cyber security Crossword Puzzles
8A Vocabulario 2022-01-13
Spanish 2- Undiad 2- Alyssa George 2021-02-18
25 Clues: send • share • office • mobile • to help • receive • routine • security • telework • flexible • autonomy • work with • a dentist • to create • an artist • a soldier • to recycle • discipline • a mechanic • earn money • communicate • to care about • to plant trees • to clean up trash • at the community center
Scene 1 Set 6: Travelling 2021-04-06
32 Clues: juna • vene • auto • mopo • loma • loma • laiva • passi • lento • matka • matka • metro • kartta • istuin • saapua • lentäjä • mopoauto • matkustaa • lentokone • skootteri • myöhästyä • polkupyörä • makuuvaunu • matkustaja • bussipysäkki • matkatavarat • moottoripyörä • turvatarkastus • ravintolavaunu • passintarkastus • saapuvat(lennot) • lähtevät (lennot)
Wordmaster Voca4 2021-05-27
30 Clues: 선장 • 목수 • 점원 • 비서 • 군인 • 교수 • 어부 • 탐정 • 삽화가 • 소설가 • 대통령 • 정원사 • 제빵사 • 과학자 • 사업가 • 변호사 • 미용사 • 사진사 • 회계사 • 판매원 • 치과의사 • 우주비행사 • 금전출납원 • 예술가, 화가 • 기사, 기술자 • 공무원, 관리 • 기자, 통신원 • 조종사, 조종하다 • 판사, 심사원, 판단하다 • guard 경호원, 경비원
Unit 3 2021-11-04
21 Clues: luggage • customs • airport • suitcase • to board • to arrive • to depart • to travel • the screen • the ticket • bathingsuit • the passport • the bus stop • the airplane • the passenger • identification • to take a taxi • to stand in a line • to confirm a flight • to pack the suitcase • pass through security
D3-L5 Crucigrama de vocabulario 2021-10-23
35 Clues: port • land • valid • waves • ruins • island • jungle • return • ticket • cruise • hostel • arrival • lodging • welcome • delayed • distant • warning • takeoff • compass • expired • security • farewell • accident • included • passport • traveler • dangerous • reception • itinerary • insurance • adventure • adventurer • prohibited • destination • recommendable
Lake Prince Woods Workers 2021-08-16
Across
- Marketing
- Maintenance
- Activities Dir.
- Social Services
- Director
- Assistant Activities
- Chaplain
- Chef
- Maintenance
- Nursing Dir.
- Therapy
- Medical Cebter
- Outreach Coordinator
- Local Hospital
- Notary
Down
- President UCHAS
- Receptionist
- Security Guard
- Office Manager
- Dietery
- Rear Entrance
- Hair Salon
- Dietery Head
- At Home Care
- Home Care
- Human Resources
- Business Manager
- Receptionist
- Welcome Committee
29 Clues: Chef • Notary • Dietery • Therapy • Director • Chaplain • Marketing • Home Care • Hair Salon • Maintenance • Maintenance • Receptionist • Dietery Head • At Home Care • Nursing Dir. • Receptionist • Rear Entrance • Security Guard • Office Manager • Medical Cebter • Local Hospital • President UCHAS • Activities Dir. • Social Services • Human Resources • Business Manager • Welcome Committee • Assistant Activities • ...
Really Hard STUFF 2019-05-19
Across
- disposition.
- tangible.
- maneuver.
- imperil.
- region.
- defendable.
- grass.
- terrain.
- habitat.
- conduct.
- guardianship.
- organic.
- account.
- discipline.
- supplies.
- mortal.
- adaptable.
- meteorological.
- deterioration.
Down
- mural.
- security.
- vegetation.
- biologic.
- living.
- public.
- architecture.
- substantial.
- mainland.
- geology.
- scope.
- analyst.
- countanence.
- Animalia.
- sterile.
- blueprint.
35 Clues: mural. • grass. • scope. • living. • public. • region. • mortal. • imperil. • terrain. • habitat. • conduct. • geology. • organic. • account. • analyst. • sterile. • security. • tangible. • biologic. • maneuver. • mainland. • supplies. • Animalia. • blueprint. • adaptable. • vegetation. • defendable. • discipline. • disposition. • substantial. • countanence. • architecture. • guardianship. • deterioration. • meteorological.
crossword 2014-01-27
32 Clues: тень • звук • отель • карта • вдруг • работа • подвал • ремень • охрана • скелет • деревня • полночь • напуган • неуютно • недавно • браслет • ловушка • странный • ожерелье • волшебный • переезжать • привидение • потрясающий • симпатичный • мистический • впечатляющий • рассказывать • ночной кошмар • путешествовать • дом с призраками • гость/посетитель • плавающий по воздуху
London Sights 2015-11-11
35 Clues: Bus • Zug • laut • Turm • Flug • Platz • Punkt • König • Fahrt • Glocke • stehen • Ticket • werfen • Gefahr • Palast • sicher • Jugend • Abflug • reisen • berühmt • kämpfen • Königin • Verkehr • Ankunft • bedeuten • behalten • Detektiv • anfangen • Flugzeug • Flughafen • Sicherheit • Rolltreppe • Geldstrafe • respektieren • Taschendiebe
opt pre int 11 2024-08-14
Across
- особенный, конкретный
- охрана, надёжность
- большинство
- жестокий
- связанный с насилием, жестокий
- электрический
- приз
- случайно
- вес, весить
- атом
- притяжение
- редкий
- уверенно
Down
- фактор
- слой
- клейкий
- важность
- воздушный шар
- комфорт
- нетрудоспособность, инвалидность
- ген
- потолок
- чистить
- креативность
- рвать
- исследовать
- заряд
- меньшинство
- награда, награждать
- игрушка
30 Clues: ген • слой • приз • атом • рвать • заряд • фактор • редкий • клейкий • комфорт • потолок • чистить • игрушка • важность • жестокий • случайно • уверенно • притяжение • большинство • вес, весить • исследовать • меньшинство • креативность • воздушный шар • электрический • охрана, надёжность • награда, награждать • особенный, конкретный • связанный с насилием, жестокий • нетрудоспособность, инвалидность
Vocab Spanish 3 2023-04-26
30 Clues: gum • sun • boat • door • candy • shade • plane • hotel • cloud • train • energy • to fly • landed • to fish • baggage • to flip • airport • weather • snorkle • to walk • security • to board • suitcase • sunscreen • cliff jump • sunglasses • water bottle • bathing suit • clothing store • grocery's store
4K puzzle (module Reading 1&2) 2023-09-27
Across
- toepassen
- toestemming
- verstoren
- aan de andere kant
- meerdere
- ongebruikelijk
- lanceren
- hoewel
- gegevens
- in plaats daarvan
- gemeenschap
- ontwikkelaar
- betrekken
- beplanting
- besturen
- beveiliging
- vastmaken
Down
- beoordelen
- kenmerk
- desondanks
- samenwerken
- terwijl
- onhandig
- duurzaam
- natuurbehoud
- statistieken
- met als gevolg
- maar toch
- verboden
- omdat
30 Clues: omdat • hoewel • kenmerk • terwijl • onhandig • meerdere • duurzaam • lanceren • gegevens • besturen • verboden • toepassen • verstoren • betrekken • maar toch • vastmaken • beoordelen • desondanks • beplanting • toestemming • samenwerken • gemeenschap • beveiliging • natuurbehoud • statistieken • ontwikkelaar • ongebruikelijk • met als gevolg • in plaats daarvan • aan de andere kant
June Event 2025-04-30
Across
- PJSK OCs
- Naomi Kimishima
- Jermling #2
- Fire Emblem
- #FlockOnFridays
- Sakura Ogami
- Emotion OCs
- Yakuza
- Bird
- Moderator
- Dedede
Down
- 2 Time AWE Champ
- PokeRolls
- Ringo Esashi
- Kara Shirectus
- Dave
- Star
- Kokoto
- AWE Security
- 'Advertiser and Writer Extraordinaire' role
- Moon Mage
- Cross Dimensional Purple Hunt
- PJSK Character
- Active on Mudae
24 Clues: Dave • Star • Bird • Kokoto • Yakuza • Dedede • PJSK OCs • PokeRolls • Moon Mage • Moderator • Jermling #2 • Fire Emblem • Emotion OCs • Ringo Esashi • AWE Security • Sakura Ogami • Kara Shirectus • PJSK Character • Naomi Kimishima • #FlockOnFridays • Active on Mudae • 2 Time AWE Champ • Cross Dimensional Purple Hunt • 'Advertiser and Writer Extraordinaire' role
Cyber Space Safety 2013-11-03
Across
- Abuse of technology and the internet
- Software that is harmful to your computer by, spreading cookies and making copies of itself
- A series of secret letter or numbers that unlock a computer etc.
- Internet software on Apple appliances
Down
- Mail that is sent using technology and the internet
- Using information from the internet and not referencing it in your bibliography
- A weblog that is on the internet, often a diary or journal
- A harmful software program that erases your computer and gives it problems
- An advertisement that often appears on top of another window
- Wireless internet on technology
10 Clues: Wireless internet on technology • Abuse of technology and the internet • Internet software on Apple appliances • Mail that is sent using technology and the internet • A weblog that is on the internet, often a diary or journal • An advertisement that often appears on top of another window • A series of secret letter or numbers that unlock a computer etc. • ...
Cyber Quiz Practice 2025-08-20
Across
- What is the act of pretending to be someone else online?
- Which component is responsible for a robot's movement?
- What is the full form of WLAN?
- What term describes an incident where sensitive data is accessed or stolen without authorisation?
Down
- The process of breaking an image into parts is called?
- What is the shortcut key to insert a track change in MS Word?
- What is the length of IPv6 address?
- Who invented electric motor in 1873?
- Which Indian state government has partnered with Google Cloud to launch a digital platform for agriculture using AI and Beacon technology?
- What small file stores information about user preferences online?
10 Clues: What is the full form of WLAN? • What is the length of IPv6 address? • Who invented electric motor in 1873? • The process of breaking an image into parts is called? • Which component is responsible for a robot's movement? • What is the act of pretending to be someone else online? • What is the shortcut key to insert a track change in MS Word? • ...
