cyber security Crossword Puzzles

8A Vocabulario 2022-01-13

8A Vocabulario crossword puzzle
Across
  1. they believe
  2. Reasonable
  3. inconsistent
  4. Security
  5. reason
  6. consistent
Down
  1. organized
  2. Balance
  3. he/she grows
  4. to organize
  5. I believe

11 Clues: reasonBalanceSecurityorganizedI believeReasonableconsistentto organizethey believeinconsistenthe/she grows

Spanish 2- Undiad 2- Alyssa George 2021-02-18

Spanish 2- Undiad 2- Alyssa George crossword puzzle
Across
  1. share
  2. to care about
  3. discipline
  4. at the community center
  5. flexible
  6. a mechanic
  7. to create
  8. routine
  9. communicate
  10. autonomy
  11. a soldier
  12. earn money
Down
  1. to plant trees
  2. security
  3. work with
  4. to recycle
  5. to clean up trash
  6. a dentist
  7. telework
  8. office
  9. to help
  10. receive
  11. an artist
  12. mobile
  13. send

25 Clues: sendshareofficemobileto helpreceiveroutinesecurityteleworkflexibleautonomywork witha dentistto createan artista soldierto recycledisciplinea mechanicearn moneycommunicateto care aboutto plant treesto clean up trashat the community center

Scene 1 Set 6: Travelling 2021-04-06

Scene 1 Set 6: Travelling crossword puzzle
Across
  1. laiva
  2. juna
  3. passi
  4. lento
  5. lentäjä
  6. lentokone
  7. auto
  8. matka
  9. turvatarkastus
  10. skootteri
  11. matkustaja
  12. lähtevät (lennot)
  13. passintarkastus
  14. loma
  15. loma
  16. metro
Down
  1. bussipysäkki
  2. kartta
  3. matkustaa
  4. saapuvat(lennot)
  5. vene
  6. mopoauto
  7. moottoripyörä
  8. matkatavarat
  9. polkupyörä
  10. ravintolavaunu
  11. makuuvaunu
  12. myöhästyä
  13. matka
  14. istuin
  15. saapua
  16. mopo

32 Clues: junaveneautomopolomalomalaivapassilentomatkamatkametrokarttaistuinsaapualentäjämopoautomatkustaalentokoneskootterimyöhästyäpolkupyörämakuuvaunumatkustajabussipysäkkimatkatavaratmoottoripyöräturvatarkastusravintolavaunupassintarkastussaapuvat(lennot)lähtevät (lennot)

Wordmaster Voca4 2021-05-27

Wordmaster Voca4 crossword puzzle
Across
  1. 판사, 심사원, 판단하다
  2. 대통령
  3. guard 경호원, 경비원
  4. 군인
  5. 과학자
  6. 우주비행사
  7. 기사, 기술자
  8. 공무원, 관리
  9. 금전출납원
  10. 기자, 통신원
  11. 미용사
  12. 사진사
  13. 회계사
  14. 판매원
Down
  1. 선장
  2. 목수
  3. 점원
  4. 치과의사
  5. 예술가, 화가
  6. 삽화가
  7. 소설가
  8. 비서
  9. 정원사
  10. 제빵사
  11. 조종사, 조종하다
  12. 사업가
  13. 교수
  14. 변호사
  15. 어부
  16. 탐정

30 Clues: 선장목수점원비서군인교수어부탐정삽화가소설가대통령정원사제빵사과학자사업가변호사미용사사진사회계사판매원치과의사우주비행사금전출납원예술가, 화가기사, 기술자공무원, 관리기자, 통신원조종사, 조종하다판사, 심사원, 판단하다guard 경호원, 경비원

Unit 3 2021-11-04

Unit 3 crossword puzzle
Across
  1. luggage
  2. to pack the suitcase
  3. to depart
  4. the bus stop
  5. the passenger
  6. the airplane
  7. to travel
  8. the ticket
  9. airport
  10. to board
Down
  1. identification
  2. pass through security
  3. to confirm a flight
  4. to take a taxi
  5. the passport
  6. bathingsuit
  7. customs
  8. suitcase
  9. to arrive
  10. to stand in a line
  11. the screen

21 Clues: luggagecustomsairportsuitcaseto boardto arriveto departto travelthe screenthe ticketbathingsuitthe passportthe bus stopthe airplanethe passengeridentificationto take a taxito stand in a lineto confirm a flightto pack the suitcasepass through security

D3-L5 Crucigrama de vocabulario 2021-10-23

D3-L5 Crucigrama de vocabulario crossword puzzle
Across
  1. lodging
  2. welcome
  3. delayed
  4. farewell
  5. island
  6. land
  7. destination
  8. warning
  9. recommendable
  10. compass
  11. reception
  12. itinerary
  13. ticket
  14. valid
  15. traveler
  16. adventure
  17. prohibited
  18. cruise
  19. hostel
Down
  1. port
  2. arrival
  3. security
  4. dangerous
  5. distant
  6. accident
  7. included
  8. jungle
  9. passport
  10. return
  11. takeoff
  12. insurance
  13. adventurer
  14. expired
  15. waves
  16. ruins

35 Clues: portlandvalidwavesruinsislandjunglereturnticketcruisehostelarrivallodgingwelcomedelayeddistantwarningtakeoffcompassexpiredsecurityfarewellaccidentincludedpassporttravelerdangerousreceptionitineraryinsuranceadventureadventurerprohibiteddestinationrecommendable

Lake Prince Woods Workers 2021-08-16

Lake Prince Woods Workers crossword puzzle
Across
  1. Marketing
  2. Maintenance
  3. Activities Dir.
  4. Social Services
  5. Director
  6. Assistant Activities
  7. Chaplain
  8. Chef
  9. Maintenance
  10. Nursing Dir.
  11. Therapy
  12. Medical Cebter
  13. Outreach Coordinator
  14. Local Hospital
  15. Notary
Down
  1. President UCHAS
  2. Receptionist
  3. Security Guard
  4. Office Manager
  5. Dietery
  6. Rear Entrance
  7. Hair Salon
  8. Dietery Head
  9. At Home Care
  10. Home Care
  11. Human Resources
  12. Business Manager
  13. Receptionist
  14. Welcome Committee

29 Clues: ChefNotaryDieteryTherapyDirectorChaplainMarketingHome CareHair SalonMaintenanceMaintenanceReceptionistDietery HeadAt Home CareNursing Dir.ReceptionistRear EntranceSecurity GuardOffice ManagerMedical CebterLocal HospitalPresident UCHASActivities Dir.Social ServicesHuman ResourcesBusiness ManagerWelcome CommitteeAssistant Activities...

Really Hard STUFF 2019-05-19

Really Hard STUFF crossword puzzle
Across
  1. disposition.
  2. tangible.
  3. maneuver.
  4. imperil.
  5. region.
  6. defendable.
  7. grass.
  8. terrain.
  9. habitat.
  10. conduct.
  11. guardianship.
  12. organic.
  13. account.
  14. discipline.
  15. supplies.
  16. mortal.
  17. adaptable.
  18. meteorological.
  19. deterioration.
Down
  1. mural.
  2. security.
  3. vegetation.
  4. biologic.
  5. living.
  6. public.
  7. architecture.
  8. substantial.
  9. mainland.
  10. geology.
  11. scope.
  12. analyst.
  13. countanence.
  14. Animalia.
  15. sterile.
  16. blueprint.

35 Clues: mural.grass.scope.living.public.region.mortal.imperil.terrain.habitat.conduct.geology.organic.account.analyst.sterile.security.tangible.biologic.maneuver.mainland.supplies.Animalia.blueprint.adaptable.vegetation.defendable.discipline.disposition.substantial.countanence.architecture.guardianship.deterioration.meteorological.

crossword 2014-01-27

crossword crossword puzzle
Across
  1. отель
  2. полночь
  3. ремень
  4. переезжать
  5. напуган
  6. дом с призраками
  7. карта
  8. недавно
  9. гость/посетитель
  10. охрана
  11. ловушка
  12. вдруг
  13. симпатичный
  14. мистический
  15. ожерелье
  16. путешествовать
  17. рассказывать
  18. плавающий по воздуху
Down
  1. деревня
  2. работа
  3. подвал
  4. впечатляющий
  5. волшебный
  6. потрясающий
  7. неуютно
  8. браслет
  9. тень
  10. привидение
  11. ночной кошмар
  12. странный
  13. скелет
  14. звук

32 Clues: теньзвукотелькартавдругработаподвалременьохранаскелетдеревняполночьнапуганнеуютнонедавнобраслетловушкастранныйожерельеволшебныйпереезжатьпривидениепотрясающийсимпатичныймистическийвпечатляющийрассказыватьночной кошмарпутешествоватьдом с призракамигость/посетительплавающий по воздуху

London Sights 2015-11-11

London Sights crossword puzzle
Across
  1. Glocke
  2. stehen
  3. Punkt
  4. berühmt
  5. behalten
  6. König
  7. Gefahr
  8. Flughafen
  9. Bus
  10. Detektiv
  11. Palast
  12. kämpfen
  13. Turm
  14. Fahrt
  15. Abflug
  16. Zug
  17. Flug
  18. Ankunft
  19. Flugzeug
Down
  1. laut
  2. Platz
  3. Ticket
  4. bedeuten
  5. Sicherheit
  6. werfen
  7. respektieren
  8. Taschendiebe
  9. Rolltreppe
  10. sicher
  11. Geldstrafe
  12. Königin
  13. Jugend
  14. Verkehr
  15. reisen
  16. anfangen

35 Clues: BusZuglautTurmFlugPlatzPunktKönigFahrtGlockestehenTicketwerfenGefahrPalastsicherJugendAbflugreisenberühmtkämpfenKöniginVerkehrAnkunftbedeutenbehaltenDetektivanfangenFlugzeugFlughafenSicherheitRolltreppeGeldstraferespektierenTaschendiebe

opt pre int 11 2024-08-14

opt pre int 11 crossword puzzle
Across
  1. особенный, конкретный
  2. охрана, надёжность
  3. большинство
  4. жестокий
  5. связанный с насилием, жестокий
  6. электрический
  7. приз
  8. случайно
  9. вес, весить
  10. атом
  11. притяжение
  12. редкий
  13. уверенно
Down
  1. фактор
  2. слой
  3. клейкий
  4. важность
  5. воздушный шар
  6. комфорт
  7. нетрудоспособность, инвалидность
  8. ген
  9. потолок
  10. чистить
  11. креативность
  12. рвать
  13. исследовать
  14. заряд
  15. меньшинство
  16. награда, награждать
  17. игрушка

30 Clues: генслойпризатомрватьзарядфакторредкийклейкийкомфортпотолокчиститьигрушкаважностьжестокийслучайноувереннопритяжениебольшинствовес, веситьисследоватьменьшинствокреативностьвоздушный шарэлектрическийохрана, надёжностьнаграда, награждатьособенный, конкретныйсвязанный с насилием, жестокийнетрудоспособность, инвалидность

Vocab Spanish 3 2023-04-26

Vocab Spanish 3 crossword puzzle
Across
  1. cliff jump
  2. water bottle
  3. sunglasses
  4. to fish
  5. sun
  6. baggage
  7. airport
  8. weather
  9. plane
  10. hotel
  11. snorkle
  12. cloud
  13. to board
  14. to walk
  15. landed
  16. clothing store
Down
  1. grocery's store
  2. energy
  3. boat
  4. door
  5. security
  6. candy
  7. gum
  8. to fly
  9. bathing suit
  10. to flip
  11. sunscreen
  12. shade
  13. suitcase
  14. train

30 Clues: gumsunboatdoorcandyshadeplanehotelcloudtrainenergyto flylandedto fishbaggageto flipairportweathersnorkleto walksecurityto boardsuitcasesunscreencliff jumpsunglasseswater bottlebathing suitclothing storegrocery's store

4K puzzle (module Reading 1&2) 2023-09-27

4K puzzle (module Reading 1&2) crossword puzzle
Across
  1. toepassen
  2. toestemming
  3. verstoren
  4. aan de andere kant
  5. meerdere
  6. ongebruikelijk
  7. lanceren
  8. hoewel
  9. gegevens
  10. in plaats daarvan
  11. gemeenschap
  12. ontwikkelaar
  13. betrekken
  14. beplanting
  15. besturen
  16. beveiliging
  17. vastmaken
Down
  1. beoordelen
  2. kenmerk
  3. desondanks
  4. samenwerken
  5. terwijl
  6. onhandig
  7. duurzaam
  8. natuurbehoud
  9. statistieken
  10. met als gevolg
  11. maar toch
  12. verboden
  13. omdat

30 Clues: omdathoewelkenmerkterwijlonhandigmeerdereduurzaamlancerengegevensbesturenverbodentoepassenverstorenbetrekkenmaar tochvastmakenbeoordelendesondanksbeplantingtoestemmingsamenwerkengemeenschapbeveiligingnatuurbehoudstatistiekenontwikkelaarongebruikelijkmet als gevolgin plaats daarvanaan de andere kant

June Event 2025-04-30

June Event crossword puzzle
Across
  1. PJSK OCs
  2. Naomi Kimishima
  3. Jermling #2
  4. Fire Emblem
  5. #FlockOnFridays
  6. Sakura Ogami
  7. Emotion OCs
  8. Yakuza
  9. Bird
  10. Moderator
  11. Dedede
Down
  1. 2 Time AWE Champ
  2. PokeRolls
  3. Ringo Esashi
  4. Kara Shirectus
  5. Dave
  6. Star
  7. Kokoto
  8. AWE Security
  9. 'Advertiser and Writer Extraordinaire' role
  10. Moon Mage
  11. Cross Dimensional Purple Hunt
  12. PJSK Character
  13. Active on Mudae

24 Clues: DaveStarBirdKokotoYakuzaDededePJSK OCsPokeRollsMoon MageModeratorJermling #2Fire EmblemEmotion OCsRingo EsashiAWE SecuritySakura OgamiKara ShirectusPJSK CharacterNaomi Kimishima#FlockOnFridaysActive on Mudae2 Time AWE ChampCross Dimensional Purple Hunt'Advertiser and Writer Extraordinaire' role

Cyber Space Safety 2013-11-03

Cyber Space Safety crossword puzzle
Across
  1. Abuse of technology and the internet
  2. Software that is harmful to your computer by, spreading cookies and making copies of itself
  3. A series of secret letter or numbers that unlock a computer etc.
  4. Internet software on Apple appliances
Down
  1. Mail that is sent using technology and the internet
  2. Using information from the internet and not referencing it in your bibliography
  3. A weblog that is on the internet, often a diary or journal
  4. A harmful software program that erases your computer and gives it problems
  5. An advertisement that often appears on top of another window
  6. Wireless internet on technology

10 Clues: Wireless internet on technologyAbuse of technology and the internetInternet software on Apple appliancesMail that is sent using technology and the internetA weblog that is on the internet, often a diary or journalAn advertisement that often appears on top of another windowA series of secret letter or numbers that unlock a computer etc....

