cyber security Crossword Puzzles
Crossword 1 - Technical terms 2024-11-04
Across
- Network monitoring tool used to analyze and troubleshoot network traffic.
- Network monitoring tool for tracking performance and availability.
- Authentication system used to manage network access.
- The layout or structure of a network.
- Virtual Private Network; provides secure remote access to a network.
- Command used to test network connectivity and latency.
- Process of encoding data to protect it during transmission.
- Delay in data transmission over a network.
- Unit of data transmitted over a network.
Down
- Device that connects multiple devices within a single network.
- Security device that controls incoming and outgoing traffic.
- Device that allows wireless devices to connect to a network without cables.
- Measurement of data transmission capacity in a network.
- Part of an IP address configuration that helps segment networks.
- Unique identifier assigned to each device on a network.
- Device that directs data traffic between networks.
- Virtual Local Area Network; divides network traffic for security and performance.
17 Clues: The layout or structure of a network. • Unit of data transmitted over a network. • Delay in data transmission over a network. • Device that directs data traffic between networks. • Authentication system used to manage network access. • Command used to test network connectivity and latency. • Measurement of data transmission capacity in a network. • ...
SHAGGy 2025-01-08
Across
- A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
- A natural or legal person who holds shares in a company
- Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
Down
- The earnings a company equally shared among the shareholders in proportion to the number of shares they hold
- An intermediary in charge of placing buy and sell orders on the market
- Selling a security you don't own to buy it back later
- A stock that goes up and down quickly
- It’s the world’s biggest stock exchange, based in Manhattan
- A very sharp rise of a market
- The ability to buy or sell assets quickly in large quantities
10 Clues: A very sharp rise of a market • A stock that goes up and down quickly • Selling a security you don't own to buy it back later • A natural or legal person who holds shares in a company • It’s the world’s biggest stock exchange, based in Manhattan • The ability to buy or sell assets quickly in large quantities • ...
Teen years 2024-09-30
15 Clues: Vorbild • unter Druck • Beliebtheit • provozierend • Gruppendruck • selbstbewusst • Lebensabschnitt • Risiken eingehen • sich durch setzen • gehemmt, befangen • selbständig werden • die Erwartungen erfüllen • sich gegen etwas auflehnen • an die eigenen Grenzen gehen • sich nach Sicherheit/Geborgenheit sehnen
TTS SEJARAH PERKEMBANGAN IPTEK 2020-11-18
Across
- negara yang meluncurkan manusia pertama ke bulan
- pesawat ulang-alik buatan rusia
- badan penerbangan dan antariksa Amerika Serikat
- pemindahan manusia atau barang dari satu tempat ke tempat lainnya dengan menggunakan sebuah wahana yang digerakkan oleh tenaga manusia atau mesin
- nama pimpinan ilmuwan roket jerman yang mengembangkan pelurur kendali V2
- tempat menguji senjata buatan AS
Down
- seorang mayor Angkatan Udara Rusia yang menjadi orang rusia pertama ke luar angkasa
- contoh serat optik
- memberikan pelayanan yang lebih luas serta keamanan bagi negara merupakan manfaat transportasi terhadap
- salah satu teknologi komunikasi yang menggunakan teknologi cyber/internet
- badan pengawasan teknologi rudal
- light amplification by stimulated emission of radiation
12 Clues: contoh serat optik • pesawat ulang-alik buatan rusia • badan pengawasan teknologi rudal • tempat menguji senjata buatan AS • badan penerbangan dan antariksa Amerika Serikat • negara yang meluncurkan manusia pertama ke bulan • light amplification by stimulated emission of radiation • nama pimpinan ilmuwan roket jerman yang mengembangkan pelurur kendali V2 • ...
PPKN KELOMPOK 5 2025-02-22
Across
- Toleransi juga mengandung makna?
- Sebutan lain dari kata serangan (Siber) adalah?
- Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
- Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
- Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
- Pernyataan bersama, merupakan pengertian dari kata?
- Sebutan lain dari tantangan dari dalam?
- Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
Down
- Contoh sikap yang baik di lingkungan sekolah adalah?
- Negara Kesatuan Republik Indonesia di singkat menjadi?
- Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
- Sebutan lain dari tantangan dari luar?
12 Clues: Toleransi juga mengandung makna? • Sebutan lain dari tantangan dari luar? • Sebutan lain dari tantangan dari dalam? • Sebutan lain dari kata serangan (Siber) adalah? • Pernyataan bersama, merupakan pengertian dari kata? • Contoh sikap yang baik di lingkungan sekolah adalah? • Negara Kesatuan Republik Indonesia di singkat menjadi? • ...
Alyssa & Chris’ Baby Shower 2021-06-22
Unit 11 2024-02-12
unit 11 2025-02-14
12 Clues: cuddle • landslide • a stander • tangy, acid • appeal, cry • guide, pilot • order, arrange • confirm, insure • silly, ridiculous • choosy, particular • achievable, reasonable • protection, safekeeping
Smart Home Crossword Puzzle 2025-03-22
Across
- – A key benefit of smart home technology, reducing waste.
- – Control smart home features from anywhere using an app.
- – Used to describe eco-friendly smart homes.
- – Smart cameras, locks, and alarms improve home safety.
- – The goal of smart technology: eco-friendly solutions.
- assistants - Alexa, Siri, and Google Assistant.
- – Products with LEED, Energy Star, or WELL certification.
- – Motion, temperature, and leak sensors make homes smarter.
- – Smart thermostats adjust heating & cooling for efficiency.
Down
- – Smart systems track energy, water, and security data.
- – Smart devices communicate via Wi-Fi, Bluetooth, or Zigbee.
- – Smart bulbs use LEDs and can be controlled remotely.
- – Solar-powered devices or panels reduce reliance on the grid.
- – A central controller for multiple smart devices (like Amazon Echo or Google Nest).
- – Smart fridges, ovens, washers, and dishwashers save energy.
- – Smart tech helps reduce power consumption.
- – Controlling devices automatically to improve convenience.
- – Many smart devices connect without hardwiring.
- HOME – The overall concept of an automated, connected home.
19 Clues: – Used to describe eco-friendly smart homes. • – Smart tech helps reduce power consumption. • assistants - Alexa, Siri, and Google Assistant. • – Many smart devices connect without hardwiring. • – Smart bulbs use LEDs and can be controlled remotely. • – Smart systems track energy, water, and security data. • – Smart cameras, locks, and alarms improve home safety. • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Budget Vocabulary 2022-10-24
Across
- amount borrowed in a single year
- control, by the Federal Reserve Board, of the money supply
- taxing and spending by the Congress and the President
- economic support provided by government to aid an individual, industry, or business
- spending revisited yearly by Congress/President ex. defense spending
- Social Security is an example
- healthcare for people 65+
Down
- total amount of money the government owes over years
- provides nonpartisan advise to Congress about budgetary decisions
- #1 source of revenue for the federal government
- social security, medicare, medicaid, interest on the debt that must be paid
- the charge for borrowing money
- term for when government brings in more money than it spends
- part of EOP that advises the President about the budget
- healthcare for needy people
15 Clues: healthcare for people 65+ • healthcare for needy people • Social Security is an example • the charge for borrowing money • amount borrowed in a single year • #1 source of revenue for the federal government • total amount of money the government owes over years • taxing and spending by the Congress and the President • part of EOP that advises the President about the budget • ...
Cyber safety-by Bridget Graham 2016-05-24
Across
- when you post something on the internet so everyone can see it
- information stored on your computer or device
- never tell anyone about it because you don't know what's going to happen
- a search engine
- little pictures to express your feeling
- a location on the internet
- allows people to share things online
- something that is important not to tell people on the internet or they can track you down
- when an unknown number or email address appears on your emails
Down
- ups when browsing a new window appears that you don't want
- a web address
- when someone is being mean to you on line
- when someone pretends to be your friend on games but their really not
- a little chip that is is in your computer that you can turn off and on
- to decline or not accept a request on a game
- private information that you don't share with with other people
- when you close a screen to save it for later
- your personal address on your computer
- to copy a file from one computer system to another via the Internet
- a saved link to a website
- to upload information to the web
21 Clues: a web address • a search engine • a saved link to a website • a location on the internet • to upload information to the web • allows people to share things online • your personal address on your computer • little pictures to express your feeling • when someone is being mean to you on line • to decline or not accept a request on a game • ...
CSAM 2022 - Be Cyber Smart 2022-10-02
Across
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
- The process of taking plain text and scrambling it into an unreadable format.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
- Hardware or software designed to prevent unauthorized access to or from private network.
- The I in the C-I-A Triad; protection from unauthorized changes.
- Verifying identity
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- Threatening behavior facilitated through electronic means such as texting.
- A fraudalent email purportedly from a reputabld companty attempting to get personal information.
Down
- A sequence of words or text used to control access to a computer; similar to a password.
- A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- THe A in the C-I-A Triad. It ensures authorized users have access.
- Facebook, Twitter, Instagram, etc. (two words)
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
- Unauthorize access to a network, information systems, or application.