Ramsey chapter 4 lesson 2 game 2025-03-06
Across
- every time you spend with credit you add to this
- something owned (that has value) offered as security on a debt; if the debt is not repaid as agreed, the item is forfeited to the lender
- a loan for a fixed amount of money that‘s paid back in monthly installments
- 80% of Americans have this type of payment
- a legal claim against (or right to own) an asset until the debt (loan) is repaid
- the increase in value of a home over time; the difference between the amount owed and what the home could be sold for
- an asset that increases in value over time
- the lender doesn’t require you to put down a security deposit or collateral
Down
- you have to put down a security deposit or use something as collateral.
- credit that automatically renews whenever a payment is made to reduce the debt
- a loan that typically takes 15-30 years to pay off; for a house
- an asset that loses value over time, such as a car that’s worth less every year
- often come with higher rates a fees
- failure to repay a loan on time
- a lender who uses deceptive, unfair, or fraudulent practices on borrowers who are desperate for cash
15 Clues: failure to repay a loan on time • often come with higher rates a fees • 80% of Americans have this type of payment • every time you spend with credit you add to this • an asset that increases in value over time • a loan that typically takes 15-30 years to pay off; for a house • you have to put down a security deposit or use something as collateral. • ...
Bullying 2022-11-15
Across
- It happens online
- someone who helps a victim stand up to a bully
- saying mean things to someone
- doing purposely mean things to someone over and over again
Down
- someone who watches the bullying happen and does nothing
- a just dance coach the bully's other coaches
- purposely leaving someone out of activities
7 Clues: It happens online • saying mean things to someone • purposely leaving someone out of activities • a just dance coach the bully's other coaches • someone who helps a victim stand up to a bully • someone who watches the bullying happen and does nothing • doing purposely mean things to someone over and over again
network 2023-05-01
Across
- the maximum amount of data that can be sent through online methods
- a type of security to prevent access that is hidden through a unique password
- provides service to a large amount of devices while physically existing
- the structure that shows how things are connected
- a user that has higher access than normal users
- security that prevents unauthorized access
Down
- area network (LAN)
- a set of rules for data transmission and receiving
- the user that is capable of receiving information
- a company's singular private network
- address
- virtual connections for the start and end of a network
- interconnected devices that can send information to and from
13 Clues: address • area network (LAN) • a company's singular private network • security that prevents unauthorized access • a user that has higher access than normal users • the user that is capable of receiving information • the structure that shows how things are connected • a set of rules for data transmission and receiving • ...
Personal Safety 2025-09-30
Across
- Safety gear worn on your head.
- A line you don’t cross without permission.
- What you should do at home to keep yourself safe. (2 words)
- A short but powerful word to refuse something.
- Making sound decisions online
- Being mindful of what’s happening around you.
- Having space for yourself, in person and online
Down
- Everyday good judgment that helps you stay safe. (2 words)
- Respecting the distance people need between themselves and others. (2 words)
9 Clues: Making sound decisions online • Safety gear worn on your head. • A line you don’t cross without permission. • Being mindful of what’s happening around you. • A short but powerful word to refuse something. • Having space for yourself, in person and online • Everyday good judgment that helps you stay safe. (2 words) • ...
Security and Viruses 2013-05-01
Across
- a type of grayware, is similar to adware.
- is a program written with malicious intent and sent out by attackers.
- is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- or malware is a file or program other then a virus that is potentially harmful. Grayware or malware is a file or program other then a virus that is potentially harmful.
Down
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- is a self-replicating program that is harmful to networks.
- important in computers and networks
- is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- of death A series of repeated, larger than normal pings that crash the receiving computer.
- Programming language that allows applets to run within a web browser.
- is a software program that displays advertising on your computer.
11 Clues: important in computers and networks • a type of grayware, is similar to adware. • is a self-replicating program that is harmful to networks. • is a software program that displays advertising on your computer. • is a program written with malicious intent and sent out by attackers. • Programming language that allows applets to run within a web browser. • ...
Security IT Crossword 2022-11-14
Across
- Accessible at any time.
- Unauthorised access of data can lead to this.
- The main way data is destroyed by a third-party.
- Accessed only by those with authorisation.
Down
- Teachers giving students higher grades than they actually deserve is an example of this.
- Stolen personal information may lead to the theft of this.
- The abbreviation of an act towards to processing of data
- The main cause of accidental lose of data.
- DDoS attacks lead to a loss of ______
- Maintained so that content is up-to-date and correct.
- Loss of intellectual property can lead to this.
11 Clues: Accessible at any time. • DDoS attacks lead to a loss of ______ • The main cause of accidental lose of data. • Accessed only by those with authorisation. • Unauthorised access of data can lead to this. • Loss of intellectual property can lead to this. • The main way data is destroyed by a third-party. • Maintained so that content is up-to-date and correct. • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- An attack using computer program to guess the correct user credentials
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Protocol used for encryption which protects data in transit
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- Encryption technique used to protect data
- A sequence of words or text used to control access to a computer; similar to a password.
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
- The act of tricking someone into giving up sensitive information
- System(software or hardware) used to manage network security and monitor traffic
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- This testing simulates a full stack attack, probing every possible weakness
- Malicious program that can replicate itself
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
Vocab unidad 2/2 2016-11-15
16 Clues: stop • flight • screen • station • to board • suitcase • itinerary • to travel • door/gate • bathing suit • bathing suit • boarding pass • to take a taxi • carry-on/hand luggage • to go through security • the check-in the luggage
vocabulary 1 2014-10-12
22 Clues: thing • by car • ticket • street • arrival • by foot • suitcase • CD player • buy plane • immigration • travel agent • boarding pass • train station • baggage claim • direct flight • to take a taxi • flight attendant • stopover;layover • recreation center • to land;to touch down • to go through security • currency exchange office
EDTX CONTACTS 2014-12-03
Across
- CATS COORDINATOR
- DISTRICT OFFICE SECURITY MANAGER
- FOIA CONTACT
- HUMAN RESOURCES OFFICER
- ETHICS ADVISOR
- PSC COORDINATOR
- SEXUAL HARASSMENT CONTACT
- INDIAN COUNTRY CONTACT
- PLANO VW COORDINATOR
Down
- CRIMINAL CHIEF
- IT SUPERVISOR
- FLU PARALEGAL
- SHERMAN LEGAL ASSISTANT
- CRISIS MANAGEMENT COORDINATOR
- RECORDS COMPLIANCE OFFICER
- PLANO AIC
- PUBLIC CORRUPTION CONTACT
- TYLER GJ COORDINATOR
- TYLER RECEPTIONIST
- TEXARKANA AUSA
20 Clues: PLANO AIC • FOIA CONTACT • IT SUPERVISOR • FLU PARALEGAL • CRIMINAL CHIEF • ETHICS ADVISOR • TEXARKANA AUSA • PSC COORDINATOR • CATS COORDINATOR • TYLER RECEPTIONIST • TYLER GJ COORDINATOR • PLANO VW COORDINATOR • INDIAN COUNTRY CONTACT • SHERMAN LEGAL ASSISTANT • HUMAN RESOURCES OFFICER • PUBLIC CORRUPTION CONTACT • SEXUAL HARASSMENT CONTACT • RECORDS COMPLIANCE OFFICER • ...
commonly confused words 2022-04-07
20 Clues: place • simple • beyond • hurled • gleamed • revealed • at the time • writing paper • without noise • flying vehicle • head of school • a great extent • rule of conduct • a fixed position • a part of something • used in a comparison • attentive of accuracy • possessive form of they • contraction of they are • quiet order and security
Spanish II Airport 1 2022-03-31
28 Clues: seat • gate • first • scale • plane • screen • flight • second • counter • airline • airport • customs • arrival • suitcase • carry on • then (l) • then (e) • passenger • departure • luggage tag • ticket (bi) • destination • ticket (bo) • boarding pass • baggage claim • security check • no smoking section • porter/suitcase guy
3EMES JOBS CROSSWORD PUZZLE corrected 2023-09-19
26 Clues: kiné • marin • boucher • traiteur • douanier • plombier • jardinier • comptable • grossiste • boulanger • directeur • bijoutier • chirurgien • teinturier • réparateur • infirmière • secouriste • sage-femme • pharmacien • couturière • hôtesse de l'air • agent-immobilier • chauffeur routier • agent de sécurité • présentateur météo • marchand de poisson
13th Week Words 2023-12-23
30 Clues: bina • film • hasta • sebze • mimar • sanat • mektup • misket • musluk • kamyon • mobilya • uçurtma • muhabir • madenci • satranç • marangoz • yönetmen • dağıtmak • dedektif • güvenlik • tesisatçı • heykeltraş • diş hekimi • oyuncak ayı • film çekmek • tamir etmek • tedavi etmek • oyuncak bebek • tasarım yapmak • oyuncak kutusu
casino 2024-04-03
21 Clues: Hosts • Cashier • Concerts • card games • Tech Smart • Advertising • pocket aces • lake gaming • on the shore • Texas Holdem • place to eat • sport betting • leads the way • fun in the sun • rest your head • varifies money • gaming machines • Safety Officers • Keeps Place Clean • a place of gaming • Helps Employees with questions.
the Oaks 2024-07-21
Across
- VERTICAL TRANSPORT
- BUILDING WING
- BINGO VENUE
- NEW DINING OPTION
- WORKOUT PLAACE
- APPROPRIATE TREE
- INTERNET VENDOR
- FAVORITE RESTAURANT TRIP
- TRANSPORT DRIVER
- CHEF
- front desk
Down
- RESIDENT APP
- APPROPIATE TREE
- DINING CHIEF
- KEEPING US SAFR
- MONTHLY MEETING
- WEEKEND ACTVITY
- RESIDENT GROUP
- Common RESIDENT NAME
- POPULAR COMMITTEE
- FUN GAME
- MEETING PLACE
- TRANSPOTATION SUV
23 Clues: CHEF • FUN GAME • front desk • BINGO VENUE • RESIDENT APP • DINING CHIEF • BUILDING WING • MEETING PLACE • RESIDENT GROUP • WORKOUT PLAACE • APPROPIATE TREE • KEEPING US SAFR • MONTHLY MEETING • WEEKEND ACTVITY • INTERNET VENDOR • APPROPRIATE TREE • TRANSPORT DRIVER • NEW DINING OPTION • POPULAR COMMITTEE • TRANSPOTATION SUV • VERTICAL TRANSPORT • Common RESIDENT NAME • FAVORITE RESTAURANT TRIP
Technology and digital life 2025-07-26
Across
- – qidirmoq
- – batareya
- – ijtimoiy tarmoq
- – bulutli tizim
- – yuklab olmoq
- – internet
- – ilova
- – sun’iy intellekt
- – innovatsiya
- – dasturiy ta’minot
- – translatsiya qilmoq
- – ulanish
- – yangilash
- – veb-sayt
- – Wi-Fi
- – texnologiya
Down
- – akkaunt
- – yuklamoq
- – uskuna
- – ekran
- – smartfon
- – xavfsizlik
- – ma’lumot
- – raqamli
- – parol
- – noutbuk
- – virtual
- – elektron pochta
- – onlayn
- – qurilma
30 Clues: – ekran • – ilova • – parol • – Wi-Fi • – uskuna • – onlayn • – akkaunt • – raqamli • – noutbuk • – virtual • – ulanish • – qurilma • – qidirmoq • – yuklamoq • – smartfon • – batareya • – ma’lumot • – internet • – veb-sayt • – yangilash • – xavfsizlik • – innovatsiya • – texnologiya • – yuklab olmoq • – bulutli tizim • – ijtimoiy tarmoq • – elektron pochta • – sun’iy intellekt • – dasturiy ta’minot • – translatsiya qilmoq
Historical Treaties 2024-12-11
Across
- War of 1812.
