cyber security Crossword Puzzles

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assignment - Billy Summers Crossword 2024-03-06

Vocabulary Assignment - Billy Summers Crossword crossword puzzle
Across
  1. just behavior or treatment
  2. someone who writes a book
  3. a type of phone used by criminals
  4. a person accompanying another for security purposes
  5. a secret plan to do something unlawful
  6. an outfit used in order to not get recognised
  7. the act of getting away quickly, usually from a crime scene
Down
  1. a long range rifle usually equipped with a scope
  2. a building where criminal trials take place
  3. protection against and from any potential harm
  4. the practice of a person doing business or shoring assets overseas to avoid taxes
  5. an account of a person's life written as such by that person
  6. a killer for hire
  7. the act of willful killing for any reason
  8. a person who arranges deals and work between two people or groups

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. a person accompanying another for security purposes
  2. an account of a person's life written as such by that person
  3. a person who arranges deals and work between two people or groups
  4. just behavior or treatment
  5. the practice of a person doing business or shoring assets overseas to avoid taxes
  6. the act of getting away quickly, usually from a crime scene
  7. a killer for hire
Down
  1. a building where criminal trials take place
  2. the act of willful killing for any reason
  3. a secret plan to do something unlawful
  4. a type of phone used by criminals
  5. an outfit used in order to not get recognised
  6. someone who writes a book
  7. protection against and from any potential harm
  8. a long range rifle usually equipped with a scope

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Shields and Scrubs 2025-08-12

Shields and Scrubs crossword puzzle
Across
  1. – Workplace ______ Prevention Site Committee focus.
  2. – The culture reinforced through consistent reporting and early intervention.
  3. – What staff monitor for early signs of escalation.
  4. – Risk assessment tool for recognizing escalating behaviors (acronym).
  5. – Detection systems flagged 235,000+ alerts for these in 2025.
  6. – Early coordinated ______ helps manage patient threats effectively.
  7. – Street name of the office location for Security Services.
  8. – Emotion expressed to acknowledge frustration and build trust.
Down
  1. – Response for situations involving aggressive or threatening behavior (no space).
  2. – A key value to uphold in all patient interactions.
  3. – Something to set clearly with patients showing inappropriate behaviors.
  4. – Issued when unsafe patient behaviors require immediate attention.
  5. – Department responsible for protecting staff and patients.
  6. – Reporting system for documenting incidents of verbal abuse or threats.
  7. – Built by listening and acknowledging patient concerns.

15 Clues: – Workplace ______ Prevention Site Committee focus.– What staff monitor for early signs of escalation.– A key value to uphold in all patient interactions.– Built by listening and acknowledging patient concerns.– Department responsible for protecting staff and patients.– Street name of the office location for Security Services....

WatchGuard Dictionary Day 2022-10-11

WatchGuard Dictionary Day crossword puzzle
Across
  1. WatchGuard's signature red box
  2. security simplified
  3. WatchGuard's Security Platform
Down
  1. WatchGuard Cloud
  2. XDR based threat detection and remediation platform
  3. An easy-to-use MFA product
  4. proactive defense strategy

7 Clues: WatchGuard Cloudsecurity simplifiedAn easy-to-use MFA productproactive defense strategyWatchGuard's signature red boxWatchGuard's Security PlatformXDR based threat detection and remediation platform

week 5 spelling words 2025-02-27

week 5 spelling words crossword puzzle
Across
  1. test
  2. having great influence on someone or something.
  3. secret
  4. weddins
  5. security
  6. timing
  7. possibly
  8. must have
  9. existing or occurring at the beginning
Down
  1. a qualification
  2. incomplete
  3. positioned in
  4. for people to live in
  5. party

14 Clues: testpartysecrettimingweddinssecuritypossiblymust haveincompletepositioned ina qualificationfor people to live inexisting or occurring at the beginninghaving great influence on someone or something.

Types of markets 2022-01-25

Types of markets crossword puzzle
Across
  1. securities with maturities of less than one year
  2. location where buyers and sellers of financial products meet to conduct business
  3. investment instruments representing equity or debt
  4. another name for equity
  5. A security representing a loan issued by a business or government is known
  6. A security representing ownership in a corporation is known as
  7. maturity less than one year
  8. is another name for debt
Down
  1. investors are risk ____ meaning given a choice of two investments of equal return, the investor will choose the investment with the lower risk.
  2. Expected __. amount of future cash flows
  3. maturity more than 10 years
  4. Ability to convert an investment to cash at its full value
  5. securities with maturities of greater than one year
  6. maturity 2-10 years
  7. return/ purchase price

15 Clues: maturity 2-10 yearsreturn/ purchase priceanother name for equityis another name for debtmaturity more than 10 yearsmaturity less than one yearExpected __. amount of future cash flowssecurities with maturities of less than one yearinvestment instruments representing equity or debtsecurities with maturities of greater than one year...

Roaring Twenties Hour 5 2017-04-25

Roaring Twenties Hour 5 crossword puzzle
Across
  1. A machine with four wheels that can hold a small number of people
  2. Hoover Republican elected president in 1928.
  3. Lindbergh Who flew alone in his plane from New York to Paris in 33 ½ hours.
  4. Conservation Corps Put jobs in the forest and woods for young men.
  5. Coolidge Vice President of Massachusetts
  6. Ford Stands high among automobile makers.
Down
  1. Introduced to wireless telegraph
  2. A person exploring a new area
  3. Works Administration Sums were spent to build schools, highways, bridges, hospitals, and dams.
  4. Got people to be able buy new machines.
  5. brothers Kept in the air for one minute of a powered-machine they made
  6. The flying of an aircraft
  7. De Forest Invented a radio tube
  8. Security Act Been Expanded and extended after Social Security.
  9. Harding Was elected president in 1920.

15 Clues: The flying of an aircraftA person exploring a new areaDe Forest Invented a radio tubeIntroduced to wireless telegraphHarding Was elected president in 1920.Got people to be able buy new machines.Coolidge Vice President of MassachusettsFord Stands high among automobile makers.Hoover Republican elected president in 1928....