Cyber Quiz Practice 2025-08-20

Cyber Quiz Practice crossword puzzle
Across
  1. What is the act of pretending to be someone else online?
  2. Which component is responsible for a robot's movement?
  3. What is the full form of WLAN?
  4. What term describes an incident where sensitive data is accessed or stolen without authorisation?
Down
  1. The process of breaking an image into parts is called?
  2. What is the shortcut key to insert a track change in MS Word?
  3. What is the length of IPv6 address?
  4. Who invented electric motor in 1873?
  5. Which Indian state government has partnered with Google Cloud to launch a digital platform for agriculture using AI and Beacon technology?
  6. What small file stores information about user preferences online?

10 Clues: What is the full form of WLAN?What is the length of IPv6 address?Who invented electric motor in 1873?The process of breaking an image into parts is called?Which component is responsible for a robot's movement?What is the act of pretending to be someone else online?What is the shortcut key to insert a track change in MS Word?...

Ramsey chapter 4 lesson 2 game 2025-03-06

Ramsey chapter 4 lesson 2 game crossword puzzle
Across
  1. every time you spend with credit you add to this
  2. something owned (that has value) offered as security on a debt; if the debt is not repaid as agreed, the item is forfeited to the lender
  3. a loan for a fixed amount of money that‘s paid back in monthly installments
  4. 80% of Americans have this type of payment
  5. a legal claim against (or right to own) an asset until the debt (loan) is repaid​​​​​​​
  6. the increase in value of a home over time; the difference between the amount owed and what the home could be sold for​​​​​​​
  7. an asset that increases in value over time​​​​​​​
  8. the lender doesn’t require you to put down a security deposit or collateral
Down
  1. you have to put down a security deposit or use something as collateral.
  2. credit that automatically renews whenever a payment is made to reduce the debt
  3. a loan that typically takes 15-30 years to pay off; for a house
  4. an asset that loses value over time, such as a car that’s worth less every year​​​​​​​
  5. often come with higher rates a fees
  6. failure to repay a loan on time​
  7. a lender who uses deceptive, unfair, or fraudulent practices on borrowers who are desperate for cash

15 Clues: failure to repay a loan on time​often come with higher rates a fees80% of Americans have this type of paymentevery time you spend with credit you add to thisan asset that increases in value over time​​​​​​​a loan that typically takes 15-30 years to pay off; for a houseyou have to put down a security deposit or use something as collateral....

Bullying 2022-11-15

Bullying crossword puzzle
Across
  1. It happens online
  2. someone who helps a victim stand up to a bully
  3. saying mean things to someone
  4. doing purposely mean things to someone over and over again
Down
  1. someone who watches the bullying happen and does nothing
  2. a just dance coach the bully's other coaches
  3. purposely leaving someone out of activities

7 Clues: It happens onlinesaying mean things to someonepurposely leaving someone out of activitiesa just dance coach the bully's other coachessomeone who helps a victim stand up to a bullysomeone who watches the bullying happen and does nothingdoing purposely mean things to someone over and over again

network 2023-05-01

network crossword puzzle
Across
  1. the maximum amount of data that can be sent through online methods
  2. a type of security to prevent access that is hidden through a unique password
  3. provides service to a large amount of devices while physically existing
  4. the structure that shows how things are connected
  5. a user that has higher access than normal users
  6. security that prevents unauthorized access
Down
  1. area network (LAN)
  2. a set of rules for data transmission and receiving
  3. the user that is capable of receiving information
  4. a company's singular private network
  5. address
  6. virtual connections for the start and end of a network
  7. interconnected devices that can send information to and from

13 Clues: addressarea network (LAN)a company's singular private networksecurity that prevents unauthorized accessa user that has higher access than normal usersthe user that is capable of receiving informationthe structure that shows how things are connecteda set of rules for data transmission and receiving...

Personal Safety 2025-09-30

Personal Safety crossword puzzle
Across
  1. Safety gear worn on your head.
  2. A line you don’t cross without permission.
  3. What you should do at home to keep yourself safe. (2 words)
  4. A short but powerful word to refuse something.
  5. Making sound decisions online
  6. Being mindful of what’s happening around you.
  7. Having space for yourself, in person and online
Down
  1. Everyday good judgment that helps you stay safe. (2 words)
  2. Respecting the distance people need between themselves and others. (2 words)

9 Clues: Making sound decisions onlineSafety gear worn on your head.A line you don’t cross without permission.Being mindful of what’s happening around you.A short but powerful word to refuse something.Having space for yourself, in person and onlineEveryday good judgment that helps you stay safe. (2 words)...

Security and Viruses 2013-05-01

Security and Viruses crossword puzzle
Across
  1. a type of grayware, is similar to adware.
  2. is a program written with malicious intent and sent out by attackers.
  3. is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
  4. or malware is a file or program other then a virus that is potentially harmful. Grayware or malware is a file or program other then a virus that is potentially harmful.
Down
  1. is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  2. is a self-replicating program that is harmful to networks.
  3. important in computers and networks
  4. is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
  5. of death A series of repeated, larger than normal pings that crash the receiving computer.
  6. Programming language that allows applets to run within a web browser.
  7. is a software program that displays advertising on your computer.

11 Clues: important in computers and networksa type of grayware, is similar to adware.is a self-replicating program that is harmful to networks.is a software program that displays advertising on your computer.is a program written with malicious intent and sent out by attackers.Programming language that allows applets to run within a web browser....

Security IT Crossword 2022-11-14

Security IT Crossword crossword puzzle
Across
  1. Accessible at any time.
  2. Unauthorised access of data can lead to this.
  3. The main way data is destroyed by a third-party.
  4. Accessed only by those with authorisation.
Down
  1. Teachers giving students higher grades than they actually deserve is an example of this.
  2. Stolen personal information may lead to the theft of this.
  3. The abbreviation of an act towards to processing of data
  4. The main cause of accidental lose of data.
  5. DDoS attacks lead to a loss of ______
  6. Maintained so that content is up-to-date and correct.
  7. Loss of intellectual property can lead to this.

11 Clues: Accessible at any time.DDoS attacks lead to a loss of ______The main cause of accidental lose of data.Accessed only by those with authorisation.Unauthorised access of data can lead to this.Loss of intellectual property can lead to this.The main way data is destroyed by a third-party.Maintained so that content is up-to-date and correct....

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. An attack using computer program to guess the correct user credentials
  2. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  3. Protocol used for encryption which protects data in transit
  4. A piece of data stored on your device by websites you visit. Not chocolate chip, though
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  7. Encryption technique used to protect data
  8. A sequence of words or text used to control access to a computer; similar to a password.
  9. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
  1. The act of tricking someone into giving up sensitive information
  2. System(software or hardware) used to manage network security and monitor traffic
  3. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  4. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  5. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  6. This testing simulates a full stack attack, probing every possible weakness
  7. Malicious program that can replicate itself

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  2. Encryption technique used to protect data
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
  4. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. System(software or hardware) used to manage network security and monitor traffic
  7. Malicious program that can replicate itself
  8. An attack using computer program to guess the correct user credentials
  9. This testing simulates a full stack attack, probing every possible weakness
Down
  1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  2. Protocol used for encryption which protects data in transit
  3. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  4. The act of tricking someone into giving up sensitive information
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  7. A piece of data stored on your device by websites you visit. Not chocolate chip, though

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

Vocab unidad 2/2 2016-11-15

Vocab unidad 2/2 crossword puzzle
Across
  1. flight
  2. to go through security
  3. boarding pass
  4. to board
  5. bathing suit
  6. carry-on/hand luggage
  7. door/gate
  8. suitcase
  9. station
Down
  1. the check-in the luggage
  2. bathing suit
  3. stop
  4. itinerary
  5. to take a taxi
  6. screen
  7. to travel

16 Clues: stopflightscreenstationto boardsuitcaseitineraryto traveldoor/gatebathing suitbathing suitboarding passto take a taxicarry-on/hand luggageto go through securitythe check-in the luggage

vocabulary 1 2014-10-12

vocabulary 1 crossword puzzle
Across
  1. flight attendant
  2. travel agent
  3. by car
  4. to land;to touch down
  5. train station
  6. baggage claim
  7. stopover;layover
  8. to take a taxi
  9. by foot
  10. ticket
  11. buy plane
  12. street
Down
  1. arrival
  2. immigration
  3. boarding pass
  4. thing
  5. currency exchange office
  6. CD player
  7. direct flight
  8. recreation center
  9. to go through security
  10. suitcase

22 Clues: thingby carticketstreetarrivalby footsuitcaseCD playerbuy planeimmigrationtravel agentboarding passtrain stationbaggage claimdirect flightto take a taxiflight attendantstopover;layoverrecreation centerto land;to touch downto go through securitycurrency exchange office

EDTX CONTACTS 2014-12-03

EDTX CONTACTS crossword puzzle
Across
  1. CATS COORDINATOR
  2. DISTRICT OFFICE SECURITY MANAGER
  3. FOIA CONTACT
  4. HUMAN RESOURCES OFFICER
  5. ETHICS ADVISOR
  6. PSC COORDINATOR
  7. SEXUAL HARASSMENT CONTACT
  8. INDIAN COUNTRY CONTACT
  9. PLANO VW COORDINATOR
Down
  1. CRIMINAL CHIEF
  2. IT SUPERVISOR
  3. FLU PARALEGAL
  4. SHERMAN LEGAL ASSISTANT
  5. CRISIS MANAGEMENT COORDINATOR
  6. RECORDS COMPLIANCE OFFICER
  7. PLANO AIC
  8. PUBLIC CORRUPTION CONTACT
  9. TYLER GJ COORDINATOR
  10. TYLER RECEPTIONIST
  11. TEXARKANA AUSA

20 Clues: PLANO AICFOIA CONTACTIT SUPERVISORFLU PARALEGALCRIMINAL CHIEFETHICS ADVISORTEXARKANA AUSAPSC COORDINATORCATS COORDINATORTYLER RECEPTIONISTTYLER GJ COORDINATORPLANO VW COORDINATORINDIAN COUNTRY CONTACTSHERMAN LEGAL ASSISTANTHUMAN RESOURCES OFFICERPUBLIC CORRUPTION CONTACTSEXUAL HARASSMENT CONTACTRECORDS COMPLIANCE OFFICER...

commonly confused words 2022-04-07

commonly confused words crossword puzzle
Across
  1. simple
  2. flying vehicle
  3. quiet order and security
  4. writing paper
  5. at the time
  6. place
  7. possessive form of they
  8. without noise
Down
  1. rule of conduct
  2. a fixed position
  3. gleamed
  4. a part of something
  5. used in a comparison
  6. beyond
  7. revealed
  8. hurled
  9. attentive of accuracy
  10. head of school
  11. contraction of they are
  12. a great extent

20 Clues: placesimplebeyondhurledgleamedrevealedat the timewriting paperwithout noiseflying vehiclehead of schoola great extentrule of conducta fixed positiona part of somethingused in a comparisonattentive of accuracypossessive form of theycontraction of they arequiet order and security

Spanish II Airport 1 2022-03-31

Spanish II Airport 1 crossword puzzle
Across
  1. screen
  2. first
  3. plane
  4. luggage tag
  5. passenger
  6. flight
  7. suitcase
  8. carry on
  9. then (l)
  10. airport
  11. destination
  12. ticket (bo)
  13. arrival
Down
  1. boarding pass
  2. security check
  3. baggage claim
  4. scale
  5. porter/suitcase guy
  6. counter
  7. airline
  8. ticket (bi)
  9. no smoking section
  10. seat
  11. second
  12. gate
  13. customs
  14. then (e)
  15. departure

