cyber security Crossword Puzzles
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assignment - Billy Summers Crossword 2024-03-06
Across
- just behavior or treatment
- someone who writes a book
- a type of phone used by criminals
- a person accompanying another for security purposes
- a secret plan to do something unlawful
- an outfit used in order to not get recognised
- the act of getting away quickly, usually from a crime scene
Down
- a long range rifle usually equipped with a scope
- a building where criminal trials take place
- protection against and from any potential harm
- the practice of a person doing business or shoring assets overseas to avoid taxes
- an account of a person's life written as such by that person
- a killer for hire
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Vocabulary Assingment 2024-03-07
Across
- a person accompanying another for security purposes
- an account of a person's life written as such by that person
- a person who arranges deals and work between two people or groups
- just behavior or treatment
- the practice of a person doing business or shoring assets overseas to avoid taxes
- the act of getting away quickly, usually from a crime scene
- a killer for hire
Down
- a building where criminal trials take place
- the act of willful killing for any reason
- a secret plan to do something unlawful
- a type of phone used by criminals
- an outfit used in order to not get recognised
- someone who writes a book
- protection against and from any potential harm
- a long range rifle usually equipped with a scope
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Shields and Scrubs 2025-08-12
Across
- – Workplace ______ Prevention Site Committee focus.
- – The culture reinforced through consistent reporting and early intervention.
- – What staff monitor for early signs of escalation.
- – Risk assessment tool for recognizing escalating behaviors (acronym).
- – Detection systems flagged 235,000+ alerts for these in 2025.
- – Early coordinated ______ helps manage patient threats effectively.
- – Street name of the office location for Security Services.
- – Emotion expressed to acknowledge frustration and build trust.
Down
- – Response for situations involving aggressive or threatening behavior (no space).
- – A key value to uphold in all patient interactions.
- – Something to set clearly with patients showing inappropriate behaviors.
- – Issued when unsafe patient behaviors require immediate attention.
- – Department responsible for protecting staff and patients.
- – Reporting system for documenting incidents of verbal abuse or threats.
- – Built by listening and acknowledging patient concerns.
15 Clues: – Workplace ______ Prevention Site Committee focus. • – What staff monitor for early signs of escalation. • – A key value to uphold in all patient interactions. • – Built by listening and acknowledging patient concerns. • – Department responsible for protecting staff and patients. • – Street name of the office location for Security Services. • ...
WatchGuard Dictionary Day 2022-10-11
7 Clues: WatchGuard Cloud • security simplified • An easy-to-use MFA product • proactive defense strategy • WatchGuard's signature red box • WatchGuard's Security Platform • XDR based threat detection and remediation platform
week 5 spelling words 2025-02-27
14 Clues: test • party • secret • timing • weddins • security • possibly • must have • incomplete • positioned in • a qualification • for people to live in • existing or occurring at the beginning • having great influence on someone or something.
Types of markets 2022-01-25
Across
- securities with maturities of less than one year
- location where buyers and sellers of financial products meet to conduct business
- investment instruments representing equity or debt
- another name for equity
- A security representing a loan issued by a business or government is known
- A security representing ownership in a corporation is known as
- maturity less than one year
- is another name for debt
Down
- investors are risk ____ meaning given a choice of two investments of equal return, the investor will choose the investment with the lower risk.
- Expected __. amount of future cash flows
- maturity more than 10 years
- Ability to convert an investment to cash at its full value
- securities with maturities of greater than one year
- maturity 2-10 years
- return/ purchase price
15 Clues: maturity 2-10 years • return/ purchase price • another name for equity • is another name for debt • maturity more than 10 years • maturity less than one year • Expected __. amount of future cash flows • securities with maturities of less than one year • investment instruments representing equity or debt • securities with maturities of greater than one year • ...
Roaring Twenties Hour 5 2017-04-25
Across
- A machine with four wheels that can hold a small number of people
- Hoover Republican elected president in 1928.
- Lindbergh Who flew alone in his plane from New York to Paris in 33 ½ hours.
- Conservation Corps Put jobs in the forest and woods for young men.
- Coolidge Vice President of Massachusetts
- Ford Stands high among automobile makers.
Down
- Introduced to wireless telegraph
- A person exploring a new area
- Works Administration Sums were spent to build schools, highways, bridges, hospitals, and dams.
- Got people to be able buy new machines.
- brothers Kept in the air for one minute of a powered-machine they made
- The flying of an aircraft
- De Forest Invented a radio tube
- Security Act Been Expanded and extended after Social Security.
- Harding Was elected president in 1920.
15 Clues: The flying of an aircraft • A person exploring a new area • De Forest Invented a radio tube • Introduced to wireless telegraph • Harding Was elected president in 1920. • Got people to be able buy new machines. • Coolidge Vice President of Massachusetts • Ford Stands high among automobile makers. • Hoover Republican elected president in 1928. • ...
Ryan McGirr 2017-09-08
Across
- The electronic responsibilities and rules of being online.
- The use of electronic communication to bully
- Any message passed through digital devices.
- plagiarism When someone steals or takes information without permission.
- Effective passwords will help you keep your security.
- Someone you don’t know might be dangerous or bad.
- Keeping your information about yourself away from internet predators.
- When someone copies your image without permission.
- The security of your online information.
- Being online and active.
Down
- Using electronics to interact in social activities online and being responsible.
- A way to talk to friends and share stuff online.
- Digital search will help you find when you're looking for in the internet.
- The access you have to your stuff online.
- Using things on the internet fairly.
15 Clues: Being online and active. • Using things on the internet fairly. • The security of your online information. • The access you have to your stuff online. • Any message passed through digital devices. • The use of electronic communication to bully • A way to talk to friends and share stuff online. • Someone you don’t know might be dangerous or bad. • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assingment 2024-03-07
Across
- just behavior or treatment
- someone who writes a book
- a type of phone used by criminals
- a person accompanying another for security purposes
- a secret plan to do something unlawful
- an outfit used in order to not get recognised
- the act of getting away quickly, usually from a crime scene
Down
- a long range rifle usually equipped with a scope
- a building where criminal trials take place
- protection against and from any potential harm
- the practice of a person doing business or shoring assets overseas to avoid taxes
- an account of a person's life written as such by that person
- a killer for hire
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Information Security Quiz #15 2015-05-26
Across
- The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- Tapping confidential information from trash
- A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- This can slow down your computer AND watch everywhere you go on the internet.
Down
- You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- Use this tool to dispose of documents that contain personal or financial information.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- The front line of defence in information security!
- Records of IS activities
- Destruction of computer equipment or records
16 Clues: Records of IS activities • Tapping confidential information from trash • Destruction of computer equipment or records • The front line of defence in information security! • This can slow down your computer AND watch everywhere you go on the internet. • Use this tool to dispose of documents that contain personal or financial information. • ...
Enterprise Information Security Policy 2017-09-06
Across
- ____ is compromised of 60 standards
- A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
- Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
- A Credential established by a sequence of characters used as a secret key
- The physical elements of a computer system
- Verifying the identity of a user, machine, software component, device, or other entity.
- The set of characteristics by which a Person is definitively recognizable or known.
Down
- All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
- _____ implements standards to protect Protected Health Information (PHI).
- Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
- Any type of storage device that can be removed from a computer while the system is running.
- A piece of Software intended to update an electronic Information Resource.
- A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
- A person or persons responsible for supervising people or work.
- Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
- Protected Health Information acronym
16 Clues: ____ is compromised of 60 standards • Protected Health Information acronym • The physical elements of a computer system • A person or persons responsible for supervising people or work. • _____ implements standards to protect Protected Health Information (PHI). • A Credential established by a sequence of characters used as a secret key • ...
Information security -Unit 4 2022-11-18
Across
- attack using birth dates
- translating key into code
- barrier between trusted networks
- recognising somebody
- sepcial form of information
- certainty to remain safe
- Symmetric block cipher
- tool to practice encryption
- process of determining something or someone
Down
- cipher in which one character is replaced by another
- security structure to decide user privileges
- inspection
- cipher in which we use polyalphabetic substitution
- scrambling position of characters
- act of invading illegally
- method to transform a message
16 Clues: inspection • recognising somebody • Symmetric block cipher • attack using birth dates • certainty to remain safe • translating key into code • act of invading illegally • sepcial form of information • tool to practice encryption • method to transform a message • barrier between trusted networks • scrambling position of characters • process of determining something or someone • ...
Bank and Branch Security 2024-11-21
Across
- You must do this any time you are not within arms reach of your computer
- This is activated by going up or down with a pin number
- These are located at every public entrance/exit doorways
- You place customer information that you no longer need into what?
- _____________ assume a weapon is involved
- You call and ask if this person is available if things are not the way they should be when you arrive in the morning
- Keeping the _____________ of our customers is HIGH priority
- Someone that "phishes" for secure information
- Night Drop, ATM, and moving debit cards MUST be done how?
Down
- Signal that shows someone is clearing the branch
- Signal that shows the branch is safe to enter
- You NEVER give these to anyone
- You trigger this by holding down two buttons for 3 seconds
- This must be locked up at night but made readily accessible during the day
- Meeting place that you go to if there is an emergency
- ___________ ________ and do what the robber asks
16 Clues: You NEVER give these to anyone • _____________ assume a weapon is involved • Signal that shows the branch is safe to enter • Someone that "phishes" for secure information • Signal that shows someone is clearing the branch • ___________ ________ and do what the robber asks • Meeting place that you go to if there is an emergency • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
- Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
- Was ist der Überbegriff für unerwünschte, schädliche Software?