Ryan McGirr 2017-09-08

Ryan McGirr crossword puzzle
Across
  1. The electronic responsibilities and rules of being online.
  2. The use of electronic communication to bully
  3. Any message passed through digital devices.
  4. plagiarism When someone steals or takes information without permission.
  5. Effective passwords will help you keep your security.
  6. Someone you don’t know might be dangerous or bad.
  7. Keeping your information about yourself away from internet predators.
  8. When someone copies your image without permission.
  9. The security of your online information.
  10. Being online and active.
Down
  1. Using electronics to interact in social activities online and being responsible.
  2. A way to talk to friends and share stuff online.
  3. Digital search will help you find when you're looking for in the internet.
  4. The access you have to your stuff online.
  5. Using things on the internet fairly.

15 Clues: Being online and active.Using things on the internet fairly.The security of your online information.The access you have to your stuff online.Any message passed through digital devices.The use of electronic communication to bullyA way to talk to friends and share stuff online.Someone you don’t know might be dangerous or bad....

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. just behavior or treatment
  2. someone who writes a book
  3. a type of phone used by criminals
  4. a person accompanying another for security purposes
  5. a secret plan to do something unlawful
  6. an outfit used in order to not get recognised
  7. the act of getting away quickly, usually from a crime scene
Down
  1. a long range rifle usually equipped with a scope
  2. a building where criminal trials take place
  3. protection against and from any potential harm
  4. the practice of a person doing business or shoring assets overseas to avoid taxes
  5. an account of a person's life written as such by that person
  6. a killer for hire
  7. the act of willful killing for any reason
  8. a person who arranges deals and work between two people or groups

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Information Security Quiz #15 2015-05-26

Information Security Quiz #15 crossword puzzle
Across
  1. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
  2. Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
  3. Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
  4. In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
  5. Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
  6. Tapping confidential information from trash
  7. A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
  8. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
  9. This can slow down your computer AND watch everywhere you go on the internet.
Down
  1. You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
  2. Use this tool to dispose of documents that contain personal or financial information.
  3. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  4. Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
  5. The front line of defence in information security!
  6. Records of IS activities
  7. Destruction of computer equipment or records

16 Clues: Records of IS activitiesTapping confidential information from trashDestruction of computer equipment or recordsThe front line of defence in information security!This can slow down your computer AND watch everywhere you go on the internet.Use this tool to dispose of documents that contain personal or financial information....

Enterprise Information Security Policy 2017-09-06

Enterprise Information Security Policy crossword puzzle
Across
  1. ____ is compromised of 60 standards
  2. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  3. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  4. A Credential established by a sequence of characters used as a secret key
  5. The physical elements of a computer system
  6. Verifying the identity of a user, machine, software component, device, or other entity.
  7. The set of characteristics by which a Person is definitively recognizable or known.
Down
  1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. _____ implements standards to protect Protected Health Information (PHI).
  3. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
  4. Any type of storage device that can be removed from a computer while the system is running.
  5. A piece of Software intended to update an electronic Information Resource.
  6. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. A person or persons responsible for supervising people or work.
  8. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  9. Protected Health Information acronym

16 Clues: ____ is compromised of 60 standardsProtected Health Information acronymThe physical elements of a computer systemA person or persons responsible for supervising people or work._____ implements standards to protect Protected Health Information (PHI).A Credential established by a sequence of characters used as a secret key...

Information security -Unit 4 2022-11-18

Information security -Unit 4 crossword puzzle
Across
  1. attack using birth dates
  2. translating key into code
  3. barrier between trusted networks
  4. recognising somebody
  5. sepcial form of information
  6. certainty to remain safe
  7. Symmetric block cipher
  8. tool to practice encryption
  9. process of determining something or someone
Down
  1. cipher in which one character is replaced by another
  2. security structure to decide user privileges
  3. inspection
  4. cipher in which we use polyalphabetic substitution
  5. scrambling position of characters
  6. act of invading illegally
  7. method to transform a message

16 Clues: inspectionrecognising somebodySymmetric block cipherattack using birth datescertainty to remain safetranslating key into codeact of invading illegallysepcial form of informationtool to practice encryptionmethod to transform a messagebarrier between trusted networksscrambling position of charactersprocess of determining something or someone...

Bank and Branch Security 2024-11-21

Bank and Branch Security crossword puzzle
Across
  1. You must do this any time you are not within arms reach of your computer
  2. This is activated by going up or down with a pin number
  3. These are located at every public entrance/exit doorways
  4. You place customer information that you no longer need into what?
  5. _____________ assume a weapon is involved
  6. You call and ask if this person is available if things are not the way they should be when you arrive in the morning
  7. Keeping the _____________ of our customers is HIGH priority
  8. Someone that "phishes" for secure information
  9. Night Drop, ATM, and moving debit cards MUST be done how?
Down
  1. Signal that shows someone is clearing the branch
  2. Signal that shows the branch is safe to enter
  3. You NEVER give these to anyone
  4. You trigger this by holding down two buttons for 3 seconds
  5. This must be locked up at night but made readily accessible during the day
  6. Meeting place that you go to if there is an emergency
  7. ___________ ________ and do what the robber asks

16 Clues: You NEVER give these to anyone_____________ assume a weapon is involvedSignal that shows the branch is safe to enterSomeone that "phishes" for secure informationSignal that shows someone is clearing the branch___________ ________ and do what the robber asksMeeting place that you go to if there is an emergency...

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
  2. Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
  3. Was ist der Überbegriff für unerwünschte, schädliche Software?
  4. und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
  5. Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
Down
  1. Was versteckt sich in einem scheinbar nützlichen Programm ?
  2. Mithilfe von elektronischen Medien wird ... durchgeführt
  3. Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
  4. Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
  5. Bei was werden gefälschte Webseiten umgeleitet ?

10 Clues: Bei was werden gefälschte Webseiten umgeleitet ?Mithilfe von elektronischen Medien wird ... durchgeführtWas versteckt sich in einem scheinbar nützlichen Programm ?und Junke E-Mails Wie werden unerwünschte Werbemails genannt?Sie sind in ein Dokument/Datei eingebettet und nennen sich ...Was ist der Überbegriff für unerwünschte, schädliche Software?...