28 Clues: seatgatefirstscaleplanescreenflightsecondcounterairlineairportcustomsarrivalsuitcasecarry onthen (l)then (e)passengerdepartureluggage tagticket (bi)destinationticket (bo)boarding passbaggage claimsecurity checkno smoking sectionporter/suitcase guy

3EMES JOBS CROSSWORD PUZZLE corrected 2023-09-19

3EMES JOBS CROSSWORD PUZZLE corrected crossword puzzle
Across
  1. boucher
  2. chirurgien
  3. réparateur
  4. jardinier
  5. comptable
  6. pharmacien
  7. grossiste
  8. boulanger
  9. marchand de poisson
  10. agent de sécurité
  11. bijoutier
Down
  1. marin
  2. hôtesse de l'air
  3. traiteur
  4. teinturier
  5. infirmière
  6. secouriste
  7. douanier
  8. présentateur météo
  9. chauffeur routier
  10. sage-femme
  11. agent-immobilier
  12. plombier
  13. kiné
  14. couturière
  15. directeur

26 Clues: kinémarinbouchertraiteurdouanierplombierjardiniercomptablegrossisteboulangerdirecteurbijoutierchirurgienteinturierréparateurinfirmièresecouristesage-femmepharmaciencouturièrehôtesse de l'airagent-immobilierchauffeur routieragent de sécuritéprésentateur météomarchand de poisson

13th Week Words 2023-12-23

13th Week Words crossword puzzle
Across
  1. bina
  2. tasarım yapmak
  3. hasta
  4. diş hekimi
  5. yönetmen
  6. sebze
  7. tesisatçı
  8. dağıtmak
  9. film çekmek
  10. kamyon
  11. mimar
  12. madenci
  13. tamir etmek
  14. sanat
  15. güvenlik
  16. oyuncak kutusu
Down
  1. oyuncak bebek
  2. mobilya
  3. heykeltraş
  4. mektup
  5. misket
  6. uçurtma
  7. muhabir
  8. marangoz
  9. oyuncak ayı
  10. dedektif
  11. film
  12. musluk
  13. tedavi etmek
  14. satranç

30 Clues: binafilmhastasebzemimarsanatmektupmisketmuslukkamyonmobilyauçurtmamuhabirmadencisatrançmarangozyönetmendağıtmakdedektifgüvenliktesisatçıheykeltraşdiş hekimioyuncak ayıfilm çekmektamir etmektedavi etmekoyuncak bebektasarım yapmakoyuncak kutusu

casino 2024-04-03

casino crossword puzzle
Across
  1. sport betting
  2. fun in the sun
  3. Concerts
  4. Hosts
  5. rest your head
  6. leads the way
  7. Cashier
  8. Safety Officers
  9. varifies money
  10. lake gaming
Down
  1. Helps Employees with questions.
  2. on the shore
  3. Advertising
  4. Keeps Place Clean
  5. gaming machines
  6. pocket aces
  7. card games
  8. Texas Holdem
  9. a place of gaming
  10. place to eat
  11. Tech Smart

21 Clues: HostsCashierConcertscard gamesTech SmartAdvertisingpocket aceslake gamingon the shoreTexas Holdemplace to eatsport bettingleads the wayfun in the sunrest your headvarifies moneygaming machinesSafety OfficersKeeps Place Cleana place of gamingHelps Employees with questions.

the Oaks 2024-07-21

the Oaks crossword puzzle
Across
  1. VERTICAL TRANSPORT
  2. BUILDING WING
  3. BINGO VENUE
  4. NEW DINING OPTION
  5. WORKOUT PLAACE
  6. APPROPRIATE TREE
  7. INTERNET VENDOR
  8. FAVORITE RESTAURANT TRIP
  9. TRANSPORT DRIVER
  10. CHEF
  11. front desk
Down
  1. RESIDENT APP
  2. APPROPIATE TREE
  3. DINING CHIEF
  4. KEEPING US SAFR
  5. MONTHLY MEETING
  6. WEEKEND ACTVITY
  7. RESIDENT GROUP
  8. Common RESIDENT NAME
  9. POPULAR COMMITTEE
  10. FUN GAME
  11. MEETING PLACE
  12. TRANSPOTATION SUV

23 Clues: CHEFFUN GAMEfront deskBINGO VENUERESIDENT APPDINING CHIEFBUILDING WINGMEETING PLACERESIDENT GROUPWORKOUT PLAACEAPPROPIATE TREEKEEPING US SAFRMONTHLY MEETINGWEEKEND ACTVITYINTERNET VENDORAPPROPRIATE TREETRANSPORT DRIVERNEW DINING OPTIONPOPULAR COMMITTEETRANSPOTATION SUVVERTICAL TRANSPORTCommon RESIDENT NAMEFAVORITE RESTAURANT TRIP

Technology and digital life 2025-07-26

Technology and digital life crossword puzzle
Across
  1. – qidirmoq
  2. – batareya
  3. – ijtimoiy tarmoq
  4. – bulutli tizim
  5. – yuklab olmoq
  6. – internet
  7. – ilova
  8. – sun’iy intellekt
  9. – innovatsiya
  10. – dasturiy ta’minot
  11. – translatsiya qilmoq
  12. – ulanish
  13. – yangilash
  14. – veb-sayt
  15. – Wi-Fi
  16. – texnologiya
Down
  1. – akkaunt
  2. – yuklamoq
  3. – uskuna
  4. – ekran
  5. – smartfon
  6. – xavfsizlik
  7. – ma’lumot
  8. – raqamli
  9. – parol
  10. – noutbuk
  11. – virtual
  12. – elektron pochta
  13. – onlayn
  14. – qurilma

30 Clues: – ekran– ilova– parol– Wi-Fi– uskuna– onlayn– akkaunt– raqamli– noutbuk– virtual– ulanish– qurilma– qidirmoq– yuklamoq– smartfon– batareya– ma’lumot– internet– veb-sayt– yangilash– xavfsizlik– innovatsiya– texnologiya– yuklab olmoq– bulutli tizim– ijtimoiy tarmoq– elektron pochta– sun’iy intellekt– dasturiy ta’minot– translatsiya qilmoq

Historical Treaties 2024-12-11

Historical Treaties crossword puzzle
Across
  1. War of 1812.
  2. Spanish succession.
  3. Ottoman empire.
  4. Antarctic treaty.
  5. Israeli-Palestinian.
  6. EU foundation.
  7. WWII aftermath.
  8. Balkan wars.
  9. Thirty Years' War.
  10. First Opium War.
Down
  1. Napoleonic end.
  2. WWI peace.
  3. International law.
  4. Climate protocol.
  5. Spain-Portugal divide.
  6. Bosnian peace.
  7. European security.
  8. Soviet-Polish peace.
  9. Korean armistice.
  10. Revolutionary War.
  11. Conservation pact.

21 Clues: WWI peace.War of 1812.Balkan wars.Bosnian peace.EU foundation.Napoleonic end.Ottoman empire.WWII aftermath.First Opium War.Climate protocol.Antarctic treaty.Korean armistice.International law.European security.Revolutionary War.Conservation pact.Thirty Years' War.Spanish succession.Israeli-Palestinian.Soviet-Polish peace.Spain-Portugal divide.

Cyber 2024-09-18

Cyber crossword puzzle
Across
  1. problem event
  2. dangerous problem
Down
  1. helpful program
  2. bad thing

4 Clues: bad thingproblem eventhelpful programdangerous problem

Chapter 8 Vocabulary 2014-11-18

Chapter 8 Vocabulary crossword puzzle
Across
  1. amendment that established the order of succession to the presidency and spelled out what happens when the vice presidency becomes vacant
  2. ______ vote; the official vote for president and vice president by electors in each state
  3. National Security _______; helps coordinate American military and foreign policy
  4. amendment that requires that the electors cast separate ballots for president and vice president
  5. _____ secretary; one of the president’s top assistants who is in charge of media relations
  6. salary
  7. member of a party chosen in each state to formally elect the president and vice president
Down
  1. secretaries of the executive departments, the vice president, and other top officials that help the president make decisions and policy
  2. amendment that secured the traditional presidential limitation of two terms
  3. presidential _______; the order in which officials fill the office of present in case of a vacancy
  4. central _______; Office of Management and Budget’s review of all legislative proposals that executive agencies prepare
  5. Office of ______ and Budget; prepares the national budget that the president proposes to Congress each year
  6. ______ Office of the President; consists of individuals and agencies that directly assist the president
  7. National Security ______; director of the National Security Council staff
  8. the release of secret information by anonymous government officials to the media

15 Clues: salaryNational Security ______; director of the National Security Council staffamendment that secured the traditional presidential limitation of two termsNational Security _______; helps coordinate American military and foreign policythe release of secret information by anonymous government officials to the media...

Team Five 2023-08-25

Team Five crossword puzzle
Across
  1. collection of investments owned and managed as a collective whole with specific investment goals in mind
  2. prolonged period of falling stock prices, usually marked by a decline of 20% or more.
  3. A rise in the prices of goods and services, often equated with loss of purchasing power.
  4. computer system that offers information to investment data service, news feeds, and trade execution services
  5. measurement of changes in stock market conditions based on the average performance of 500 widely held common stocks
  6. a financial professional who buys and sells securities on behalf of their clients
Down
  1. long term investment representing ownership in a company
  2. a security that you own the security with the expectation that the stock will rise in value in the future
  3. portion of a company's profit paid to common and preferred shareholders
  4. fixed amount of money the issuer agrees to pay and most often a percentage of the face value of the bond.
  5. A security's trading high point over the last 52-week period
  6. unit or piece of ownership in an investment
  7. borrowing a security from your brokerage whose price you think will fall and selling it on the open market
  8. owner of common or preferred stock of a corporation
  9. ability to have ready access to invested money, easily converted into cash

15 Clues: unit or piece of ownership in an investmentowner of common or preferred stock of a corporationlong term investment representing ownership in a companyA security's trading high point over the last 52-week periodportion of a company's profit paid to common and preferred shareholders...

MVLA newspaper crossword 1 2024-05-14

MVLA newspaper crossword 1 crossword puzzle
Across
  1. the number of gaming PCs in the cyber libary
  2. one of two houses that has never won the house championship
  3. the brand of TV in most of the classrooms
  4. the state that our Lego Robotics team went to for the national competition in 2023
  5. Grandezza's mascot
Down
  1. the room across from the nurses office
  2. Mrs. Binkley's room
  3. the house that won in the first year
  4. the male teacher who accompanied the 2024 state NHD team to Albquerque

9 Clues: Grandezza's mascotMrs. Binkley's roomthe house that won in the first yearthe room across from the nurses officethe brand of TV in most of the classroomsthe number of gaming PCs in the cyber libaryone of two houses that has never won the house championshipthe male teacher who accompanied the 2024 state NHD team to Albquerque...

Wordfrenzy 2025-01-08

Wordfrenzy crossword puzzle
Across
  1. Street , It’s the world’s biggest stock exchange, based in Manhattan
  2. , Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
  3. , A stock that goes up and down quickly
  4. Selling , Selling a security you don't own to buy it back later
  5. , A natural or legal person who holds shares in a company
Down
  1. , The ability to buy or sell assets quickly in large quantities
  2. , A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
  3. , An intermediary in charge of placing buy and sell orders on the markets
  4. , A very sharp rise of a market
  5. , The earnings a company equally shared among the shareholders in proportion to the number of shares they hold

10 Clues: , A very sharp rise of a market, A stock that goes up and down quickly, A natural or legal person who holds shares in a company, The ability to buy or sell assets quickly in large quantitiesSelling , Selling a security you don't own to buy it back laterStreet , It’s the world’s biggest stock exchange, based in Manhattan...

internet privacy 2025-05-18

internet privacy crossword puzzle
Across
  1. Private Network encrypts traffic between devices and the internetand protects sensitive data. Users can bypass geographic restrictions as internet traffic is routed.
  2. This is an individual who gains unauthorized access and exploits weaknesses in the information.
  3. Loading the data into unreadable format by applying an algorithm
  4. It is the identity verification before granting access. Authentication enhances the security and privacy of systems. Common methods include passwords, biometrics (fingerprints or facial recognition), and security tokens. Most widely use Multi-factor authentication (MFA) enhances security by requiring more than one form of verification.
Down
  1. a hidden way of bypassing normal authentication or encryption in a system. It is an illegal way to gain unauthorized access by bypassing the standard security methods. Backdoors can be installed by malware or intentionally left for debugging. It can control the system remotely and poses risks to data.
  2. The monitoring of incoming and outgoing traffic based on security rules that already had been determined. The system is a barrier between trusted and untrusted networks. it is based on both hardware and software, which analyzes data packets if they should be allowed or blocked. The sensitive information is secured.
  3. A broad category 9 of malicious software to damage computer systems.
  4. tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses

8 Clues: Loading the data into unreadable format by applying an algorithmA broad category 9 of malicious software to damage computer systems.This is an individual who gains unauthorized access and exploits weaknesses in the information.tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses...