- Spanish succession.
- Ottoman empire.
- Antarctic treaty.
- Israeli-Palestinian.
- EU foundation.
- WWII aftermath.
- Balkan wars.
- Thirty Years' War.
- First Opium War.
Down
- Napoleonic end.
- WWI peace.
- International law.
- Climate protocol.
- Spain-Portugal divide.
- Bosnian peace.
- European security.
- Soviet-Polish peace.
- Korean armistice.
- Revolutionary War.
- Conservation pact.
21 Clues: WWI peace. • War of 1812. • Balkan wars. • Bosnian peace. • EU foundation. • Napoleonic end. • Ottoman empire. • WWII aftermath. • First Opium War. • Climate protocol. • Antarctic treaty. • Korean armistice. • International law. • European security. • Revolutionary War. • Conservation pact. • Thirty Years' War. • Spanish succession. • Israeli-Palestinian. • Soviet-Polish peace. • Spain-Portugal divide.
Cyber 2024-09-18
Chapter 8 Vocabulary 2014-11-18
Across
- amendment that established the order of succession to the presidency and spelled out what happens when the vice presidency becomes vacant
- ______ vote; the official vote for president and vice president by electors in each state
- National Security _______; helps coordinate American military and foreign policy
- amendment that requires that the electors cast separate ballots for president and vice president
- _____ secretary; one of the president’s top assistants who is in charge of media relations
- salary
- member of a party chosen in each state to formally elect the president and vice president
Down
- secretaries of the executive departments, the vice president, and other top officials that help the president make decisions and policy
- amendment that secured the traditional presidential limitation of two terms
- presidential _______; the order in which officials fill the office of present in case of a vacancy
- central _______; Office of Management and Budget’s review of all legislative proposals that executive agencies prepare
- Office of ______ and Budget; prepares the national budget that the president proposes to Congress each year
- ______ Office of the President; consists of individuals and agencies that directly assist the president
- National Security ______; director of the National Security Council staff
- the release of secret information by anonymous government officials to the media
15 Clues: salary • National Security ______; director of the National Security Council staff • amendment that secured the traditional presidential limitation of two terms • National Security _______; helps coordinate American military and foreign policy • the release of secret information by anonymous government officials to the media • ...
Team Five 2023-08-25
Across
- collection of investments owned and managed as a collective whole with specific investment goals in mind
- prolonged period of falling stock prices, usually marked by a decline of 20% or more.
- A rise in the prices of goods and services, often equated with loss of purchasing power.
- computer system that offers information to investment data service, news feeds, and trade execution services
- measurement of changes in stock market conditions based on the average performance of 500 widely held common stocks
- a financial professional who buys and sells securities on behalf of their clients
Down
- long term investment representing ownership in a company
- a security that you own the security with the expectation that the stock will rise in value in the future
- portion of a company's profit paid to common and preferred shareholders
- fixed amount of money the issuer agrees to pay and most often a percentage of the face value of the bond.
- A security's trading high point over the last 52-week period
- unit or piece of ownership in an investment
- borrowing a security from your brokerage whose price you think will fall and selling it on the open market
- owner of common or preferred stock of a corporation
- ability to have ready access to invested money, easily converted into cash
15 Clues: unit or piece of ownership in an investment • owner of common or preferred stock of a corporation • long term investment representing ownership in a company • A security's trading high point over the last 52-week period • portion of a company's profit paid to common and preferred shareholders • ...
MVLA newspaper crossword 1 2024-05-14
Across
- the number of gaming PCs in the cyber libary
- one of two houses that has never won the house championship
- the brand of TV in most of the classrooms
- the state that our Lego Robotics team went to for the national competition in 2023
- Grandezza's mascot
Down
- the room across from the nurses office
- Mrs. Binkley's room
- the house that won in the first year
- the male teacher who accompanied the 2024 state NHD team to Albquerque
9 Clues: Grandezza's mascot • Mrs. Binkley's room • the house that won in the first year • the room across from the nurses office • the brand of TV in most of the classrooms • the number of gaming PCs in the cyber libary • one of two houses that has never won the house championship • the male teacher who accompanied the 2024 state NHD team to Albquerque • ...
Wordfrenzy 2025-01-08
Across
- Street , It’s the world’s biggest stock exchange, based in Manhattan
- , Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
- , A stock that goes up and down quickly
- Selling , Selling a security you don't own to buy it back later
- , A natural or legal person who holds shares in a company
Down
- , The ability to buy or sell assets quickly in large quantities
- , A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
- , An intermediary in charge of placing buy and sell orders on the markets
- , A very sharp rise of a market
- , The earnings a company equally shared among the shareholders in proportion to the number of shares they hold
10 Clues: , A very sharp rise of a market • , A stock that goes up and down quickly • , A natural or legal person who holds shares in a company • , The ability to buy or sell assets quickly in large quantities • Selling , Selling a security you don't own to buy it back later • Street , It’s the world’s biggest stock exchange, based in Manhattan • ...
internet privacy 2025-05-18
Across
- Private Network encrypts traffic between devices and the internetand protects sensitive data. Users can bypass geographic restrictions as internet traffic is routed.
- This is an individual who gains unauthorized access and exploits weaknesses in the information.
- Loading the data into unreadable format by applying an algorithm
- It is the identity verification before granting access. Authentication enhances the security and privacy of systems. Common methods include passwords, biometrics (fingerprints or facial recognition), and security tokens. Most widely use Multi-factor authentication (MFA) enhances security by requiring more than one form of verification.
Down
- a hidden way of bypassing normal authentication or encryption in a system. It is an illegal way to gain unauthorized access by bypassing the standard security methods. Backdoors can be installed by malware or intentionally left for debugging. It can control the system remotely and poses risks to data.
- The monitoring of incoming and outgoing traffic based on security rules that already had been determined. The system is a barrier between trusted and untrusted networks. it is based on both hardware and software, which analyzes data packets if they should be allowed or blocked. The sensitive information is secured.
- A broad category 9 of malicious software to damage computer systems.
- tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses
8 Clues: Loading the data into unreadable format by applying an algorithm • A broad category 9 of malicious software to damage computer systems. • This is an individual who gains unauthorized access and exploits weaknesses in the information. • tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses • ...
Abiotic not living 2025-01-27
13 Clues: view • Theory • living • Theory • resource • Security • extraction • not living • populations • Water Scarcity • Climate Change • Water Scarcity • Greenhouse Gases
Ch. 8 Vocabulary 2023-02-02
Across
- graphic mark or emblem to aid and promote brand
- media and content that use a combination of different content forms
- ____ networking site is an online platform that focuses on building relations
- ___ marketing as a means of communicating commercial messages
- a sign, name or symbol used to identify your business
Down
- ____ name defines a realm of administrative autonomy
- _____ hosting is a service that allow your salon to be on the internet
- global system of interconnected computers
- ____ ___ engine optimization improving your location on internet searches
- a memorable motto or phrase use by a company
- ____ platform an environment for ad delivery
- of mouth passing of information from person to person
12 Clues: global system of interconnected computers • a memorable motto or phrase use by a company • ____ platform an environment for ad delivery • graphic mark or emblem to aid and promote brand • ____ name defines a realm of administrative autonomy • of mouth passing of information from person to person • a sign, name or symbol used to identify your business • ...
Bullying 2017-05-15
Across
- People who have been bullied are at a great risk of____ problems
- This is a form of verbal bullying
- This is a form of physical bullying
- Girls tend to bully in____
- Boy bullies tend to be more_____
- Cyber bullying is bullying that takes place using_____
Down
- Over 3.2____ students are victims of bullying each year
- This is a form of social bullying
- About 160,000 students____ school everyday because they are being bullied
- 71% of students report that bullying is a_____ at their school
- People who watch the bullying occur and don't do anything about it
- ___ in 10 students drop out of school each year because of repeated bullying
12 Clues: Girls tend to bully in____ • Boy bullies tend to be more_____ • This is a form of verbal bullying • This is a form of social bullying • This is a form of physical bullying • Cyber bullying is bullying that takes place using_____ • Over 3.2____ students are victims of bullying each year • 71% of students report that bullying is a_____ at their school • ...
Stay safe online. 2022-02-15
Across
- Cyber safety should include the use of your ________ too.
- You should use the strictest privacy settings when creating accounts and post on ________ ________ .
- smart way to save data from your hard drive to another source
- Use internet sites with the highest ______ settings
- Keep your computers and mobile devices up to _______.
- A ____________ password is at least eight characters in length
Down
- What you put online lasts ______
- Do not post _____ information online
- Your digital trail of everything you do online
- Do not share it with anyone
- Change your password if you think your account has been ________________.
- dangerous emails that may have been sent from your inbox to others
12 Clues: Do not share it with anyone • What you put online lasts ______ • Do not post _____ information online • Your digital trail of everything you do online • Use internet sites with the highest ______ settings • Keep your computers and mobile devices up to _______. • Cyber safety should include the use of your ________ too. • ...