- und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
- Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
Down
- Was versteckt sich in einem scheinbar nützlichen Programm ?
- Mithilfe von elektronischen Medien wird ... durchgeführt
- Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
- Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
- Bei was werden gefälschte Webseiten umgeleitet ?
10 Clues: Bei was werden gefälschte Webseiten umgeleitet ? • Mithilfe von elektronischen Medien wird ... durchgeführt • Was versteckt sich in einem scheinbar nützlichen Programm ? • und Junke E-Mails Wie werden unerwünschte Werbemails genannt? • Sie sind in ein Dokument/Datei eingebettet und nennen sich ... • Was ist der Überbegriff für unerwünschte, schädliche Software? • ...
A Stronger Me 2012-07-15
Across
- Someone who abuses someone to have power of them
- You life is what?
- To be uncomfortable in a situation is what type of sign?
- To be discluded from the world is to be what?
- To be in control is having all the what?
Down
- The given name to a type of technological bullying?
- A group of people either family or friends or helpline
- Hitting someone repeatedly is what kind of abuse?
- Attacking someone either physically, emotionally or verbally is called what?
- The mourning of someone is called what?
10 Clues: You life is what? • The mourning of someone is called what? • To be in control is having all the what? • To be discluded from the world is to be what? • Someone who abuses someone to have power of them • Hitting someone repeatedly is what kind of abuse? • The given name to a type of technological bullying? • A group of people either family or friends or helpline • ...
Cyber Wellness Crossword Puzzle 2014-06-05
Across
- Do not set __________ password for your account.
- Cyber bullying is using the social–network to _________ others online.
- Be ________ for your words and actions online.
- Be ________ of what you post online, they can hurt others.
- If you do not want to _________ the song, you should buy the CD.
Down
- What is one very famous website for watching videos?
- You can find help from your teacher or _________.
- Do not post things that will hurt others on social _________.
- Do not use the same ________ for all your accounts.
- We should not download games and movies _________.
10 Clues: Be ________ for your words and actions online. • Do not set __________ password for your account. • You can find help from your teacher or _________. • We should not download games and movies _________. • Do not use the same ________ for all your accounts. • What is one very famous website for watching videos? • ...
Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class 2021-10-08
Across
- Most type form of Plagiarism
- name of the software that can perform multiple language checks for plagiarism
- Unintentional Plagiarism
- The Indian act that covers Plagiarism is Indian ……….. Act , 1957
- A Type of irresponsible authorship that leads to plagiarism
- one study multiple articles refers to what type of Plagarism
Down
- Copying content from the internet is which type of plagiarism
- Failure to appropriately credit others' prior discoveries
- Marks If there is a need to reproduce a ‘short’ exact text from elsewhere, following should be used in the paper
- One of the consequences of plagiarism
10 Clues: Unintentional Plagiarism • Most type form of Plagiarism • One of the consequences of plagiarism • Failure to appropriately credit others' prior discoveries • A Type of irresponsible authorship that leads to plagiarism • one study multiple articles refers to what type of Plagarism • Copying content from the internet is which type of plagiarism • ...
Cybersecurity and Healthcare 2021-05-31
Across
- Limiting the risks or impacts of a cyber threat.
- Generic term for computer viruses, trojans, etc. designed for malicious purposes.
- A type of cyberattack that holds your systems or information hostage until a ransom is paid.
- You should never share this.
- The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
- When should you report an IT breach or potential breach?
- A cyberattack attempting to discover your personal information.
- Federal law protecting patient privacy.
- The US Food and Drug Administration.
- Whose responsibility is cybersecurity?
10 Clues: You should never share this. • The US Food and Drug Administration. • Whose responsibility is cybersecurity? • Federal law protecting patient privacy. • Limiting the risks or impacts of a cyber threat. • When should you report an IT breach or potential breach? • A cyberattack attempting to discover your personal information. • ...
Ty Violet-bullying 2022-03-04
Across
- you are the victim of a bully
- what type of person is hurting the bullied
- you are getting bullied by someone in front of your friends
- this is a type of bullying that removes people from groups
- what type of bullying is a person who watches and does nothing
Down
- you are hurting people by words
- you are hurting the person next to you
- of power what is the b in the ABC's of bullying
- Michel pushed Brandon what type of bullying is this.
- this type of bullying is done online
10 Clues: you are the victim of a bully • you are hurting people by words • this type of bullying is done online • you are hurting the person next to you • what type of person is hurting the bullied • of power what is the b in the ABC's of bullying • Michel pushed Brandon what type of bullying is this. • this is a type of bullying that removes people from groups • ...
Friday fun 2023-12-14
Across
- If 13=m and 20=t, how much is 8+1+3+11+5+4
- 1010011010
- This cyber-related term can come from anywhere!
- If the weather is between #03a2ff and 104, 3, 255, how is it?
- Go forward go back, nothing has changed..
Down
- The publisher of 9th best-selling game in the USA in 2020
- The last name of the person on the list of people on the world's first www-page.
- German word in the middle, coming soon
- A coding snake
- 01100011 01100101 01110010 01101110
10 Clues: 1010011010 • A coding snake • 01100011 01100101 01110010 01101110 • German word in the middle, coming soon • Go forward go back, nothing has changed.. • If 13=m and 20=t, how much is 8+1+3+11+5+4 • This cyber-related term can come from anywhere! • The publisher of 9th best-selling game in the USA in 2020 • If the weather is between #03a2ff and 104, 3, 255, how is it? • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Suicide Awareness and Prevention 2023-09-21
Across
- Talking about suicide can help spread ________ of mental health
- Condition associated with cyber and other bullying
- CDC says 20% of youth experience social __________
- Early diagnosis and treatment of mental disorders can lead to a ____________ life
- Targets of _____________ are at a greater risk of self-harm and suicidal behaviors
Down
- A potential warning sign of impending suicide is giving away _________
- Mean age of onset of adolescent depression
- Suicide _____________ is a critical goal of the NJROTC program
- A potential warning sign of impending suicide is long-term ____________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • Condition associated with cyber and other bullying • CDC says 20% of youth experience social __________ • Suicide _____________ is a critical goal of the NJROTC program • Talking about suicide can help spread ________ of mental health • Mental health is often overlooked and called the "silent ________" • ...
wije 2025-02-24
Across
- Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
- Untuk menampilkan bagian grafik yang ingin ditampilkan
- Fitur untuk menyederhanakan dan menganalisa data
- Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
- Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
- Aturan pelindungan privasi
- Salah satu web/aplikasi chatbot populer
- Proses pemberian izin atau kewenangan untuk mengakses data tertentu
- Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
- Media sosial untuk berkomunikasi
10 Clues: Aturan pelindungan privasi • Media sosial untuk berkomunikasi • Salah satu web/aplikasi chatbot populer • Fitur untuk menyederhanakan dan menganalisa data • Untuk menampilkan bagian grafik yang ingin ditampilkan • Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor • Proses pemberian izin atau kewenangan untuk mengakses data tertentu • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
digital media 2023-10-10
puzzle 5 2024-07-10
5 Clues: A personal area online • Ability to use or enter • A copy of your files for safety • Program that fights harmful software • Related to computers and the internet
Chapter 5 2013-10-18
Across
- A contractual term where goods that are sold are paid for upon receipt.
- Person owing funds under a construction contract must retain a specified percentage to be paid at a later time.
- A chattel used to indicate to a purchaser the nature of similar goods usually to be delivered in the future; those goods must match the sample.
- Creditors who have taken steps to ensure that they will be paid, usually by acquiring first claim to some property that ensures payment over other creditors.
- Offences under provincial statutory or regulations that impose penalties but do not qualify as criminal law.
- A legislated requirement for incorporating a company in some jurisdictions in Canada; also the process of filing a form to perfect a security under the Personal Property Security Act.
- This involves the practice of placing two prices on an item and the merchant charging the higher of the two.
- Where goods are purchased on the basis of a description set out in an advertisement or on packaged materials, including all manufactured goods.
- Proceeding in which a receiver is appointed for a corporation that has defaulted on its obligations to a creditor to protect its assets for the creditors.
- A receipt for goods in the care of the shipper.
- The seller provides credit to the purchaser, holding title until the goods are paid for.
- Goods must be usable by the purchaser in the way normally intended.
- Creditors that are secured so that they have a priority with respect to their claims again the debtor.
- Designed to ensure that consumers are treated fairly in the marketplace.
- A requirement of the Sale of Goods Act imposing an obligation on the seller to ensure a certain standard of fitness and quality on the goods they sell.
- A contract term placing the responsibility for arranging and paying for the insurance and freight for goods being transported from seller to purchaser.
- Licensed professionals who, for a fee, assist the debtor and creditors in the bankruptcy process, holding and otherwise dealing with that bankrupt's property for the benefit of the creditors.
- An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving individual debtor's involving lesser indebtness the right to make a proposal to creditors, which if accepted and performed will avoid bankruptcy.
- Where a product is advertised at a low price and the purchaser is persuaded to purchase a higher priced product when the lower price one is not available.
- Where competitors biding on a product coordinate to determine the winning bid.