20 Clues: Verifying identity • Facebook, Twitter, Instagram, etc. (two words) • The I in the C-I-A Triad; protection from unauthorized changes. • THe A in the C-I-A Triad. It ensures authorized users have access. • Unauthorize access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Networking concept and Cyber Ethics 2025-05-19
Across
- The unwanted bulk emails that come from unknown sources are called.
- A computer ion a network.
- Equivalent form of Hacking.
- simplest way to prevent plagiarism.
- Program that disrupts the normal functioning of a computer.
- It is wireless technology.
- Protecting the data and resources from any unauthorized access.
- Refers to criminal activities that involve the use of computer, network and internet.
- Group of computers or other peripheral devices.
- Refers to an illegal intrusion in a computer system or a network.
- It is a legal right granted by law to the creator for his original work.
- Is used to connect a computer to the available internet connection over the existing telephone line.
Down
- Certain sets of rule determine how data should be transferred over networks and so on.
- Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
- Ranges less than 10 meters.
- It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
- Refers to computer network restricted to a organization.
- Group of star figured workstations connected to a linear backbone cable.
- It is a network device that is used to connect all computers to a network.
- Metropolitan Area Network.
20 Clues: A computer ion a network. • It is wireless technology. • Metropolitan Area Network. • Ranges less than 10 meters. • Equivalent form of Hacking. • simplest way to prevent plagiarism. • Group of computers or other peripheral devices. • Refers to computer network restricted to a organization. • Program that disrupts the normal functioning of a computer. • ...
Financial Procedures 2016-01-05
Across
- Preferred way by business of refunding Solar Credits
- Interest from Security Deposit applied every this many months
- Can we transfer solar credits
- Previously called backdating
- Used to complete a Transfer of Credit
- Raised to notify user to manually refund Security Deposit
- Account status where the Financial Adjustment can only be cancelled
Down
- Which SA is the Solar Credit held on
- Where to find all business processes
- The min amount of premises or NMIs acct can have for Consolidated Accounts
- The maximum amount of SAs a Child account can have
- The document which contains Authority Levels
12 Clues: Previously called backdating • Can we transfer solar credits • Which SA is the Solar Credit held on • Where to find all business processes • Used to complete a Transfer of Credit • The document which contains Authority Levels • The maximum amount of SAs a Child account can have • Preferred way by business of refunding Solar Credits • ...
Cyber Safety and Respectful Choices 2021-05-17
Across
- media, Snapchat or Instagram.
- Online bullying.
- relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Healthy.
Down
- The condition of being protected from or unlikely to cause danger, risk, or injury.
- Due regard for the feelings, wishes, or rights of others.
6 Clues: Healthy. • Online bullying. • media, Snapchat or Instagram. • Due regard for the feelings, wishes, or rights of others. • The condition of being protected from or unlikely to cause danger, risk, or injury. • relating to or characteristic of the culture of computers, information technology, and virtual reality.
Cyber Safety and Respectful Choices 2021-05-17
Across
- media, Snapchat or Instagram.
- Online bullying.
- relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Healthy.
Down
- The condition of being protected from or unlikely to cause danger, risk, or injury.
- Due regard for the feelings, wishes, or rights of others.
6 Clues: Healthy. • Online bullying. • media, Snapchat or Instagram. • Due regard for the feelings, wishes, or rights of others. • The condition of being protected from or unlikely to cause danger, risk, or injury. • relating to or characteristic of the culture of computers, information technology, and virtual reality.
Screaming Halt 2023-05-04
Across
- name of black trans person killed in San Francisco
- "I _____ a lot of people on this board"
- Brown was killed because he was trying to _______.
- Protestors called on Walgreen's to get rid of ______.
- "But I have to pretend that you have some form of _____ left."
- speaker who screamed at the board
- "So I don't have any ______ prepared for you today"
- Nothing in the store was worth Brown's ______.
Down
- "This is what the trans _______ in this country has brought me to."
- McGeever called the board _______ before walking away.
- Walgreen's and other retail stores have seen a spike in ______ in recent years
- name of store Brown took things from
- "We demand an end to armed ________"
- Last name of security guard responsible for man's death
- nonverbal expression of "______"
- "The suspect believed he was in ______ danger"
16 Clues: nonverbal expression of "______" • speaker who screamed at the board • name of store Brown took things from • "We demand an end to armed ________" • "I _____ a lot of people on this board" • "The suspect believed he was in ______ danger" • Nothing in the store was worth Brown's ______. • name of black trans person killed in San Francisco • ...
DD Resources HIPAA Crossword 2015-12-03
Across
- HIPAA is not just a good idea. It is the ___.
- Necessary The minimum PHI needed to accomplish an intended purpose.
- What must be completed and signed before any PHI can be released?
- The Health Insurance Portability and Accountability Act of 1996.
- Any health information received or maintained by DD Resources is ________.
- What Does The second "A" in HIPAA stand for?
- What does the "P" in HIPAA stand for?
- What does the "I" in HIPAA stand for?
- Who is responsible for keeping Consumer information confidential?
- What does the "H" in HIPAA stand for?
Down
- Consumers have the right to make ___________ about the privacy and security of their PHI/EPHI without fear of retaliation.
- How does confidential documentation need to be disposed of?
- What does the first "A" in HIPAA stand for?
- This person is DD Resources’ Security Official.
- Coversheet All faxes sent with PHI must have a ___ ______.
- The third largest mammal on Earth.
- of Privacy Practices What document is given to Consumers that outlines the use and disclosure of their PHI?
- The impermissible use or disclosure of PHI/EPHI released verbally, in writing or transmitted electronically is a ____________________.
- out Files must be ______ ___, whenever removed from their designated location.
- Computer ___ should never be shared or posted.
- The __________ Rule establishes and protects the Confidentiality, Integrity and Availability of EPHI.
- The _____________ Rule protects an individual’s rights, limits the uses and disclosures of PHI and sets administrative rules.
- Communications Protected Health Information (PHI) can include paper records, _____________ __________________, and information that is transmitted and maintained in any electronic format.
- Any PHI that maintained or transmitted electronically is __________.
24 Clues: The third largest mammal on Earth. • What does the "P" in HIPAA stand for? • What does the "I" in HIPAA stand for? • What does the "H" in HIPAA stand for? • What does the first "A" in HIPAA stand for? • What Does The second "A" in HIPAA stand for? • HIPAA is not just a good idea. It is the ___. • Computer ___ should never be shared or posted. • ...
Investing in Stocks 2012-12-16
Across
- independent agency of the federal government that insures accounts up to $250,000 per depositor at almost all US depository institutions.
- a nontransferable bond issued by the U.S. government.
- The total accumulatated value of the assets a person possesses.
- A list of financial assets held by an individual,bank,or other financial institution.
- property or other possessions acquired for future financial return or benefit.
- A long term interest-bearing security issued by the U.S. government. Interest is paid semiannually.
- the cost of passing up the next best alternative when making a decision.
- a form of time deposit at a bank or other savings institution.
- Considered the safest securities available to the U.S. investor.
Down
- a variety of investments in a investment portfolio,the goal is to reduce the risk in a portfolio.
- calculated on initial principal and the accumulated interest of prior periods.
- The capital raised by a corporation by issuing shares of ownership.
- Protects investors' cash and securities when a brokerage firm goes out of business,up to $500,000.
- Funds from many investors pooled together to establish a diversified portfolio of investments.
- Government debt security issued with maturities of two to ten years and traded in the capital markets. A fixed interest.
- A percentage amount of the return on an investment or loan.
- A savings account that pays variable interest rates based on current conditions in the market for short term securities.
- A long term interest bearing security issued by county,city,or state governments,having a maturity of at least ten years.
- a rule used to calculate the doubling of money.
- a certificate of debt issued by a government or corporation that offers payment of the original principal plus interest by a specified future date.
20 Clues: a rule used to calculate the doubling of money. • a nontransferable bond issued by the U.S. government. • A percentage amount of the return on an investment or loan. • a form of time deposit at a bank or other savings institution. • The total accumulatated value of the assets a person possesses. • Considered the safest securities available to the U.S. investor. • ...
Lesson 1 A Vocabulary Crossword 2023-10-03
Across
- An individual who installs, modifies and repairs personal computer (PC) hardware components.
- An individual who is responsible for the maintenance and security of an organization's database resources and data.
- The management and processing of information using computers and computer networks.
- An individual who manages the security measures used to protect electronic data.
- An individual who manages a Web development team.
- An individual who is responsible for the organization and appearance of a Web site.
- An individual who develops primarily server-side Web applications.
- An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
Down
- An individual who diagnoses and resolves users' technical hardware and software problems.
- An individual who analyzes Web site statistics to determine the site's effectiveness.
- An individual who troubleshoots and repairs mobile device hardware components.
- An individual who manages and maintains a network infrastructure.
- An individual who manages and maintains network servers.
- An individual who determines the visibility of Web sites across multiple clients and search engines.
- Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations over the Internet.
- An individual who creates the overview plan of a Web site's development.
- The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing.