A Stronger Me 2012-07-15

A Stronger Me crossword puzzle
Across
  1. Someone who abuses someone to have power of them
  2. You life is what?
  3. To be uncomfortable in a situation is what type of sign?
  4. To be discluded from the world is to be what?
  5. To be in control is having all the what?
Down
  1. The given name to a type of technological bullying?
  2. A group of people either family or friends or helpline
  3. Hitting someone repeatedly is what kind of abuse?
  4. Attacking someone either physically, emotionally or verbally is called what?
  5. The mourning of someone is called what?

10 Clues: You life is what?The mourning of someone is called what?To be in control is having all the what?To be discluded from the world is to be what?Someone who abuses someone to have power of themHitting someone repeatedly is what kind of abuse?The given name to a type of technological bullying?A group of people either family or friends or helpline...

Cyber Wellness Crossword Puzzle 2014-06-05

Cyber Wellness Crossword Puzzle crossword puzzle
Across
  1. Do not set __________ password for your account.
  2. Cyber bullying is using the social–network to _________ others online.
  3. Be ________ for your words and actions online.
  4. Be ________ of what you post online, they can hurt others.
  5. If you do not want to _________ the song, you should buy the CD.
Down
  1. What is one very famous website for watching videos?
  2. You can find help from your teacher or _________.
  3. Do not post things that will hurt others on social _________.
  4. Do not use the same ________ for all your accounts.
  5. We should not download games and movies _________.

10 Clues: Be ________ for your words and actions online.Do not set __________ password for your account.You can find help from your teacher or _________.We should not download games and movies _________.Do not use the same ________ for all your accounts.What is one very famous website for watching videos?...

Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class 2021-10-08

Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class crossword puzzle
Across
  1. Most type form of Plagiarism
  2. name of the software that can perform multiple language checks for plagiarism
  3. Unintentional Plagiarism
  4. The Indian act that covers Plagiarism is Indian ……….. Act , 1957
  5. A Type of irresponsible authorship that leads to plagiarism
  6. one study multiple articles refers to what type of Plagarism
Down
  1. Copying content from the internet is which type of plagiarism
  2. Failure to appropriately credit others' prior discoveries
  3. Marks If there is a need to reproduce a ‘short’ exact text from elsewhere, following should be used in the paper
  4. One of the consequences of plagiarism

10 Clues: Unintentional PlagiarismMost type form of PlagiarismOne of the consequences of plagiarismFailure to appropriately credit others' prior discoveriesA Type of irresponsible authorship that leads to plagiarismone study multiple articles refers to what type of PlagarismCopying content from the internet is which type of plagiarism...

Cybersecurity and Healthcare 2021-05-31

Cybersecurity and Healthcare crossword puzzle
Across
  1. Limiting the risks or impacts of a cyber threat.
  2. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
  3. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
  4. You should never share this.
  5. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
  1. When should you report an IT breach or potential breach?
  2. A cyberattack attempting to discover your personal information.
  3. Federal law protecting patient privacy.
  4. The US Food and Drug Administration.
  5. Whose responsibility is cybersecurity?

10 Clues: You should never share this.The US Food and Drug Administration.Whose responsibility is cybersecurity?Federal law protecting patient privacy.Limiting the risks or impacts of a cyber threat.When should you report an IT breach or potential breach?A cyberattack attempting to discover your personal information....

Ty Violet-bullying 2022-03-04

Ty Violet-bullying crossword puzzle
Across
  1. you are the victim of a bully
  2. what type of person is hurting the bullied
  3. you are getting bullied by someone in front of your friends
  4. this is a type of bullying that removes people from groups
  5. what type of bullying is a person who watches and does nothing
Down
  1. you are hurting people by words
  2. you are hurting the person next to you
  3. of power what is the b in the ABC's of bullying
  4. Michel pushed Brandon what type of bullying is this.
  5. this type of bullying is done online

10 Clues: you are the victim of a bullyyou are hurting people by wordsthis type of bullying is done onlineyou are hurting the person next to youwhat type of person is hurting the bulliedof power what is the b in the ABC's of bullyingMichel pushed Brandon what type of bullying is this.this is a type of bullying that removes people from groups...

Friday fun 2023-12-14

Friday fun crossword puzzle
Across
  1. If 13=m and 20=t, how much is 8+1+3+11+5+4
  2. 1010011010
  3. This cyber-related term can come from anywhere!
  4. If the weather is between #03a2ff and 104, 3, 255, how is it?
  5. Go forward go back, nothing has changed..
Down
  1. The publisher of 9th best-selling game in the USA in 2020
  2. The last name of the person on the list of people on the world's first www-page.
  3. German word in the middle, coming soon
  4. A coding snake
  5. 01100011 01100101 01110010 01101110

10 Clues: 1010011010A coding snake01100011 01100101 01110010 01101110German word in the middle, coming soonGo forward go back, nothing has changed..If 13=m and 20=t, how much is 8+1+3+11+5+4This cyber-related term can come from anywhere!The publisher of 9th best-selling game in the USA in 2020If the weather is between #03a2ff and 104, 3, 255, how is it?...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Suicide Awareness and Prevention 2023-09-21

Suicide Awareness and Prevention crossword puzzle
Across
  1. Talking about suicide can help spread ________ of mental health
  2. Condition associated with cyber and other bullying
  3. CDC says 20% of youth experience social __________
  4. Early diagnosis and treatment of mental disorders can lead to a ____________ life
  5. Targets of _____________ are at a greater risk of self-harm and suicidal behaviors
Down
  1. A potential warning sign of impending suicide is giving away _________
  2. Mean age of onset of adolescent depression
  3. Suicide _____________ is a critical goal of the NJROTC program
  4. A potential warning sign of impending suicide is long-term ____________
  5. Mental health is often overlooked and called the "silent ________"

10 Clues: Mean age of onset of adolescent depressionCondition associated with cyber and other bullyingCDC says 20% of youth experience social __________Suicide _____________ is a critical goal of the NJROTC programTalking about suicide can help spread ________ of mental healthMental health is often overlooked and called the "silent ________"...

wije 2025-02-24

wije crossword puzzle
Across
  1. Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
  2. Untuk menampilkan bagian grafik yang ingin ditampilkan
  3. Fitur untuk menyederhanakan dan menganalisa data
  4. Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
  5. Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
  1. Aturan pelindungan privasi
  2. Salah satu web/aplikasi chatbot populer
  3. Proses pemberian izin atau kewenangan untuk mengakses data tertentu
  4. Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
  5. Media sosial untuk berkomunikasi

10 Clues: Aturan pelindungan privasiMedia sosial untuk berkomunikasiSalah satu web/aplikasi chatbot populerFitur untuk menyederhanakan dan menganalisa dataUntuk menampilkan bagian grafik yang ingin ditampilkanSirkuit elektronik yang diukir pada lapisan bahan semikonduktorProses pemberian izin atau kewenangan untuk mengakses data tertentu...