- Process by which an insolvent person voluntarily or involuntarily transfers assets to a trustee for distribution to creditors.
- General creditors; there is only a contract requiring a debt to be repaid, but no collateral contract giving that creditor priority with respect to some property in the event of default.
- Offences under provincial legislation or federal regulatory statutes that impose penalties but do not qualify as criminal law.
- Where two or more individuals act together to accomplish an illegal purpose.
- Under the Personal Property Security Act where value has been given pursuant to contract and the creditor now has a claim against assets used as security.
- Seller retains the right to stop the shipment in event of default.
- When an agreement has been made; but before there has been any performance.
Down
- An individual purchasing goods or services not for resale or to be used in a business.
- Where title to a chattel is transferred to a creditor as security for debt.
- Where competitors agree on a fixed price for selling their services or merchandise thus keeping prices high and defeating competition.
- Collateral right to debt giving the creditor the right to take back the goods or intercept the debt owing used as security in the event of a default.
- An obligation on the seller under the sale of Goods Act to convey ownership in the goods being sold.
- An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving corporations and debtors with significant debt the right to make a proposal to creditors, which if accepted and performed, will avoid bankruptcy.
- Court ordering the transfer of debtor's assets to a trustee as part of the bankruptcy process.
- An interest in property giving a creditor a prior claim to that property, often called a lien.
- Punishable wrongdoing associated with bankruptcy such as withholding information or wrongfully transferring assets.
- A fraudulant investment scheme where funds invested by later investors are used to pay off earlier investors, creating a false sense of success.
- A voluntary transfer of assets to a trustee in bankruptcy.
- A bankrupt is discharge but still required to pay a specified amount to creditors, as opposed to an absolute discharge where no such conditions are imposed.
- Merchants temporarily transfer to a creditor the right to collect money owed to the merchant by customers as security for a loan.
- Where the bankrupt is relieved of his debts, and his assets are no longer under the control of the trustee.
- When a person is unable to pay his or her debts as they become due.
- Registering a security or taking a possession of the collateral used to secure a debt under the Personal Property Security Act.
- Free on board: a term designating the point that title and responsibility for goods sold transfers to the purchaser.
44 Clues: A receipt for goods in the care of the shipper. • A voluntary transfer of assets to a trustee in bankruptcy. • Seller retains the right to stop the shipment in event of default. • Goods must be usable by the purchaser in the way normally intended. • When a person is unable to pay his or her debts as they become due. • ...
Comp B 2023-12-06
Across
- Main screen and user interface of a computer
- Process of encoding data for security purposes
- Input device for controlling on-screen movement
- Security measure to protect a computer from unauthorized access
Down
- Device for converting physical images into digital format
- Wireless technology for connecting devices
- Activity of playing video or computer games
- Central unit that performs calculations in a computer
- Temporary storage area for frequently accessed data
- Collection of songs organized for playback
10 Clues: Wireless technology for connecting devices • Collection of songs organized for playback • Activity of playing video or computer games • Main screen and user interface of a computer • Process of encoding data for security purposes • Input device for controlling on-screen movement • Temporary storage area for frequently accessed data • ...
Crossword - Voltedge 2019-09-05
Across
- What is the SOX Compliant application under EHS
- Tool replacing Oracle HR
- Measure based on the deviations of individual scores from the mean
- One of the focus areas of EHS
- CDA application is hosted here
Down
- Tool used for Rewards and Recognitions
- What protocal is used to authenticate OnGuard end user's SSO
- Python library for machine learning
- Portal to view security emergency contact and other security info
- TCT supports export control for which country?
10 Clues: Tool replacing Oracle HR • One of the focus areas of EHS • CDA application is hosted here • Python library for machine learning • Tool used for Rewards and Recognitions • TCT supports export control for which country? • What is the SOX Compliant application under EHS • What protocal is used to authenticate OnGuard end user's SSO • ...
SC crossword - v2 2025-12-22
Across
- The area where bags and passengers are screened
- The building where passengers wait for flights
- The path planes use to get to the runway
- Where the pilot sits to fly the plane
Down
- Where you board your plane
- Where planes take off and land
- When a plane touches back down
- What you do with your ticket and bags before security
- The person who flies the plane
- When a plane leaves the ground
10 Clues: Where you board your plane • Where planes take off and land • When a plane touches back down • The person who flies the plane • When a plane leaves the ground • Where the pilot sits to fly the plane • The path planes use to get to the runway • The building where passengers wait for flights • The area where bags and passengers are screened • ...
Human Rights 2020-12-14
Human Rights 2020-12-14
Thanksgiving Puzzle 2022-10-17
Across
- Occurs after eating to much, known as a food ____.
- Which state did the pilgrims land?
- Thanksgiving is held on what day each year.
- A noise typically associated with turkeys
- Two people hold opposite ends till it breaks in half, the bigger side is deemed the winner.
- The location of the Macy's Day Parade.
- Tastes better than turkey.
Down
- The day after thanksgiving commonly known for all the deals offered.
- A holiday that is celebrated by excessive eating.
- What is the current month we are in?
- The main dish served for thanksgiving dinner.
- The name of the ship the pilgrims came on.
- Usually the last float in the Macy's Day Parade.
- What day does the cyber version of black fridat occur?
14 Clues: Tastes better than turkey. • Which state did the pilgrims land? • What is the current month we are in? • The location of the Macy's Day Parade. • A noise typically associated with turkeys • The name of the ship the pilgrims came on. • Thanksgiving is held on what day each year. • The main dish served for thanksgiving dinner. • ...
Unit 9: Digital Health 2024-04-22
Across
- a health professional who diagnoses medical conditions
- patients can use social media to choose doctors by reading _____ from other patients about their experience
- a word that means 'not good enough'
- your digital _______ includes all the actions you take online
- a person who receives medical treatment
- ______-bullying includes targeting and threatening someone online
- something that is trustworthy
Down
- patients can use social media to find online _____ groups
- you must be careful online as some information may be _____ and incorrect
- a word that means loneliness
- _____ media allows people to interact online, examples include facebook and instagram
- a person who steals important information online
- the most popular social media platform in the UAE
- a mental health problem involving a lot of worry and stress
14 Clues: a word that means loneliness • something that is trustworthy • a word that means 'not good enough' • a person who receives medical treatment • a person who steals important information online • the most popular social media platform in the UAE • a health professional who diagnoses medical conditions • patients can use social media to find online _____ groups • ...
Bullying 2024-08-20
Across
- Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
- Tindakan yang melibatkan perundungan secara berkelompok.
- Mempermalukan seseorang di depan orang lain
- Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
- Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
- Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
- Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
- Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
- Tindakan menyebar informasi palsu tentang seseorang.
- Perasaan tidak berdaya dan tertekan akibat tindakan bullying
- Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
- Kata untuk seseorang yang melakukan bullying.
- Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
- Jenis bullying yang terjadi melalui media sosial atau teknologi digital
14 Clues: Mempermalukan seseorang di depan orang lain • Kata untuk seseorang yang melakukan bullying. • Tindakan menyebar informasi palsu tentang seseorang. • Tindakan yang melibatkan perundungan secara berkelompok. • Perasaan tidak berdaya dan tertekan akibat tindakan bullying • Kata untuk mengidentifikasi individu yang menjadi sasaran bullying • ...
Financial Math Vocab 2021-09-20
Across
- An overtime rate that is two times the hourly rate
- payroll or other types of checks that are directly and electronically deposited into a bank account
- The set amount of money that a worker recieves for each item the individual produces
- paid time off that an employer may offer to employees as an employee benefit
- an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
- the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
- a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
- the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
- one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
- social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
- the set number of hours that an employee is expected to work
- Money that employees or others recieve based on sales, for example, an author or musician
- The total pay, which is the sum of an employees hourly pay and overtime pay
- a plan that employees to buy or recieve company stock;offered as an employee benefit
- asistance to employees who are injured while working at their job, a program that is governed by state laws.
- an employee benefit that allows employees paid time off to care for sick children or newborns
Down
- The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
- a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
- a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
- the federal act that established social security insurance
- an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
- a type of retirement plan where an employee recieves compensation from an employer after retirement
- The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
- a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
- a type of worker who is paid for each item the employee produces
- a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
- a set amount that an employee is paid for each hour of work
- the hourly wage an employee recieves for any overtime hours
- a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
- A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
- The extra hours an employee works beyond their regular hours
- the maximum income on which a person must pay social security tax in a given year
32 Clues: An overtime rate that is two times the hourly rate • the federal act that established social security insurance • a set amount that an employee is paid for each hour of work • the hourly wage an employee recieves for any overtime hours • the set number of hours that an employee is expected to work • The extra hours an employee works beyond their regular hours • ...
3.4 Crossword 2024-10-19
14 Clues: жол, дорога • жұмыс, работа • ақылды, умный • оғаш, странный • сағыну, скучать • туған, рожденный • әкелу, приносить • кейбір, несколько • кәмпиттер, конфеты • қауіпсіздік, охрана • тауық, курица, цыпленок • жылы шырайлы, дружелюбный • қол бұлғау, махать (рукой) • үйрету, учить, преподавать
GSPR Knowledge 2022-12-04
14 Clues: who signs • PR Hospital • PR gatecheck • not football • procure to.. • legal matters • regulated div • security impact • supplier control • first step to six • engagement metric • inflationary pain • kick-off governance • personal development framework
PROTECTING YOUR COMPUTER 2016-04-24
Across
- Security __________ offer a wide range of protection.