- An individual who examines an organization's security requirements and determines the necessary infrastructure.
- A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.
- An individual who develops Web sites and/or applications for mobile devices.
20 Clues: An individual who manages a Web development team. • An individual who manages and maintains network servers. • An individual who manages and maintains a network infrastructure. • An individual who develops primarily server-side Web applications. • An individual who creates the overview plan of a Web site's development. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Security documentation that details system resource usage by users and processes for auditing.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Attacks that overwhelm a target system or network with a flood of traffic
- Policy-based accept or deny of network traffic.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Injecting malicious scripts into webpages viewed by other users
- Matching known patterns of threats against security event data to find potential matches.
- Code examination performed without running the malicious program.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Process of transforming information into a scrambled format to secure it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- The correlation that matches the known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Food Security and Beyond 2017-09-13
Across
- A crop commonly grown in the Asia region
- The type of air pressure system that is associated with clouds and rain
- A natural disaster currently affecting parts of the USA
- When all people at all times have physical and economic access to sufficient, safe, nutritious food to maintain healthy and active lives
- Part of the United Nations, an organisation working towards food security
- Farming methods that preserve resources
- Exchange of food and money between countries
- The type of air pressure system that is associated with fine weather
- The lines on a weather map that show us air pressure systems
Down
- A process involving increasing temperatures and more extreme weather events that threatens food production
- When people do not have access to a sufficient quality of nutritious food
- The process that converts raw materials into food products
- A situation where a person's basic needs are not being met
- A shortage of food for the population
- Plants that are grown on a large scale and sold
- All of the people who live in a particular place
16 Clues: A shortage of food for the population • Farming methods that preserve resources • A crop commonly grown in the Asia region • Exchange of food and money between countries • Plants that are grown on a large scale and sold • All of the people who live in a particular place • A natural disaster currently affecting parts of the USA • ...
Cyber Safety 2023-11-01
6 Clues: To secure your account • What You search up with • When Someone is being Bullied Online • How can we access the world wide web • A app that generates a web page for us • when someone is helping you in a bullied situation
Lecture 3 2024-10-21
14 Clues: Queries • Injection • Statements • Sanitization • SQL Injection • Data Exposure • SQL Injection • SQL Injection • Authentication • Scripting (XSS) • Request Forgery • Deserialization • Misconfiguration • Logging and Monitoring
Environmental Services 2017-08-18
Across
- What tupe of rags do we use to clean? (blue and yellow)
- What company takes care of pest control?
- Evening discharge cleaners are called?
- What company takes care of RED trash and sharps for the hospital?
- Who is the head of safety and security?
- What is the brand of electronic paper towels we use?
- What is the name of the security company?
- What program is used to look up chemicals?
Down
- These are used to keep your hands clean.
- What is the name of the fragrance spray we use?
- What floor is ICU on?
- Used to collect trash from multiple areas.
- What is the Color of ES Scrubs?
- How far out should you schedule PTO?
- What brand of bleach do we use to clean with?
- Who is the manager of ES?
- This is used to swipe you into the building or certain areas.
17 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • How far out should you schedule PTO? • Evening discharge cleaners are called? • Who is the head of safety and security? • These are used to keep your hands clean. • What company takes care of pest control? • What is the name of the security company? • ...
Week 1 - Crossword 2024-11-01
Across
- Address Unique identifier assigned to each device on a network.
- Point Device that allows wireless devices to connect to a network without cables.
- Measurement of data transmission capacity in a network.
- Security device that controls incoming and outgoing traffic.
- Authentication system used to manage network access.
- Unit of data transmitted over a network.
- Process of encoding data to protect it during transmission.
- Network monitoring tool used to analyze and troubleshoot network traffic.
Down
- monitoring tool for tracking performance and availability.
- Device that connects multiple devices within a single network.
- Virtual Local Area Network; divides network traffic for security and performance.
- Command used to test network connectivity and latency.
- Delay in data transmission over a network.
- Part of an IP address configuration that helps segment networks.
- Device that directs data traffic between networks.
- Virtual Private Network; provides secure remote access to a network.
- The layout or structure of a network.
17 Clues: The layout or structure of a network. • Unit of data transmitted over a network. • Delay in data transmission over a network. • Device that directs data traffic between networks. • Authentication system used to manage network access. • Command used to test network connectivity and latency. • Measurement of data transmission capacity in a network. • ...
Bullying Crossword Puzzle 2015-11-15
Across
- What acronym reminds us how to act if you are bullied?
- What does the "R" stand for in "HERO"?
- Bullies can call you ____.
- What does the "E" stand for in "HERO"?
- The "E" in "SAFE" stands for "End it ____".
- A bully is identified not how they look, but rather by their ___.
- What does the "H" stand for in "HERO"?
Down
- Bullying online is called ___ bullying
- If you see bullying, do not be a _____.
- The "O" in "HERO" stands for___ communication.
- Bullying can be done by an individual or ___.
- Bullying can be physical or ___.
- Being a bully makes you a smaller person. Helping others makes you a __ person.
- ____ someone from a group is a form of bullying.
- The "S" in "SAFE" stands for "Stand ____".
- This acronym is great to remember if you see bullying occuring.
- Bullies can get you in ___.
- If you are bullied, tell an ___.
18 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___. • If you are bullied, tell an ___. • Bullying online is called ___ bullying • What does the "R" stand for in "HERO"? • What does the "E" stand for in "HERO"? • What does the "H" stand for in "HERO"? • If you see bullying, do not be a _____. • The "S" in "SAFE" stands for "Stand ____". • ...
NORMA 2024-01-14
Across
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Norma yang menjamin kebebasan berserikat disebut?
- Sikap saling menghargai dalam keberagaman budaya?16.Integritas Norma yang melarang korupsi dan penyalahgunaan kekuasaan?17. Keselamatan Ketaatan terhadap norma keselamatan di tempat kerja?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Norma dalam mengelola konflik secara damai?
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
Down
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Norma agama yang menjadi pedoman hidup?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
- Norma etika dalam penggunaan teknologi informasi?
- Tanggung jawab menjaga kelestarian lingkungan?
18 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Norma yang menjamin kebebasan berserikat disebut? • Norma etika dalam penggunaan teknologi informasi? • Larangan diskriminasi berdasarkan jenis kelamin disebut? • ...
Daily Vocabulary 2024-11-12
week 6 2025-10-03
Bullying 2019-09-07
Across
- stubborn and complete intolerance of any belief or opinion that differs from one's own
- abusing, insulting, or otherwise harming someone on a regular basis
- hitting, pushing, kicking, or damaging other's property
- to dislike intensely or passionately
- name-calling, teasing, insults, homophobic or racist remarks
- prejudice or discrimination against someone of a different race
Down
- commonly held ideas about specific groups of people, often negative
- Harassment unwelcome sexual advances, verbal or physical
- an unfavorable opinion formed beforehand without knowledge, thought, or reason
- lying, spreading rumors, excluding others on purpose
- Hurtful comments, posts, images, videos online or messages
11 Clues: to dislike intensely or passionately • lying, spreading rumors, excluding others on purpose • hitting, pushing, kicking, or damaging other's property • Harassment unwelcome sexual advances, verbal or physical • Hurtful comments, posts, images, videos online or messages • name-calling, teasing, insults, homophobic or racist remarks • ...
Bullying 2019-09-07
Across
- to dislike intensely or passionately
- hitting, pushing, kicking, or damaging other's property
- commonly held ideas about specific groups of people, often negative
- unwelcome sexual advances, verbal or physical
- Hurtful comments, posts, images, videos online or messages
- lying, spreading rumors, excluding others on purpose
Down
- abusing, insulting, or otherwise harming someone on a regular basis
- an unfavorable opinion formed beforehand without knowledge, thought, or reason
- stubborn and complete intolerance of any belief or opinion that differs from one's own
- name-calling, teasing, insults, homophobic or racist remarks
- prejudice or discrimination against someone of a different race
11 Clues: to dislike intensely or passionately • unwelcome sexual advances, verbal or physical • lying, spreading rumors, excluding others on purpose • hitting, pushing, kicking, or damaging other's property • Hurtful comments, posts, images, videos online or messages • name-calling, teasing, insults, homophobic or racist remarks • ...
Cyber Safety Review 2022-02-17
Across
- To Pretend to be someone you are not
- Having good manners online
- ___ a term used in Megan's Story that involves lying about your identity
- Self_____ is how you feel about yourself
Down
- Bullying someone over and over with varying degrees of intensity
- Facts or proof you should show to an adult if you are being cyber bullied.
- Fake phrases meant to hurt someone
- Feeling very sad and upset, a feeling you can possibly have when being bullied.
- Another name for a cyberbully
9 Clues: Having good manners online • Another name for a cyberbully • Fake phrases meant to hurt someone • To Pretend to be someone you are not • Self_____ is how you feel about yourself • Bullying someone over and over with varying degrees of intensity • ___ a term used in Megan's Story that involves lying about your identity • ...