Syniverse Crossword 2025-12-03

Syniverse Crossword crossword puzzle
Across
  1. Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
  2. Using mobile service outside your home network
  3. Protecting networks and data from cyber threats
  4. Application to person messaging for OTPs, alerts, and notifications
  5. Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
  1. Delivery of texts and rich communications
  2. Final money movement between carriers after clearing
  3. Continuous advancement that keeps networks and businesses competitive
  4. Illicit or abusive use of telecom services
  5. Reconciling usage records between operators for billing

10 Clues: Delivery of texts and rich communicationsIllicit or abusive use of telecom servicesUsing mobile service outside your home networkProtecting networks and data from cyber threatsFinal money movement between carriers after clearingReconciling usage records between operators for billingApplication to person messaging for OTPs, alerts, and notifications...

digital media 2023-10-10

digital media crossword puzzle
Across
  1. two sides from the digitalisation
  2. cyber criminal
Down
  1. << follower
  2. big media company

4 Clues: << followercyber criminalbig media companytwo sides from the digitalisation

puzzle 5 2024-07-10

puzzle 5 crossword puzzle
Across
  1. A personal area online
  2. Related to computers and the internet
Down
  1. Ability to use or enter
  2. Program that fights harmful software
  3. A copy of your files for safety

5 Clues: A personal area onlineAbility to use or enterA copy of your files for safetyProgram that fights harmful softwareRelated to computers and the internet

Chapter 5 2013-10-18

Chapter 5 crossword puzzle
Across
  1. A contractual term where goods that are sold are paid for upon receipt.
  2. Person owing funds under a construction contract must retain a specified percentage to be paid at a later time.
  3. A chattel used to indicate to a purchaser the nature of similar goods usually to be delivered in the future; those goods must match the sample.
  4. Creditors who have taken steps to ensure that they will be paid, usually by acquiring first claim to some property that ensures payment over other creditors.
  5. Offences under provincial statutory or regulations that impose penalties but do not qualify as criminal law.
  6. A legislated requirement for incorporating a company in some jurisdictions in Canada; also the process of filing a form to perfect a security under the Personal Property Security Act.
  7. This involves the practice of placing two prices on an item and the merchant charging the higher of the two.
  8. Where goods are purchased on the basis of a description set out in an advertisement or on packaged materials, including all manufactured goods.
  9. Proceeding in which a receiver is appointed for a corporation that has defaulted on its obligations to a creditor to protect its assets for the creditors.
  10. A receipt for goods in the care of the shipper.
  11. The seller provides credit to the purchaser, holding title until the goods are paid for.
  12. Goods must be usable by the purchaser in the way normally intended.
  13. Creditors that are secured so that they have a priority with respect to their claims again the debtor.
  14. Designed to ensure that consumers are treated fairly in the marketplace.
  15. A requirement of the Sale of Goods Act imposing an obligation on the seller to ensure a certain standard of fitness and quality on the goods they sell.
  16. A contract term placing the responsibility for arranging and paying for the insurance and freight for goods being transported from seller to purchaser.
  17. Licensed professionals who, for a fee, assist the debtor and creditors in the bankruptcy process, holding and otherwise dealing with that bankrupt's property for the benefit of the creditors.
  18. An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving individual debtor's involving lesser indebtness the right to make a proposal to creditors, which if accepted and performed will avoid bankruptcy.
  19. Where a product is advertised at a low price and the purchaser is persuaded to purchase a higher priced product when the lower price one is not available.
  20. Where competitors biding on a product coordinate to determine the winning bid.
  21. Process by which an insolvent person voluntarily or involuntarily transfers assets to a trustee for distribution to creditors.
  22. General creditors; there is only a contract requiring a debt to be repaid, but no collateral contract giving that creditor priority with respect to some property in the event of default.
  23. Offences under provincial legislation or federal regulatory statutes that impose penalties but do not qualify as criminal law.
  24. Where two or more individuals act together to accomplish an illegal purpose.
  25. Under the Personal Property Security Act where value has been given pursuant to contract and the creditor now has a claim against assets used as security.
  26. Seller retains the right to stop the shipment in event of default.
  27. When an agreement has been made; but before there has been any performance.
Down
  1. An individual purchasing goods or services not for resale or to be used in a business.
  2. Where title to a chattel is transferred to a creditor as security for debt.
  3. Where competitors agree on a fixed price for selling their services or merchandise thus keeping prices high and defeating competition.
  4. Collateral right to debt giving the creditor the right to take back the goods or intercept the debt owing used as security in the event of a default.
  5. An obligation on the seller under the sale of Goods Act to convey ownership in the goods being sold.
  6. An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving corporations and debtors with significant debt the right to make a proposal to creditors, which if accepted and performed, will avoid bankruptcy.
  7. Court ordering the transfer of debtor's assets to a trustee as part of the bankruptcy process.
  8. An interest in property giving a creditor a prior claim to that property, often called a lien.
  9. Punishable wrongdoing associated with bankruptcy such as withholding information or wrongfully transferring assets.
  10. A fraudulant investment scheme where funds invested by later investors are used to pay off earlier investors, creating a false sense of success.
  11. A voluntary transfer of assets to a trustee in bankruptcy.
  12. A bankrupt is discharge but still required to pay a specified amount to creditors, as opposed to an absolute discharge where no such conditions are imposed.
  13. Merchants temporarily transfer to a creditor the right to collect money owed to the merchant by customers as security for a loan.
  14. Where the bankrupt is relieved of his debts, and his assets are no longer under the control of the trustee.
  15. When a person is unable to pay his or her debts as they become due.
  16. Registering a security or taking a possession of the collateral used to secure a debt under the Personal Property Security Act.
  17. Free on board: a term designating the point that title and responsibility for goods sold transfers to the purchaser.