PELANGGARAN HAK DAN PENGINGKARAN KEWAJIBAN 2025-10-17
Across
- Pertentangan atau perselisihan antara dua pihak atau lebih
- Perlakuan buruk, penganiayaan, atau perburuan yang dilakukan secara sistematis dan sewenang-wenang terhadap seorang individu atau kelompok
- Hak Asasi Manusia
- Memaksa seseorang melakukan atau tidak melakukan sesuatu sesuai kehendak si pelaku
- Perbuatan yang melanggar hukum atau hak
- Tindakan yang harus dilakukan seseorang dengan penuh tanggung jawab
Down
- Ketidakmampuan atau ketidakinginan menerima perbedaan dari orang atau kelompok lain
- Sebuah dimensi terkomputerisasi dimana kita dapat dengan bebas memindahkan informasi dan mengakses data yang berupa audio dan visual
- Tindakan tidak melaksanakan kewajiban sebagai warga negara
- Memperlakukan seseorang atau kelompok secara berbeda dan tidak adil
- Sesuatu yang seharusnya diterima atau dilakukan oleh seseorang
- Perundungan
12 Clues: Perundungan • Hak Asasi Manusia • Perbuatan yang melanggar hukum atau hak • Pertentangan atau perselisihan antara dua pihak atau lebih • Tindakan tidak melaksanakan kewajiban sebagai warga negara • Sesuatu yang seharusnya diterima atau dilakukan oleh seseorang • Memperlakukan seseorang atau kelompok secara berbeda dan tidak adil • ...
Yo Recuerdo Worksheet Crossword 2021-09-20
INFORMATION TECHNOLOGY 2017-05-08
Vocabulary - Unit 3 2023-12-05
Safety and Security 2021-07-20
12 Clues: Health risks • Jack sparrow • Favourite module • The Tasmanian devil • Online safety drill • Rare but catastrophic • Jail on a cruise ship • Cruise Recent covid case • Dr. Liu's favourite fruit • "Rose, promise me you'll survive" • Sound of the emergency alarm on cruise • Sound of the emergency alarm on cruise
Security and privacy 2025-12-09
Across
- Laws, considered collectively, that may protect user data (e.g., GDPR).
- Not having official permission or approval (Past Participle/Adjective).
- The state of being free from danger or threat; protection.
- A qualification, achievement, personal quality, or user ID used to indicate suitability or access rights.
- The assurance that systems and data are accessible by authorized users when needed.
- The act, state, or right of possessing something (e.g., data).
Down
- Intended to be kept secret (Adjective).
- The action or process of identifying the presence of something concealed (e.g., a virus).
- The right to keep personal matters and relationships secret.
- An unwelcome intrusion into another's domain or privacy.
- Software that blocks access to certain data or websites.
11 Clues: Intended to be kept secret (Adjective). • An unwelcome intrusion into another's domain or privacy. • Software that blocks access to certain data or websites. • The state of being free from danger or threat; protection. • The right to keep personal matters and relationships secret. • The act, state, or right of possessing something (e.g., data). • ...
Finance Jargon 2018-03-13
Across
- The equity investors in a leveraged buy-out.
- The process whereby a single bank issues letters of credit and relies on an indemnity from a syndicate of banks if the letters of credit are called.
- An entity that holds legal title to someone else's assets.
- A provision in a facility agreement that allows the borrower to elect whether it wants to pay cash interest or capitalise the interest.
- The order in which payments are allocated or applied.
- A type of security aimed at avoiding administration risk.
- The percentage amount added to the base rate applicable to a floating rate loan.
- The department in a bank typically responsible for agreeing to make financing available.
- An acronym for legislation to combat tax-evasion in the USA.
- Property that is subject to a security interest.
- An exchange of payment streams between two parties, often used to mitigate interest rate risk.
Down
- A repayment obligation that is spread over a period of time through a series of payments is said to __________.
- The amount outstanding on a loan.
- Process by which a lender demands repayment of an outstanding loan before the due date.
- The total amount a lender has agreed to lend under a credit facility.
- When you add accrued interest to the principal outstanding of a loan you are said to __________ the interest.
- A screen rate used to calculate interest on a floating rate loan.
- An acronym for a specific type of security interest over personal property available to asset financiers.
- A statement of legal conclusions based on certain assumed facts and subject to qualifications.
- Abbreviation used to describe the costs incurred to acquire a new asset or improve an asset.
20 Clues: The amount outstanding on a loan. • The equity investors in a leveraged buy-out. • Property that is subject to a security interest. • The order in which payments are allocated or applied. • A type of security aimed at avoiding administration risk. • An entity that holds legal title to someone else's assets. • ...
DD Resources HIPAA Crossword 2015-12-03
Across
- The third largest mammal on Earth.
- All faxes sent with PHI must have a ___ ______.
- This person is DD Resources’ Security Official.
- The minimum PHI needed to accomplish an intended purpose. (2 words)
- What does the first "A" in HIPAA stand for?
- What document is given to Consumers that outlines the use and disclosure of their PHI? (4 words)
- Any PHI that maintained or transmitted electronically is __________.
- The impermissible use or disclosure of PHI/EPHI released verbally, in writing or transmitted electronically is a ____________________.
Down
- What does the "H" in HIPAA stand for?
- The __________ Rule establishes and protects the Confidentiality, Integrity and Availability of EPHI.
- What Does The second "A" in HIPAA stand for?
- Protected Health Information (PHI) can include paper records, _____________ __________________, and information that is transmitted and maintained in any electronic format.
- The _____________ Rule protects an individual’s rights, limits the uses and disclosures of PHI and sets administrative rules.
- What does the "P" in HIPAA stand for?
- out Files must be ______ ___, whenever removed from their designated location.
- What must be completed and signed before any PHI can be released?
- The Health Insurance Portability and Accountability Act of 1996.
- Consumers have the right to make ___________ about the privacy and security of their PHI/EPHI without fear of retaliation.
- HIPAA is not just a good idea. It is the ___.
- What does the "I" in HIPAA stand for?
- Who is responsible for keeping Consumer information confidential?
- Computer ___ should never be shared or posted.
- How does confidential documentation need to be disposed of?
- Any health information received or maintained by DD Resources is ________.
24 Clues: The third largest mammal on Earth. • What does the "H" in HIPAA stand for? • What does the "P" in HIPAA stand for? • What does the "I" in HIPAA stand for? • What does the first "A" in HIPAA stand for? • What Does The second "A" in HIPAA stand for? • HIPAA is not just a good idea. It is the ___. • Computer ___ should never be shared or posted. • ...
Derivative 2023-02-08
Across
- Where can you turn for further information on classifications?
- What is one of the only two authorized sources of classified guidance?
- Who do you contact to discuss your belief a document is improperly classified?
- If a document is marked improperly, you may be subject to?
- What are you expected to do when you believe information is improperly classified?
- During a challenge the classifier has how many days to submit their initial response?
- The standard period to be applied to classified is the classification guide provides no instruction from the OCA should be calculated for _________ years.
- Each classified document should have a Classification _______ ________ to identify who and from what document it was derived from and what the destruction date is.
- Collateral Classification that if unauthorized release could reasonably be expected to cause damage to national security is?
- The marking that appears at the top and bottom of each page is what marking?
- What is the marking called the is to appear at the beginning of each paragraph?
Down
- Collateral Classification that if unauthorized release could reasonably be expected to cause exceptionally grave damage to national security is?
- Individual that has been designated in writing and is charged with making the initial determination of classified is a _______ classification authority.
- The second of only two authorized sources of classified guidance.
- The control marking “FOUO” is what type of control?
- An individual responsible to apply the two authorized sources to documents are called ______ classifiers.
- Derivative Classifiers are required to complete training _________.
- The standards for classified marking is set out in _______ _______ 13526.
- Collateral Classification that if unauthorized release could reasonably be expected to cause serious damage to national security is?
- Classification markings are required on document, blogs, chat rooms, and ________.
20 Clues: The control marking “FOUO” is what type of control? • If a document is marked improperly, you may be subject to? • Where can you turn for further information on classifications? • The second of only two authorized sources of classified guidance. • Derivative Classifiers are required to complete training _________. • ...
Economies Crossword 2022-10-04
Across
- a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.
- retirement savings plans that serve employees of public schools and tax-exempt organizations
- a savings product that earns interest on a lump sum for a fixed period of time.
- a security that represents the ownership of a fraction of the issuing corporation.
- a consistent means of measuring the value of things
- an interest-bearing deposit account held at a bank or other financial institution.
- a debt security, similar to an IOU.
- a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
- A store of value is an asset, commodity, or currency that maintains its value without depreciating.
- a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
- Every purchase you made over time.
Down
- a number from 300 to 850 that rates a consumer’s creditworthniess
- a retirement savings and investing plan that employers offer.
- is a detailed breakdown of your credit history prepared by a credit bureau.
- type of financial cooperative that provides traditional banking services.
- grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
- an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
- a type of tax-advantaged
- a financial institution that is licensed to accept checking and savings deposits and make loans
- is a risk management strategy that mixes a wide variety of investments within a portfolio.
20 Clues: a type of tax-advantaged • Every purchase you made over time. • a debt security, similar to an IOU. • a consistent means of measuring the value of things • a retirement savings and investing plan that employers offer. • a number from 300 to 850 that rates a consumer’s creditworthniess • type of financial cooperative that provides traditional banking services. • ...
Financial Math 2021-09-20
Across
- amount of sales produced by that employee
- care covers only the employee
- depends pn the social security percentage and the
- paid for by fica taxes
- the hourly wage an employee receive for any overtime hours
- typically benefits are in forms
- addition to your salary
- care for sick children or newborns
- offered as an employee benefit
- you work at a job covered by social security you must pay
- most part-time jobs that have students hold pay a set amount for each hour they work
- compensation that an employee receives from an employer
- overtime rate could be there three times the hourly rate
- for each item they complete
- paid for by fica taxes
- fixed period of employment
- businesses pay their employees twice a month or
Down
- is unique nine digits
- another benefit that is required by the government
- are paid a certain amount
- overtime hours calculated as 1.5 times the regular hourly rate
- mean their paycheck amount are automatically deposited electronically into their bank
- total pay which is the sum of your hourly and your overtime pay
- government program that offers benefits
- required the employee to work only a specific number of hours per week
- they receive 26 paychecks per year
- rate two times the hourly rate
- president franklin d. roosvelt started social security in 1935
- money that employees or other receive base on sales
- care cover all members of the immediate family for health care bills
- combined into paid time off
- an insurance program available through the u.s
- paid holiday time
- paid sick time
- childcare leave;and more
- extra hours are more than the full-time number of hours
- there are federal and state laws on the lowest hourly rate
37 Clues: paid sick time • paid holiday time • is unique nine digits • paid for by fica taxes • paid for by fica taxes • addition to your salary • childcare leave;and more • are paid a certain amount • fixed period of employment • combined into paid time off • for each item they complete • care covers only the employee • rate two times the hourly rate • offered as an employee benefit • ...