Computer Project 2025-06-15
Across
- : Bullying someone online through messages or social media
- : A harmful program that can damage files and software
- : People who use the internet or computers to commit crimes
- : Software that protects your computer from viruses
Down
- : The practice of protecting devices and data from cyber threats
- : Fake messages that try to steal passwords or bank info
- : Criminal activities done using computers or the internet
- : A system that blocks unauthorized access to or from a private network
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Bullying someone online through messages or social media • : Criminal activities done using computers or the internet • : People who use the internet or computers to commit crimes • ...
Cyberbullying Crossword 2021-05-06
Across
- types of schools where rules and sanctions are stricter
- motivates victims more to seek help when they realize such people have also been in their shoes.
- a form of communication that can have more psychologically lasting effects on the victim.
- monitored very strictly in schools
Down
- same problem in a new guise
- an app used to curate
- attempt to steal, intercept usernames, passwords and financial credentials
- Last name of star that quit online chat over the abuse he receives
- country of elevated online abuse in mirror article
- an interventive strategy to cyber bullying
10 Clues: an app used to curate • same problem in a new guise • monitored very strictly in schools • an interventive strategy to cyber bullying • country of elevated online abuse in mirror article • types of schools where rules and sanctions are stricter • Last name of star that quit online chat over the abuse he receives • ...
Internet, Networking and Computers. 2021-08-04
Across
- What is the highest directory in a file system?
- a popular method of cyber attack involving repeated requests
- the part of a computer that blocks unauthorized access to communications
- What measurement of space is 1024 megabytes?
Down
- The software that operates and controls devices on a computer
- a wired connection to the internet via a router/modem
- The network cabling system that uses copper
- What protocol is used to send files over the internet?
- What is the name of a smaller sized desktop?
- Temporary storage using memory for a faster experience
10 Clues: The network cabling system that uses copper • What is the name of a smaller sized desktop? • What measurement of space is 1024 megabytes? • What is the highest directory in a file system? • a wired connection to the internet via a router/modem • What protocol is used to send files over the internet? • Temporary storage using memory for a faster experience • ...
A Stronger Me 2012-07-15
Across
- Hitting someone repeatedly is what kind of abuse?
- You life is what?
- The mourning of someone is called what?
- To be discluded from the world is to be what?
- The given name to a type of technological bullying?
Down
- A group of people either family or friends or helpline
- To be uncomfortable in a situation is what type of sign?
- To be in control is having all the what?
- Attacking someone either physically, emotionally or verbally is called what?
- Someone who abuses someone to have power of them
10 Clues: You life is what? • The mourning of someone is called what? • To be in control is having all the what? • To be discluded from the world is to be what? • Someone who abuses someone to have power of them • Hitting someone repeatedly is what kind of abuse? • The given name to a type of technological bullying? • A group of people either family or friends or helpline • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
- Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
- Bei was werden gefälschte Webseiten umgeleitet ?
- Mithilfe von elektronischen Medien wird ... durchgeführt
- Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
Down
- Was versteckt sich in einem scheinbar nützlichen Programm ?
- und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
- Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
- Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
- Was ist der Überbegriff für unerwünschte, schädliche Software?
10 Clues: Bei was werden gefälschte Webseiten umgeleitet ? • Mithilfe von elektronischen Medien wird ... durchgeführt • Was versteckt sich in einem scheinbar nützlichen Programm ? • und Junke E-Mails Wie werden unerwünschte Werbemails genannt? • Sie sind in ein Dokument/Datei eingebettet und nennen sich ... • Was ist der Überbegriff für unerwünschte, schädliche Software? • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Suicide Awareness and Prevention 2023-09-21
Across
- Early diagnosis & treatment of mental disorders can lead to a _____ life
- Talking about suicide can help spread ________ of mental health
- Targets of _____ are at a greater risk of self-harm & suicidal behaviors
- Mean age of onset of adolescent depression
- Suicide _______ is a critical goal of the NJROTC program
Down
- Condition associated with cyber and other bullying
- CDC says 20% of youth experience social __________
- A potential warning sign of impending suicide is giving away _________
- A potential warning sign of impending suicide is long-term ____________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • Condition associated with cyber and other bullying • CDC says 20% of youth experience social __________ • Suicide _______ is a critical goal of the NJROTC program • Talking about suicide can help spread ________ of mental health • Mental health is often overlooked and called the "silent ________" • ...
Suicide Awareness and Prevention 2023-09-21
Across
- CDC says 20% of youth experience social __________
- A warning sign of impending suicide is long-term ____________
- Suicide _______ is a critical goal of the NJROTC program
- Condition associated with cyber and other bullying
- Talking about suicide can help spread ________ of mental health
- Mean age of onset of adolescent depression
Down
- Early diagnosis & treatment of mental disorders can lead to a _____ life
- Targets of _____ are at a greater risk of self-harm
- A warning sign of impending suicide is giving away _________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • CDC says 20% of youth experience social __________ • Condition associated with cyber and other bullying • Targets of _____ are at a greater risk of self-harm • Suicide _______ is a critical goal of the NJROTC program • A warning sign of impending suicide is giving away _________ • ...
UX Word Wizard - 5 2024-11-19
Across
- A test to differentiate humans from bots
- A component to scroll through images or content horizontally
- A list of options that appears when you click a button
- A symbol or image representing a company or a brand
- A list of options or links for navigation
Down
- The practice of making websites usable for people with disabilities
- A cyber attack focused on stealing sensitive information
- An area on a webpage for users to enter information
- A feature that enlarges or reduces the view of content
- An indication that content is loading
10 Clues: An indication that content is loading • A test to differentiate humans from bots • A list of options or links for navigation • An area on a webpage for users to enter information • A symbol or image representing a company or a brand • A feature that enlarges or reduces the view of content • A list of options that appears when you click a button • ...
wije 2025-02-24
Across
- Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
- Untuk menampilkan bagian grafik yang ingin ditampilkan
- Fitur untuk menyederhanakan dan menganalisa data
- Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
- Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
- Aturan pelindungan privasi
- Salah satu web/aplikasi chatbot populer
- Proses pemberian izin atau kewenangan untuk mengakses data tertentu
- Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
- Media sosial untuk berkomunikasi
10 Clues: Aturan pelindungan privasi • Media sosial untuk berkomunikasi • Salah satu web/aplikasi chatbot populer • Fitur untuk menyederhanakan dan menganalisa data • Untuk menampilkan bagian grafik yang ingin ditampilkan • Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor • Proses pemberian izin atau kewenangan untuk mengakses data tertentu • ...
Bullying 2025-05-02
Across
- This modern form of bullying hides behind screens
- One who intimidates or harms others to gain power
- One who witnesses bullying but doesn’t intervene
- This form of bullying leaves bruises, not just feelings hurt
Down
- Pattern of power abuse, often masked as “just teasing”
- Like all bullying — it happens again and again
- Relentless and unwanted behavior that targets a person
- This kind of abuse cuts with words, not weapons
- This silent form of bullying manipulates the mind, not the body
- One who suffers from bullying or abuse
10 Clues: One who suffers from bullying or abuse • Like all bullying — it happens again and again • This kind of abuse cuts with words, not weapons • One who witnesses bullying but doesn’t intervene • This modern form of bullying hides behind screens • One who intimidates or harms others to gain power • Pattern of power abuse, often masked as “just teasing” • ...
Find the words 2025-05-05
Across
- worldwide network for multiple users
- The process of writing code to create software or applications
- Technology that creates simulated environments that can be interacted with through special devices
Down
- group of applications for socializing and other uses
- Practices and tools to protect data and systems from cyber threats
- A mobile device that combines phone and computer functions
- An electronic device used to process data
- A device that creates three-dimensional objects from digital models
- An automated machine designed to perform tasks independently
- Technology that allows wireless communication between devices
10 Clues: worldwide network for multiple users • An electronic device used to process data • group of applications for socializing and other uses • A mobile device that combines phone and computer functions • An automated machine designed to perform tasks independently • Technology that allows wireless communication between devices • ...
Rabbit-Proof Fence Vocabulary 2024-08-17
12 Clues: cows • refuge • afraid • reptile • hurting • security • footprint • squat down • deep sadness • a dry area of land • village, community • a point of reference
Crossword - Voltedge 2019-09-06
Across
- Tool replacing Oracle HR
- Portal to view security emergency contact and other security info
- One of the focus areas of EHS
- What protocal is used to authenticate OnGuard end user's SSO
- TCT supports export control for which country?
- Measure based on the deviations of individual scores from the mean
Down
- Tool used for Rewards and Recognitions
- What is the SOX Compliant application under EHS
- Python library for machine learning
- CDA application is hosted here
10 Clues: Tool replacing Oracle HR • One of the focus areas of EHS • CDA application is hosted here • Python library for machine learning • Tool used for Rewards and Recognitions • TCT supports export control for which country? • What is the SOX Compliant application under EHS • What protocal is used to authenticate OnGuard end user's SSO • ...
Let us see who was focusing! 2023-04-15
Across
- a network security system that monitors and controls incoming and outgoing network traffic based on a set of rules.