44 Clues: A receipt for goods in the care of the shipper.A voluntary transfer of assets to a trustee in bankruptcy.Seller retains the right to stop the shipment in event of default.Goods must be usable by the purchaser in the way normally intended.When a person is unable to pay his or her debts as they become due....

Comp B 2023-12-06

Comp B crossword puzzle
Across
  1. Main screen and user interface of a computer
  2. Process of encoding data for security purposes
  3. Input device for controlling on-screen movement
  4. Security measure to protect a computer from unauthorized access
Down
  1. Device for converting physical images into digital format
  2. Wireless technology for connecting devices
  3. Activity of playing video or computer games
  4. Central unit that performs calculations in a computer
  5. Temporary storage area for frequently accessed data
  6. Collection of songs organized for playback

10 Clues: Wireless technology for connecting devicesCollection of songs organized for playbackActivity of playing video or computer gamesMain screen and user interface of a computerProcess of encoding data for security purposesInput device for controlling on-screen movementTemporary storage area for frequently accessed data...

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. What is the SOX Compliant application under EHS
  2. Tool replacing Oracle HR
  3. Measure based on the deviations of individual scores from the mean
  4. One of the focus areas of EHS
  5. CDA application is hosted here
Down
  1. Tool used for Rewards and Recognitions
  2. What protocal is used to authenticate OnGuard end user's SSO
  3. Python library for machine learning
  4. Portal to view security emergency contact and other security info
  5. TCT supports export control for which country?

10 Clues: Tool replacing Oracle HROne of the focus areas of EHSCDA application is hosted herePython library for machine learningTool used for Rewards and RecognitionsTCT supports export control for which country?What is the SOX Compliant application under EHSWhat protocal is used to authenticate OnGuard end user's SSO...

SC crossword - v2 2025-12-22

SC crossword - v2 crossword puzzle
Across
  1. The area where bags and passengers are screened
  2. The building where passengers wait for flights
  3. The path planes use to get to the runway
  4. Where the pilot sits to fly the plane
Down
  1. Where you board your plane
  2. Where planes take off and land
  3. When a plane touches back down
  4. What you do with your ticket and bags before security
  5. The person who flies the plane
  6. When a plane leaves the ground

10 Clues: Where you board your planeWhere planes take off and landWhen a plane touches back downThe person who flies the planeWhen a plane leaves the groundWhere the pilot sits to fly the planeThe path planes use to get to the runwayThe building where passengers wait for flightsThe area where bags and passengers are screened...

Human Rights 2020-12-14

Human Rights crossword puzzle
Across
  1. arrest
  2. discrimination
  3. treatment
  4. security
  5. spirit brotherhood
  6. declaration
Down
  1. cruel
  2. servitude
  3. recogniton
  4. limitation of sovereignty

10 Clues: cruelarrestsecurityservitudetreatmentrecognitondeclarationdiscriminationspirit brotherhoodlimitation of sovereignty

Human Rights 2020-12-14

Human Rights crossword puzzle
Across
  1. servitude
  2. spirit brotherhood
  3. limitation of sovereignty
Down
  1. discrimination
  2. security
  3. declaration
  4. cruel
  5. treatment
  6. arrest
  7. recogniton

10 Clues: cruelarrestsecurityservitudetreatmentrecognitondeclarationdiscriminationspirit brotherhoodlimitation of sovereignty

Thanksgiving Puzzle 2022-10-17

Thanksgiving Puzzle crossword puzzle
Across
  1. Occurs after eating to much, known as a food ____.
  2. Which state did the pilgrims land?
  3. Thanksgiving is held on what day each year.
  4. A noise typically associated with turkeys
  5. Two people hold opposite ends till it breaks in half, the bigger side is deemed the winner.
  6. The location of the Macy's Day Parade.
  7. Tastes better than turkey.
Down
  1. The day after thanksgiving commonly known for all the deals offered.
  2. A holiday that is celebrated by excessive eating.
  3. What is the current month we are in?
  4. The main dish served for thanksgiving dinner.
  5. The name of the ship the pilgrims came on.
  6. Usually the last float in the Macy's Day Parade.
  7. What day does the cyber version of black fridat occur?

14 Clues: Tastes better than turkey.Which state did the pilgrims land?What is the current month we are in?The location of the Macy's Day Parade.A noise typically associated with turkeysThe name of the ship the pilgrims came on.Thanksgiving is held on what day each year.The main dish served for thanksgiving dinner....

Unit 9: Digital Health 2024-04-22

Unit 9: Digital Health crossword puzzle
Across
  1. a health professional who diagnoses medical conditions
  2. patients can use social media to choose doctors by reading _____ from other patients about their experience
  3. a word that means 'not good enough'
  4. your digital _______ includes all the actions you take online
  5. a person who receives medical treatment
  6. ______-bullying includes targeting and threatening someone online
  7. something that is trustworthy
Down
  1. patients can use social media to find online _____ groups
  2. you must be careful online as some information may be _____ and incorrect
  3. a word that means loneliness
  4. _____ media allows people to interact online, examples include facebook and instagram
  5. a person who steals important information online
  6. the most popular social media platform in the UAE
  7. a mental health problem involving a lot of worry and stress

14 Clues: a word that means lonelinesssomething that is trustworthya word that means 'not good enough'a person who receives medical treatmenta person who steals important information onlinethe most popular social media platform in the UAEa health professional who diagnoses medical conditionspatients can use social media to find online _____ groups...

Bullying 2024-08-20

Bullying crossword puzzle
Across
  1. Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
  2. Tindakan yang melibatkan perundungan secara berkelompok.
  3. Mempermalukan seseorang di depan orang lain
  4. Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
  5. Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
  6. Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
  7. Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
  1. Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
  2. Tindakan menyebar informasi palsu tentang seseorang.
  3. Perasaan tidak berdaya dan tertekan akibat tindakan bullying
  4. Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
  5. Kata untuk seseorang yang melakukan bullying.
  6. Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
  7. Jenis bullying yang terjadi melalui media sosial atau teknologi digital

14 Clues: Mempermalukan seseorang di depan orang lainKata untuk seseorang yang melakukan bullying.Tindakan menyebar informasi palsu tentang seseorang.Tindakan yang melibatkan perundungan secara berkelompok.Perasaan tidak berdaya dan tertekan akibat tindakan bullyingKata untuk mengidentifikasi individu yang menjadi sasaran bullying...