Abiotic not living 2025-01-27

Abiotic not living crossword puzzle
Across
  1. populations
  2. Theory
  3. living
  4. Theory
  5. Greenhouse Gases
  6. Security
  7. Water Scarcity
Down
  1. Water Scarcity
  2. resource
  3. view
  4. Climate Change
  5. extraction
  6. not living

13 Clues: viewTheorylivingTheoryresourceSecurityextractionnot livingpopulationsWater ScarcityClimate ChangeWater ScarcityGreenhouse Gases

Ch. 8 Vocabulary 2023-02-02

Ch. 8 Vocabulary crossword puzzle
Across
  1. graphic mark or emblem to aid and promote brand
  2. media and content that use a combination of different content forms
  3. ____ networking site is an online platform that focuses on building relations
  4. ___ marketing as a means of communicating commercial messages
  5. a sign, name or symbol used to identify your business
Down
  1. ____ name defines a realm of administrative autonomy
  2. _____ hosting is a service that allow your salon to be on the internet
  3. global system of interconnected computers
  4. ____ ___ engine optimization improving your location on internet searches
  5. a memorable motto or phrase use by a company
  6. ____ platform an environment for ad delivery
  7. of mouth passing of information from person to person

12 Clues: global system of interconnected computersa memorable motto or phrase use by a company____ platform an environment for ad deliverygraphic mark or emblem to aid and promote brand____ name defines a realm of administrative autonomyof mouth passing of information from person to persona sign, name or symbol used to identify your business...

Bullying 2017-05-15

Bullying crossword puzzle
Across
  1. People who have been bullied are at a great risk of____ problems
  2. This is a form of verbal bullying
  3. This is a form of physical bullying
  4. Girls tend to bully in____
  5. Boy bullies tend to be more_____
  6. Cyber bullying is bullying that takes place using_____
Down
  1. Over 3.2____ students are victims of bullying each year
  2. This is a form of social bullying
  3. About 160,000 students____ school everyday because they are being bullied
  4. 71% of students report that bullying is a_____ at their school
  5. People who watch the bullying occur and don't do anything about it
  6. ___ in 10 students drop out of school each year because of repeated bullying

12 Clues: Girls tend to bully in____Boy bullies tend to be more_____This is a form of verbal bullyingThis is a form of social bullyingThis is a form of physical bullyingCyber bullying is bullying that takes place using_____Over 3.2____ students are victims of bullying each year71% of students report that bullying is a_____ at their school...

Stay safe online. 2022-02-15

Stay safe online. crossword puzzle
Across
  1. Cyber safety should include the use of your ________ too.
  2. You should use the strictest privacy settings when creating accounts and post on ________ ________ .
  3. smart way to save data from your hard drive to another source
  4. Use internet sites with the highest ______ settings
  5. Keep your computers and mobile devices up to _______.
  6. A ____________ password is at least eight characters in length
Down
  1. What you put online lasts ______
  2. Do not post _____ information online
  3. Your digital trail of everything you do online
  4. Do not share it with anyone
  5. Change your password if you think your account has been ________________.
  6. dangerous emails that may have been sent from your inbox to others

12 Clues: Do not share it with anyoneWhat you put online lasts ______Do not post _____ information onlineYour digital trail of everything you do onlineUse internet sites with the highest ______ settingsKeep your computers and mobile devices up to _______.Cyber safety should include the use of your ________ too....

PELANGGARAN HAK DAN PENGINGKARAN KEWAJIBAN 2025-10-17

PELANGGARAN HAK DAN PENGINGKARAN KEWAJIBAN crossword puzzle
Across
  1. Pertentangan atau perselisihan antara dua pihak atau lebih
  2. Perlakuan buruk, penganiayaan, atau perburuan yang dilakukan secara sistematis dan sewenang-wenang terhadap seorang individu atau kelompok
  3. Hak Asasi Manusia
  4. Memaksa seseorang melakukan atau tidak melakukan sesuatu sesuai kehendak si pelaku
  5. Perbuatan yang melanggar hukum atau hak
  6. Tindakan yang harus dilakukan seseorang dengan penuh tanggung jawab
Down
  1. Ketidakmampuan atau ketidakinginan menerima perbedaan dari orang atau kelompok lain
  2. Sebuah dimensi terkomputerisasi dimana kita dapat dengan bebas memindahkan informasi dan mengakses data yang berupa audio dan visual
  3. Tindakan tidak melaksanakan kewajiban sebagai warga negara
  4. Memperlakukan seseorang atau kelompok secara berbeda dan tidak adil
  5. Sesuatu yang seharusnya diterima atau dilakukan oleh seseorang
  6. Perundungan

12 Clues: PerundunganHak Asasi ManusiaPerbuatan yang melanggar hukum atau hakPertentangan atau perselisihan antara dua pihak atau lebihTindakan tidak melaksanakan kewajiban sebagai warga negaraSesuatu yang seharusnya diterima atau dilakukan oleh seseorangMemperlakukan seseorang atau kelompok secara berbeda dan tidak adil...

Yo Recuerdo Worksheet Crossword 2021-09-20

Yo Recuerdo Worksheet Crossword crossword puzzle
Across
  1. young
  2. temples
  3. to steal
  4. payment
  5. polite
Down
  1. money
  2. necklace
  3. security
  4. airplane
  5. town

10 Clues: townmoneyyoungpolitetemplespaymentnecklacesecurityto stealairplane

INFORMATION TECHNOLOGY 2017-05-08

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. FRAME COMPUTER
  2. CARD
  3. COMPUTER
  4. COMPUTER
  5. OFFICE
  6. CONNECTORS
  7. POINT
Down
  1. DRIVE
  2. SECURITY
  3. MANAGEMENT
  4. DRIVE
  5. SOFTWARE

12 Clues: CARDDRIVEDRIVEPOINTOFFICESECURITYCOMPUTERCOMPUTERSOFTWAREMANAGEMENTCONNECTORSFRAME COMPUTER

Vocabulary - Unit 3 2023-12-05

Vocabulary - Unit 3 crossword puzzle
Across
  1. machać
  2. gość
  3. kontrola bezpieczeństwa
  4. przyjemny
  5. dziki
Down
  1. imigrant
  2. spektakularny
  3. kawiarnia
  4. niesamowity
  5. witać

10 Clues: gośćwitaćdzikimachaćimigrantkawiarniaprzyjemnyniesamowityspektakularnykontrola bezpieczeństwa

Safety and Security 2021-07-20

Safety and Security crossword puzzle
Across
  1. The Tasmanian devil
  2. Rare but catastrophic
  3. "Rose, promise me you'll survive"
  4. Sound of the emergency alarm on cruise
  5. Jail on a cruise ship
  6. Health risks
  7. Dr. Liu's favourite fruit
  8. Jack sparrow
Down
  1. Sound of the emergency alarm on cruise
  2. Cruise Recent covid case
  3. Favourite module
  4. Online safety drill

12 Clues: Health risksJack sparrowFavourite moduleThe Tasmanian devilOnline safety drillRare but catastrophicJail on a cruise shipCruise Recent covid caseDr. Liu's favourite fruit"Rose, promise me you'll survive"Sound of the emergency alarm on cruiseSound of the emergency alarm on cruise

Security and privacy 2025-12-09

Security and privacy crossword puzzle
Across
  1. Laws, considered collectively, that may protect user data (e.g., GDPR).
  2. Not having official permission or approval (Past Participle/Adjective).
  3. The state of being free from danger or threat; protection.
  4. A qualification, achievement, personal quality, or user ID used to indicate suitability or access rights.
  5. The assurance that systems and data are accessible by authorized users when needed.
  6. The act, state, or right of possessing something (e.g., data).
Down
  1. Intended to be kept secret (Adjective).
  2. The action or process of identifying the presence of something concealed (e.g., a virus).
  3. The right to keep personal matters and relationships secret.
  4. An unwelcome intrusion into another's domain or privacy.
  5. Software that blocks access to certain data or websites.

11 Clues: Intended to be kept secret (Adjective).An unwelcome intrusion into another's domain or privacy.Software that blocks access to certain data or websites.The state of being free from danger or threat; protection.The right to keep personal matters and relationships secret.The act, state, or right of possessing something (e.g., data)....

Finance Jargon 2018-03-13

Finance Jargon crossword puzzle
Across
  1. The equity investors in a leveraged buy-out.
  2. The process whereby a single bank issues letters of credit and relies on an indemnity from a syndicate of banks if the letters of credit are called.
  3. An entity that holds legal title to someone else's assets.
  4. A provision in a facility agreement that allows the borrower to elect whether it wants to pay cash interest or capitalise the interest.
  5. The order in which payments are allocated or applied.
  6. A type of security aimed at avoiding administration risk.
  7. The percentage amount added to the base rate applicable to a floating rate loan.
  8. The department in a bank typically responsible for agreeing to make financing available.
  9. An acronym for legislation to combat tax-evasion in the USA.
  10. Property that is subject to a security interest.
  11. An exchange of payment streams between two parties, often used to mitigate interest rate risk.
Down
  1. A repayment obligation that is spread over a period of time through a series of payments is said to __________.
  2. The amount outstanding on a loan.
  3. Process by which a lender demands repayment of an outstanding loan before the due date.
  4. The total amount a lender has agreed to lend under a credit facility.
  5. When you add accrued interest to the principal outstanding of a loan you are said to __________ the interest.
  6. A screen rate used to calculate interest on a floating rate loan.
  7. An acronym for a specific type of security interest over personal property available to asset financiers.
  8. A statement of legal conclusions based on certain assumed facts and subject to qualifications.
  9. Abbreviation used to describe the costs incurred to acquire a new asset or improve an asset.

20 Clues: The amount outstanding on a loan.The equity investors in a leveraged buy-out.Property that is subject to a security interest.The order in which payments are allocated or applied.A type of security aimed at avoiding administration risk.An entity that holds legal title to someone else's assets....

DD Resources HIPAA Crossword 2015-12-03

DD Resources HIPAA Crossword crossword puzzle
Across
  1. The third largest mammal on Earth.
  2. All faxes sent with PHI must have a ___ ______.
  3. This person is DD Resources’ Security Official.
  4. The minimum PHI needed to accomplish an intended purpose. (2 words)
  5. What does the first "A" in HIPAA stand for?
  6. What document is given to Consumers that outlines the use and disclosure of their PHI? (4 words)
  7. Any PHI that maintained or transmitted electronically is __________.
  8. The impermissible use or disclosure of PHI/EPHI released verbally, in writing or transmitted electronically is a ____________________.
Down
  1. What does the "H" in HIPAA stand for?
  2. The __________ Rule establishes and protects the Confidentiality, Integrity and Availability of EPHI.
  3. What Does The second "A" in HIPAA stand for?
  4. Protected Health Information (PHI) can include paper records, _____________ __________________, and information that is transmitted and maintained in any electronic format.
  5. The _____________ Rule protects an individual’s rights, limits the uses and disclosures of PHI and sets administrative rules.
  6. What does the "P" in HIPAA stand for?
  7. out Files must be ______ ___, whenever removed from their designated location.
  8. What must be completed and signed before any PHI can be released?
  9. The Health Insurance Portability and Accountability Act of 1996.
  10. Consumers have the right to make ___________ about the privacy and security of their PHI/EPHI without fear of retaliation.
  11. HIPAA is not just a good idea. It is the ___.
  12. What does the "I" in HIPAA stand for?
  13. Who is responsible for keeping Consumer information confidential?
  14. Computer ___ should never be shared or posted.
  15. How does confidential documentation need to be disposed of?
  16. Any health information received or maintained by DD Resources is ________.

24 Clues: The third largest mammal on Earth.What does the "H" in HIPAA stand for?What does the "P" in HIPAA stand for?What does the "I" in HIPAA stand for?What does the first "A" in HIPAA stand for?What Does The second "A" in HIPAA stand for?HIPAA is not just a good idea. It is the ___.Computer ___ should never be shared or posted....

Derivative 2023-02-08

Derivative crossword puzzle
Across
  1. Where can you turn for further information on classifications?
  2. What is one of the only two authorized sources of classified guidance?
  3. Who do you contact to discuss your belief a document is improperly classified?
  4. If a document is marked improperly, you may be subject to?
  5. What are you expected to do when you believe information is improperly classified?
  6. During a challenge the classifier has how many days to submit their initial response?
  7. The standard period to be applied to classified is the classification guide provides no instruction from the OCA should be calculated for _________ years.
  8. Each classified document should have a Classification _______ ________ to identify who and from what document it was derived from and what the destruction date is.
  9. Collateral Classification that if unauthorized release could reasonably be expected to cause damage to national security is?
  10. The marking that appears at the top and bottom of each page is what marking?
  11. What is the marking called the is to appear at the beginning of each paragraph?
Down
  1. Collateral Classification that if unauthorized release could reasonably be expected to cause exceptionally grave damage to national security is?
  2. Individual that has been designated in writing and is charged with making the initial determination of classified is a _______ classification authority.
  3. The second of only two authorized sources of classified guidance.
  4. The control marking “FOUO” is what type of control?
  5. An individual responsible to apply the two authorized sources to documents are called ______ classifiers.
  6. Derivative Classifiers are required to complete training _________.
  7. The standards for classified marking is set out in _______ _______ 13526.
  8. Collateral Classification that if unauthorized release could reasonably be expected to cause serious damage to national security is?
  9. Classification markings are required on document, blogs, chat rooms, and ________.