- the business's main goal
- the relational database they use
- future goal of the e-commerce
- Increases when using a relational database
Down
- suggestion for sportszone
- Where the content was saved
- an organized collection of data that is stored and accessed electronically
- Single table structure
- a situation that sports zone considered as an opportunity
10 Clues: Single table structure • the business's main goal • suggestion for sportszone • Where the content was saved • future goal of the e-commerce • the relational database they use • Increases when using a relational database • a situation that sports zone considered as an opportunity • an organized collection of data that is stored and accessed electronically • ...
Active Directory 2015-01-14
Across
- what can active directory do (6 Letters Beginning with B)
- What is AD? [15 Letters]
- What active directory is [8 Letters]
Down
- What is the main reason active directory is used? [8 Letters]
- Beginning with B - Who uses it? [10 Letters]
- Active directory service [10 Letters]
- Protocol AD uses (4 letters - Acronym)
- Another word for Single user name and password [5 Letters]
- Improves ? Security[11 Letters]
- Active Directory improves through _ _ _ _ _ _ _ _ _ _ _ management capabilities [11 Letters]
10 Clues: What is AD? [15 Letters] • Improves ? Security[11 Letters] • What active directory is [8 Letters] • Active directory service [10 Letters] • Protocol AD uses (4 letters - Acronym) • Beginning with B - Who uses it? [10 Letters] • what can active directory do (6 Letters Beginning with B) • Another word for Single user name and password [5 Letters] • ...
Robbery 2017-07-10
Across
- First name of the second security officer
- first thing you do after a robbery
- what do you hand out to customers that witnessed the robbery
- Who is the 1st security officer
- distinctive physical characteristic
Down
- full name of the 1st contact for media
- Keep the customer ______!
- common description of suspect involving how long they have been alive
- who should you call after you lock the doors
- common description of suspect involving their size
10 Clues: Keep the customer ______! • Who is the 1st security officer • first thing you do after a robbery • distinctive physical characteristic • full name of the 1st contact for media • First name of the second security officer • who should you call after you lock the doors • common description of suspect involving their size • ...
Important Concepts 2017-11-17
Across
- Is the increasing interaction of people through the growth of the international flow
- Income advised to infaltion
- % of economy growth
- Ability to influence others based on specific characteristics
- People who share democratic and cultural similarities
- State actions taken to ensure its security that threatened the security of other states
- studies interactions between countries
Down
- Right of a nation to become an independent state
- Type of conflict in which religion could be involved
- Income
10 Clues: Income • % of economy growth • Income advised to infaltion • studies interactions between countries • Right of a nation to become an independent state • Type of conflict in which religion could be involved • People who share democratic and cultural similarities • Ability to influence others based on specific characteristics • ...
ESLA COME 2024-10-03
Across
- OS permit to creat server
- Security rules in windows server
- Security protocol use private and public key
- a machine capable of reproducing human behaviour
- Other model of OSI model more simply make by american army
Down
- Network devices in level 2 of OSI model
- Protcol to use ip @ in a other place or nation
- Model of interconnection network devices
- Protocol use in ping
- Association protocol permit to associate ip @ and MAC @
10 Clues: Protocol use in ping • OS permit to creat server • Security rules in windows server • Network devices in level 2 of OSI model • Model of interconnection network devices • Security protocol use private and public key • Protcol to use ip @ in a other place or nation • a machine capable of reproducing human behaviour • Association protocol permit to associate ip @ and MAC @ • ...
SCA Crossword Puzzle 2025-11-20
Across
- The area where bags and passengers are screened
- The person who flies the plane
- Where planes take off and land
- Where the pilot sits to fly the plane
- When a plane touches back down
Down
- What you do with your ticket and bags before security
- The building where passengers wait for flights
- When a plane leaves the ground
- Where you board your plane
- The path planes use to get to the runway
10 Clues: Where you board your plane • The person who flies the plane • When a plane leaves the ground • Where planes take off and land • When a plane touches back down • Where the pilot sits to fly the plane • The path planes use to get to the runway • The building where passengers wait for flights • The area where bags and passengers are screened • ...
COMPUTER PUZZLE 2025-06-16
Across
- hacking - hacking done for good cause
- to point - two nodes are directly connected with each other
- card - attached to computer to connect network
- - using the language or thoughts of another person as one's original work
- topology - each node is connected to every other node in the network
- - Illegal intrusion into a computer system or network
Down
- - prevents unauthorised use people from accessing your system and network
- - transforming data into a unreadable code
- practices - accessing the internet in an illegal manner
- crime- criminal activities that involve the use of computer
- - each computer in a network
- m topology - all the nodes are in circular manner
- - two or more computers located at distance places
- -bulk emails that come from unknown sources
14 Clues: - each computer in a network • hacking - hacking done for good cause • - transforming data into a unreadable code • -bulk emails that come from unknown sources • card - attached to computer to connect network • m topology - all the nodes are in circular manner • - two or more computers located at distance places • - Illegal intrusion into a computer system or network • ...
COMPUTER PUZZLE 2025-06-16
Across
- hacking - hacking done for good cause
- to point - two nodes are directly connected with each other
- card - attached to computer to connect network
- - using the language or thoughts of another person as one's original work
- topology - each node is connected to every other node in the network
- - Illegal intrusion into a computer system or network
Down
- - prevents unauthorised use people from accessing your system and network
- - transforming data into a unreadable code
- practices - accessing the internet in an illegal manner
- crime- criminal activities that involve the use of computer
- - each computer in a network
- m topology - all the nodes are in circular manner
- - two or more computers located at distance places
- -bulk emails that come from unknown sources
14 Clues: - each computer in a network • hacking - hacking done for good cause • - transforming data into a unreadable code • -bulk emails that come from unknown sources • card - attached to computer to connect network • m topology - all the nodes are in circular manner • - two or more computers located at distance places • - Illegal intrusion into a computer system or network • ...
Georgia Milestones Testing Training 2016-03-29
Across
- are used for each student for each section of the online assessment
- of test security occurs when examiners fail to follow administration directions for the test
- electronic devices should be used during testing sessions (by teachers or students)
- must be kept secure at all times
- is permitted during breaks
- can write in the test books
Down
- should be covered in testing rooms
- must monitor the integrity of the assessment, through circulation and checking in
- during the entire testing period
- responsible for test security
- begins on April 12
- o'clock is the time proctors should arrive in rooms they are proctoring
12 Clues: begins on April 12 • is permitted during breaks • can write in the test books • responsible for test security • during the entire testing period • must be kept secure at all times • should be covered in testing rooms • are used for each student for each section of the online assessment • o'clock is the time proctors should arrive in rooms they are proctoring • ...
9/11 2024-05-10
Across
- where the first attacks happened on 9/11
- the kind of tree that survived the twin tower attack
- what happened to the towers after they were hit
- month of the terrorist attacks in 2011
- president during 9/11
- new legislation passed to fight terrorism
- president that made Patriot Act become Freedom Act
- target for another terrorist plane after NYC
Down
- leader of 9/11 attacking terrorist organization
- where Americans crashed plane headed to White House
- new airport security after 9/11, Transportation Security Administration
- musical artist who wrote a song to inspire patriotism after 9/11
12 Clues: president during 9/11 • month of the terrorist attacks in 2011 • where the first attacks happened on 9/11 • new legislation passed to fight terrorism • target for another terrorist plane after NYC • leader of 9/11 attacking terrorist organization • what happened to the towers after they were hit • president that made Patriot Act become Freedom Act • ...
SAFE INTERNET 2025-02-28
Across
- A secret code used to secure accounts
- A type of malware disguised as legitimate software
- Any software designed to harm or exploit a system
- The right to protect personal information online
- A unique identifier for logging into accounts
- A tool or app used for two-step verification
Down
- A scam where attackers trick users into revealing sensitive information
- A security system that blocks unauthorized access
- A tool that encrypts your internet connection for security
- Software that protects computers from malware
- Illegal activities conducted on the internet
- Malicious software that secretly gathers user data
12 Clues: A secret code used to secure accounts • Illegal activities conducted on the internet • A tool or app used for two-step verification • Software that protects computers from malware • A unique identifier for logging into accounts • The right to protect personal information online • A security system that blocks unauthorized access • ...
3.5 Compare and contrast network access and management method 2025-09-03
Across
- Management done on a separate network for security
- Sends only some traffic through VPN, rest uses local internet
- VPN where a user connects through a web browser
- Secure intermediate system used to access another network
- VPN that allows a remote user to connect to a network
Down
- Sends all traffic through VPN for security
- Management done over the same network being monitored
- Graphical interface for managing devices
- VPN that connects two networks together permanently
- Software interface for programmatic management
- Direct connection to a device using serial or USB
- Secure command line access protocol
12 Clues: Secure command line access protocol • Graphical interface for managing devices • Sends all traffic through VPN for security • Software interface for programmatic management • VPN where a user connects through a web browser • Direct connection to a device using serial or USB • Management done on a separate network for security • ...
pazdan olaolczak03@gmail.com 2018-01-29
5 Clues: Nękanie w cyber przestrzeni • Osoba,która próbuje włamać się na komputer • Najpopularniejsza wyszukiwarka internetowa • Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu • Złośliwy program, który można pobrać z internetu nieświadomie
Cyber ethics 11 2025-05-23
5 Clues: log out from public ____. • details should be kept ____. • not open emails from ____ senders. • rule: If it’s not yours, give ____. • cyber citizens think before they ____.