Financial Math Vocab 2021-09-20

Financial Math Vocab crossword puzzle
Across
  1. An overtime rate that is two times the hourly rate
  2. payroll or other types of checks that are directly and electronically deposited into a bank account
  3. The set amount of money that a worker recieves for each item the individual produces
  4. paid time off that an employer may offer to employees as an employee benefit
  5. an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
  6. the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
  7. a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
  8. the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
  9. one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
  10. social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
  11. the set number of hours that an employee is expected to work
  12. Money that employees or others recieve based on sales, for example, an author or musician
  13. The total pay, which is the sum of an employees hourly pay and overtime pay
  14. a plan that employees to buy or recieve company stock;offered as an employee benefit
  15. asistance to employees who are injured while working at their job, a program that is governed by state laws.
  16. an employee benefit that allows employees paid time off to care for sick children or newborns
Down
  1. The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
  2. a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
  3. a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
  4. the federal act that established social security insurance
  5. an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
  6. a type of retirement plan where an employee recieves compensation from an employer after retirement
  7. The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
  8. a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
  9. a type of worker who is paid for each item the employee produces
  10. a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
  11. a set amount that an employee is paid for each hour of work
  12. the hourly wage an employee recieves for any overtime hours
  13. a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
  14. A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
  15. The extra hours an employee works beyond their regular hours
  16. the maximum income on which a person must pay social security tax in a given year

32 Clues: An overtime rate that is two times the hourly ratethe federal act that established social security insurancea set amount that an employee is paid for each hour of workthe hourly wage an employee recieves for any overtime hoursthe set number of hours that an employee is expected to workThe extra hours an employee works beyond their regular hours...

3.4 Crossword 2024-10-19

3.4 Crossword crossword puzzle
Across
  1. үйрету, учить, преподавать
  2. жұмыс, работа
  3. кәмпиттер, конфеты
  4. қауіпсіздік, охрана
  5. оғаш, странный
  6. жол, дорога
  7. әкелу, приносить
Down
  1. тауық, курица, цыпленок
  2. қол бұлғау, махать (рукой)
  3. сағыну, скучать
  4. туған, рожденный
  5. кейбір, несколько
  6. жылы шырайлы, дружелюбный
  7. ақылды, умный

14 Clues: жол, дорогажұмыс, работаақылды, умныйоғаш, странныйсағыну, скучатьтуған, рожденныйәкелу, приноситькейбір, несколькокәмпиттер, конфетықауіпсіздік, охранатауық, курица, цыпленокжылы шырайлы, дружелюбныйқол бұлғау, махать (рукой)үйрету, учить, преподавать

GSPR Knowledge 2022-12-04

GSPR Knowledge crossword puzzle
Across
  1. PR Hospital
  2. kick-off governance
  3. regulated div
  4. inflationary pain
  5. not football
  6. security impact
Down
  1. first step to six
  2. legal matters
  3. engagement metric
  4. supplier control
  5. who signs
  6. PR gatecheck
  7. personal development framework
  8. procure to..

14 Clues: who signsPR HospitalPR gatechecknot footballprocure to..legal mattersregulated divsecurity impactsupplier controlfirst step to sixengagement metricinflationary painkick-off governancepersonal development framework

PROTECTING YOUR COMPUTER 2016-04-24

PROTECTING YOUR COMPUTER crossword puzzle
Across
  1. Security __________ offer a wide range of protection.
  2. These type of evaluations are a great way to check it out.
  3. This OS has built in protections.
  4. These products offer advanced users a pick-and-mix approach.
  5. Do this often to keep the best protection.
  6. These should be installed regularly.
  7. These also have built in security settings.
Down
  1. These reviews are better than the manufacturer review.
  2. One of the three components protection should contain.
  3. Official looking notices that warn of viruses and a fix.
  4. Best software against Internet threats.
  5. System _________ takes you back to a time before the problem.
  6. This should be done to your computer at least once per week.
  7. Never forget to reverse this action when done.

14 Clues: This OS has built in protections.These should be installed regularly.Best software against Internet threats.Do this often to keep the best protection.These also have built in security settings.Never forget to reverse this action when done.Security __________ offer a wide range of protection.These reviews are better than the manufacturer review....

CyberSmart Crossword 2025-09-26

CyberSmart Crossword crossword puzzle
Across
  1. What to do when walking a visitor through secure areas
  2. A dishonest scheme or trick
  3. Malicious software that locks files until money is paid
  4. Type of information that must be carefully guarded
  5. What you should do with a suspicious email
  6. Fraudulent emails that trick people into revealing personal info
  7. – What you should do to your workstation when you leave your desk
Down
  1. A secret code used to access systems or accounts
  2. Software patches that fix bugs and security flaws
  3. Malicious code that spreads from one computer to another
  4. Software that secretly collects your information
  5. Worn to identify you as an employee
  6. Watching over somebody's shoulder to see what they are typing
  7. What good security habits do for your data

14 Clues: A dishonest scheme or trickWorn to identify you as an employeeWhat you should do with a suspicious emailWhat good security habits do for your dataA secret code used to access systems or accountsSoftware that secretly collects your informationSoftware patches that fix bugs and security flawsType of information that must be carefully guarded...

Compliance 3 2023-03-28

Compliance 3 crossword puzzle
Across
  1. ________ email sending shall be prohibited. (Information Security Policy)
  2. The ________ gifts should NOT be given to vendor/supplier China Mobile subsidiaries, government institutions and HQ of PRC state-owned enterprises. (Gift policy)
  3. Access log records in site access control and surveillance systems shall be kept for a minimum of ____ days. (Information Security Policy)
  4. ________ units have the responsibility to monitor public sentiment within the scope of business. (Public Sentiment Management Policy)
  5. ______ refers to a situation in which a person decides to report serious concerns about any suspected misconduct, malpractice or irregularity within the Company. (internal control policy)
Down
  1. _______ committee conducts the meeting which is responsible for sourcing, and make the approval in accordance with the relevant provisions of the ______ policy. (conference management policy)
  2. The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)
  3. All units can provide their preferred gift suggestions. __________ Division will evaluate and add the executable gifts to the list prepared in the middle and end of the year. (Gift policy)
  4. Three types of _________ Sponsorships are available to staff: team nomination, professional membership and professional certification examination sponsorship. (Education Sponsorships Policy)
  5. Passwords shall be ____ or more characters. (Information Security Policy)

10 Clues: ________ email sending shall be prohibited. (Information Security Policy)Passwords shall be ____ or more characters. (Information Security Policy)The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)...