Personal Finance Vocabulary 2022-10-19
Across
- a debt security
- an interest-bearing deposit account held at a bank or other financial institution
- the interest you earn on interest
- what employees earn before taxes, benefits and other payroll deductions are withheld from their wages
- the amount an employee receives after all deductions and taxes are taken out
- a statement of all transactions made between entities
- a financial institution that is licensed to accept checking and savings deposits and make loans
- a loan that requires an asset as collateral
- a type of short-term borrowing where a lender will extend high-interest credit based on your income
- predicts how likely you are to pay back a loan on time
- a security that represents the ownership of a fraction of the issuing corporation
- a company that pools money from many investors and invests the money in securities
Down
- a quick and easy method of calculating the interest charge on a loan
- the process of shifting an economy away from a single income source toward multiple sources from a growing range of sectors and markets
- an interest rate on a loan or security that fluctuates over time because it is based on an underlying benchmark interest rate or index that changes periodically
- a savings account that holds a fixed amount of money for a fixed period of time
- a statement that has information about your credit activity and current credit situation
- profits gained from the sale of capital assets
- a financial institution that offers services like banks but is run by its members
- an unchanging rate charged on a liability, such as a loan or mortgage
20 Clues: a debt security • the interest you earn on interest • a loan that requires an asset as collateral • profits gained from the sale of capital assets • a statement of all transactions made between entities • predicts how likely you are to pay back a loan on time • a quick and easy method of calculating the interest charge on a loan • ...
SOP Engineering - Keamanan Penyediaan Daya Listrik (PM-ASRI/ENG-04) dan SOP Security - Penanganan Saat Kondisi Listrik Padam (PM-ASRI/SEC-02) 2019-08-04
Across
- Spv GEA dan TR bertugas untuk …. penanganan listrik padam.
- Jika terdapat insiden (injured) maka wajib dibuatkan dokumen …..
- Tindakan yang diambil jika terdapat kondisi ada orang yang terjebak di dalam lift.
- Jabatan pada Dept Engineering yang bertanggung jawab untuk memantau pemakaian beban listrik, memeriksa kebutuhan beban listrik, memeriksa tegangan listrik, dan memeriksa kesiapan genset (rutin).
- Surat ….. dari PLN akan diberikan TR kepada pihak tenant jika terdapat informasi pemadaman listrik.
- Security, Spv GEA, Spv TR, Engineering melakukan ….. keliling ke seluruh area Mall dan Kawasan untuk memastikan situasi kondusif, aman dan terkendali.
- Laporan/ BAK/ analisa terhadap kejadian listrik padam akan dibuat oleh ….. Engineering dan diserahkan kepada Manager dan GM Ops.
- Khusus untuk ….. apabila pada keadaan normal, ada kebutuhan kenaikan beban yang cukup significant (>300 KW) harus diinformasikan ke pihak penyedia supply listrik.
- Jika power sudah normal, maka genset akan segera digantikan kembali dengan power listrik dari …..
Down
- Kondisi dimana supply listrik kebutuhan mall terpenuhi.
- Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall.
- Saat perpindahan listrik PLN ke genset, Spv Engineering akan melakukan pemantauan beban listrik (serta melakukan ….. semua peralatan).
- Kondisi dimana supply listrik tidak ada/ mati.
- Security akan menghubungi pihak ….. jika terdapat kondisi listrik padam.
- Staff/ Spv Engineering akan mencari …. listrik padam dan lamanya listrik padam.
- Salah satu hal yang dipantau dari pemakaian beban listrik.
- Pihak Security juga wajib membuat BAK listrik ….. setelah kejadian.
- Untuk listrik padam ….., pihak pengelola melalui Dept. Tenant Relations akan memberikan informasi ke pihak tenant terlebih dahulu.
- Jika listrik sudah normal/ menyala maka akan diinfomasikan oleh GEA via …..
- Mesin untuk membantu back up power jika terdapat kondisi listrik padam.
20 Clues: Kondisi dimana supply listrik tidak ada/ mati. • Kondisi dimana supply listrik kebutuhan mall terpenuhi. • Spv GEA dan TR bertugas untuk …. penanganan listrik padam. • Salah satu hal yang dipantau dari pemakaian beban listrik. • Jika terdapat insiden (injured) maka wajib dibuatkan dokumen ….. • Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall. • ...
Investment Unit 2024-03-20
Across
- when the market is trending upward
- the size of a company in the stock market
- required minimum distribution
- dollar cost averaging
- a retirement account that you put money in after tax
- federal insurance contributions act
- for long term goals
- the return in 2023 for S&P 500 (percentage)
- Security the largest social programs in the United States, providing retirement
- measures the price performance of a basket of securities
- price to earning ratio
- the max amount you can contribute to your ira and rothira annually
- when the market is trending downward
- for short term goals
- currencies that are created and backed by the government, but not tied or backed by the value of any physical commodity
- out of the account annually
- the age to collect social security benefits
- a type of security under which the issuer owes the holder a debt, and is obliged
Down
- a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
- never lose money (rule)
- virtual currency
- a retirement account that you put money in before tax
- the increase in the value of an asset, usually recognized when it is sold for a higher amount
- 1.45% is deducted from your paycheck monthly
- a series of letters used to represent a companies stock
- the age you can start investing
- a retirement system that state employees and trades pay into
- a piece of a company in the stockmarket
- Far worse shape than Social Security
- never forget rule one
- the distribution of some of a company's earnings to a class of its shareholders
- Distribution When you turn 73, you must take the
- inital price offering of a stock
33 Clues: virtual currency • for long term goals • for short term goals • dollar cost averaging • never forget rule one • price to earning ratio • never lose money (rule) • out of the account annually • required minimum distribution • the age you can start investing • inital price offering of a stock • when the market is trending upward • federal insurance contributions act • ...
RU ITEC411 Chapter 5 2024-11-24
Across
- a written form of defamation
- the 2010 act that aimed to combat libel tourism
- the act that came after the September 11th attacks that increased surveillance
- acronym for the 1984 act that aimed to combat hacking by punishing people who accessed a computer without proper authorization
- technique attackers use to send people to fake web sites pretending to be the real one to steal personal information
- the concept of hacking with the purpose of a political or social cause
- the action of someone exposing wrongdoing, usually by the government
- word that comes before hat hacker, this type of hacker hacks with good intent to expose vulnerabilities and strengthen a system's security
Down
- this can be used to protect personal information by scrambling it up
- when you receive a text message from a scammer pretending to be a company to steal your personal information
- suppressing or prohibiting something from being shared
- when you receive an email from a scammer pretending to be a company to steal your personal information
- 2008 computer worm that caused damage to Iran's nuclear program
- this retailer was victim to a major security breach in fall of 2013 where over 70 million customer records were stolen
- intellectual property law that gives protection from unauthorized use or distribution and gives ownership to creative works
- physical and behavioral features of a person
- acronym for the organization that manages trade rules globally
- when you receive a phone call from a scammer pretending to be a company to steal your personal information
- a network security feature that restricts and monitors traffic
- type of computer malware that has the ability to spread from computer to computer by itself
20 Clues: a written form of defamation • physical and behavioral features of a person • the 2010 act that aimed to combat libel tourism • suppressing or prohibiting something from being shared • acronym for the organization that manages trade rules globally • a network security feature that restricts and monitors traffic • ...
Investing Crossword Answers & Clues 2025-03-25
Across
- buying and selling stocks for quick money
- if you leave your company you can roll over your 401k funds to a new investment account
- a sum of money saved for a particular purpose
- buying and investing long term
- a collection of stocks, bonds, or other assets that trades on a stock exchange
- a security that represents the ownership of a fraction of the corporation
- the process of offering shares of a private corporation to the public in a new stock issuance
- age you receive full social security benefits
- the total value of a company’s stock
- ceo of berkshire hathaway
- represents the loan of a buyer, payed back at a stated interest rate
Down
- pain is longer than the thrill
- having worked for a certain amount of time with a company, to own 100% of the money your company has matched in your 401k
- the increase in value of an asset, usually recognized when it is sold for a higher amount
- stock prices are rising
- stock prices are declining
- the distribution of some of a company's earnings to a class of its shareholders
- take money from investors and purchase a portfolio that may include stocks, bonds, or a combination of assets
- measures the price performance of a basket of securities
- a strategy in which you invest your money in equal amounts, at regular intervals
- social security and medicare taxes
- the availability of cash or the ease in which an asset an asset can be converted to cash
- government medical health plan
- takes cash from a large group of investors and invests in stocks, bonds, and other securities
- investing all the money you have available at that given time, and putting it into the market
25 Clues: stock prices are rising • ceo of berkshire hathaway • stock prices are declining • pain is longer than the thrill • buying and investing long term • government medical health plan • social security and medicare taxes • the total value of a company’s stock • buying and selling stocks for quick money • a sum of money saved for a particular purpose • ...
Financial market 2025-05-15
Across
- — The value of an ownership interest in a company, typically in the form of stocks.
- — An entity that develops, registers, and sells securities to finance its operations.
- — A person or institution that allocates capital with the expectation of receiving financial returns.
- — A type of security that represents ownership in a corporation.
- — Money placed in a bank or financial institution for safekeeping or earning interest.
- — A public authority or agency responsible for overseeing and enforcing financial market laws.
- — An organized marketplace where securities, commodities, or other financial instruments are traded.
- — A fixed-income security representing a loan made by an investor to a borrower.
- — A tradable financial asset, such as stocks, bonds, or options.
- — A contract that provides financial protection against specific risks in exchange for premium payments.