- These type of evaluations are a great way to check it out.
- This OS has built in protections.
- These products offer advanced users a pick-and-mix approach.
- Do this often to keep the best protection.
- These should be installed regularly.
- These also have built in security settings.
Down
- These reviews are better than the manufacturer review.
- One of the three components protection should contain.
- Official looking notices that warn of viruses and a fix.
- Best software against Internet threats.
- System _________ takes you back to a time before the problem.
- This should be done to your computer at least once per week.
- Never forget to reverse this action when done.
14 Clues: This OS has built in protections. • These should be installed regularly. • Best software against Internet threats. • Do this often to keep the best protection. • These also have built in security settings. • Never forget to reverse this action when done. • Security __________ offer a wide range of protection. • These reviews are better than the manufacturer review. • ...
CyberSmart Crossword 2025-09-26
Across
- What to do when walking a visitor through secure areas
- A dishonest scheme or trick
- Malicious software that locks files until money is paid
- Type of information that must be carefully guarded
- What you should do with a suspicious email
- Fraudulent emails that trick people into revealing personal info
- – What you should do to your workstation when you leave your desk
Down
- A secret code used to access systems or accounts
- Software patches that fix bugs and security flaws
- Malicious code that spreads from one computer to another
- Software that secretly collects your information
- Worn to identify you as an employee
- Watching over somebody's shoulder to see what they are typing
- What good security habits do for your data
14 Clues: A dishonest scheme or trick • Worn to identify you as an employee • What you should do with a suspicious email • What good security habits do for your data • A secret code used to access systems or accounts • Software that secretly collects your information • Software patches that fix bugs and security flaws • Type of information that must be carefully guarded • ...
Compliance 3 2023-03-28
Across
- ________ email sending shall be prohibited. (Information Security Policy)
- The ________ gifts should NOT be given to vendor/supplier China Mobile subsidiaries, government institutions and HQ of PRC state-owned enterprises. (Gift policy)
- Access log records in site access control and surveillance systems shall be kept for a minimum of ____ days. (Information Security Policy)
- ________ units have the responsibility to monitor public sentiment within the scope of business. (Public Sentiment Management Policy)
- ______ refers to a situation in which a person decides to report serious concerns about any suspected misconduct, malpractice or irregularity within the Company. (internal control policy)
Down
- _______ committee conducts the meeting which is responsible for sourcing, and make the approval in accordance with the relevant provisions of the ______ policy. (conference management policy)
- The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)
- All units can provide their preferred gift suggestions. __________ Division will evaluate and add the executable gifts to the list prepared in the middle and end of the year. (Gift policy)
- Three types of _________ Sponsorships are available to staff: team nomination, professional membership and professional certification examination sponsorship. (Education Sponsorships Policy)
- Passwords shall be ____ or more characters. (Information Security Policy)
10 Clues: ________ email sending shall be prohibited. (Information Security Policy) • Passwords shall be ____ or more characters. (Information Security Policy) • The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy) • ...
Financial Jargons 2022-10-26
Across
- a fixed income investment which is issued by the government or a company to its buyers
- a market where the prices of the stocks are increasing over a prolonged period of time
- It shows the average number of stocks which are traded during a particular time
- It relates to the amount of money or the value in cash that the holder of a security will obtain from the issuer of the security when the security matures at the specific date
- It shows how much a company or firm pays out in every year as compared to the stock price Income Stock
Down
- It is a form of fixed-income instrument which is not backed by security of any physical assets or collateral of the issuer
- An entity who purchases or sells investments/stocks on behalf of the investor/trader in return for a commission
- These are equity shares of companies which are well-established and financially stable
- It refers to a period in which the prices of equity shares fall consistently
- It is the final price on a specific trading day at which the equity shares of a company are sold or traded
10 Clues: It refers to a period in which the prices of equity shares fall consistently • It shows the average number of stocks which are traded during a particular time • a fixed income investment which is issued by the government or a company to its buyers • These are equity shares of companies which are well-established and financially stable • ...
Bradley 2025-11-07
Across
- A card that lets you borrow money up to a limit to buy things, and pay it back later with interest if unpaid
- The percentage charged by a lender for borrowing money, or earned when saving money.
- Something valuable (like a house or car) that a lender can take if the borrower doesn’t repay a loan.
- An interest rate that can change over time, depending on the market.
- A loan used to buy a house, where the house is the security for the loan.
- Replacing an old loan with a new one, usually to get a better interest rate or lower payments.
- A person or company (like a bank) that lends money to someone.
- The length of time you have to repay a loan.
Down
- A card that takes money directly from your bank account when you buy something.
- An asset (like a car or house) a borrower gives as security for a loan.
- A set period of time a loan or deposit lasts (e.g. a 3-year loan).
- The original amount of money borrowed or invested, not including interest.
- An interest rate that stays the same for the whole loan term.
- Money borrowed that must be paid back, usually with interest.
- The person who takes money from a lender and promises to pay it back.
- The maximum amount you can borrow or spend (for example, on a credit card).
- The chance of losing money or something valuable when making a financial decision
17 Clues: The length of time you have to repay a loan. • An interest rate that stays the same for the whole loan term. • Money borrowed that must be paid back, usually with interest. • A person or company (like a bank) that lends money to someone. • A set period of time a loan or deposit lasts (e.g. a 3-year loan). • ...
Unit 11 2023-02-27
Bullying 2012-10-18
Across
- ______ are most likely to be bullied online.
- It is important to raise _________ of bullying in your community.
- It is important to tell a teacher or trusted ______ if bullying is occuring.
- bullying is a form of _______.
- To treat another kindly, with patience and care.
- A person who observes the bullying behavior.
- Physical or emotional injury to someone.
- Help prevent bullying by taking _______.
Down
- Mental bullying occurs when bullies spread _____ about someone.
- A way of bullying by using email or a cell phone.
- If extra help is needed there are ______ groups.
- Making a statement or taking action that shows harm to another.
- Rumor or talk of a personal, sensational, or intimate nature.
- Racist remarks and name calling are forms of ______ bullying.
- Most bullies try to get a _____ from their targets.
15 Clues: bullying is a form of _______. • Physical or emotional injury to someone. • Help prevent bullying by taking _______. • ______ are most likely to be bullied online. • A person who observes the bullying behavior. • If extra help is needed there are ______ groups. • To treat another kindly, with patience and care. • A way of bullying by using email or a cell phone. • ...
Crossword 2021-02-14
15 Clues: luggage • airport • monitor • bus stop • passport • to travel • passenger • boarding pass • to get in line • to take a taxi • flight attendant • round trip ticket • to go on vacation • to pack a suitcase • to go through security
Virtual Learning 2024-08-11
15 Clues: - Typing tool. • - Post a file. • - Video device. • - Security code. • - Saved webpage. • - Internet tool. • - Access account. • - Web connection. • - Short assessment. • - Silence your mic. • - Video call platform. • - Online conversation. • - Small discussion group. • - Online course platform. • - Live video transmission.
CROSSWORD 9th APRIL 2018-04-03
12 Clues: ERA • LABEL • COMBAT • SALARY • INFERIOR • SECURITY • A MOINS QUE • CANDID/DIRECT • MORE AND MORE • ACT DISHONESTLY • REMAINS OF A FIRE • WOMAN RECENTLY MARRIED
System Securiy 2018-07-12
Across
- The most effective way to achieve data security
- a code which unlocks personal accounts
- An attack which requires trial and error.
- and theft Act of stealing computer information.
- A category of manipulating in order to reveal personal information.
- Its also known as antivirus
- faking to be someone else in order to acquire information.
- Its an computer attack which has a code embedded in a badly designed application.
- A set of rules that limit computer network access
Down
- A type of viruses.
- monitoring computer network trafficking to gather information
- is an attempt to check the security of facilities
- A type of attack which prevents users from accessing servers.
- Higher accessed people have a wider set of information in comparison to lower level users
- To protect a network or system
15 Clues: A type of viruses. • Its also known as antivirus • To protect a network or system • a code which unlocks personal accounts • An attack which requires trial and error. • The most effective way to achieve data security • and theft Act of stealing computer information. • is an attempt to check the security of facilities • A set of rules that limit computer network access • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assingment 2024-03-07
Across
- a type of phone used by criminals
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
- the act of getting away quickly, usually from a crime scene
- a person accompanying another for security purposes
- the practice of a person doing business or shoring assets overseas to avoid taxes
- a secret plan to do something unlawful
Down
- a killer for hire
- protection against and from any potential harm
- an account of a person's life written as such by that person
- a long range rifle usually equipped with a scope
- an outfit used in order to not get recognised
- a building where criminal trials take place
- just behavior or treatment
- someone who writes a book
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY 2025-04-21
Across
- It is recognized as a significant social and political endeavor that promotes gender equality and addresses violence against women.
- Analyzes state politics, economics, and nationalism, noting that feminist movements may disrupt national unity or economic progress if viewed against government policies.
- Explores how governments use force to maintain control and suppress dissent, with activists becoming targets if viewed as inciting unrest or challenging state authority.
- Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors.
- Accentuate the socialconstruction of reality and the critical role of identity and societal norms.