Financial Jargons 2022-10-26

Financial Jargons crossword puzzle
Across
  1. a fixed income investment which is issued by the government or a company to its buyers
  2. a market where the prices of the stocks are increasing over a prolonged period of time
  3. It shows the average number of stocks which are traded during a particular time
  4. It relates to the amount of money or the value in cash that the holder of a security will obtain from the issuer of the security when the security matures at the specific date
  5. It shows how much a company or firm pays out in every year as compared to the stock price Income Stock
Down
  1. It is a form of fixed-income instrument which is not backed by security of any physical assets or collateral of the issuer
  2. An entity who purchases or sells investments/stocks on behalf of the investor/trader in return for a commission
  3. These are equity shares of companies which are well-established and financially stable
  4. It refers to a period in which the prices of equity shares fall consistently
  5. It is the final price on a specific trading day at which the equity shares of a company are sold or traded

10 Clues: It refers to a period in which the prices of equity shares fall consistentlyIt shows the average number of stocks which are traded during a particular timea fixed income investment which is issued by the government or a company to its buyersThese are equity shares of companies which are well-established and financially stable...

Bradley 2025-11-07

Bradley crossword puzzle
Across
  1. A card that lets you borrow money up to a limit to buy things, and pay it back later with interest if unpaid
  2. The percentage charged by a lender for borrowing money, or earned when saving money.
  3. Something valuable (like a house or car) that a lender can take if the borrower doesn’t repay a loan.
  4. An interest rate that can change over time, depending on the market.
  5. A loan used to buy a house, where the house is the security for the loan.
  6. Replacing an old loan with a new one, usually to get a better interest rate or lower payments.
  7. A person or company (like a bank) that lends money to someone.
  8. The length of time you have to repay a loan.
Down
  1. A card that takes money directly from your bank account when you buy something.
  2. An asset (like a car or house) a borrower gives as security for a loan.
  3. A set period of time a loan or deposit lasts (e.g. a 3-year loan).
  4. The original amount of money borrowed or invested, not including interest.
  5. An interest rate that stays the same for the whole loan term.
  6. Money borrowed that must be paid back, usually with interest.
  7. The person who takes money from a lender and promises to pay it back.
  8. The maximum amount you can borrow or spend (for example, on a credit card).
  9. The chance of losing money or something valuable when making a financial decision

17 Clues: The length of time you have to repay a loan.An interest rate that stays the same for the whole loan term.Money borrowed that must be paid back, usually with interest.A person or company (like a bank) that lends money to someone.A set period of time a loan or deposit lasts (e.g. a 3-year loan)....

Unit 11 2023-02-27

Unit 11 crossword puzzle
Across
  1. to order
  2. protection
  3. silly
  4. tangy
  5. a standard
Down
  1. to guide
  2. protection
  3. achievable
  4. a landslide
  5. to confirm
  6. to cuddle
  7. an appeal

12 Clues: sillytangyto guideto orderto cuddlean appealprotectionachievableto confirmprotectiona standarda landslide

Bullying 2012-10-18

Bullying crossword puzzle
Across
  1. ______ are most likely to be bullied online.
  2. It is important to raise _________ of bullying in your community.
  3. It is important to tell a teacher or trusted ______ if bullying is occuring.
  4. bullying is a form of _______.
  5. To treat another kindly, with patience and care.
  6. A person who observes the bullying behavior.
  7. Physical or emotional injury to someone.
  8. Help prevent bullying by taking _______.
Down
  1. Mental bullying occurs when bullies spread _____ about someone.
  2. A way of bullying by using email or a cell phone.
  3. If extra help is needed there are ______ groups.
  4. Making a statement or taking action that shows harm to another.
  5. Rumor or talk of a personal, sensational, or intimate nature.
  6. Racist remarks and name calling are forms of ______ bullying.
  7. Most bullies try to get a _____ from their targets.

15 Clues: bullying is a form of _______.Physical or emotional injury to someone.Help prevent bullying by taking _______.______ are most likely to be bullied online.A person who observes the bullying behavior.If extra help is needed there are ______ groups.To treat another kindly, with patience and care.A way of bullying by using email or a cell phone....

Crossword 2021-02-14

Crossword crossword puzzle
Across
  1. round trip ticket
  2. to go on vacation
  3. boarding pass
  4. to get in line
  5. monitor
  6. to pack a suitcase
  7. flight attendant
Down
  1. to go through security
  2. luggage
  3. bus stop
  4. passport
  5. airport
  6. to take a taxi
  7. to travel
  8. passenger

15 Clues: luggageairportmonitorbus stoppassportto travelpassengerboarding passto get in lineto take a taxiflight attendantround trip ticketto go on vacationto pack a suitcaseto go through security

Virtual Learning 2024-08-11

Virtual Learning crossword puzzle
Across
  1. - Access account.
  2. - Saved webpage.
  3. - Online conversation.
  4. - Video device.
  5. - Post a file.
  6. - Internet tool.
  7. - Silence your mic.
Down
  1. - Short assessment.
  2. - Web connection.
  3. - Video call platform.
  4. - Security code.
  5. - Live video transmission.
  6. - Small discussion group.
  7. - Online course platform.
  8. - Typing tool.

15 Clues: - Typing tool.- Post a file.- Video device.- Security code.- Saved webpage.- Internet tool.- Access account.- Web connection.- Short assessment.- Silence your mic.- Video call platform.- Online conversation.- Small discussion group.- Online course platform.- Live video transmission.