Down
- — A system or place where financial instruments are bought and sold.
- — The income return on an investment, expressed as a percentage of its cost or market value.
- — The rate at which the general level of prices for goods and services rises over time.
- — The provision of money, goods, or services with the expectation of future repayment.
- — The ease with which an asset can be converted into cash without affecting its price.
- — The possibility of losing some or all of the original investment.
- — A system of money in general use in a particular country.
- — An intermediary who facilitates transactions between buyers and sellers in financial markets.
- — A financial derivative that gives the holder the right, but not the obligation, to buy or sell an asset.
- — Financial assets or the financial value of assets used to fund operations and growth.
20 Clues: — A system of money in general use in a particular country. • — A type of security that represents ownership in a corporation. • — A tradable financial asset, such as stocks, bonds, or options. • — The possibility of losing some or all of the original investment. • — A system or place where financial instruments are bought and sold. • ...
Financial Fundamentals 2025-05-27
Across
- Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
- A type of debt security issued by a company or government to raise capital
- Employment taxes such as Social Security
- A strategy where an investor spreads their investments across a variety of different assets to reduce overall risk
- Regulates business activities within own boundaries; intrastate commerce
- Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
- Ability to convert an investment to cash for full value; includes items like demand deposits, CDs, Treasury bills, and money market funds
- Corporation and other organizations sell items, pay expenses, and borrow to finance business operations
- Tax based on land and buildings
- The debts or financial obligations that a person or company owes to others
Down
- The cost of borrowing money
- Regulates banks
- Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
- Tax where everyone pays the same amount
- Insures bank deposits
- Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
- Regulates stock markets
- Tax based on purchases
- Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
- A rise in the general level of prices (consumer price index)
- _____ are consumers and households who make purchases, save, invest, and pay taxes
- Where the tax rate increases along with the amount
- County boards; city or town councils; services for an orderly society
- Potential of an investment
24 Clues: Regulates banks • Insures bank deposits • Tax based on purchases • Regulates stock markets • Potential of an investment • The cost of borrowing money • Tax based on land and buildings • Tax where everyone pays the same amount • Employment taxes such as Social Security • Where the tax rate increases along with the amount • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attack that uses a list of commonly used words or phrases to guess a password.
- Injecting malicious scripts into webpages viewed by other users
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Matching known patterns of threats against security event data to find potential matches.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Policy-based accept or deny of network traffic.
Down
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Process of transforming information into a scrambled format to secure it.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Code examination performed without running the malicious program.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Cloud-based vulnerability management platform with scanning and reporting.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Attacks that overwhelm a target system or network with a flood of traffic
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
Industrial Security Concept Crossword Puzzle 2025-10-25
Across
- – minimizing the probability of the potential loss
- – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
- – sound and good judgement to arrive at wise and timely decision
- - is the potential that a chosen action or activity will lead to a loss
- – being watchful in spotting violator, a person, a vehicle or an accident
- – moving the financial impact of the potential loss over to an insurance company
- – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
- – an indication of impending danger or harm
- – Removing the risk totally from the business
- – includes any person who offers or renders personal service to watch or secure
- – it is a state or quality of being free from fear or danger, assurance, certainty.
- – spreading the risk through decentralization to limit the impact of the potential loss
Down
- – it deters man from committing acts of fear being caught, charged in court or get dismissed
- – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
- - it uses barriers being placed between the potential intruder and the object/matter to be protected
- – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
- – a person who does detective work for hire, reward or commission
- – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
- – a chance of being injured or harmed
- – ability to deal with others successfully without offending
20 Clues: – a chance of being injured or harmed • – an indication of impending danger or harm • – Removing the risk totally from the business • – minimizing the probability of the potential loss • – ability to deal with others successfully without offending • – sound and good judgement to arrive at wise and timely decision • ...
Unit2-word_file 2014-12-24
12 Clues: Blut • Dieb • Alarm • Polizei • Fußabdruck • Fingerabdruck • stehlen/ klauen • festnehmen/ verhaften • Sicherheit/ Wachmannschaft • Polizeimeister/ Wachtmeister • Wachposten/ Wärter/ Posten/ Wachmann • Waffe/ Pistole/ Revolver/ Schusswaffe
Narnia Ch 1-3 2023-11-08
AVIATION 2024-09-08
13 Clues: ATL • WLG • Icing • Loader • Jackson • Auckland • Operator • Water trucks • facility Toilets • facility Duty free • security AVSEC • word for passengers PAX • vehicle Belt loader
ic3 lesson 30 vocab 2015-05-15
Across
- hacker program that sits in your computer recording personal information
- hacker program that records keystrokes
- programs that use a dictionary to try and guess the password by entering in a whole lot of words until the right one is found
- invading someone else's computer
- hacker program for finding out log ins and passwords
- decrypts information
Down
- a secure physical device that provides a strong firewall
- hacking technique that controls your browser, benefiting the hacker
- encrypts information
- repetitive strain injury, caused by repetitive motions over long periods of time
- transport layer security, for security of a server
- complex and secure password
12 Clues: encrypts information • decrypts information • complex and secure password • invading someone else's computer • hacker program that records keystrokes • transport layer security, for security of a server • hacker program for finding out log ins and passwords • a secure physical device that provides a strong firewall • ...
Cybersecurity 2024-06-04
Across
- This malicious software holds your data hostage until a ransom is paid
- The process of verifying a user's identity
- A deceptive email attempt to steal personal information
- Malicious software designed to harm a computer system
- Scrambling data to make it unreadable without a key
- Process of identifying and correcting security vulnerabilities in a
Down
- A security incident where sensitive data is exposed
- Software program designed to block unauthorized access while
- An attack that overwhelms a server with traffic, making it unavailable
- Software that scans for and neutralizes viruses and other malicious
- system.
- authorized communications.
12 Clues: system. • authorized communications. • The process of verifying a user's identity • A security incident where sensitive data is exposed • Scrambling data to make it unreadable without a key • Malicious software designed to harm a computer system • A deceptive email attempt to steal personal information • Software program designed to block unauthorized access while • ...
confidentiality 2025-02-06
Across
- work history, date of birth, social security number, criminal record,
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- of information
Down
- Espionage form of espionage conducted for commercial purposes rather than security;
- set of rules or promises which limits access or places restrictions on certain
- or Sensitive Data information about an employee prior to employment such as a résumé,
- in the Workplace keeping employee, customer and client information private
- actions, supervisory notations
- religion, etc.
- insurance information
- involves individuals hired to steal trade secrets, new products or
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • set of rules or promises which limits access or places restrictions on certain • ...
Vocabulary - Unit 3 2023-12-05
Vocabulary 2022-12-31
3-7 2024-12-10
Across
- Term used to describe the simulated representation of cyberspace
- The city where Molly and Case share a breakfast in the text
- This term refers to the technology allowing a person's consciousness to be replicated in cyberspace
- A type of painkiller used by Molly after an injury
- Surgical implant in the skull, mentioned as a common feature
- Thief who stole an AI
- AI stands for this (two words)
- The city in Turkey where Case and Molly are traveling to
- Molly's specific type of suit worn for protection and blending in
- The substance that Armitage claims is slowly dissolving inside Case’s arteries
- Virtual reality term, used when "keying in"
- The device used to connect the Flatline’s construct to Case’s system
- Armitage is diagnosed with this mental disability
- High-security location at the tip of the spindle
Down
- Subculture involved in surreal violence and media manipulation (two words)
- A term used for an electronic entity that mimics a deceased person's skills and behavior
- The axis of the Sprawl that includes Boston and Atlanta
- The system used to access and hack information protected by security
- City where the Panther Moderns were involved
- Case’s former mentor (two words)
- Short term for a substitute used to replace human senses in cyberspace (two words)
- Technology company referenced as the source of security systems (two words)
- The operation that Corto was involved in, which caused his severe injuries (two words)
- Leader of the group from # across/down (two words)
- Armitage was heavily injured while flying into this country
- The flat, origami-wrapped object Molly gives Case
- The high-tech deck Case uses (two words)
27 Clues: Thief who stole an AI • AI stands for this (two words) • Case’s former mentor (two words) • The high-tech deck Case uses (two words) • Virtual reality term, used when "keying in" • City where the Panther Moderns were involved • High-security location at the tip of the spindle • The flat, origami-wrapped object Molly gives Case • ...
Access controls 2 2025-07-07
Across
- 2 doors enclosing a vestibule
- Maglock components consist of a electromagnet and ...
- Access control must interface with this system
- This is the best hardware type to be in compliance with egress requirements
- Used to ensure that the alarm is valid
- This door type is primarily used in finished office spaces
- Two way radio is form of security ...
- A mantrap for cars
- The power requirement for Maglocks
- Alarm Secure and Bypass are considered .... in a security alarm system
- Category detection system of interior volumetric detection systems
- Access control panels need to be in these locations
- light color is measured in ...
- Hollow metal frames are most common in this type of building
Down
- One of the most common communication protocols for AC systems
- Most basic dead bolt equipped electrified lock legal in occupied rooms
- This lock type is not considered Free Egress
- The number of security countermeasures types in an access control system
- The range in which a camera has the ability to differentiate extreme light and dark in a frame
- This type of glass door is also known as Storefront Door
- Three types of threat actors include Terrorist Petty and ...
- The minimum number of hours allowed for battery backup power on an AC panel
- Type of event log allowed to be used in a court of law
- Type of electrified lock that lacks physical strength
- Redundancy helps ensure reliability when things ...
- This alarm type can be avoided by alarm filtering
- Device required on all maglock doors
- Type of door frame that can withstand low use and low impact
28 Clues: A mantrap for cars • 2 doors enclosing a vestibule • light color is measured in ... • The power requirement for Maglocks • Device required on all maglock doors • Used to ensure that the alarm is valid • Two way radio is form of security ... • This lock type is not considered Free Egress • Access control must interface with this system • ...
Chapter 2 crossword 2025-11-14
Across
- The colony of Massachusetts was the first colony to issue what currency in the Us
- The Chinese began using this as money
- Money can be saved and used at a later date
- The federal government issued what.
- Putting money aside so it will be available when you need it
- A bill security that matures in a year or less
- What was created in 1913 by Woodrow Wilson
- A document guaranteeing payment of a specific amount of money
- what corporation can Shares be traded openly
- Ownership of Gold by US citizens was illegal until when.