Jason crossword 2025-09-09
Across
- is a computer program that simulates human conversation with an end user.
- type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- electro-mechanical data storage device that stores and retrieves digital data
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
- is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- the practice of pretending on social media to be someone different
- is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- a software program or a system desgined to help users find information
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
- is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- is an application for accessing websites.
Down
- is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- s a mobile device that combines traditional mobile technology with more advanced computing abilities.
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- networking technology that uses radio waves to provide wireless high-speed Internet access.
- In the digital age, consumers are more connected than ever before through smartphones and apps
- is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
- device designed to fit on top of a typical office desk.
- A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- A computer's short term memory , where the data that the processor is currently using is stored
- all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
27 Clues: is an application for accessing websites. • device designed to fit on top of a typical office desk. • the practice of pretending on social media to be someone different • a software program or a system desgined to help users find information • is a computer program that simulates human conversation with an end user. • ...
Safety Week#4_9 2014-10-27
10 Clues: / ดึง • / ผลัก • / เดือน • / ลูกกลิ้ง • / คอมพิวเตอร์ • / การลาพักร้อน • / ซุปเปอร์ไวเซอร์ • / การรักษาความปลอดภัย • / การดูแลความสะอาดเรียบร้อย • / คุ้มกัน หรือ อุปกรณ์ป้องกัน
TSchmidt - Network Devices 2023-01-04
Across
- all traffic flows through this for processing
- connects networks
- wired network
- this takes a single input and spreads it out amongst all outputs
- bridges reduces traffic between these
- refrigerators, dishwashers, smart tvs and thermostats are some of these
- A wireless network connects wirelessly to this
- patch panels provide a ________ between PCs and switches/routers
- an all in one security, with ids, ips, and a firewall
- protects data and equipment on a network from an unauthorized access
Down
- aps provide network access to...
- monitors all devices under or connected to a network
- another term for ethernet over power is...
- These filter and segment network traffic by sending data back to device which it was sent
- legacy systems are inherently ______ to security breaches
- passively monitors traffic on networks
- extending a signals distance and restoring weak signals
- this powers on devices that are not directly connected to power or have a battery
- Another wireless network
19 Clues: wired network • connects networks • Another wireless network • aps provide network access to... • bridges reduces traffic between these • passively monitors traffic on networks • another term for ethernet over power is... • all traffic flows through this for processing • A wireless network connects wirelessly to this • monitors all devices under or connected to a network • ...
Power Apps 2024-04-29
16 Clues: YMCA • Aces$ • Foster • Nursing • Shapiro • Security • Clinicals • Daycare Center • Concealed Carry • Access & Review • Land of Lincoln • Healthcare Worker • Illinois State Police • Firearm Owners Identification • Federal Bureau of Investigation • Needed to own a gaming machine not in a casino
Digital identity 2023-10-26
Across
- Protecting yourself on the internet (12 letters).
- Customize your online visibility (15 letters).
- What others think of you based on your actions (10 letters).
- Enhanced login security (12 letters).
Down
- Who you are on the internet (14 letters).
- Courtesy and consideration for others (7 letters).
- Key to your online security (8 letters).
- Harassment on the internet (12 letters).
- Confirm the truth of something (6 letters).
- Notify authorities of misconduct (6 letters).
10 Clues: Enhanced login security (12 letters). • Key to your online security (8 letters). • Harassment on the internet (12 letters). • Who you are on the internet (14 letters). • Confirm the truth of something (6 letters). • Customize your online visibility (15 letters). • Notify authorities of misconduct (6 letters). • Protecting yourself on the internet (12 letters). • ...
Computer Virus 2024-07-06
Across
- "Software that spies on computer activities."
- "Self-replicating malware."
- Horse: "Malware disguised as legitimate software."
- "Software designed to disrupt, damage, or gain unauthorized access."
- "A type of malicious software."
Down
- "A hidden means of bypassing security."
- "Malware that encrypts data for ransom."
- "A security system that monitors and controls incoming and outgoing network traffic."
- "Software designed to detect and remove malware."
- "Software used to gain unauthorized access and hide its presence."
10 Clues: "Self-replicating malware." • "A type of malicious software." • "A hidden means of bypassing security." • "Malware that encrypts data for ransom." • "Software that spies on computer activities." • "Software designed to detect and remove malware." • Horse: "Malware disguised as legitimate software." • "Software used to gain unauthorized access and hide its presence." • ...
Mr Müller`s last week`s vocabulary 2020-05-04
Across
- to Chat, meet,for a Long time
- someone who is not nice to you over the Internet
- time between a child and a adult
- when you like a Person and the Person like`s you too
- when i look in your eyes and you look in my eyes
- when we talk but i don`t think the same About a theme like you do
Down
- to don`t like yourself
- i look silent at you and nod
- write something on paper and send it by post
- electrial device
10 Clues: electrial device • to don`t like yourself • i look silent at you and nod • to Chat, meet,for a Long time • time between a child and a adult • write something on paper and send it by post • someone who is not nice to you over the Internet • when i look in your eyes and you look in my eyes • when you like a Person and the Person like`s you too • ...
Digital Footprint Crossword Puzzle 2020-09-30
Across
- Talking and socializing with other people
- A composition of letters, numbers, and/or symbols to get onto an electronic or website
- Inventions that solve problems or make life easier
- A big network that connects people all over the world on their electronics
Down
- Things that are online
- Someone who bullies people online
- A person or program that tries to trick people into giving away their money or information
- The victim of cyber bullying
- The searches, websites, and social media that you leave behind
- A program or error that causes an electronic to malfunction
10 Clues: Things that are online • The victim of cyber bullying • Someone who bullies people online • Talking and socializing with other people • Inventions that solve problems or make life easier • A program or error that causes an electronic to malfunction • The searches, websites, and social media that you leave behind • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Cybertrafficking Crossword Puzzle 2024-04-23
Across
- Human trafficking is a form of_______ slavery.
- The emoji cherries means ___.
- Gender most likely to be trafficked for sexual exploitation.
- Element of human trafficking.
- I am a person who has been trafficked by another person. Who am I?
Down
- Aspect of trafficking that does not need to be present in order for a situation to be considered child trafficking.
- Children can be vulnerable to ___ grooming.
- Gender most likely to be trafficking for labour exploitation.
- ___ settings helps to protect sensitive information from strangers.
- _____ scams are messages that try to trick you into providing sensitive information.
10 Clues: The emoji cherries means ___. • Element of human trafficking. • Children can be vulnerable to ___ grooming. • Human trafficking is a form of_______ slavery. • Gender most likely to be trafficked for sexual exploitation. • Gender most likely to be trafficking for labour exploitation. • ___ settings helps to protect sensitive information from strangers. • ...
unit 1 2024-12-16
Across
- use in an improper way,improper treatment,
- of time between childhood and adulthood.
- Dating-going out in a group rather than just as a couple
- Dating-casual dating that involves no commitment to help the relationship.
- Dating-dating only one person on a regular basis.
- of love and emotional attachment to another person.
Down
- who obsessively follows,observes,or contacts another person without their consent.
- continuous change.
- stalker-a person who uses the internet as a means to stalk or harass someone.
- Violence-abuse in a family or household.
- further the development of a relationship.
11 Clues: continuous change. • of time between childhood and adulthood. • Violence-abuse in a family or household. • use in an improper way,improper treatment, • further the development of a relationship. • Dating-dating only one person on a regular basis. • of love and emotional attachment to another person. • Dating-going out in a group rather than just as a couple • ...
Nicrossword 2 2024-12-23
Across
- State Wide Area Network to connect state administration offices.
- Software with source code that anyone can inspect, modify, and enhance.
- National Knowledge Network for connecting educational and research institutions.
- Protection against cyber threats and securing digital infrastructure.
- Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
- A unique identification project by the Government of India.
- Unified Mobile Application for New-age Governance.
- An ICT solution for the management of hospital services.
- A paperless office solution by NIC for government departments.
- A nationwide communication network by NIC.
10 Clues: A nationwide communication network by NIC. • Unified Mobile Application for New-age Governance. • An ICT solution for the management of hospital services. • A unique identification project by the Government of India. • A paperless office solution by NIC for government departments. • State Wide Area Network to connect state administration offices. • ...
Infomatika 9-2 Bab 1 2025-01-06
Across
- Kejahatan cyber dengan mengecoh orang lain agar memberikan data pribadi.
- Perdagangan yang menggunakan jasa jaringan telekomunikasi.
- Diskusi dan kelas online merupakan TIK dalam bidang?
- Tindakan melawan hukum seseorang menggunakan sarana komputer.
- Dapat digunakan untuk melakukan jual-beli jarak jauh adalah peran TIK dalam bidang?