20 Clues: The control marking “FOUO” is what type of control?If a document is marked improperly, you may be subject to?Where can you turn for further information on classifications?The second of only two authorized sources of classified guidance.Derivative Classifiers are required to complete training _________....

Economies Crossword 2022-10-04

Economies Crossword crossword puzzle
Across
  1. a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.
  2. retirement savings plans that serve employees of public schools and tax-exempt organizations
  3. a savings product that earns interest on a lump sum for a fixed period of time.
  4. a security that represents the ownership of a fraction of the issuing corporation.
  5. a consistent means of measuring the value of things
  6. an interest-bearing deposit account held at a bank or other financial institution.
  7. a debt security, similar to an IOU.
  8. a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
  9. A store of value is an asset, commodity, or currency that maintains its value without depreciating.
  10. a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
  11. Every purchase you made over time.
Down
  1. a number from 300 to 850 that rates a consumer’s creditworthniess
  2. a retirement savings and investing plan that employers offer.
  3. is a detailed breakdown of your credit history prepared by a credit bureau.
  4. type of financial cooperative that provides traditional banking services.
  5. grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
  6. an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
  7. a type of tax-advantaged
  8. a financial institution that is licensed to accept checking and savings deposits and make loans
  9. is a risk management strategy that mixes a wide variety of investments within a portfolio.

20 Clues: a type of tax-advantagedEvery purchase you made over time.a debt security, similar to an IOU.a consistent means of measuring the value of thingsa retirement savings and investing plan that employers offer.a number from 300 to 850 that rates a consumer’s creditworthniesstype of financial cooperative that provides traditional banking services....

Financial Math 2021-09-20

Financial Math crossword puzzle
Across
  1. amount of sales produced by that employee
  2. care covers only the employee
  3. depends pn the social security percentage and the
  4. paid for by fica taxes
  5. the hourly wage an employee receive for any overtime hours
  6. typically benefits are in forms
  7. addition to your salary
  8. care for sick children or newborns
  9. offered as an employee benefit
  10. you work at a job covered by social security you must pay
  11. most part-time jobs that have students hold pay a set amount for each hour they work
  12. compensation that an employee receives from an employer
  13. overtime rate could be there three times the hourly rate
  14. for each item they complete
  15. paid for by fica taxes
  16. fixed period of employment
  17. businesses pay their employees twice a month or
Down
  1. is unique nine digits
  2. another benefit that is required by the government
  3. are paid a certain amount
  4. overtime hours calculated as 1.5 times the regular hourly rate
  5. mean their paycheck amount are automatically deposited electronically into their bank
  6. total pay which is the sum of your hourly and your overtime pay
  7. government program that offers benefits
  8. required the employee to work only a specific number of hours per week
  9. they receive 26 paychecks per year
  10. rate two times the hourly rate
  11. president franklin d. roosvelt started social security in 1935
  12. money that employees or other receive base on sales
  13. care cover all members of the immediate family for health care bills
  14. combined into paid time off
  15. an insurance program available through the u.s
  16. paid holiday time
  17. paid sick time
  18. childcare leave;and more
  19. extra hours are more than the full-time number of hours
  20. there are federal and state laws on the lowest hourly rate

37 Clues: paid sick timepaid holiday timeis unique nine digitspaid for by fica taxespaid for by fica taxesaddition to your salarychildcare leave;and moreare paid a certain amountfixed period of employmentcombined into paid time offfor each item they completecare covers only the employeerate two times the hourly rateoffered as an employee benefit...

Personal Finance Vocabulary 2022-10-19

Personal Finance Vocabulary crossword puzzle
Across
  1. a debt security
  2. an interest-bearing deposit account held at a bank or other financial institution
  3. the interest you earn on interest
  4. what employees earn before taxes, benefits and other payroll deductions are withheld from their wages
  5. the amount an employee receives after all deductions and taxes are taken out
  6. a statement of all transactions made between entities
  7. a financial institution that is licensed to accept checking and savings deposits and make loans
  8. a loan that requires an asset as collateral
  9. a type of short-term borrowing where a lender will extend high-interest credit based on your income
  10. predicts how likely you are to pay back a loan on time
  11. a security that represents the ownership of a fraction of the issuing corporation
  12. a company that pools money from many investors and invests the money in securities
Down
  1. a quick and easy method of calculating the interest charge on a loan
  2. the process of shifting an economy away from a single income source toward multiple sources from a growing range of sectors and markets
  3. an interest rate on a loan or security that fluctuates over time because it is based on an underlying benchmark interest rate or index that changes periodically
  4. a savings account that holds a fixed amount of money for a fixed period of time
  5. a statement that has information about your credit activity and current credit situation
  6. profits gained from the sale of capital assets
  7. a financial institution that offers services like banks but is run by its members
  8. an unchanging rate charged on a liability, such as a loan or mortgage

20 Clues: a debt securitythe interest you earn on interesta loan that requires an asset as collateralprofits gained from the sale of capital assetsa statement of all transactions made between entitiespredicts how likely you are to pay back a loan on timea quick and easy method of calculating the interest charge on a loan...

SOP Engineering - Keamanan Penyediaan Daya Listrik (PM-ASRI/ENG-04) dan SOP Security - Penanganan Saat Kondisi Listrik Padam (PM-ASRI/SEC-02) 2019-08-04

SOP Engineering - Keamanan Penyediaan Daya Listrik (PM-ASRI/ENG-04) dan SOP Security - Penanganan Saat Kondisi Listrik Padam (PM-ASRI/SEC-02) crossword puzzle
Across
  1. Spv GEA dan TR bertugas untuk …. penanganan listrik padam.
  2. Jika terdapat insiden (injured) maka wajib dibuatkan dokumen …..
  3. Tindakan yang diambil jika terdapat kondisi ada orang yang terjebak di dalam lift.
  4. Jabatan pada Dept Engineering yang bertanggung jawab untuk memantau pemakaian beban listrik, memeriksa kebutuhan beban listrik, memeriksa tegangan listrik, dan memeriksa kesiapan genset (rutin).
  5. Surat ….. dari PLN akan diberikan TR kepada pihak tenant jika terdapat informasi pemadaman listrik.
  6. Security, Spv GEA, Spv TR, Engineering melakukan ….. keliling ke seluruh area Mall dan Kawasan untuk memastikan situasi kondusif, aman dan terkendali.
  7. Laporan/ BAK/ analisa terhadap kejadian listrik padam akan dibuat oleh ….. Engineering dan diserahkan kepada Manager dan GM Ops.
  8. Khusus untuk ….. apabila pada keadaan normal, ada kebutuhan kenaikan beban yang cukup significant (>300 KW) harus diinformasikan ke pihak penyedia supply listrik.
  9. Jika power sudah normal, maka genset akan segera digantikan kembali dengan power listrik dari …..
Down
  1. Kondisi dimana supply listrik kebutuhan mall terpenuhi.
  2. Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall.
  3. Saat perpindahan listrik PLN ke genset, Spv Engineering akan melakukan pemantauan beban listrik (serta melakukan ….. semua peralatan).
  4. Kondisi dimana supply listrik tidak ada/ mati.
  5. Security akan menghubungi pihak ….. jika terdapat kondisi listrik padam.
  6. Staff/ Spv Engineering akan mencari …. listrik padam dan lamanya listrik padam.
  7. Salah satu hal yang dipantau dari pemakaian beban listrik.
  8. Pihak Security juga wajib membuat BAK listrik ….. setelah kejadian.
  9. Untuk listrik padam ….., pihak pengelola melalui Dept. Tenant Relations akan memberikan informasi ke pihak tenant terlebih dahulu.
  10. Jika listrik sudah normal/ menyala maka akan diinfomasikan oleh GEA via …..
  11. Mesin untuk membantu back up power jika terdapat kondisi listrik padam.

20 Clues: Kondisi dimana supply listrik tidak ada/ mati.Kondisi dimana supply listrik kebutuhan mall terpenuhi.Spv GEA dan TR bertugas untuk …. penanganan listrik padam.Salah satu hal yang dipantau dari pemakaian beban listrik.Jika terdapat insiden (injured) maka wajib dibuatkan dokumen …..Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall....

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. when the market is trending upward
  2. the size of a company in the stock market
  3. required minimum distribution
  4. dollar cost averaging
  5. a retirement account that you put money in after tax
  6. federal insurance contributions act
  7. for long term goals
  8. the return in 2023 for S&P 500 (percentage)
  9. Security the largest social programs in the United States, providing retirement
  10. measures the price performance of a basket of securities
  11. price to earning ratio
  12. the max amount you can contribute to your ira and rothira annually
  13. when the market is trending downward
  14. for short term goals
  15. currencies that are created and backed by the government, but not tied or backed by the value of any physical commodity
  16. out of the account annually
  17. the age to collect social security benefits
  18. a type of security under which the issuer owes the holder a debt, and is obliged
Down
  1. a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
  2. never lose money (rule)
  3. virtual currency
  4. a retirement account that you put money in before tax
  5. the increase in the value of an asset, usually recognized when it is sold for a higher amount
  6. 1.45% is deducted from your paycheck monthly
  7. a series of letters used to represent a companies stock
  8. the age you can start investing
  9. a retirement system that state employees and trades pay into
  10. a piece of a company in the stockmarket
  11. Far worse shape than Social Security
  12. never forget rule one
  13. the distribution of some of a company's earnings to a class of its shareholders
  14. Distribution When you turn 73, you must take the
  15. inital price offering of a stock

33 Clues: virtual currencyfor long term goalsfor short term goalsdollar cost averagingnever forget rule oneprice to earning rationever lose money (rule)out of the account annuallyrequired minimum distributionthe age you can start investinginital price offering of a stockwhen the market is trending upwardfederal insurance contributions act...

RU ITEC411 Chapter 5 2024-11-24

RU ITEC411 Chapter 5 crossword puzzle
Across
  1. a written form of defamation
  2. the 2010 act that aimed to combat libel tourism
  3. the act that came after the September 11th attacks that increased surveillance
  4. acronym for the 1984 act that aimed to combat hacking by punishing people who accessed a computer without proper authorization
  5. technique attackers use to send people to fake web sites pretending to be the real one to steal personal information
  6. the concept of hacking with the purpose of a political or social cause
  7. the action of someone exposing wrongdoing, usually by the government
  8. word that comes before hat hacker, this type of hacker hacks with good intent to expose vulnerabilities and strengthen a system's security
Down
  1. this can be used to protect personal information by scrambling it up
  2. when you receive a text message from a scammer pretending to be a company to steal your personal information
  3. suppressing or prohibiting something from being shared
  4. when you receive an email from a scammer pretending to be a company to steal your personal information
  5. 2008 computer worm that caused damage to Iran's nuclear program
  6. this retailer was victim to a major security breach in fall of 2013 where over 70 million customer records were stolen
  7. intellectual property law that gives protection from unauthorized use or distribution and gives ownership to creative works
  8. physical and behavioral features of a person
  9. acronym for the organization that manages trade rules globally
  10. when you receive a phone call from a scammer pretending to be a company to steal your personal information
  11. a network security feature that restricts and monitors traffic
  12. type of computer malware that has the ability to spread from computer to computer by itself

20 Clues: a written form of defamationphysical and behavioral features of a personthe 2010 act that aimed to combat libel tourismsuppressing or prohibiting something from being sharedacronym for the organization that manages trade rules globallya network security feature that restricts and monitors traffic...

Investing Crossword Answers & Clues 2025-03-25

Investing Crossword Answers & Clues crossword puzzle
Across
  1. buying and selling stocks for quick money
  2. if you leave your company you can roll over your 401k funds to a new investment account
  3. a sum of money saved for a particular purpose
  4. buying and investing long term
  5. a collection of stocks, bonds, or other assets that trades on a stock exchange
  6. a security that represents the ownership of a fraction of the corporation
  7. the process of offering shares of a private corporation to the public in a new stock issuance
  8. age you receive full social security benefits
  9. the total value of a company’s stock
  10. ceo of berkshire hathaway
  11. represents the loan of a buyer, payed back at a stated interest rate
Down
  1. pain is longer than the thrill
  2. having worked for a certain amount of time with a company, to own 100% of the money your company has matched in your 401k
  3. the increase in value of an asset, usually recognized when it is sold for a higher amount
  4. stock prices are rising
  5. stock prices are declining
  6. the distribution of some of a company's earnings to a class of its shareholders
  7. take money from investors and purchase a portfolio that may include stocks, bonds, or a combination of assets
  8. measures the price performance of a basket of securities
  9. a strategy in which you invest your money in equal amounts, at regular intervals
  10. social security and medicare taxes
  11. the availability of cash or the ease in which an asset an asset can be converted to cash
  12. government medical health plan
  13. takes cash from a large group of investors and invests in stocks, bonds, and other securities
  14. investing all the money you have available at that given time, and putting it into the market

25 Clues: stock prices are risingceo of berkshire hathawaystock prices are decliningpain is longer than the thrillbuying and investing long termgovernment medical health plansocial security and medicare taxesthe total value of a company’s stockbuying and selling stocks for quick moneya sum of money saved for a particular purpose...