- An analysis of the company itself, its operations, its positions within the industry
- Anything of value that is accepted in return for goods
- The Lydian King Croesus created the which true coin
- Maintain its value over time
- Who signed the National Banking Act
- People who buy shares of stock in the company
- The mechanism a nation uses to provide and manage money for itself
Down
- what corporation can Shares not sold publicly
- Investing can help you beat ...
- Federal Reserve System is what bank of the United States.
- The Federal Reserve System is divided into how many districts.
- A note of security that pays interest over terms ranging from 2-10 years
- Someone who assists you with buying stocks and bonds
- selling stocks and bonds directly to public investors
- A financial investment issued by a corporation
- Those people who do the work for a business
- People who lend money to the business for a contracted rate of interest
- The what bank of the U.S was chartered in 1789 by Alexander Hamilton
- Money for real estate, equipment, and so on
- Taking measures to make money grow
30 Clues: Maintain its value over time • Investing can help you beat ... • Taking measures to make money grow • The federal government issued what. • Who signed the National Banking Act • The Chinese began using this as money • What was created in 1913 by Woodrow Wilson • Money can be saved and used at a later date • Those people who do the work for a business • ...
Investment essentails 2024-03-11
Across
- Contracts that give the buyer the right, but not the obligation, to buy or sell an asset at a specified price on or before a certain date.
- A market condition marked by falling stock prices.
- Stocks of large, reputable companies known for their ability to operate profitably in good times and bad.
- The benchmark index of the NSE.
- The Bombay Stock Exchange, one of the oldest in Asia.
- The income return on an investment, such as the interest or dividends received from holding a particular security.
- A person or company that buys and sells goods or assets for others.
- An investor's share of a company's profit, usually paid out quarterly.
- The degree to which an asset or security can be quickly bought or sold in the market without affecting its price.
- The value of shares issued by a company.
Down
- Financial contracts obligating the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.
- A place where stocks and other securities are bought and sold.
- The degree of variation of a trading price series over time, usually measured by the standard deviation of logarithmic returns.
- The National Stock Exchange of India.
- Partial ownership in a company.
- The benchmark index of the BSE.
- A market condition marked by rising stock prices.
- The first sale of stock by a private company to the public.
- A financial security with a value that is reliant upon or derived from, an underlying asset or group of assets.
- A collection of investments held by an institution or a private individual.
20 Clues: Partial ownership in a company. • The benchmark index of the BSE. • The benchmark index of the NSE. • The National Stock Exchange of India. • The value of shares issued by a company. • A market condition marked by rising stock prices. • A market condition marked by falling stock prices. • The Bombay Stock Exchange, one of the oldest in Asia. • ...
Air Travel 2 2024-02-03
Continuing Education 2025-10-24
14 Clues: 8099 • fire • dial 88 • medication • one source • quality rounds • active shooter • cardiac arrest • winter weather • slow heart rate • empty oxygen tank • hold beta blockers • gas shut off valves • patient interactions
LA NETIQUETTE 2021-11-11
5 Clues: bullismo bullismo online • news informazioni false nel web • codice segreto per accedere a un dispositivo • diritto alla riservatezza delle informazioni • violare un sistema informatico per danneggiarlo
Social Security Crossword Puzzle 2023-03-27
Across
- _______ describe the in-built flexibility of existing state benefits and taxes to respond automatically to expansion and contraction of the economy. [two words w/o space]
- A programme that requires participants to work in exchange for social security benefits.
- “[In the UK,] The extension of benefit _______ to many more single parents since 2008 has led many to move into paid work, but that work has been almost entirely part-time and low-earning”
- The principle describes the state taking on the role of providing benefits and insuring against risks from the mutual aid societies and private market, due to the state’s ability to manage risk more efficiently and create a larger pool of resources. [two words w/o space]
- “the degree to which individual adults can uphold a socially acceptable standard of living independently of family relationships”
- The proportion of the population that is eligible for and/or receives a particular social security benefit.
- Household-level means-tested benefits can _______ work within the couple.
- A reduction in the amount of benefits paid as a family's income increases, often referred to as benefit _______
Down
- While on the one hand cash-for-care recognises the important societal and economic contribution of unpaid care, it can potentially also reinforce _______ inequalities over the long-term.
- “A collective action to protect individuals against income deficiencies” [two words w/o space].
- A core purpose of pension systems is to _______ income within individuals – from their working years to retired years – or between individuals – from richer to poorer individuals.
- Acronym for an unconditional cash benefit paid regularly to every citizen independently on the amount of income they have or hours they work.
- A situation where reliance on benefits creates a cycle of dependency, making it difficult to escape poverty and leading to a _________.
- Pension systems where the person gets a pension income equal to the contributions they have paid in plus the market return on them.
- A set of public policies that aim to reduce government budget deficits.
- A key goal of social security systems worldwide is to reduce/prevent _______
16 Clues: A set of public policies that aim to reduce government budget deficits. • Household-level means-tested benefits can _______ work within the couple. • A key goal of social security systems worldwide is to reduce/prevent _______ • A programme that requires participants to work in exchange for social security benefits. • ...
Anti-Bullying Week Crossword Puzzle 2021-11-17
Across
- What you wear on the first day of Anti-Bullying Week.
- Where the majority of bullying takes place.
- How bullies behave.
- When someone uses phones, computers or other technology to bully someone.
- Who you can hang out with after you have been bullied.
- What you should tell bullies to do if you catch them in the act.
Down
- Who to tell if you are or have been bullied.
- When people use their bodies or objects to harm someone.
- What kids can develop if they are bullied.
- When someone uses words to hurt someone.
- The month of Anti-Bullying Week.
- A reason why someone is bullied.
12 Clues: How bullies behave. • The month of Anti-Bullying Week. • A reason why someone is bullied. • When someone uses words to hurt someone. • What kids can develop if they are bullied. • Where the majority of bullying takes place. • Who to tell if you are or have been bullied. • What you wear on the first day of Anti-Bullying Week. • ...
Stop Bullying! 2024-04-14
Across
- Komisi Perlindungan Anak Indonesia
- seseorang yang melakukan penderitaan
- membuat jarak/mengucilkan korban dengan tidak mengikutsertakan korban dalam kegiatan termasuk jenis bullying...
- seseorang yang menyaksikan penderitaan
- seseorang yang mengalami penderitaan
- istilah bullying dalam bahasa Indonesia
- kondisi yang timbul sebagai akibat dari pengalaman atau peristiwa buruk yang dialami oleh seseorang, seperti kecelakaan, korban kekerasan fisik, atau bencana alam.
Down
- jenis bullying yang melibatkan penggunaan kata-kata untuk menyakiti, merendahkan, atau mengintimidasi seseorang.
- sifat atau perasaan yang membentengi seseorang dari melakukan yang rendah atau kurang sopan.
- memukul, menampar, mendorong jenis perundungan..
- Kementerian Pemberdayaan Perempuan dan Perlindungan Anak
- usaha memasukkan nilai-nilai kebudayaan terhadap individu sehingga individu tersebut menjadi bagian masyarakat
- jenis perundungan yang dilakukan di medsos
13 Clues: Komisi Perlindungan Anak Indonesia • seseorang yang melakukan penderitaan • seseorang yang mengalami penderitaan • seseorang yang menyaksikan penderitaan • istilah bullying dalam bahasa Indonesia • jenis perundungan yang dilakukan di medsos • memukul, menampar, mendorong jenis perundungan.. • Kementerian Pemberdayaan Perempuan dan Perlindungan Anak • ...
Ethics & Compliance 2019-05-28
16 Clues: Bravery • Wellbeing • Behaviour • Observance • Nimbleness • Honesty, honour • Safeguard, shield • Care and security • Provision, supply • Battles, struggles • Beliefs, Integrity • Attention, concern • Teamwork, cooperation • Presents and generosity • Confidential reporting tool • Who we are and how we strive to be everyday
assignment 1 and 2 2025-02-19
Across
- The obtaining of money by legal process through seizure and sale of property; the raising of the money for which an execution has been issued. So, where the sheriff or other state official, armed with a writ, seizes a debtor’s property in order to satisfy a judgment.
- A way to settle a foreclosure case, or preempt one, by voluntarily surrendering the deed to the property in exchange for not defending the foreclosure and for not.exercising a right of redemption.
- A power of sale is not the same thing as a short sale. For an explanation of the difference between the two,
- Tort for wrongful taking/use of property. A debtor’s remedy against an unsecured creditor that attempts to use self-help.
- A security interest in real property.
- the legal process of enforcing the judgment,usually be seizing and selling property of the debtor
- Any transfer made with actual intent to hinder, delay or defraud any creditor is voidable. See UVTA Sections 4(a), 5(a) and 8.
- Taking property without going through a judicial process, in order to use the property to satisfy a debt. Not available to unsecured creditors.
- When one amount owing is cancelled in light of another amount owing. See also ,
Down
- A “lease” is really a sale with a security interest if the term of the lease extends for the entire remaining economic life of the collateral, so that the lease is just like a financed purchase. See UCC 1-203. This is in keeping with the Intended as a Security Doctrine. See also the Bright-Line and Economics of the Transactions Test (Assignment 22).
- The process by which the creditor compels application of the value of the collateral to payment of the debt when the creditor holds a lien interest in the collateral. Usually involves a sale of the collateral; the sale cuts off the right to redeem, and completes theforeclosure.
- Statutes that render certain property untouchable by creditors seeking to compel repayment. Generally only helps individuals retain their property, not corporations. Generally only applies vis-à-vis a debtor and an unsecured creditor. Exemption statutes generally cannot protect a debtor’s property from secured creditors.
- If a factor purchases the accounts of another with contractual provisions that make it so that they don’t really bear any risk of loss, but instead have recourse against the seller of the accounts for the value of the sale, then the sale is not really a sale, it is a security agreement secured by the accounts. See UCC 9-102(a). This is in keeping with the Intended as a Security Doctrine.
- An interest in property, contingent on the non-payment of a debt. See UCC 1-201(35). See also the Intended as a Security Doctrine and UCC 9-109(a)(1).
- “[T]he debtor’s right to pay the secured debt even after default and retain ownership of the collateral.” (LoPucki et. al. pg 26)
15 Clues: A security interest in real property. • When one amount owing is cancelled in light of another amount owing. See also , • the legal process of enforcing the judgment,usually be seizing and selling property of the debtor • A power of sale is not the same thing as a short sale. For an explanation of the difference between the two, • ...