- Focuses on individual empowerment over state security; feminist movements expose issues like gender violence, risking state backlash.
- National Commission to Prevent and Eradicate Violence
Down
- Explores how gender power dynamics shape security. Feminists can be seen as threats when they challenge patriarchal systems supporting national security
- Argues that state sovereignty and security can lead to groups such as feminist movements being perceived as challenging established norms.
- Analyzes the motivations, beliefs, and actions of influential leaders in feminist movements. Governments often perceive feminists as threats, influenced by specific individuals who embody larger challenges to authority.
10 Clues: National Commission to Prevent and Eradicate Violence • Accentuate the socialconstruction of reality and the critical role of identity and societal norms. • Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors. • ...
PPB 0035.14 - Mobile Computing 2020-11-13
Across
- Internet standard that has security vulnerabilities.
- Security __________ must be in place prior to its implementation.
- Health information stored or captured by clinicians or if it is communicated to a healthcare provider who uses it to deliver care is governed by what law (i.e. PHIPA)?
- To support a facility’s functional needs for staying connected to a network, __________ points are created.
- Other than tracking health records, what is the other challenge for HIM professionals when these information are residing on mobile devices?
- Applications used in mobile devices allow healthcare providers and patients to access to __________ test results, medical records, and reference materials.
- What are used for storing addresses, organizing tasks, and scheduling functions?
- __________ or Wi_Fi is the technology used to connect devices and computers together.
- These devices, known as mobile healthcare computing devices or abbreviated __________, range from the size of a cell phone with a tiny screen to tablets.
- This must be required to access a mobile device.
- Evolution in mobile technology and the use of wireless networks has opened many doors to support mHealth, however, mobile devices may also provide challenges such as ___________ and data loss.
- mhealth refers to the use of mobile and __________ devices to improve healthcare.
- Wifi access provides clinicians with more mobility and what?
- The use of mobile devices is an important ___________ that Infoway believes can address several of the key challenges facing the healthcare system.
- Health information generated by a mobile device that uses medical records for situations such as audits, health research, and information reporting are what type of applications?
- Typically, clinicians use cellular phones and __________ for communication.
- A study found that approximately __________ of physicians had increased productivity with the use of this technology in the hospital setting.
- Healthcare organizations would need to outline the ____________ and acceptable uses of mobile devices that capture and store clinical information.
- If a healthcare organization is implementing mHealth into their system, they must take ownership and the possibility of device loss or ___________ into consideration.
- According to Canada Health Infoway (Infoway), Clinicians want portable, __________, and useful tools to assist them in their practice.
- In order to evolve to address their privacy and security considerations, healthcare organizations must put out ___________ and regulation.
Down
- mHealth can be downloaded by consumers from provider portals or by health providers to collect, record and report information either manually or via interfaces with what devices?
- What must clinicians search for to achieve the most effective application(s) for their myriad of needs?
- What will be harmonized with mHealth’s initiatives and directions in the short and long-term once policies are implemented?
- Policies would need to address mobile device ____________.
- The most popular connection is __________ that allows high speed transfer.
- Remotely monitoring hospital patients or the elderly can free up much needed what in hospitals and nursing homes?
- mHealth has the potential to benefit society in a number of ways, such as cutting the costs of providing healthcare, maintaining and improving __________ of care, and reaching patients in remote locations.
- Intermittently connected MHCD’s pose what great risk?
- __________ can also be used as a tool for patients to manage appointments, renew prescriptions, or view medical records.
- With this implementation, practitioners can access the hospital’s internet guidelines in what way?
- The term __________ health has become visible as a new capability of information management within health delivery organizations (HDOs).
- Where should policy makers and program managers need to be aware of privacy security issues to ensure appropriate policies and strategies are developed and implemented?
- Studies predict mHealth has the potential to reduce the __________ burden of healthcare delivery for clinicians by 20 to 30 percent.
- The functional categories of MHCDs each have different requirements for __________, security, communication, and systems integration.
- mHealth is also part of an organization’s ___________ health record and is subject to requests for disclosures, subpoenas, and e-discovery.
- It is also empowering the elderly by providing them with __________involvement in their treatment.
- What type of devices do practitioners use in order to access databases, drug details, or drug reactions?
- What must be replaced in order for information updates to be done?
- Message ___________ security and data storage security can put citizen information at risk if the necessary precautions are not taken.
- The use of these technologies can __________ healthcare costs by supporting care delivery, promoting healthy behavior changes in patients, and transforming the caregiver-to-patient and care-giver-to caregiver relationships.
- Many functions that can be performed and being ported to mobile platforms are using what kind of clinical information system?
- To avoid problems, assessing the validity of the quality of mHealth applications should include privacy, security, ___________, and content features.
- Many challenges include preventing unauthorized access to, ensuring that it is not stored on a mobile device, and particularly dealing with what kind of sensitive patient information?
- Physicians are increasingly using smartphones which allows them to access medical resources in order to support __________ based decision making.
- mHealth implementers must pay attention to storage issues and the concept of the extensive amount of health data being generated is called?
- mHealth also has the potential to reduce the per __________ cost of healthcare, while simultaneously maintaining or improving care quality.
- What control concerns are related to these mobile devices that must be dealt with and resolved?
- Policies may be involved in how mobile devices are handled when the information they contain may become involved in what potential legal action?
49 Clues: This must be required to access a mobile device. • Internet standard that has security vulnerabilities. • Intermittently connected MHCD’s pose what great risk? • Policies would need to address mobile device ____________. • Wifi access provides clinicians with more mobility and what? • Security __________ must be in place prior to its implementation. • ...
Competency 5, Information Security 2020-10-10
Across
- A method for confirming users' identities.
- A virus and worm are two types.
- Right to choose the conditions and the extent to which information and beliefs are shared with others. Informed consent for the release of medical records represents the application of information privacy.
- The protection of physical items, objects, or areas from unauthorized access and misuse.
- US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
- Electronic tool that can track system access by individual user, by user class, or by all persons who viewed a specific client record.
- Unspoken understanding that private information shared in a situation in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
- Freedom to do things without other people watching you or knowing what you are doing. Privacy includes the right to determine what information is collected, how it is used, and the ability to access collected information to review its security and accuracy.
- Acronym for the exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies.
- Acronym for Health Insurance Portability and Accountability Act.
Down
- Protection of information systems and the information housed on them from unauthorized use or threats to integrity.
- The exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies
- The protection of non-tangible items such as software and data integrity from unauthorized access and misuse.
- Programs written for the purpose of stealing information, causing annoyance or performing covert actions.
- Data that has been interpreted.
- Type of gateway designed to protect private network resources from outside hackers, network damage, and theft or misuse of information.
16 Clues: A virus and worm are two types. • Data that has been interpreted. • A method for confirming users' identities. • Acronym for Health Insurance Portability and Accountability Act. • The protection of physical items, objects, or areas from unauthorized access and misuse. • ...
Security awareness month 2021 2021-10-04
Across
- Tide's bug bounty program
- This is commonly assigned to bank customers for use with ATMs and for use with debit cards.
- Security is the job of __________.
- A service that both encrypts your data and hides your IP address
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Tide's Information classification procedure has four colours. Green, Amber, Red and _________.
- Unauthorised person follows an authorised individual to enter a typically secured area.
- Any data that could potentially be used to identify a particular person.
Down
- You should _____ a device before stepping away from it.
- Where is Tide's Information Security Management System kept
- You message in this channel if an incident occurs.
- For a password to be secure, it should contain upper and lower case letters, numbers, and ________
- You should never share your __________.
- Who is Tide's Ciso?
- A type of online scam where criminals impersonate legitimate organisations via email
- A malicious code that can infect your system.
16 Clues: Who is Tide's Ciso? • Tide's bug bounty program • Security is the job of __________. • You should never share your __________. • A malicious code that can infect your system. • You message in this channel if an incident occurs. • You should _____ a device before stepping away from it. • Where is Tide's Information Security Management System kept • ...
Infant Safety and Security 2016-11-19
Across
- Function allowing caregivers to adjust/change banding material
- Code name for infant abduction
- Allows caregiver to automatically enroll infant in the Safe Place system 60 seconds after the infant in banded with transmitter
- Never assume an alarm is ________
- In case of a code pink, use Vocera to "__________ to Everyone Everywhere"
- Allows caregiver to pre-assign a transmitter to a specific infant before banding the infant
- Information alarm color (auto-enroll, transfer complete, expired alarms)
- Color for check band, device fault and client missing alarms
- Function allowing movement between monitored units
Down
- Function allowing movement to unmonitored areas (MRI, CT, etc)
- On employee badges letting families know who is authorized to transport the baby
- Staff should ALWAYS respond __________ to all alarms
- The number to call to report a Code Pink can be found on most unit
- Function to remove the infant from the system
- Infant safety and security is the responsibility of _________ in the healthcare facility.
- Color for cut band, door alarm, no signal and 'band off" alarms
16 Clues: Code name for infant abduction • Never assume an alarm is ________ • Function to remove the infant from the system • Function allowing movement between monitored units • Staff should ALWAYS respond __________ to all alarms • Color for check band, device fault and client missing alarms • Function allowing movement to unmonitored areas (MRI, CT, etc) • ...