Financial market 2025-05-15

Financial market crossword puzzle
Across
  1. — The value of an ownership interest in a company, typically in the form of stocks.
  2. — An entity that develops, registers, and sells securities to finance its operations.
  3. — A person or institution that allocates capital with the expectation of receiving financial returns.
  4. — A type of security that represents ownership in a corporation.
  5. — Money placed in a bank or financial institution for safekeeping or earning interest.
  6. — A public authority or agency responsible for overseeing and enforcing financial market laws.
  7. — An organized marketplace where securities, commodities, or other financial instruments are traded.
  8. — A fixed-income security representing a loan made by an investor to a borrower.
  9. — A tradable financial asset, such as stocks, bonds, or options.
  10. — A contract that provides financial protection against specific risks in exchange for premium payments.
Down
  1. — A system or place where financial instruments are bought and sold.
  2. — The income return on an investment, expressed as a percentage of its cost or market value.
  3. — The rate at which the general level of prices for goods and services rises over time.
  4. — The provision of money, goods, or services with the expectation of future repayment.
  5. — The ease with which an asset can be converted into cash without affecting its price.
  6. — The possibility of losing some or all of the original investment.
  7. — A system of money in general use in a particular country.
  8. — An intermediary who facilitates transactions between buyers and sellers in financial markets.
  9. — A financial derivative that gives the holder the right, but not the obligation, to buy or sell an asset.
  10. — Financial assets or the financial value of assets used to fund operations and growth.

20 Clues: — A system of money in general use in a particular country.— A type of security that represents ownership in a corporation.— A tradable financial asset, such as stocks, bonds, or options.— The possibility of losing some or all of the original investment.— A system or place where financial instruments are bought and sold....

Financial Fundamentals 2025-05-27

Financial Fundamentals crossword puzzle
Across
  1. Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
  2. A type of debt security issued by a company or government to raise capital
  3. Employment taxes such as Social Security
  4. A strategy where an investor spreads their investments across a variety of different assets to reduce overall risk
  5. Regulates business activities within own boundaries; intrastate commerce
  6. Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
  7. Ability to convert an investment to cash for full value; includes items like demand deposits, CDs, Treasury bills, and money market funds
  8. Corporation and other organizations sell items, pay expenses, and borrow to finance business operations
  9. Tax based on land and buildings
  10. The debts or financial obligations that a person or company owes to others
Down
  1. The cost of borrowing money
  2. Regulates banks
  3. Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
  4. Tax where everyone pays the same amount
  5. Insures bank deposits
  6. Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
  7. Regulates stock markets
  8. Tax based on purchases
  9. Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
  10. A rise in the general level of prices (consumer price index)
  11. _____ are consumers and households who make purchases, save, invest, and pay taxes
  12. Where the tax rate increases along with the amount
  13. County boards; city or town councils; services for an orderly society
  14. Potential of an investment

24 Clues: Regulates banksInsures bank depositsTax based on purchasesRegulates stock marketsPotential of an investmentThe cost of borrowing moneyTax based on land and buildingsTax where everyone pays the same amountEmployment taxes such as Social SecurityWhere the tax rate increases along with the amount...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  2. Code examination performed without running the malicious program.
  3. Attacks that overwhelm a target system or network with a flood of traffic
  4. Injecting malicious scripts into webpages viewed by other users
  5. Process of transforming information into a scrambled format to secure it.
  6. Matching known patterns of threats against security event data to find potential matches.
  7. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  8. Criminal use of the internet or other electronic means to persistently harass an individual.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  11. Cloud-based vulnerability management platform with scanning and reporting.
  12. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
  1. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Policy-based accept or deny of network traffic.
  3. Attack that uses a list of commonly used words or phrases to guess a password.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Gaining unauthorized access to a secured area by following an authorized person.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. Security documentation that details system resource usage by users and processes for auditing.
  8. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attack that uses a list of commonly used words or phrases to guess a password.
  2. Injecting malicious scripts into webpages viewed by other users
  3. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Matching known patterns of threats against security event data to find potential matches.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  8. Policy-based accept or deny of network traffic.
Down
  1. Graphic object used in reports to visualize the correlation between an object and its performance.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Process of transforming information into a scrambled format to secure it.
  4. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  5. Security documentation that details system resource usage by users and processes for auditing.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  8. Code examination performed without running the malicious program.
  9. Criminal use of the internet or other electronic means to persistently harass an individual.
  10. Cloud-based vulnerability management platform with scanning and reporting.
  11. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  12. Attacks that overwhelm a target system or network with a flood of traffic

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  2. Code examination performed without running the malicious program.
  3. Attacks that overwhelm a target system or network with a flood of traffic
  4. Injecting malicious scripts into webpages viewed by other users
  5. Process of transforming information into a scrambled format to secure it.
  6. Matching known patterns of threats against security event data to find potential matches.
  7. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  8. Criminal use of the internet or other electronic means to persistently harass an individual.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  11. Cloud-based vulnerability management platform with scanning and reporting.
  12. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
  1. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Policy-based accept or deny of network traffic.
  3. Attack that uses a list of commonly used words or phrases to guess a password.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Gaining unauthorized access to a secured area by following an authorized person.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. Security documentation that details system resource usage by users and processes for auditing.
  8. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

Industrial Security Concept Crossword Puzzle 2025-10-25

Industrial Security Concept Crossword Puzzle crossword puzzle
Across
  1. – minimizing the probability of the potential loss
  2. – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
  3. – sound and good judgement to arrive at wise and timely decision
  4. - is the potential that a chosen action or activity will lead to a loss
  5. – being watchful in spotting violator, a person, a vehicle or an accident
  6. – moving the financial impact of the potential loss over to an insurance company
  7. – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
  8. – an indication of impending danger or harm
  9. – Removing the risk totally from the business
  10. – includes any person who offers or renders personal service to watch or secure
  11. – it is a state or quality of being free from fear or danger, assurance, certainty.
  12. – spreading the risk through decentralization to limit the impact of the potential loss
Down
  1. – it deters man from committing acts of fear being caught, charged in court or get dismissed
  2. – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
  3. - it uses barriers being placed between the potential intruder and the object/matter to be protected
  4. – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
  5. – a person who does detective work for hire, reward or commission
  6. – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
  7. – a chance of being injured or harmed
  8. – ability to deal with others successfully without offending

20 Clues: – a chance of being injured or harmed– an indication of impending danger or harm– Removing the risk totally from the business– minimizing the probability of the potential loss– ability to deal with others successfully without offending– sound and good judgement to arrive at wise and timely decision...

Unit2-word_file 2014-12-24

Unit2-word_file crossword puzzle
Across
  1. Wachposten/ Wärter/ Posten/ Wachmann
  2. Polizeimeister/ Wachtmeister
  3. Polizei
  4. Fingerabdruck
Down
  1. Blut
  2. Alarm
  3. Fußabdruck
  4. Sicherheit/ Wachmannschaft
  5. stehlen/ klauen
  6. festnehmen/ verhaften
  7. Waffe/ Pistole/ Revolver/ Schusswaffe
  8. Dieb

12 Clues: BlutDiebAlarmPolizeiFußabdruckFingerabdruckstehlen/ klauenfestnehmen/ verhaftenSicherheit/ WachmannschaftPolizeimeister/ WachtmeisterWachposten/ Wärter/ Posten/ WachmannWaffe/ Pistole/ Revolver/ Schusswaffe

Narnia Ch 1-3 2023-11-08

Narnia Ch 1-3 crossword puzzle
Across
  1. trick
  2. curious
  3. scarf
  4. tell me
  5. male deer
  6. sense of security
Down
  1. from now on
  2. crazy
  3. radio
  4. packages
  5. light meal
  6. layer of gold

12 Clues: trickcrazyradioscarfcurioustell mepackagesmale deerlight mealfrom now onlayer of goldsense of security

AVIATION 2024-09-08

AVIATION crossword puzzle
Across
  1. Auckland
  2. Icing
  3. security AVSEC
  4. WLG
  5. facility Toilets
Down
  1. Water trucks
  2. ATL
  3. word for passengers PAX
  4. Jackson
  5. Loader
  6. Operator
  7. facility Duty free
  8. vehicle Belt loader

13 Clues: ATLWLGIcingLoaderJacksonAucklandOperatorWater trucksfacility Toiletsfacility Duty freesecurity AVSECword for passengers PAXvehicle Belt loader

ic3 lesson 30 vocab 2015-05-15

ic3 lesson 30 vocab crossword puzzle
Across
  1. hacker program that sits in your computer recording personal information
  2. hacker program that records keystrokes
  3. programs that use a dictionary to try and guess the password by entering in a whole lot of words until the right one is found
  4. invading someone else's computer
  5. hacker program for finding out log ins and passwords
  6. decrypts information
Down
  1. a secure physical device that provides a strong firewall
  2. hacking technique that controls your browser, benefiting the hacker
  3. encrypts information
  4. repetitive strain injury, caused by repetitive motions over long periods of time
  5. transport layer security, for security of a server
  6. complex and secure password

12 Clues: encrypts informationdecrypts informationcomplex and secure passwordinvading someone else's computerhacker program that records keystrokestransport layer security, for security of a serverhacker program for finding out log ins and passwordsa secure physical device that provides a strong firewall...

Cybersecurity 2024-06-04

Cybersecurity crossword puzzle
Across
  1. This malicious software holds your data hostage until a ransom is paid
  2. The process of verifying a user's identity
  3. A deceptive email attempt to steal personal information
  4. Malicious software designed to harm a computer system
  5. Scrambling data to make it unreadable without a key
  6. Process of identifying and correcting security vulnerabilities in a
Down
  1. A security incident where sensitive data is exposed
  2. Software program designed to block unauthorized access while
  3. An attack that overwhelms a server with traffic, making it unavailable
  4. Software that scans for and neutralizes viruses and other malicious
  5. system.
  6. authorized communications.

12 Clues: system.authorized communications.The process of verifying a user's identityA security incident where sensitive data is exposedScrambling data to make it unreadable without a keyMalicious software designed to harm a computer systemA deceptive email attempt to steal personal informationSoftware program designed to block unauthorized access while...

confidentiality 2025-02-06

confidentiality crossword puzzle
Across
  1. work history, date of birth, social security number, criminal record,
  2. information
  3. Data records of an employee’s performance on the job such as performance reports,
  4. Data information which may arise from employment-related physicals, drug tests and
  5. of information
Down
  1. Espionage form of espionage conducted for commercial purposes rather than security;
  2. set of rules or promises which limits access or places restrictions on certain
  3. or Sensitive Data information about an employee prior to employment such as a résumé,
  4. in the Workplace keeping employee, customer and client information private
  5. actions, supervisory notations
  6. religion, etc.
  7. insurance information
  8. involves individuals hired to steal trade secrets, new products or

13 Clues: informationreligion, etc.of informationinsurance informationactions, supervisory notationsinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,set of rules or promises which limits access or places restrictions on certain...

Vocabulary - Unit 3 2023-12-05

Vocabulary - Unit 3 crossword puzzle
Across
  1. machać
  2. przyjemny
  3. imigrant
  4. spektakularny
  5. dziki
Down
  1. kontrola bezpieczeństwa
  2. witać
  3. gość
  4. niesamowity
  5. kawiarnia

10 Clues: gośćwitaćdzikimachaćimigrantkawiarniaprzyjemnyniesamowityspektakularnykontrola bezpieczeństwa

Vocabulary 2022-12-31

Vocabulary crossword puzzle
Across
  1. Pemain
  2. Keamanan
  3. ruang kelas
  4. Burung
Down
  1. Hijau
  2. Peta
  3. Keluarga
  4. Daging
  5. Dunia
  6. Kecil

10 Clues: PetaHijauDuniaKecilDagingPemainBurungKeluargaKeamananruang kelas

3-7 2024-12-10

3-7 crossword puzzle
Across
  1. Term used to describe the simulated representation of cyberspace
  2. The city where Molly and Case share a breakfast in the text
  3. This term refers to the technology allowing a person's consciousness to be replicated in cyberspace
  4. A type of painkiller used by Molly after an injury
  5. Surgical implant in the skull, mentioned as a common feature
  6. Thief who stole an AI
  7. AI stands for this (two words)
  8. The city in Turkey where Case and Molly are traveling to
  9. Molly's specific type of suit worn for protection and blending in
  10. The substance that Armitage claims is slowly dissolving inside Case’s arteries
  11. Virtual reality term, used when "keying in"
  12. The device used to connect the Flatline’s construct to Case’s system
  13. Armitage is diagnosed with this mental disability
  14. High-security location at the tip of the spindle
Down
  1. Subculture involved in surreal violence and media manipulation (two words)
  2. A term used for an electronic entity that mimics a deceased person's skills and behavior
  3. The axis of the Sprawl that includes Boston and Atlanta
  4. The system used to access and hack information protected by security
  5. City where the Panther Moderns were involved
  6. Case’s former mentor (two words)
  7. Short term for a substitute used to replace human senses in cyberspace (two words)
  8. Technology company referenced as the source of security systems (two words)
  9. The operation that Corto was involved in, which caused his severe injuries (two words)
  10. Leader of the group from # across/down (two words)
  11. Armitage was heavily injured while flying into this country
  12. The flat, origami-wrapped object Molly gives Case
  13. The high-tech deck Case uses (two words)

27 Clues: Thief who stole an AIAI stands for this (two words)Case’s former mentor (two words)The high-tech deck Case uses (two words)Virtual reality term, used when "keying in"City where the Panther Moderns were involvedHigh-security location at the tip of the spindleThe flat, origami-wrapped object Molly gives Case...