FITC.sb 2013-05-15
Across
- A small piece quantity of something.
- Drive a self contained storage device containing a read -write mechanism.
- wireless locale area network.
- Engine A program for retrieval of data,files,or documents from a database
- The programs and other operating information used by a computer.
- A port developed by IMB for connecting a mouse or or keyboard to a Mac or Pc.
- network.
- Port An electronic and physical port thats sends Geiger audio through an
- Produce, deliver or supply data using a computer.
Down
- Of the culture of the computers,information technology,and virtual reality.
- The physical parts of the computer and related devices.
- What does ISP stand for.
- a file created by a software application.
- Port A locale network.
- What does LED stand for.
- What does SSID stand for.
- What does ram stand for.
- To put data in the computer.
18 Clues: network. • Port A locale network. • What does ISP stand for. • What does LED stand for. • What does ram stand for. • What does SSID stand for. • To put data in the computer. • wireless locale area network. • A small piece quantity of something. • a file created by a software application. • Produce, deliver or supply data using a computer. • ...
Bullying Crossword Puzzle 2015-11-15
Across
- The "E" in "SAFE" stands for "End it ____".
- What does the "H" stand for in "HERO"?
- The "S" in "SAFE" stands for "Stand ____".
- Bullies can call you ____.
- If you see bullying, do not be a _____.
- Bullying can be physical or ___.
- Bullying can be done by an individual or ___.
- A bully is identified not how they look, but rather by their ___.
- This acronym is great to remember if you see bullying occuring.
- Being a bully makes you a smaller person. Helping others makes you a __ person.
- If you are bullied, tell an ___.
Down
- What does the "E" stand for in "HERO"?
- The "O" in "HERO" stands for___ communication.
- The "A" in "SAFE" stands for "Ask for ____".
- Bullies can get you in ___.
- Bullying online is called ___ bullying
- What acronym reminds us how to act if you are bullied?
- ____ someone from a group is a form of bullying.
- What does the "R" stand for in "HERO"?
19 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___. • If you are bullied, tell an ___. • What does the "E" stand for in "HERO"? • What does the "H" stand for in "HERO"? • Bullying online is called ___ bullying • What does the "R" stand for in "HERO"? • If you see bullying, do not be a _____. • The "S" in "SAFE" stands for "Stand ____". • ...
Airports 2021-02-11
Across
- three ounces one quart one zip top bag
- Check-in is on which side
- in NZ all pax are required to fill out a departure card if travelling internationally
- the area before departing passengers pass through security
- this is a secure area only for international travellers
- abbreviation of Liquids, Aerosols, Gels
- a facility everyone uses in the airport
- this was established in NZ in 1977
- is it okay to joke around and fake threats in an airport
- what is the airport code for nelson?
- these types of vehicles are mostly used to push an aircraft
Down
- making announcements that the plane is ready for boarding
- ZQN
- the area where you go through security and hand over your passport for inspection
- sacred space in an airport
- ROT
- taking off your shoes, removing your belt buckle and putting metal items in a tray is....
- duty free is on what side
- another name for customs/security
- Airport code for Amsterdam
- who is in charge of getting passengers from a to b
21 Clues: ZQN • ROT • Check-in is on which side • duty free is on what side • sacred space in an airport • Airport code for Amsterdam • another name for customs/security • this was established in NZ in 1977 • what is the airport code for nelson? • three ounces one quart one zip top bag • abbreviation of Liquids, Aerosols, Gels • a facility everyone uses in the airport • ...
Georgia Milestones Testing Training 2016-03-29
Across
- o'clock is the time proctors should arrive in rooms they are proctoring
- should be covered in testing rooms
- must be kept secure at all times
- is permitted during breaks
- must monitor the integrity of the assessment, through circulation and checking in
- can write in the test books
Down
- are used for each student for each section of the online assessment
- responsible for test security
- of test security occurs when examiners fail to follow administration directions for the test
- begins on April 12
- during the entire testing period
- electronic devices should be used during testing sessions (by teachers or students)
12 Clues: begins on April 12 • is permitted during breaks • can write in the test books • responsible for test security • must be kept secure at all times • during the entire testing period • should be covered in testing rooms • are used for each student for each section of the online assessment • o'clock is the time proctors should arrive in rooms they are proctoring • ...
CSI Newsletter 2019-03-05
Across
- Founder of the CSI team (First name)
- Automated tools used for simple and repetitive tasks
- Malicious software that denies access to data in return for payment
- Device placed in gas pumps to steal consumer data
- What are automated pre recorded phone messages
Down
- Virtual currency which has an equivalent value in real currency
- Created to make life easier but are often hacked or monitored
- A cyber group well known for hacking and wearing masks
- Who won the last CSI Newsletter $50 quiz (first name)
- What credit reporting bureau was hacked recently
- Electronics manufacturer sued for $2.2 million
11 Clues: Founder of the CSI team (First name) • Electronics manufacturer sued for $2.2 million • What are automated pre recorded phone messages • What credit reporting bureau was hacked recently • Device placed in gas pumps to steal consumer data • Automated tools used for simple and repetitive tasks • Who won the last CSI Newsletter $50 quiz (first name) • ...
Revision 2025-09-19
Across
- I tell my teacher if I haven't done the homework. How is my behaviour?
- Noticing what is happening in the present
- Purposely troubling someone else through actions or words
- Stepping into other's shoes to understand how they are feeling
- When two or more people do not agree on the same thing
- Being thankful and appreciative
Down
- Kindness/Patience/Honesty and Forgiveness are examples of
- Spreading rumours about someone is an example of which type of bullying?
- Appreciating yourself and doing things you like
- Doing things to take care of yourself
- Which type of bullying takes place online?
11 Clues: Being thankful and appreciative • Doing things to take care of yourself • Noticing what is happening in the present • Which type of bullying takes place online? • Appreciating yourself and doing things you like • When two or more people do not agree on the same thing • Kindness/Patience/Honesty and Forgiveness are examples of • ...
Cybersecurity Crossword Challenge 2025-08-19
Across
- A fake email or text that tries to steal information.
- Keeping personal and health information protected.
- Written rules that guide safe and compliant practices.
- Software designed to damage or steal data.
- Must be sent from a secured machine when it contains PHI.
- When private or confidential information is accessed without permission.
- What you should file if you notice a privacy or security issue.
Down
- Information that must not be shared with unauthorized people.
- A secret word used to log in securely.
- The law that protects patient health information.
- How systems, files, and conversations should always be kept.
- Extra login security using a code or device.
- What staff must wear to access the building.
- Abbreviation for Protected Health Information.
- A review process to check compliance with rules.
- What you do to computers, doors, or files when unattended.
16 Clues: A secret word used to log in securely. • Software designed to damage or steal data. • Extra login security using a code or device. • What staff must wear to access the building. • Abbreviation for Protected Health Information. • A review process to check compliance with rules. • The law that protects patient health information. • ...
Cyber Safety: Be eSmart! 2021-09-09
Across
- A safe place for searching stuff up
- To send something to someone
- A character used for math and to call someone
- Unwanted email
- Opposite of Offline
- Shielded from harm
- Something to follow
Down
- Your parent
- A place where places you visited is kept
- Synonym for reliable
- Something that belongs to you
- Someone you don't know
- Someone who hurts someone else deliberately
- The act of being safe
14 Clues: Your parent • Unwanted email • Shielded from harm • Opposite of Offline • Something to follow • Synonym for reliable • The act of being safe • Someone you don't know • To send something to someone • Something that belongs to you • A safe place for searching stuff up • A place where places you visited is kept • Someone who hurts someone else deliberately • ...
Bullying crossword 2022-04-26
Across
- someone who tries to help those who have been victimized around them
- someone who you can tell if you are being bullied and has authority at school
- bullying through exclusion
- someone who ignores an act of violence
Down
- bullying through insults and threats
- a bullying form rooted in violence
- something that can happen from being bullied, another word for sadness
- a person who actively attempts to harm others physically or mentally
- a type of bullying commonly found online
9 Clues: bullying through exclusion • a bullying form rooted in violence • bullying through insults and threats • someone who ignores an act of violence • a type of bullying commonly found online • someone who tries to help those who have been victimized around them • a person who actively attempts to harm others physically or mentally • ...
Shell shocker weapons 2022-01-19
Across
- Shotgun blasts do critical damage up close.
- The number of primary weapons in the game.
- The classic, high rate of fire. Medium range, never jams.
- Inspired by another BWD game, Nuke Zone.
- Bolt action sniper - One shot stopping power.
- Small magazine, medium range, big damage!
- 3-round burst. Accurate, medium range specialist.
Down
- Semi automatic sniper - Destroy from a distance.
- Pull the pin and it goes kaboom!
- Fancier versions of the regular weapons
- Fancier versions of the regular that could only be bought from January 1st to January 18th.
- The secondary weapon.
- Large clip full of egg cracking bullets. Close to medium range.
13 Clues: The secondary weapon. • Pull the pin and it goes kaboom! • Fancier versions of the regular weapons • Inspired by another BWD game, Nuke Zone. • Small magazine, medium range, big damage! • The number of primary weapons in the game. • Shotgun blasts do critical damage up close. • Bolt action sniper - One shot stopping power. • ...
computer languages 2025-05-23
Across
- One of the high-level languages.
- Example of fifth generation computer language.
- Convert high level language to low level language and vice versa.
- A network security system that protects networks from unauthorised access.
- A type of software protects computers from malicious software.
- It is used in assembly languages (2 words).
- The first interactive computer game.
Down
- First-generation language.
- Illegal activities involving computers and the internet.
- Unauthorized access to computer network security systems.
- The set of instruction that tells the computer what to do.
- Feature of fifth generation computer language (2 words).
- A social engineering attack that used to steal user data.
- A storage location of computer memory that stores data.
- Secret string of characters used to identify the user.
- Set of rules that define structure and formed a programing language.
16 Clues: First-generation language. • One of the high-level languages. • The first interactive computer game. • It is used in assembly languages (2 words). • Example of fifth generation computer language. • Secret string of characters used to identify the user. • A storage location of computer memory that stores data. • Illegal activities involving computers and the internet. • ...