Security Awareness Month 2025 2025-09-25
Across
- Locks files and demands you pay money
- Pressing on something with your mouse. Think before you do this
- A formal rule set by the company to govern behavior
- A saved copy of your files
- What you should do if you spot a phishing email
- Watches what you do on your computer
- A secret word used to log in
- What you click to open a webpage
Down
- Bad software that harms your computer
- People who break into computer systems
- A warning about something important
- A message sent over the internet
- Adds new features and fixes security problems on devices
- Keeping personal info safe
- Fake emails that try to trick you
- We do this every month via Terranova
16 Clues: A saved copy of your files • Keeping personal info safe • A secret word used to log in • A message sent over the internet • What you click to open a webpage • Fake emails that try to trick you • A warning about something important • Watches what you do on your computer • We do this every month via Terranova • Bad software that harms your computer • ...
Cyber safety-by Bridget Graham 2016-05-24
Across
- to decline or not accept a request on a game
- private information that you don't share with with other people
- when you post something on the internet so everyone can see it
- to copy a file from one computer system to another via the Internet
- something that is important not to tell people on the internet or they can track you down
- a saved link to a website
- allows people to share things online
- when you close a screen to save it for later
- when an unknown number or email address appears on your emails
- a search engine
- to upload information to the web
Down
- when someone pretends to be your friend on games but their really not
- a little chip that is is in your computer that you can turn off and on
- when someone is being mean to you on line
- a web address
- never tell anyone about it because you don't know what's going to happen
- information stored on your computer or device
- your personal address on your computer
- a location on the internet
- little pictures to express your feeling
- ups when browsing a new window appears that you don't want
21 Clues: a web address • a search engine • a saved link to a website • a location on the internet • to upload information to the web • allows people to share things online • your personal address on your computer • little pictures to express your feeling • when someone is being mean to you on line • to decline or not accept a request on a game • ...
Cyber safety words-Lance Zafico 2016-05-21
Across
- instant messaging online
- guidance
- popups
- get info from
- when bullies do bad things
- info you don't want to share
- someone you don't know
- someone following you without you knowing
- when you're using the internet
- another name for the internet
Down
- id for logging in
- says mean things
- computer guide
- bad people
- personal info
- secret word or phrase
- people getting your info
- a place where everyone chats to each other
- messages sent to your email address
- safe
20 Clues: safe • popups • guidance • bad people • personal info • get info from • computer guide • says mean things • id for logging in • secret word or phrase • someone you don't know • instant messaging online • people getting your info • when bullies do bad things • info you don't want to share • another name for the internet • when you're using the internet • messages sent to your email address • ...
SBLI Cyber Month Crossword Puzzle! 2024-10-06
Across
- A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
- A service that creates a secure connection over the internet, often used for privacy. (acronym)
- Device used to secure doors or containers, often requiring a key or combination. (1 word)
- Software that detects and removes malicious software from a computer. (1 word)
- Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
- Device used to watch and record activity in a specific area for safety purposes.(2 words)
- The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
- A type of malware that locks users out of their data, demanding payment for access. (1 word)
- Unique pattern of ridges and valleys on the skin of a finger, used for identification.
- The process of converting information into a code to prevent unauthorized access. (1 word)
- A list of trusted entities or applications that are granted access. (1 word)
Down
- An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
- A method of bypassing normal authentication, often used for malicious purposes. (1 word)
- Ethan and Brian make up this team (2 words)
- A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
- Software that secretly monitors user activity and collects personal information. (1 word)
- Team that handles SBLI's tech (acronym)
- Manipulating individuals into divulging confidential information. (2 words)
- A software update designed to fix vulnerabilities or bugs. (1 word)
- Malware disguised as legitimate software to trick users into installing it. (1 word)
- Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
- A weakness in a system that can be exploited by threats. (1 word)
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
- A network security system that monitors and controls incoming and outgoing traffic. (1 word)
- An incident where unauthorized access to data occurs. (1 word)
25 Clues: Team that handles SBLI's tech (acronym) • Ethan and Brian make up this team (2 words) • An incident where unauthorized access to data occurs. (1 word) • A weakness in a system that can be exploited by threats. (1 word) • A software update designed to fix vulnerabilities or bugs. (1 word) • ...
Cyber Ethics Puzzle, Chapter 7 2024-11-22
Across
- Commerce that takes place over the internet instead of at physical stores.
- A prominent writer espousing Neo-luddism and associated ideologies.
- Being responsible for something, such as the results of an action.
- Forms of remote communication made possible through the use of technology.
- A group of farmers concerned that technology would render them obsolete.
- Textual data that is received over the internet and formatted via HTML and CSS.
- The (often non-consentual) removal of data from a consumer device by the producer of that device.
- This company is, among other things, the primary maintainer of the android operating system, and got into controversy after removing applications from the mobile phones of users.
- A compendium of information, either in general or on a specific topic.
- An online encyclopedia who's easily editable nature has been abused by many organizations over the years.
- This company is known for maintaining strict controls over their software ecosystem.
- This company is known for its extremely popular computer operating system.
Down
- A group similar to Luddites, but with a view that most forms of technology are evil, and do more harm than good.
- A computer program designed to search the internet for websites matching a user's query.
- A worldwide network of connected devices that facilitate the sharing of information.
- A way of simulating a process through software so that one may predict the results of a course of action.
- A type of medicine that is performed at long distance using technological assistance.
- A term used to refer to field of producing and using computers.
- Sensors and other devices that are networked together and communicate via wirelessly.
- This company stirred up controversy by removing books from the digital reading devices of customers.
20 Clues: A term used to refer to field of producing and using computers. • Being responsible for something, such as the results of an action. • A prominent writer espousing Neo-luddism and associated ideologies. • A compendium of information, either in general or on a specific topic. • A group of farmers concerned that technology would render them obsolete. • ...
Cyber Fund Final Exam Vocab 2025-05-12
Across
- a computer system on the internet that is expressly set up to attract and trap intruders
- the state of being complete or uncorrupted
- data can be accessed when needed
- spoofed emails and fraudulent websites designed to fool recipients into divulging PII
- small text files that are saved on the computer for use with web browsers and websites
- another word for "technical" skills
- Governs the type of traffic that is and isn't allowed through a firewall
- a governmental organization for standardizing measurement, technology, and industrial standards
- the physical part of a computer that you can touch
- a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
- the condition of being private or secret
Down
- using a lie or scam to obtain private info
- the #1 cause of information security breaches for organizations
- This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
- deploys when conditions exist that malware is seeking
- the internet protocol that has 128 bits
- the Act that ensures that financial businesses are protecting your private data
- a tool that intercepts raw data traveling on a network
- a malicious website using a URL similar to a real one (ex.: www.aple.com)
- malware hidden inside other software that seems harmless
- acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
- a flaw or potential for harm
- a program or code that replicates by being copied or initiating its copying to another program
- the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam
24 Clues: a flaw or potential for harm • data can be accessed when needed • another word for "technical" skills • the internet protocol that has 128 bits • the condition of being private or secret • using a lie or scam to obtain private info • the state of being complete or uncorrupted • the physical part of a computer that you can touch • ...
PLACES AT ASCHOOL 2025-03-18
18 Clues: Kantin • Bermain • Olahraga • Ruang Kelas • Room^Mushola • Perpustakaan • Area^Area Loker • Room^Ruang Seni • Room^Ruang Guru • Area^Area Parkir • Room^Ruang Musik • Post^Pos Keamanan • Hall^Aula Sekolah • Room^Ruang Komputer • Room^Ruang Kesehatan • Field^Lapangan Olahraga • Yard Halaman Sekolah • Office^Ruang Kepala Sekolah
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer Term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer Term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
CSAM 2022 - Be Cyber Smart 2022-10-02
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
- THe A in the C-I-A Triad. It ensures authorized users have access.
- A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Verifying identity
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
Down
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Facebook, Twitter, Instagram, etc. (two words)
- Hardware or software designed to prevent unauthorized access to or from private network.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
- A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
- Threatening behavior facilitated through electronic means such as texting.
- The process of taking plain text and scrambling it into an unreadable format.
- Unauthorize access to a network, information systems, or application.
- The I in the C-I-A Triad; protection from unauthorized changes.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A fraudalent email purportedly from a reputable company attempting to get personal information.
20 Clues: Verifying identity • Facebook, Twitter, Instagram, etc. (two words) • The I in the C-I-A Triad; protection from unauthorized changes. • THe A in the C-I-A Triad. It ensures authorized users have access. • Unauthorize access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Super Cryptic Cyber Crossword 9000 2022-02-02
Across
- Password 2.0.
- Spoofing, at the very top of the company’s hierarchy.
- Protecting your door with a lock made of Cheetos
- Online advertising used to spread malware.
- Much stronger than SMS, but weaker than U2F.
- A Wi-Fi access point that wants to hurt you, bad…
- Oh you wanted access to your system? NOPE.
- Everyone needs protection… even Wi-Fi connections in hotel lobbies!
- Reason #999 not to use SMS as an MFA mechanism.
- Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
- registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
- Pay us money… or else have fun having no access to your files!
- Don’t get (personally) hooked!
- A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
- An item of value and/or importance to our business operations.
Down
- Hide this to have a (minor) edge over your Wi-Fi attackers!
- Lets you authenticate by the way you sign your name or walk the walk!
- An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
- This is how I prove who I claim to be to a system.