Access controls 2 2025-07-07

Access controls 2 crossword puzzle
Across
  1. 2 doors enclosing a vestibule
  2. Maglock components consist of a electromagnet and ...
  3. Access control must interface with this system
  4. This is the best hardware type to be in compliance with egress requirements
  5. Used to ensure that the alarm is valid
  6. This door type is primarily used in finished office spaces
  7. Two way radio is form of security ...
  8. A mantrap for cars
  9. The power requirement for Maglocks
  10. Alarm Secure and Bypass are considered .... in a security alarm system
  11. Category detection system of interior volumetric detection systems
  12. Access control panels need to be in these locations
  13. light color is measured in ...
  14. Hollow metal frames are most common in this type of building
Down
  1. One of the most common communication protocols for AC systems
  2. Most basic dead bolt equipped electrified lock legal in occupied rooms
  3. This lock type is not considered Free Egress
  4. The number of security countermeasures types in an access control system
  5. The range in which a camera has the ability to differentiate extreme light and dark in a frame
  6. This type of glass door is also known as Storefront Door
  7. Three types of threat actors include Terrorist Petty and ...
  8. The minimum number of hours allowed for battery backup power on an AC panel
  9. Type of event log allowed to be used in a court of law
  10. Type of electrified lock that lacks physical strength
  11. Redundancy helps ensure reliability when things ...
  12. This alarm type can be avoided by alarm filtering
  13. Device required on all maglock doors
  14. Type of door frame that can withstand low use and low impact

28 Clues: A mantrap for cars2 doors enclosing a vestibulelight color is measured in ...The power requirement for MaglocksDevice required on all maglock doorsUsed to ensure that the alarm is validTwo way radio is form of security ...This lock type is not considered Free EgressAccess control must interface with this system...

Chapter 2 crossword 2025-11-14

Chapter 2 crossword crossword puzzle
Across
  1. The colony of Massachusetts was the first colony to issue what currency in the Us
  2. The Chinese began using this as money
  3. Money can be saved and used at a later date
  4. The federal government issued what.
  5. Putting money aside so it will be available when you need it
  6. A bill security that matures in a year or less
  7. What was created in 1913 by Woodrow Wilson
  8. A document guaranteeing payment of a specific amount of money
  9. what corporation can Shares be traded openly
  10. Ownership of Gold by US citizens was illegal until when.
  11. An analysis of the company itself, its operations, its positions within the industry
  12. Anything of value that is accepted in return for goods
  13. The Lydian King Croesus created the which true coin
  14. Maintain its value over time
  15. Who signed the National Banking Act
  16. People who buy shares of stock in the company
  17. The mechanism a nation uses to provide and manage money for itself
Down
  1. what corporation can Shares not sold publicly
  2. Investing can help you beat ...
  3. Federal Reserve System is what bank of the United States.
  4. The Federal Reserve System is divided into how many districts.
  5. A note of security that pays interest over terms ranging from 2-10 years
  6. Someone who assists you with buying stocks and bonds
  7. selling stocks and bonds directly to public investors
  8. A financial investment issued by a corporation
  9. Those people who do the work for a business
  10. People who lend money to the business for a contracted rate of interest
  11. The what bank of the U.S was chartered in 1789 by Alexander Hamilton
  12. Money for real estate, equipment, and so on
  13. Taking measures to make money grow

30 Clues: Maintain its value over timeInvesting can help you beat ...Taking measures to make money growThe federal government issued what.Who signed the National Banking ActThe Chinese began using this as moneyWhat was created in 1913 by Woodrow WilsonMoney can be saved and used at a later dateThose people who do the work for a business...

Investment essentails 2024-03-11

Investment essentails crossword puzzle
Across
  1. Contracts that give the buyer the right, but not the obligation, to buy or sell an asset at a specified price on or before a certain date.
  2. A market condition marked by falling stock prices.
  3. Stocks of large, reputable companies known for their ability to operate profitably in good times and bad.
  4. The benchmark index of the NSE.
  5. The Bombay Stock Exchange, one of the oldest in Asia.
  6. The income return on an investment, such as the interest or dividends received from holding a particular security.
  7. A person or company that buys and sells goods or assets for others.
  8. An investor's share of a company's profit, usually paid out quarterly.
  9. The degree to which an asset or security can be quickly bought or sold in the market without affecting its price.
  10. The value of shares issued by a company.
Down
  1. Financial contracts obligating the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.
  2. A place where stocks and other securities are bought and sold.
  3. The degree of variation of a trading price series over time, usually measured by the standard deviation of logarithmic returns.
  4. The National Stock Exchange of India.
  5. Partial ownership in a company.
  6. The benchmark index of the BSE.
  7. A market condition marked by rising stock prices.
  8. The first sale of stock by a private company to the public.
  9. A financial security with a value that is reliant upon or derived from, an underlying asset or group of assets.
  10. A collection of investments held by an institution or a private individual.

20 Clues: Partial ownership in a company.The benchmark index of the BSE.The benchmark index of the NSE.The National Stock Exchange of India.The value of shares issued by a company.A market condition marked by rising stock prices.A market condition marked by falling stock prices.The Bombay Stock Exchange, one of the oldest in Asia....

Air Travel 2 2024-02-03

Air Travel 2 crossword puzzle
Across
  1. Trolley
  2. Pilot
  3. Takeoff
  4. Tray
  5. Security check [3w]
  6. Air Hostess
Down
  1. Crew
  2. Co-pilot
  3. Landing
  4. Seatbelt [Cinturón de _________]
  5. Seat

11 Clues: CrewSeatTrayPilotTrolleyLandingTakeoffCo-pilotAir HostessSecurity check [3w]Seatbelt [Cinturón de _________]

Continuing Education 2025-10-24

Continuing Education crossword puzzle
Across
  1. 8099
  2. hold beta blockers
  3. patient interactions
  4. empty oxygen tank
Down
  1. quality rounds
  2. active shooter
  3. cardiac arrest
  4. medication
  5. fire
  6. winter weather
  7. dial 88
  8. gas shut off valves
  9. slow heart rate
  10. one source

14 Clues: 8099firedial 88medicationone sourcequality roundsactive shootercardiac arrestwinter weatherslow heart rateempty oxygen tankhold beta blockersgas shut off valvespatient interactions

LA NETIQUETTE 2021-11-11

LA NETIQUETTE crossword puzzle
Across
  1. violare un sistema informatico per danneggiarlo
  2. diritto alla riservatezza delle informazioni
Down
  1. news informazioni false nel web
  2. codice segreto per accedere a un dispositivo
  3. bullismo bullismo online

5 Clues: bullismo bullismo onlinenews informazioni false nel webcodice segreto per accedere a un dispositivodiritto alla riservatezza delle informazioniviolare un sistema informatico per danneggiarlo

Social Security Crossword Puzzle 2023-03-27

Social Security Crossword Puzzle crossword puzzle
Across
  1. _______ describe the in-built flexibility of existing state benefits and taxes to respond automatically to expansion and contraction of the economy. [two words w/o space]
  2. A programme that requires participants to work in exchange for social security benefits.
  3. “[In the UK,] The extension of benefit _______ to many more single parents since 2008 has led many to move into paid work, but that work has been almost entirely part-time and low-earning”
  4. The principle describes the state taking on the role of providing benefits and insuring against risks from the mutual aid societies and private market, due to the state’s ability to manage risk more efficiently and create a larger pool of resources. [two words w/o space]
  5. “the degree to which individual adults can uphold a socially acceptable standard of living independently of family relationships”
  6. The proportion of the population that is eligible for and/or receives a particular social security benefit.
  7. Household-level means-tested benefits can _______ work within the couple.
  8. A reduction in the amount of benefits paid as a family's income increases, often referred to as benefit _______
Down
  1. While on the one hand cash-for-care recognises the important societal and economic contribution of unpaid care, it can potentially also reinforce _______ inequalities over the long-term.
  2. “A collective action to protect individuals against income deficiencies” [two words w/o space].
  3. A core purpose of pension systems is to _______ income within individuals – from their working years to retired years – or between individuals – from richer to poorer individuals.
  4. Acronym for an unconditional cash benefit paid regularly to every citizen independently on the amount of income they have or hours they work.
  5. A situation where reliance on benefits creates a cycle of dependency, making it difficult to escape poverty and leading to a _________.
  6. Pension systems where the person gets a pension income equal to the contributions they have paid in plus the market return on them.
  7. A set of public policies that aim to reduce government budget deficits.
  8. A key goal of social security systems worldwide is to reduce/prevent _______

16 Clues: A set of public policies that aim to reduce government budget deficits.Household-level means-tested benefits can _______ work within the couple.A key goal of social security systems worldwide is to reduce/prevent _______A programme that requires participants to work in exchange for social security benefits....

Anti-Bullying Week Crossword Puzzle 2021-11-17

Anti-Bullying Week Crossword Puzzle crossword puzzle
Across
  1. What you wear on the first day of Anti-Bullying Week.
  2. Where the majority of bullying takes place.
  3. How bullies behave.
  4. When someone uses phones, computers or other technology to bully someone.
  5. Who you can hang out with after you have been bullied.
  6. What you should tell bullies to do if you catch them in the act.
Down
  1. Who to tell if you are or have been bullied.
  2. When people use their bodies or objects to harm someone.
  3. What kids can develop if they are bullied.
  4. When someone uses words to hurt someone.
  5. The month of Anti-Bullying Week.
  6. A reason why someone is bullied.

12 Clues: How bullies behave.The month of Anti-Bullying Week.A reason why someone is bullied.When someone uses words to hurt someone.What kids can develop if they are bullied.Where the majority of bullying takes place.Who to tell if you are or have been bullied.What you wear on the first day of Anti-Bullying Week....

Stop Bullying! 2024-04-14

Stop Bullying! crossword puzzle
Across
  1. Komisi Perlindungan Anak Indonesia
  2. seseorang yang melakukan penderitaan
  3. membuat jarak/mengucilkan korban dengan tidak mengikutsertakan korban dalam kegiatan termasuk jenis bullying...
  4. seseorang yang menyaksikan penderitaan
  5. seseorang yang mengalami penderitaan
  6. istilah bullying dalam bahasa Indonesia
  7. kondisi yang timbul sebagai akibat dari pengalaman atau peristiwa buruk yang dialami oleh seseorang, seperti kecelakaan, korban kekerasan fisik, atau bencana alam.
Down
  1. jenis bullying yang melibatkan penggunaan kata-kata untuk menyakiti, merendahkan, atau mengintimidasi seseorang.
  2. sifat atau perasaan yang membentengi seseorang dari melakukan yang rendah atau kurang sopan.
  3. memukul, menampar, mendorong jenis perundungan..
  4. Kementerian Pemberdayaan Perempuan dan Perlindungan Anak
  5. usaha memasukkan nilai-nilai kebudayaan terhadap individu sehingga individu tersebut menjadi bagian masyarakat
  6. jenis perundungan yang dilakukan di medsos

13 Clues: Komisi Perlindungan Anak Indonesiaseseorang yang melakukan penderitaanseseorang yang mengalami penderitaanseseorang yang menyaksikan penderitaanistilah bullying dalam bahasa Indonesiajenis perundungan yang dilakukan di medsosmemukul, menampar, mendorong jenis perundungan..Kementerian Pemberdayaan Perempuan dan Perlindungan Anak...