Down
- Ilmu yang mempelajari tentang komputer untuk mengatur dan menganalisis data.
- Kegiatan dalam internet untuk mencari informasi dengan mesin pencari.
- Layanan perbankan dari bank yang dilakukan menggunakan SMS merupakan TIK dalam bidang?
- Kumpulan komputer di seluruh dunia yang saling terhubung membentuk suatu jaringan disebut?
- Kejahatan dengan menggunakan kartu kredit.
10 Clues: Kejahatan dengan menggunakan kartu kredit. • Diskusi dan kelas online merupakan TIK dalam bidang? • Perdagangan yang menggunakan jasa jaringan telekomunikasi. • Tindakan melawan hukum seseorang menggunakan sarana komputer. • Kegiatan dalam internet untuk mencari informasi dengan mesin pencari. • ...
Are health hackers the new cyber security threat? 2019-03-11
Across
- Request for information from a database
- A program under the US Social Security Administration that reimburses hospitals and physicians for medical care provided to qualifying people over 65 years old.
- Poor health resulting from disease of body or mind; a disease
Down
- Something aimed or fired at
- An indication of impending danger or harm
- To struggle or contend frantically in order to get something
- market A place where such illegal business is carried on.
7 Clues: Something aimed or fired at • Request for information from a database • An indication of impending danger or harm • market A place where such illegal business is carried on. • To struggle or contend frantically in order to get something • Poor health resulting from disease of body or mind; a disease • ...
Cyber Law CIA I 2021-09-01
Across
- An environment in which communication occurs through a computer network.
- A collection of web pages and other created content having a common domain.
- A network is usually private or restricted, specially created for an enterprise or an organization.
- A situation where a person gets verbally or physically threaten on the internet,
- A way to protect data for the concerned user to access it.
- the other person a mental imbalance.
- the right/powers to make rules and authority to interpret and apply them.
Down
- The conversion of text, pictures, or sound in the digital form.
- People who are frequent users of the internet.
- A structured set of files just like a stack held in a computer, which is accessible in various ways.
- A security system present in the computer which supervises the operation and network traffic as per precoded rules.
- The process of exploiting the computer system or any private network.
- It is a stated obligation and everyone has to abide by it.
- A right especially to protect the rights and expression of the original work done by the creator.
14 Clues: the other person a mental imbalance. • People who are frequent users of the internet. • It is a stated obligation and everyone has to abide by it. • A way to protect data for the concerned user to access it. • The conversion of text, pictures, or sound in the digital form. • The process of exploiting the computer system or any private network. • ...
Basic of Cyber Sercurity 2019-07-10
Across
- items or people of value online
- making sure every individual working with an information system has specific responsibilities for information assurance
- preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
- the virtual, online world
- provides a way for denial to be impossible
- a weakness or gap in our effort to protect ourselves
- assures online information is trustworthy and accurate
Down
- infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
- guarantee of reliable access to information
- three-pronged system of cybersecurity
- the practice of protecting digital and non-digital information
- a set of rules limiting access to certain information, much like privacy
- the state of being protected against criminal or unauthorized online activity
- guarantee that the message, transaction, or other exchange of information has shown its proof of identity
14 Clues: the virtual, online world • items or people of value online • three-pronged system of cybersecurity • provides a way for denial to be impossible • guarantee of reliable access to information • a weakness or gap in our effort to protect ourselves • assures online information is trustworthy and accurate • the practice of protecting digital and non-digital information • ...
Cyber Snowball Admission Test 2023-11-20
Across
- The best movie in the world
- The best sport in the world
- The country that should have won
- The best yellow character ever
- A city we were once in
- An animal that we once were
- Hotel motel holiday inn
Down
- This is for you Rhea
- The anonymous gift Hunayn received
- Lactose intolerant people hate this...
- The app everyone should have on their phones
- This is what Rida suffered with (Starts with an A)
- Second half of the best joke
- First half of the best joke
14 Clues: This is for you Rhea • A city we were once in • Hotel motel holiday inn • The best movie in the world • The best sport in the world • First half of the best joke • An animal that we once were • Second half of the best joke • The best yellow character ever • The country that should have won • The anonymous gift Hunayn received • Lactose intolerant people hate this... • ...
Computers and Technology. 2023-05-17
Across
- - Artificial intelligence is a field of computer science that aims to create machines that can think, learn, and solve problems like humans.
- - Mobile devices like smartphones and tablets have transformed the way we access information and communicate with each other, allowing us to be connected anywhere and anytime.
- - Social media platforms like Facebook, Twitter, and Instagram have transformed the way we interact with each other online and in real life.
- - Robotics involves the use of computer technology to design, build, and operate machines that can perform tasks autonomously.
- - The term "digital" refers to anything that is encoded using binary code, and has become a ubiquitous part of modern technology and culture.
- - Cloud computing allows users to access data and applications over the internet rather than relying on local hardware, enabling greater flexibility and scalability.
- - Apple Inc. is a leading technology company that has been at the forefront of innovation with its Mac computers, iPods, iPhones, and more.
- - The global system of interconnected computer networks that has transformed the way we communicate and access information.
Down
- - International Business Machines Corporation is a pioneering computer company that played a major role in the development of early computing technology.
- - Microsoft Corporation is a software company that revolutionized personal computing with its Windows operating system and Microsoft Office suite.
- - Virtual reality and virtual worlds are computer-generated environments that have opened up new possibilities for gaming, education, and entertainment.
- - The microchip is the key component of modern electronics and has enabled the development of computers, smartphones, and other devices.
- - Google is a search engine that has become synonymous with the internet, as well as a leading developer of software and technology products.
- - Silicon is the key material used in the manufacture of computer chips and other electronics.
- - The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology.
15 Clues: - Silicon is the key material used in the manufacture of computer chips and other electronics. • - The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology. • - The global system of interconnected computer networks that has transformed the way we communicate and access information. • ...
Ch 17 Intro to Business 2025-09-15
Across
- A form specifying the number of allowances in the Employee’s Withholding Allowance Certificate
- Tax on the net income of an individual
- A federal tax used to fund the public service programs Social Security and Medicare
- Tax deducted from an individual’s paycheck, such as for Social Security and Medicare
- The amount of money you earn before any payroll deductions
- Tax on income used to pay for the Medicare (health) program provided to individuals over the age of 65 or individuals with a disability
- An employer‐sponsored retirement plan, sometimes with matching funds
- All of the income received in a year
Down
- The amount of money that tax calculations are based on
- The amount that will be withheld from each paycheck
- An attachment to an employee’s paycheck that shows the amount earned and details the payroll deductions
- Tax on income paid by both the employee and the employer to fund the Social Security system
- An employment eligibility verification form filled out by both an employer and an employee
- A simple income tax form that can be used by anyone who has an income of less than $100,000 and is not claiming dependents
- An employee’s take‐home pay; net pay is calculated by gross pay with deductions subtracted
- A reduction of taxes paid on gross income
- A form prepared by an employer reporting an employee’s annual wages and the amount of taxes withheld from paychecks
17 Clues: All of the income received in a year • Tax on the net income of an individual • A reduction of taxes paid on gross income • The amount that will be withheld from each paycheck • The amount of money that tax calculations are based on • The amount of money you earn before any payroll deductions • An employer‐sponsored retirement plan, sometimes with matching funds • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
Tech 2023-10-09
15 Clues: Typing tool • Input device • Output device • Display screen • Network security • Memory component • Computer programs • Solid-state drive • Main circuit board • Malicious software • Central processing unit • Wired network connection • Electronic communication • Internet exploration tool • Physical computer components
At the airport 2025-10-22
Cyber safety- Fleur De Gans 2016-05-24
Across
- it pops up on your computer and if you say yes it can reck your computer.
- a peace of information about your visit to a website that some websites do automatically.
- tag the nickname a user chooses to be known on in Internet games.
- a app where you can see and hear your friends even when their not even near you
- it projects you from hackers
- you keep it safe and yo don't share it on websites.
- you search up things on it
- someone who can get into your device from the other side of the world.
- list a list of friends on the internet.
- the people who say it say that it's true but it's a lie.
Down
- to send information to another computer.
- a location online that allows multiple users to communicate.
- where people can reply to you on a video that you posted.
- numbers or letters that let you in
- it is messages sent over the internet for the purpose of advertising.
- a internet website where you can post photos and videos
- sharing this software enables multiple users to access the same file.
- a app that you can download and search up videos.
- bullies someone who is being mean to you on the internet
- something that goes around and you don't know if it's the truth or a lie.
20 Clues: you search up things on it • it projects you from hackers • numbers or letters that let you in • list a list of friends on the internet. • to send information to another computer. • a app that you can download and search up videos. • you keep it safe and yo don't share it on websites. • a internet website where you can post photos and videos • ...
Cyber protection, threats, and risks 2023-09-09
Across
- internet
- backing up important or all files.
- Server lacks security and can be exploited easily in a area
- monitoring your device to find threats.
- Scam emails
- A type of protection for your Wi-Fi
- demanding money to keep data intact.