- You swipe your card into the reader, I will blindly follow.
- The risk posture of our company is situated somewhere between a bank and this.
- Ninja IT’s meaner and nastier cousin.
- A security model which assumes that there is always at least one person on every team that is compromised or coerced.
- The internet’s telephone directory.
- A vendor assessment a day keeps external audits away.
- Phishing for those partial to phone calls.
- Don’t get hooked to this social “experiment”!
- Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
- The practice and study of methods for hiding information.
- I will execute independently and self-replicate through your network connections. Sounds cool, eh?
- Defines and manages controls that an organization needs to implement.
31 Clues: Password 2.0. • Don’t get (personally) hooked! • The internet’s telephone directory. • Ninja IT’s meaner and nastier cousin. • Online advertising used to spread malware. • Phishing for those partial to phone calls. • Oh you wanted access to your system? NOPE. • Much stronger than SMS, but weaker than U2F. • Don’t get hooked to this social “experiment”! • ...
Networking Concepts and Cyber Ethics 2025-06-04
Across
- Local Area Network
- Information about a person that exists on the internet because of their online activities
- Bulk Emails
- Distributing copied software illigaly
- this topology forms a circle
- Safety Rules and regulations on the internet
- It is requires the cheapest topology setup
- Does not broadcast the message on the entire internet
- Metropolitan Area Network
Down
- Used in wireless networking
- One of the most common type of topology
- Presenting someone else's work as your own
- Combination of two terms 'net' and 'etiquette'
- Enables you to connect to the available internet
- Illegally using someone else's identity
- Illigal activities done online
- This topology uses a single communication line
- Connect two internets together,LAN and WAN
- A network device used to connect all computers
- World Area Network
20 Clues: Bulk Emails • Local Area Network • World Area Network • Metropolitan Area Network • Used in wireless networking • this topology forms a circle • Illigal activities done online • Distributing copied software illigaly • One of the most common type of topology • Illegally using someone else's identity • Presenting someone else's work as your own • ...
IT: Networking and Cyber Ethics 2025-05-27
Across
- Device that connects devices in a network
- Online manners and rules
- Copying work without giving credit
- Security system that controls network traffic
- Protecting data by converting it into code
- Wide Area Network
- Fraud attempt to obtain sensitive data
- Unauthorized access to data
- Device that forwards data packets between networks
- Local Area Network
Down
- Common wired networking technology
- Malicious software
- Online harassment or bullying
- Set of rules for data transmission
- Converts signals for internet access
- Data transfer capacity of a network
- Address: Unique string identifying a device on a network
- Legal right to protect creative work
- Footprint: Online trail of user activity
- Right to control personal data
20 Clues: Wide Area Network • Malicious software • Local Area Network • Online manners and rules • Unauthorized access to data • Online harassment or bullying • Right to control personal data • Common wired networking technology • Set of rules for data transmission • Copying work without giving credit • Data transfer capacity of a network • Converts signals for internet access • ...
Cyber Awareness Passwords and MFAs 2025-08-14
Across
- The process of verifying a user's identity.
- These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
- This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
- This type of attack uses a predefined list of common words and phrases to guess passwords.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Changing this immediately is recommended on accounts you suspect may have been compromised.
- Avoid using easily __________ information like names or birthdays in your passwords.
- This type of attack tries out countless password combinations until the correct one is found.
Down
- A strong password should be at least ______ characters long, according to NIST recommendations.
- A method of authentication using unique patterns on an individual's fingertip.
- An unauthorized user who attempts to gain access to an information system.
- A common bad habit where users employ the same credentials across different websites and services.
- The process of converting data into a format unreadable to anyone except those possessing a "key".
- Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
- A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
- This type of authentication adds an extra layer of security beyond just a password.
- Should be at least 16 characters long and combine random words to be strong.
- A specific form of phishing that targets high-profile business executives.
- A sequence of words or text used to control access to a computer; similar to a password.
- and Clues (Word TAB Clue)
- Passkeys often rely on this type of factor, like a fingerprint or facial scan.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
22 Clues: and Clues (Word TAB Clue) • The process of verifying a user's identity. • An unauthorized user who attempts to gain access to an information system. • A specific form of phishing that targets high-profile business executives. • Should be at least 16 characters long and combine random words to be strong. • ...
Supranationalism 2021-01-04
Across
- mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
- promotes unity and solidarity and spurs economic development in Africa
- organization governing common economic, social, and security issues in its European member states
- trading bloc between the countries of North America
- military alliance of countries in Western Europe and North America
Down
- high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
- integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
- global international organization that maintains peace and security and promotes economic and social development
- maintains peace and security and accelerates economic growth in Southeast Asia
9 Clues: trading bloc between the countries of North America • military alliance of countries in Western Europe and North America • promotes unity and solidarity and spurs economic development in Africa • maintains peace and security and accelerates economic growth in Southeast Asia • ...
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- A hostile and insulting interaction between internet users.
- An image that is captured of what is shown on a phone, tablet, or computer screen
- Rules or manners for interacting courteously with others online
- unwanted emails
Down
- Online communities, also known as social networks
- Sharing someone’s secrets or embarrassing information online
- Setting up a fake online profile
- malware,cyber-destroyer, break your technology
- A technology that allows us to access our files through the internet from anywhere in the world.
- Someone who posts rude or off-topic messages in an online community
10 Clues: unwanted emails • Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
Text Bullying 2019-05-22
Across
- its never too late to do / make the _____ thing / choice
- when someone is mean to someone else on purpose
- everyone is unique and ______ in their own way
- having _____ can give you the courage to help and stop bullying
- bystanders are equally evolved if they don't ____
- bully is identified not by their looks, but rather by their ____
Down
- bullying can be done by an individual or by a _____
- bullies often have problems with ________ and have their own way to deal with it
- bullying online is called ______ bullying
- bullying is unfair and one-______
10 Clues: bullying is unfair and one-______ • bullying online is called ______ bullying • everyone is unique and ______ in their own way • when someone is mean to someone else on purpose • bystanders are equally evolved if they don't ____ • bullying can be done by an individual or by a _____ • its never too late to do / make the _____ thing / choice • ...
Safety Crossword 2023-05-05
Across
- Cyber-attack that is sent via SMS/Text messaging
- Known as scam phone calls
- Program to identify and assist those who may require assistance during an evacuation
- How many life-saving rules are there
- Location of buried utilities prior to a mechanical excavation cover which life-saving rule
Down
- Someone enters behind you without your knowledge
- Malicious or threatening emails sent
- What is the 4th value recently added to Enbridge's values
- Type of training to ensure our workstations are setup properly
- What type of alarm system does Enbridge Centre and Manulife have
10 Clues: Known as scam phone calls • Malicious or threatening emails sent • How many life-saving rules are there • Someone enters behind you without your knowledge • Cyber-attack that is sent via SMS/Text messaging • What is the 4th value recently added to Enbridge's values • Type of training to ensure our workstations are setup properly • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Bullying and Decision Making 2023-09-01
Across
- Something you think and contemplate about everyday
- different types are racial, cyber, and physical
- a synonym of abuse
- a person who supports a person that’s is doing through bullying
- a mean person who physically, mentally, socially abuses for their own personal gain
Down
- a person who is experiencing abuse from a bully
- a person who teaches and gets reports about bullying
- of bully- a person who supports the bully and close friend
- a person who usually gives a bully silent approval or doesn’t want to get involved
- when someone gets bullied through technology
10 Clues: a synonym of abuse • when someone gets bullied through technology • a person who is experiencing abuse from a bully • different types are racial, cyber, and physical • Something you think and contemplate about everyday • a person who teaches and gets reports about bullying • of bully- a person who supports the bully and close friend • ...
words often confused 2022-04-07
19 Clues: glowed • hurled • detail • a place • revealed • they + are • comparisons • form of they • at that time • writing paper • simple, common • a flying object • to a great extent • a rule of conduct • still and peaceful • a part of something • in a fixed position • the head of a school • quiet order and security
Erica 2025-12-16
Across
- Painting acquired
- Georigan Adventure
- Canoe Camping 2025
- Atlanta School
- Fastest Runners in Person
- Tall active activity
- Elias Tatiana First
- _ challenge
- New Haven "Her"
- Wakeup Beverage
Down
- No Security Red Bull
- Heatsource
- First African Nation
- Travel Goal, 50
- Ferdi & Tamara Present
- Snowpants Feature
- Best Bike
- Animal seen from tent
- Backyard Structure
19 Clues: Best Bike • Heatsource • _ challenge • Atlanta School • Travel Goal, 50 • New Haven "Her" • Wakeup Beverage • Painting acquired • Snowpants Feature • Georigan Adventure • Canoe Camping 2025 • Backyard Structure • Elias Tatiana First • No Security Red Bull • First African Nation • Tall active activity • Animal seen from tent • Ferdi & Tamara Present • Fastest Runners in Person
PKN Group kevin, akio, nelson, daniel 2023-03-15
Across
- sebuah contoh dari integrasi nasional adalah pembangunan ______ oleh pemerintahan R.I,
- apa kata benda dari integritas?
