackers use this to watch what you are doing without having to be beside you
Down
  1. Replicates itself to do the most damage
  2. Plain text can be protected by turning it into ___ text
  3. someone looking over you to find out your details
  4. your messages can be made safer if they are_____
  5. This malware needs human interaction to get started.
  6. software designed to damage a computer system

10 Clues: these people perform cyber attacksReplicates itself to do the most damagesoftware designed to damage a computer systemhackers use this to find out every key pressedyour messages can be made safer if they are_____someone looking over you to find out your detailsThis malware needs human interaction to get started....

la "cyber-société" 2025-12-22

la "cyber-société" crossword puzzle
Across
  1. to survive
  2. to mention
  3. (wider)family
  4. low
  5. in demand
  6. to embody
Down
  1. to feel sorry
  2. or even
  3. harmful
  4. tool

10 Clues: lowtoolor evenharmfulin demandto embodyto surviveto mentionto feel sorry(wider)family

Module 4.1Crossword puzzle 2023-03-16

Module 4.1Crossword puzzle crossword puzzle
Across
  1. The department that is responsible for America's housing needs.
  2. The department that looks over students.
  3. The president can only have ___ terms in office.
  4. The president's advisors.
  5. The department that overlooks policy on farming.
  6. Length of the term for a president.
  7. The department that overlooks military forces.
  8. Head of the executive branch.
Down
  1. The department that protects the health of all Americans.
  2. The first Vice President.
  3. Legislative house that is controlled by the vice president.
  4. The department that protects American people from domestic threats.
  5. The first president.
  6. how old does a president have to be?
  7. System that votes the president into office.
  8. When a president rejects a bill passed by Congress.
  9. The department that creates conditions for economic growth.
  10. The department tasked with overlooking American nuclear security.

18 Clues: The first president.The first Vice President.The president's advisors.Head of the executive branch.Length of the term for a president.how old does a president have to be?The department that looks over students.System that votes the president into office.The department that overlooks military forces.The president can only have ___ terms in office....

IR - Module 1 2024-12-05

IR - Module 1 crossword puzzle
Across
  1. US and ----- were the superpowers emerged after WWII
  2. The period from 1945-1991
  3. The IGO formed after WW 2
  4. This level of IR analysis states that single countries can influence IR
  5. The process of managing / governing people in a place.
  6. The treaty to punish Germany is
  7. The relationship between nation states is called
  8. The second name of the person behind systems theory.
  9. Promote peace and security among nations, Kill evils in the society.
  10. Looting one country by another country is
Down
  1. Treaty of ---- was signed on 1648
  2. ..... conference was held in 1919 Jan
  3. The process of making slaves and setting empire is called
  4. The treaty to end war on Spanish succession was ..... treaty.
  5. Germany, Austria-Hungary, Italy
  6. German ruler during WW I
  7. Nation security is a matter of importance and selfishness
  8. This level of IR analysis says that a single person can influence in IR

18 Clues: German ruler during WW IThe period from 1945-1991The IGO formed after WW 2Germany, Austria-Hungary, ItalyThe treaty to punish Germany isTreaty of ---- was signed on 1648..... conference was held in 1919 JanLooting one country by another country isThe relationship between nation states is calledUS and ----- were the superpowers emerged after WWII...

Security 2022-02-23

Security crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

VR crossword 2023-05-08

VR crossword crossword puzzle
Across
  1. a immersive form of vr
  2. when you get sick of vr
  3. completely pulling a person into technology
  4. a type of technology which lets you go places in your own home
Down
  1. a form of vr
  2. a relaxed form of vr

6 Clues: a form of vra relaxed form of vra immersive form of vrwhen you get sick of vrcompletely pulling a person into technologya type of technology which lets you go places in your own home

Bullying 2021-12-13

Bullying crossword puzzle
Across
  1. type of bullying involving words
  2. 3 things that make the issue bullying vs. conflict
  3. people not directly involved with the bullying
  4. type of bullying involving bodily harm
  5. type of bullying typically dealing with social media
Down
  1. 3 things that make the issue bullying vs. conflict
  2. type of bullying involving other people
  3. 3 things that make the issue bullying vs. conflict

8 Clues: type of bullying involving wordstype of bullying involving bodily harmtype of bullying involving other peoplepeople not directly involved with the bullying3 things that make the issue bullying vs. conflict3 things that make the issue bullying vs. conflict3 things that make the issue bullying vs. conflict...

SkillWise Staff Week 12 2025-03-25

SkillWise Staff Week 12 crossword puzzle
Across
  1. the month we're currently in
  2. The principles we work by (8,4,5)
  3. A online learning platform, available anytime for professional development(4,6,8)
Down
  1. The January planning week game/ event, Greg Davis
  2. the database SW uses
  3. program ensuring cyber safety at SW (4,2,1)

6 Clues: the database SW usesthe month we're currently inThe principles we work by (8,4,5)program ensuring cyber safety at SW (4,2,1)The January planning week game/ event, Greg DavisA online learning platform, available anytime for professional development(4,6,8)

Internet Puzzles 2016-02-17

Internet Puzzles crossword puzzle
Across
  1. Internet program you use to surf the internet.
  2. A networking device that perform the "traffic directing" functions on the Internet.
  3. server that automatically provides an IP address.
  4. A Type of Cord that hooks direct from the modem to customers device.
  5. A tool you use to help guide your calls.
  6. The owner of a Domain name.
  7. This controls your domain name's website and email settings.
  8. What is before the .com but after the @ symbol?
  9. A free service with NPP for email and web.
Down
  1. Controls how the modem functions.
  2. The Program the customer goes to set up a Domain Name.
  3. network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
  4. Translates an IP address to a domain name.
  5. Redirects a communication request from one address to a Port.
  6. Internet output device.
  7. Changing IP Address.
  8. Modem config without NAT.
  9. Internet without wires.
  10. a hardware device that has multiple Ethernet ports.
  11. Non changing IP Address.
  12. Network Address Translation.

21 Clues: Changing IP Address.Internet output device.Internet without wires.Non changing IP Address.Modem config without NAT.The owner of a Domain name.Network Address Translation.Controls how the modem functions.A tool you use to help guide your calls.Translates an IP address to a domain name.A free service with NPP for email and web....