Ethics & Compliance 2019-05-28

Ethics & Compliance crossword puzzle
Across
  1. Observance
  2. Wellbeing
  3. Battles, struggles
  4. Beliefs, Integrity
  5. Bravery
  6. Presents and generosity
  7. Nimbleness
  8. Attention, concern
  9. Who we are and how we strive to be everyday
Down
  1. Safeguard, shield
  2. Teamwork, cooperation
  3. Honesty, honour
  4. Care and security
  5. Behaviour
  6. Provision, supply
  7. Confidential reporting tool

16 Clues: BraveryWellbeingBehaviourObservanceNimblenessHonesty, honourSafeguard, shieldCare and securityProvision, supplyBattles, strugglesBeliefs, IntegrityAttention, concernTeamwork, cooperationPresents and generosityConfidential reporting toolWho we are and how we strive to be everyday

assignment 1 and 2 2025-02-19

assignment 1 and 2 crossword puzzle
Across
  1. The obtaining of money by legal process through seizure and sale of property; the raising of the money for which an execution has been issued. So, where the sheriff or other state official, armed with a writ, seizes a debtor’s property in order to satisfy a judgment.
  2. A way to settle a foreclosure case, or preempt one, by voluntarily surrendering the deed to the property in exchange for not defending the foreclosure and for not.exercising a right of redemption.
  3. A power of sale is not the same thing as a short sale. For an explanation of the difference between the two,
  4. Tort for wrongful taking/use of property. A debtor’s remedy against an unsecured creditor that attempts to use self-help.
  5. A security interest in real property.
  6. the legal process of enforcing the judgment,usually be seizing and selling property of the debtor
  7. Any transfer made with actual intent to hinder, delay or defraud any creditor is voidable. See UVTA Sections 4(a), 5(a) and 8.
  8. Taking property without going through a judicial process, in order to use the property to satisfy a debt. Not available to unsecured creditors.
  9. When one amount owing is cancelled in light of another amount owing. See also ,
Down
  1. A “lease” is really a sale with a security interest if the term of the lease extends for the entire remaining economic life of the collateral, so that the lease is just like a financed purchase. See UCC 1-203. This is in keeping with the Intended as a Security Doctrine. See also the Bright-Line and Economics of the Transactions Test (Assignment 22).
  2. The process by which the creditor compels application of the value of the collateral to payment of the debt when the creditor holds a lien interest in the collateral. Usually involves a sale of the collateral; the sale cuts off the right to redeem, and completes theforeclosure.
  3. Statutes that render certain property untouchable by creditors seeking to compel repayment. Generally only helps individuals retain their property, not corporations. Generally only applies vis-à-vis a debtor and an unsecured creditor. Exemption statutes generally cannot protect a debtor’s property from secured creditors.
  4. If a factor purchases the accounts of another with contractual provisions that make it so that they don’t really bear any risk of loss, but instead have recourse against the seller of the accounts for the value of the sale, then the sale is not really a sale, it is a security agreement secured by the accounts. See UCC 9-102(a). This is in keeping with the Intended as a Security Doctrine.
  5. An interest in property, contingent on the non-payment of a debt. See UCC 1-201(35). See also the Intended as a Security Doctrine and UCC 9-109(a)(1).
  6. “[T]he debtor’s right to pay the secured debt even after default and retain ownership of the collateral.” (LoPucki et. al. pg 26)

15 Clues: A security interest in real property.When one amount owing is cancelled in light of another amount owing. See also ,the legal process of enforcing the judgment,usually be seizing and selling property of the debtorA power of sale is not the same thing as a short sale. For an explanation of the difference between the two,...

FITC.sb 2013-05-15

FITC.sb crossword puzzle
Across
  1. A small piece quantity of something.
  2. Drive a self contained storage device containing a read -write mechanism.
  3. wireless locale area network.
  4. Engine A program for retrieval of data,files,or documents from a database
  5. The programs and other operating information used by a computer.
  6. A port developed by IMB for connecting a mouse or or keyboard to a Mac or Pc.
  7. network.
  8. Port An electronic and physical port thats sends Geiger audio through an
  9. Produce, deliver or supply data using a computer.
Down
  1. Of the culture of the computers,information technology,and virtual reality.
  2. The physical parts of the computer and related devices.
  3. What does ISP stand for.
  4. a file created by a software application.
  5. Port A locale network.
  6. What does LED stand for.
  7. What does SSID stand for.
  8. What does ram stand for.
  9. To put data in the computer.

18 Clues: network.Port A locale network.What does ISP stand for.What does LED stand for.What does ram stand for.What does SSID stand for.To put data in the computer.wireless locale area network.A small piece quantity of something.a file created by a software application.Produce, deliver or supply data using a computer....

Bullying Crossword Puzzle 2015-11-15

Bullying Crossword Puzzle crossword puzzle
Across
  1. The "E" in "SAFE" stands for "End it ____".
  2. What does the "H" stand for in "HERO"?
  3. The "S" in "SAFE" stands for "Stand ____".
  4. Bullies can call you ____.
  5. If you see bullying, do not be a _____.
  6. Bullying can be physical or ___.
  7. Bullying can be done by an individual or ___.
  8. A bully is identified not how they look, but rather by their ___.
  9. This acronym is great to remember if you see bullying occuring.
  10. Being a bully makes you a smaller person. Helping others makes you a __ person.
  11. If you are bullied, tell an ___.
Down
  1. What does the "E" stand for in "HERO"?
  2. The "O" in "HERO" stands for___ communication.
  3. The "A" in "SAFE" stands for "Ask for ____".
  4. Bullies can get you in ___.
  5. Bullying online is called ___ bullying
  6. What acronym reminds us how to act if you are bullied?
  7. ____ someone from a group is a form of bullying.
  8. What does the "R" stand for in "HERO"?

19 Clues: Bullies can call you ____.Bullies can get you in ___.Bullying can be physical or ___.If you are bullied, tell an ___.What does the "E" stand for in "HERO"?What does the "H" stand for in "HERO"?Bullying online is called ___ bullyingWhat does the "R" stand for in "HERO"?If you see bullying, do not be a _____.The "S" in "SAFE" stands for "Stand ____"....

Airports 2021-02-11

Airports crossword puzzle
Across
  1. three ounces one quart one zip top bag
  2. Check-in is on which side
  3. in NZ all pax are required to fill out a departure card if travelling internationally
  4. the area before departing passengers pass through security
  5. this is a secure area only for international travellers
  6. abbreviation of Liquids, Aerosols, Gels
  7. a facility everyone uses in the airport
  8. this was established in NZ in 1977
  9. is it okay to joke around and fake threats in an airport
  10. what is the airport code for nelson?
  11. these types of vehicles are mostly used to push an aircraft
Down
  1. making announcements that the plane is ready for boarding
  2. ZQN
  3. the area where you go through security and hand over your passport for inspection
  4. sacred space in an airport
  5. ROT
  6. taking off your shoes, removing your belt buckle and putting metal items in a tray is....
  7. duty free is on what side
  8. another name for customs/security
  9. Airport code for Amsterdam
  10. who is in charge of getting passengers from a to b

21 Clues: ZQNROTCheck-in is on which sideduty free is on what sidesacred space in an airportAirport code for Amsterdamanother name for customs/securitythis was established in NZ in 1977what is the airport code for nelson?three ounces one quart one zip top bagabbreviation of Liquids, Aerosols, Gelsa facility everyone uses in the airport...

Georgia Milestones Testing Training 2016-03-29

Georgia Milestones Testing Training crossword puzzle
Across
  1. o'clock is the time proctors should arrive in rooms they are proctoring
  2. should be covered in testing rooms
  3. must be kept secure at all times
  4. is permitted during breaks
  5. must monitor the integrity of the assessment, through circulation and checking in
  6. can write in the test books
Down
  1. are used for each student for each section of the online assessment
  2. responsible for test security
  3. of test security occurs when examiners fail to follow administration directions for the test
  4. begins on April 12
  5. during the entire testing period
  6. electronic devices should be used during testing sessions (by teachers or students)

12 Clues: begins on April 12is permitted during breakscan write in the test booksresponsible for test securitymust be kept secure at all timesduring the entire testing periodshould be covered in testing roomsare used for each student for each section of the online assessmento'clock is the time proctors should arrive in rooms they are proctoring...

CSI Newsletter 2019-03-05

CSI Newsletter crossword puzzle
Across
  1. Founder of the CSI team (First name)
  2. Automated tools used for simple and repetitive tasks
  3. Malicious software that denies access to data in return for payment
  4. Device placed in gas pumps to steal consumer data
  5. What are automated pre recorded phone messages
Down
  1. Virtual currency which has an equivalent value in real currency
  2. Created to make life easier but are often hacked or monitored
  3. A cyber group well known for hacking and wearing masks
  4. Who won the last CSI Newsletter $50 quiz (first name)
  5. What credit reporting bureau was hacked recently
  6. Electronics manufacturer sued for $2.2 million

11 Clues: Founder of the CSI team (First name)Electronics manufacturer sued for $2.2 millionWhat are automated pre recorded phone messagesWhat credit reporting bureau was hacked recentlyDevice placed in gas pumps to steal consumer dataAutomated tools used for simple and repetitive tasksWho won the last CSI Newsletter $50 quiz (first name)...

Revision 2025-09-19

Revision crossword puzzle
Across
  1. I tell my teacher if I haven't done the homework. How is my behaviour?
  2. Noticing what is happening in the present
  3. Purposely troubling someone else through actions or words
  4. Stepping into other's shoes to understand how they are feeling
  5. When two or more people do not agree on the same thing
  6. Being thankful and appreciative
Down
  1. Kindness/Patience/Honesty and Forgiveness are examples of
  2. Spreading rumours about someone is an example of which type of bullying?
  3. Appreciating yourself and doing things you like
  4. Doing things to take care of yourself
  5. Which type of bullying takes place online?

11 Clues: Being thankful and appreciativeDoing things to take care of yourselfNoticing what is happening in the presentWhich type of bullying takes place online?Appreciating yourself and doing things you likeWhen two or more people do not agree on the same thingKindness/Patience/Honesty and Forgiveness are examples of...

Cybersecurity Crossword Challenge 2025-08-19

Cybersecurity Crossword Challenge crossword puzzle
Across
  1. A fake email or text that tries to steal information.
  2. Keeping personal and health information protected.
  3. Written rules that guide safe and compliant practices.
  4. Software designed to damage or steal data.
  5. Must be sent from a secured machine when it contains PHI.
  6. When private or confidential information is accessed without permission.
  7. What you should file if you notice a privacy or security issue.
Down
  1. Information that must not be shared with unauthorized people.
  2. A secret word used to log in securely.
  3. The law that protects patient health information.
  4. How systems, files, and conversations should always be kept.
  5. Extra login security using a code or device.
  6. What staff must wear to access the building.
  7. Abbreviation for Protected Health Information.
  8. A review process to check compliance with rules.
  9. What you do to computers, doors, or files when unattended.

16 Clues: A secret word used to log in securely.Software designed to damage or steal data.Extra login security using a code or device.What staff must wear to access the building.Abbreviation for Protected Health Information.A review process to check compliance with rules.The law that protects patient health information....

Cyber Safety: Be eSmart! 2021-09-09

Cyber Safety: Be eSmart! crossword puzzle
Across
  1. A safe place for searching stuff up
  2. To send something to someone
  3. A character used for math and to call someone
  4. Unwanted email
  5. Opposite of Offline
  6. Shielded from harm
  7. Something to follow
Down
  1. Your parent
  2. A place where places you visited is kept
  3. Synonym for reliable
  4. Something that belongs to you
  5. Someone you don't know
  6. Someone who hurts someone else deliberately
  7. The act of being safe

14 Clues: Your parentUnwanted emailShielded from harmOpposite of OfflineSomething to followSynonym for reliableThe act of being safeSomeone you don't knowTo send something to someoneSomething that belongs to youA safe place for searching stuff upA place where places you visited is keptSomeone who hurts someone else deliberately...

Bullying crossword 2022-04-26

Bullying crossword crossword puzzle
Across
  1. someone who tries to help those who have been victimized around them
  2. someone who you can tell if you are being bullied and has authority at school
  3. bullying through exclusion
  4. someone who ignores an act of violence
Down
  1. bullying through insults and threats
  2. a bullying form rooted in violence
  3. something that can happen from being bullied, another word for sadness
  4. a person who actively attempts to harm others physically or mentally
  5. a type of bullying commonly found online

9 Clues: bullying through exclusiona bullying form rooted in violencebullying through insults and threatssomeone who ignores an act of violencea type of bullying commonly found onlinesomeone who tries to help those who have been victimized around thema person who actively attempts to harm others physically or mentally...

Shell shocker weapons 2022-01-19

Shell shocker weapons crossword puzzle
Across
  1. Shotgun blasts do critical damage up close.
  2. The number of primary weapons in the game.
  3. The classic, high rate of fire. Medium range, never jams.
  4. Inspired by another BWD game, Nuke Zone.
  5. Bolt action sniper - One shot stopping power.
  6. Small magazine, medium range, big damage!
  7. 3-round burst. Accurate, medium range specialist.
Down
  1. Semi automatic sniper - Destroy from a distance.
  2. Pull the pin and it goes kaboom!
  3. Fancier versions of the regular weapons
  4. Fancier versions of the regular that could only be bought from January 1st to January 18th.
  5. The secondary weapon.
  6. Large clip full of egg cracking bullets. Close to medium range.

13 Clues: The secondary weapon.Pull the pin and it goes kaboom!Fancier versions of the regular weaponsInspired by another BWD game, Nuke Zone.Small magazine, medium range, big damage!The number of primary weapons in the game.Shotgun blasts do critical damage up close.Bolt action sniper - One shot stopping power....

computer languages 2025-05-23

computer languages crossword puzzle
Across
  1. One of the high-level languages.
  2. Example of fifth generation computer language.
  3. Convert high level language to low level language and vice versa.
  4. A network security system that protects networks from unauthorised access.
  5. A type of software protects computers from malicious software.
  6. It is used in assembly languages (2 words).
  7. The first interactive computer game.
Down
  1. First-generation language.
  2. Illegal activities involving computers and the internet.
  3. Unauthorized access to computer network security systems.
  4. The set of instruction that tells the computer what to do.
  5. Feature of fifth generation computer language (2 words).
  6. A social engineering attack that used to steal user data.
  7. A storage location of computer memory that stores data.
  8. Secret string of characters used to identify the user.
  9. Set of rules that define structure and formed a programing language.

16 Clues: First-generation language.One of the high-level languages.The first interactive computer game.It is used in assembly languages (2 words).Example of fifth generation computer language.Secret string of characters used to identify the user.A storage location of computer memory that stores data.Illegal activities involving computers and the internet....