- kampanye yang berbau ______ bisa menjadi ancaman terbangunnya integrasi nasional
- Dunia maya disebut juga dengan ______
- integrasi nilai indonesia ada dalam ______
- Sikap percaya diri merupakan khas nasionalisme Indonesia menurut _______
- _______ menjadi ciri khas bangsa indonesia
- salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah
- penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI
Down
- kita harus menghadapi bersama ancaman supaya _______ nasional dapat terwujud
- budaya beragam seharusnya menjadi ______ bukan untuk merendahkan budaya lain
- mencintai produk lokal dan budaya bangsa sendiri merupakan implementasi dari ______
- untuk mencegah terjadinya disintegrasi di masa depan, perlu ada ________ kebudayaan yang menyeluruh & berkesinambungan
- memelihara lingkungan hidup merupakan bentuk partisipasi warga negara dilingkungan ______ dan negara
- ________ menyediakan segala macam bentuk kekuatan manusia melalui berbagai proses
- dalam uud 1945 dinyatakan 4 tujuan ______
16 Clues: apa kata benda dari integritas? • Dunia maya disebut juga dengan ______ • dalam uud 1945 dinyatakan 4 tujuan ______ • integrasi nilai indonesia ada dalam ______ • _______ menjadi ciri khas bangsa indonesia • penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI • salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah • ...
Know your Products 2016-01-29
Across
- 140+ channels
- Two Services
- Communities with contracted services
- Our Guarantee
- 240+ Channels
- Ultimate video package
- 25 Mbps Internet
- Home Security
- 75 Mbps Internet
Down
- Three Services
- Telephone
- Four Services
- High Speed Internet
- Customers not in Community Contract
- Keeping our customers
- 150 Mbps Internet
- Discounted Telephone
17 Clues: Telephone • Two Services • 140+ channels • Four Services • Our Guarantee • 240+ Channels • Home Security • Three Services • 25 Mbps Internet • 75 Mbps Internet • 150 Mbps Internet • High Speed Internet • Discounted Telephone • Keeping our customers • Ultimate video package • Customers not in Community Contract • Communities with contracted services
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer Term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer Term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
Business Law 123 2014-01-23
Across
- Another word for a law.
- Law for offenses against society.
- Method of settling a dispute when a third party's advice is sought, but is not legally binding
- Court that reviews the decisions of lower courts.
- Laws that govern the use of computers and the Internet.
- Term used to add provisions to the constitution
- Method of settling a dispute when a third party's decision is legally binding.
- Decision of a court.
- Method of settling a dispute when both parties reach an agreement by themselves
- Settling a dispute through the courts.
- Court of original jurisdiction.
- Court for individuals under the age of 18.
Down
- Court responsible for handling wills and estates.
- Branch of government that may rule laws unconstitutional.
- Law based on current standards or customs.
- A law passed at the city level.
- Verbatim (word-for-word) record of court proceedings.
- Branch of government that can veto laws.
- Authority of a court to decide a case
- Law used to provide remedy for wrongs against individuals.
20 Clues: Decision of a court. • Another word for a law. • A law passed at the city level. • Court of original jurisdiction. • Law for offenses against society. • Authority of a court to decide a case • Settling a dispute through the courts. • Branch of government that can veto laws. • Law based on current standards or customs. • Court for individuals under the age of 18. • ...
Code 2016-02-08
Across
- When something bad gets into your computer
- A block to a puzzle for games or programs
- When you add something onto your computer
- A place where power or information leaves a system
- A programming language is formal constructed language that is programmed in the computer
- block A block that repeats how many times in coding
- to identify or remove errors from the computer
- A conditional clause or conjunction
- When you are working on a website and it needs to be ___
- Get mail from the computer, phone, tablet, and computers
Down
- A system
- A folder that items
- A part of a puzzle for coding
- The use of parallel in computers
- A virus on the computer
- A site that you visit or when you install a game on a software
- bully Bullies that are online
- citizenship Behaviors online
- A logic gate is an elementary building block on a digital circuit
- When something repeats it self
20 Clues: A system • A folder that items • A virus on the computer • citizenship Behaviors online • A part of a puzzle for coding • bully Bullies that are online • When something repeats it self • The use of parallel in computers • A conditional clause or conjunction • A block to a puzzle for games or programs • When you add something onto your computer • ...
Health Period 2 2023-04-24
Across
- natural sweet tasting substance found in most foods
- most popular sport at Malden High
- nutrient found in meat, dairy, eggs, nuts
- a chronic relapsing disorder often associated with drugs and alcohol
- structured conversation with questions to evaluate qualifications
- type of health related to a persons psychological and emotional well-being
- group of people united by blood or experience
- my sisters son Asher is my
- Michelle Conrad was convicted of this
- state of complete physical, mental, and social well-being
- "some people are worth melting for"
Down
- online bullying
- unwanted aggressive behavior that involves a real or perceived power imbalance
- family value based on right or wrong behavior
- unit of energy in a food or drink item
- second leading cause of death amongst teens
- custom passed down from previous generations
- parking between two cars aligned with the street
- most commonly the highest fixed expense
- how the body converts nutrients to energy
20 Clues: online bullying • my sisters son Asher is my • most popular sport at Malden High • "some people are worth melting for" • Michelle Conrad was convicted of this • unit of energy in a food or drink item • most commonly the highest fixed expense • nutrient found in meat, dairy, eggs, nuts • how the body converts nutrients to energy • second leading cause of death amongst teens • ...
Digital Media Literacy 2021-11-03
Across
- place where you can see all the content from a creator
- documentary about social media apps
- videos or images selling a product
- social media app owned by Facebook
- owner of Facebook
- if someone wants to say something about a video they do this
- a person who gives away secrets
- red pin to car
- harassment or bullying on the internet
Down
- Owner of YouTube
- a messaging app owned by Facebook
- social media which name sounds like what noise a bird makes
- if someone wants to let their friends see a video they do this
- if someone doesn’t enjoy a video they click this
- popular social media app that sounds like a clock
- massive social media company
- users that have subscribed to certain content
- online conspiracy to do with pizzerias
- The recording, reproducing, or broadcasting of moving visual images
- if someone enjoys a video they click this
20 Clues: red pin to car • Owner of YouTube • owner of Facebook • massive social media company • a person who gives away secrets • a messaging app owned by Facebook • videos or images selling a product • social media app owned by Facebook • documentary about social media apps • online conspiracy to do with pizzerias • harassment or bullying on the internet • ...
Digital Media Literacy 2021-11-03
Across
- place where you can see all the content from a creator
- documentary about social media apps
- videos or images selling a product
- social media app owned by Facebook
- owner of Facebook
- if someone wants to say something about a video they do this
- a person who gives away secrets
- red pin to car
- harassment or bullying on the internet
Down
- Owner of YouTube
- a messaging app owned by Facebook
- social media which name sounds like what noise a bird makes
- if someone wants to let their friends see a video they do this
- if someone doesn’t enjoy a video they click this
- popular social media app that sounds like a clock
- massive social media company
- users that have subscribed to certain content
- online conspiracy to do with pizzerias
- The recording, reproducing, or broadcasting of moving visual images
- if someone enjoys a video they click this
20 Clues: red pin to car • Owner of YouTube • owner of Facebook • massive social media company • a person who gives away secrets • a messaging app owned by Facebook • videos or images selling a product • social media app owned by Facebook • documentary about social media apps • online conspiracy to do with pizzerias • harassment or bullying on the internet • ...
TTS informatika 2024-03-23
Across
- kegiatan jual beli dengan media elektronik
- perintah untuk mematikan komputer
- Rumus ms.word untuk menampilkan nilai pada kumpulan data yang bersumber dari suatu tabel dengan format susunan vertikal
- sebuah kejahatan cyber yang bertujuan untuk merusak atau memanipulasi data
- layanan mobile perbankan melalui jaringan Short Message Services atau SMS
- aplikasi untuk membuat sebuah games dan simulasi pembelajan tanpa harus berkutat dengan bahasa pemrograman
- layanan perbankan yang menggunakan media telepon
- nama fitur pada google collab untuk mengganti nama file
- rumus untuk menghitung rata rata pada ms.excel
Down
- rumus untuk menjumlahkan angka pada ms.excel
- aplikasi pengolah kata
- persimpangan baris dan kolom
- aktivitas yang dibatasi dalam google collab
- Central Processing Unit
- berita atau informasi yang tidak benar
- bahasa pemrograman yang digunakan pada google collab
- kejahatan yang ada dalam media sosial
- aktivitas yang berusaha menyusupi,mengakses,atau memodifikasi sistem atau jaringan tanpa izin
- "CTRL+S" merupakan perintah untuk
- lembar kerja yang ada dalam ms.excel
- aplikasi pengolah angka
21 Clues: aplikasi pengolah kata • Central Processing Unit • aplikasi pengolah angka • persimpangan baris dan kolom • perintah untuk mematikan komputer • "CTRL+S" merupakan perintah untuk • lembar kerja yang ada dalam ms.excel • kejahatan yang ada dalam media sosial • berita atau informasi yang tidak benar • kegiatan jual beli dengan media elektronik • ...
Red Chair Report Q4 2022-09-28
16 Clues: CEO • Broncos • Morning ___ • Code storage • Time Tracker • ___ is coming • ___ Trail Road • AgilLink's App • A colorado view • Challenges & ___ • Security Training • NHL 2022 Champions • A favorite winter sport • Rick & Carl's alma mater • The color of the chair lift • City where Risclarity HQ is located