- Someone who steals your files
- After an attack has happened, what to do next.
- filters traffic going to router to find threats.
- OS
Down
- Storage
- You can install apps to protect you from getting this like McAfee.
- Someone trying to break into your device to gain information
- authentication
- WiFi
- Stock market and basically digital currency
- Secures
- destroying sensitive documents for protection.
- Who to report an attack has occurred on your device too.
20 Clues: OS • WiFi • Storage • Secures • internet • Scam emails • authentication • Someone who steals your files • backing up important or all files. • A type of protection for your Wi-Fi • demanding money to keep data intact. • monitoring your device to find threats. • Stock market and basically digital currency • destroying sensitive documents for protection. • ...
Final Exam Cyber 24-25 2025-05-08
Across
- Writing instructions for the computer
- Stands for Cascading Style Sheets
- to select all the information on the screen
- Horizontal division of a spreadsheet
- to save all changes for later use
- change the appearance of the text thicker and stand out
- What the Green flag do in Scratch?
- Vertical division of a spreadsheet
- Finding and fixing errors in a program
- the shortcut to copy selected information
- What should you ALWAYS do before sending an email?
- used to create an unordered list
- Symbolic name that stores changeable data
- when page orientation; height is greater than width
- Stands for Hypertext Markup Language
- it full-screen mode
- used to define the body of an HTML document
Down
- lines- Horizontal and Vertical lines on the spreadsheet
- the file produced in a word processing program
- the appearance and shape of characters
- tag used to represent ordered list
- scripts- Coding scripts that run at the same time
- Is used to change the appearance of a website
- <p> tag in HTML represents
- to find certain text on a page
- individual box on a Google sheet (Spreadsheet)
- text horizontally or vertically in the middle of a page
- Controllable graphic character
- reference- Letter and number that represents the cell
- to print the current page
- when page orientation; width is greater than height
31 Clues: it full-screen mode • to print the current page • <p> tag in HTML represents • to find certain text on a page • Controllable graphic character • used to create an unordered list • Stands for Cascading Style Sheets • to save all changes for later use • tag used to represent ordered list • What the Green flag do in Scratch? • Vertical division of a spreadsheet • ...
Networking Concepts and Cyber Ethics 2025-06-05
Across
- It is one of the most common network setups that consists of a group of star figured workstations .
- It is a malicious technique of tricking a web user into clicking on something what user perceives.
- It is a device that connects two different types of networks with each other.
- It is a topology uses a single communication line to which all the nodes are directly connected.
- Each computer in a network.
- It refers to being aware of the ethical practices and behaving responsibly while using the internet.
- It refers to a computer network restricted to an organisation .
- It is an act of sending email to an user misleading him to believe that is a trusted person .
- It refers to an illegal intrusion into a computer system.
- It is a set of programs that disrupts the normal functioning of a computer.
- It is a topology that is connected to a central computer using a point to point connection.
- It is a type of security system .
Down
- It is the process of transforming data into unreadable code.
- It is a wireless technology used to interconnect mobile phones,etc.
- It refers to criminal activity that involve the use of computer,networks.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
- It is a larger network than LAN .
- It stands for Wireless Fidelity.
- It refers to the act of using the language and thoughts of another person as ones original work.
- It is a network device that is used to connect all the computers.
- Purchasing a single licensed copy of a software and load on to several computers.
21 Clues: Each computer in a network. • It stands for Wireless Fidelity. • It is a larger network than LAN . • It is a type of security system . • It refers to an illegal intrusion into a computer system. • It is the process of transforming data into unreadable code. • It refers to a computer network restricted to an organisation . • ...
Advance Cyber Chapter 4(2) 2025-10-14
Across
- A property of hashing algorithms meaning a small change in the input creates a significant change in the output. (2 Words)
- The length of a key, measured in bits. (2 Words)
- A digital document that binds a public key to an identity. (2 Words)
- An older symmetric block cipher with a 64-bit block size that is now considered insecure. (abbreviation)
- An asymmetric algorithm commonly used for generating and sharing keys. (2 Words)
- The unreadable, encrypted data.
- A type of encryption that uses the same key for both encryption and decryption.
- The framework of policies, standards, and software that manages digital certificates and public-key encryption. (abbreviation)
- A one-way function that converts an input of any size into a fixed-size string of text.
- The concept that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. (2 Words)
- A block cipher standard used by the U.S. government. (abbreviation)
- An outdated hashing algorithm that produces a 128-bit hash value. (abbreviation)
- The strength of this depends on the secrecy of the key, not the algorithm.
- The practice and study of techniques for secure communication in the presence of adversaries.
Down
- An entity that issues digital certificates. (2 Words)
- A symmetric algorithm that encrypts data one bit or byte at a time. (2 Words)
- A mathematical formula or process used for encryption and decryption.
- list of digital certificates that have been revoked and are no longer valid. (abbreviation)
- A cryptographic key that is known by all parties involved in the secured communication. (2 Words)
- The process of converting ciphertext back into plaintext.
- A symmetric key algorithm that encrypts data in fixed-size chunks. (2 Words)
- A property of hashing algorithms ensures that two different inputs will not produce the same output. (2 Words)
- A cryptographic method that uses two separate but related keys: one public and one private.
- A secure hashing algorithm that produces a 256-bit hash value. (abbreviation)
- The original, readable data before it is encrypted.
25 Clues: The unreadable, encrypted data. • The length of a key, measured in bits. (2 Words) • The original, readable data before it is encrypted. • An entity that issues digital certificates. (2 Words) • The process of converting ciphertext back into plaintext. • A block cipher standard used by the U.S. government. (abbreviation) • ...
Financial Math Vocab 2021-09-20
Across
- An overtime rate that is two times the hourly rate
- payroll or other types of checks that are directly and electronically deposited into a bank account
- The set amount of money that a worker recieves for each item the individual produces
- paid time off that an employer may offer to employees as an employee benefit
- an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
- the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
- a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
- the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
- one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
- social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
- the set number of hours that an employee is expected to work
- Money that employees or others recieve based on sales, for example, an author or musician
- The total pay, which is the sum of an employees hourly pay and overtime pay
- a plan that employees to buy or recieve company stock;offered as an employee benefit
- asistance to employees who are injured while working at their job, a program that is governed by state laws.
- an employee benefit that allows employees paid time off to care for sick children or newborns
Down
- The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
- a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
- a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
- the federal act that established social security insurance
- an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
- a type of retirement plan where an employee recieves compensation from an employer after retirement
- The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
- a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
- a type of worker who is paid for each item the employee produces
- a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
- a set amount that an employee is paid for each hour of work
- the hourly wage an employee recieves for any overtime hours
- a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
- A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
- The extra hours an employee works beyond their regular hours
- the maximum income on which a person must pay social security tax in a given year
32 Clues: An overtime rate that is two times the hourly rate • the federal act that established social security insurance • a set amount that an employee is paid for each hour of work • the hourly wage an employee recieves for any overtime hours • the set number of hours that an employee is expected to work • The extra hours an employee works beyond their regular hours • ...
Jason crossword 2025-09-09
Across
- is a computer program that simulates human conversation with an end user.
- type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- electro-mechanical data storage device that stores and retrieves digital data
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
- is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- the practice of pretending on social media to be someone different
- is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- a software program or a system desgined to help users find information
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
- is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- is an application for accessing websites.
Down
- is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- s a mobile device that combines traditional mobile technology with more advanced computing abilities.
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- networking technology that uses radio waves to provide wireless high-speed Internet access.
- In the digital age, consumers are more connected than ever before through smartphones and apps
- is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
- device designed to fit on top of a typical office desk.
- A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- A computer's short term memory , where the data that the processor is currently using is stored
- all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
27 Clues: is an application for accessing websites. • device designed to fit on top of a typical office desk. • the practice of pretending on social media to be someone different • a software program or a system desgined to help users find information • is a computer program that simulates human conversation with an end user. • ...
FO Training Newsletter Issue 03/2023 Quiz 2023-06-19
Across
- The most common cause of hard landing
- Manager Flight Crew Training
- All loss of control inflight is caused by human error
- Nose-high high-bank and nose-low high-bank are types of ______
- Knowledge, ______ and Attitude contributes to overall ______
- Safety and Security in the organization is the responsibility of the employer and employees
Down
- ______ pilot at the seat may cause a loss of control inflight
- Who is FO Training Senior Executive Flight Crew Training
- Poor ______ of the pilots attributed to the crash of AF447
- Proficiency in ______ helps prevent loss of control inflight
- Safety and Security is our ______
- Accretion of ______ may cause engine loss of power
- Always ______ first in any work environment
- How many editions of FO Training newsletter are published per year?
- Short form for loss of control inflight
15 Clues: Manager Flight Crew Training • Safety and Security is our ______ • The most common cause of hard landing • Short form for loss of control inflight • Always ______ first in any work environment • Accretion of ______ may cause engine loss of power • All loss of control inflight is caused by human error • Who is FO Training Senior Executive Flight Crew Training • ...