CROSSWORD 9th APRIL 2018-04-03

CROSSWORD 9th APRIL crossword puzzle
Across
  1. COMBAT
  2. SALARY
  3. SECURITY
  4. MORE AND MORE
  5. LABEL
  6. ERA
Down
  1. ACT DISHONESTLY
  2. CANDID/DIRECT
  3. INFERIOR
  4. A MOINS QUE
  5. REMAINS OF A FIRE
  6. WOMAN RECENTLY MARRIED

12 Clues: ERALABELCOMBATSALARYINFERIORSECURITYA MOINS QUECANDID/DIRECTMORE AND MOREACT DISHONESTLYREMAINS OF A FIREWOMAN RECENTLY MARRIED

System Securiy 2018-07-12

System Securiy crossword puzzle
Across
  1. The most effective way to achieve data security
  2. a code which unlocks personal accounts
  3. An attack which requires trial and error.
  4. and theft Act of stealing computer information.
  5. A category of manipulating in order to reveal personal information.
  6. Its also known as antivirus
  7. faking to be someone else in order to acquire information.
  8. Its an computer attack which has a code embedded in a badly designed application.
  9. A set of rules that limit computer network access
Down
  1. A type of viruses.
  2. monitoring computer network trafficking to gather information
  3. is an attempt to check the security of facilities
  4. A type of attack which prevents users from accessing servers.
  5. Higher accessed people have a wider set of information in comparison to lower level users
  6. To protect a network or system

15 Clues: A type of viruses.Its also known as antivirusTo protect a network or systema code which unlocks personal accountsAn attack which requires trial and error.The most effective way to achieve data securityand theft Act of stealing computer information.is an attempt to check the security of facilitiesA set of rules that limit computer network access...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. a type of phone used by criminals
  2. the act of willful killing for any reason
  3. a person who arranges deals and work between two people or groups
  4. the act of getting away quickly, usually from a crime scene
  5. a person accompanying another for security purposes
  6. the practice of a person doing business or shoring assets overseas to avoid taxes
  7. a secret plan to do something unlawful
Down
  1. a killer for hire
  2. protection against and from any potential harm
  3. an account of a person's life written as such by that person
  4. a long range rifle usually equipped with a scope
  5. an outfit used in order to not get recognised
  6. a building where criminal trials take place
  7. just behavior or treatment
  8. someone who writes a book

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY 2025-04-21

MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY crossword puzzle
Across
  1. It is recognized as a significant social and political endeavor that promotes gender equality and addresses violence against women.
  2. Analyzes state politics, economics, and nationalism, noting that feminist movements may disrupt national unity or economic progress if viewed against government policies.
  3. Explores how governments use force to maintain control and suppress dissent, with activists becoming targets if viewed as inciting unrest or challenging state authority.
  4. Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors.
  5. Accentuate the socialconstruction of reality and the critical role of identity and societal norms.
  6. Focuses on individual empowerment over state security; feminist movements expose issues like gender violence, risking state backlash.
  7. National Commission to Prevent and Eradicate Violence
Down
  1. Explores how gender power dynamics shape security. Feminists can be seen as threats when they challenge patriarchal systems supporting national security
  2. Argues that state sovereignty and security can lead to groups such as feminist movements being perceived as challenging established norms.
  3. Analyzes the motivations, beliefs, and actions of influential leaders in feminist movements. Governments often perceive feminists as threats, influenced by specific individuals who embody larger challenges to authority.

10 Clues: National Commission to Prevent and Eradicate ViolenceAccentuate the socialconstruction of reality and the critical role of identity and societal norms.Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors....

PPB 0035.14 - Mobile Computing 2020-11-13

PPB 0035.14 - Mobile Computing crossword puzzle
Across
  1. Internet standard that has security vulnerabilities.
  2. Security __________ must be in place prior to its implementation.
  3. Health information stored or captured by clinicians or if it is communicated to a healthcare provider who uses it to deliver care is governed by what law (i.e. PHIPA)?
  4. To support a facility’s functional needs for staying connected to a network, __________ points are created.
  5. Other than tracking health records, what is the other challenge for HIM professionals when these information are residing on mobile devices?
  6. Applications used in mobile devices allow healthcare providers and patients to access to __________ test results, medical records, and reference materials.
  7. What are used for storing addresses, organizing tasks, and scheduling functions?
  8. __________ or Wi_Fi is the technology used to connect devices and computers together.
  9. These devices, known as mobile healthcare computing devices or abbreviated __________, range from the size of a cell phone with a tiny screen to tablets.
  10. This must be required to access a mobile device.
  11. Evolution in mobile technology and the use of wireless networks has opened many doors to support mHealth, however, mobile devices may also provide challenges such as ___________ and data loss.
  12. mhealth refers to the use of mobile and __________ devices to improve healthcare.
  13. Wifi access provides clinicians with more mobility and what?
  14. The use of mobile devices is an important ___________ that Infoway believes can address several of the key challenges facing the healthcare system.
  15. Health information generated by a mobile device that uses medical records for situations such as audits, health research, and information reporting are what type of applications?
  16. Typically, clinicians use cellular phones and __________ for communication.
  17. A study found that approximately __________ of physicians had increased productivity with the use of this technology in the hospital setting.
  18. Healthcare organizations would need to outline the ____________ and acceptable uses of mobile devices that capture and store clinical information.
  19. If a healthcare organization is implementing mHealth into their system, they must take ownership and the possibility of device loss or ___________ into consideration.
  20. According to Canada Health Infoway (Infoway), Clinicians want portable, __________, and useful tools to assist them in their practice.
  21. In order to evolve to address their privacy and security considerations, healthcare organizations must put out ___________ and regulation.
Down
  1. mHealth can be downloaded by consumers from provider portals or by health providers to collect, record and report information either manually or via interfaces with what devices?
  2. What must clinicians search for to achieve the most effective application(s) for their myriad of needs?
  3. What will be harmonized with mHealth’s initiatives and directions in the short and long-term once policies are implemented?
  4. Policies would need to address mobile device ____________.
  5. The most popular connection is __________ that allows high speed transfer.
  6. Remotely monitoring hospital patients or the elderly can free up much needed what in hospitals and nursing homes?
  7. mHealth has the potential to benefit society in a number of ways, such as cutting the costs of providing healthcare, maintaining and improving __________ of care, and reaching patients in remote locations.
  8. Intermittently connected MHCD’s pose what great risk?
  9. __________ can also be used as a tool for patients to manage appointments, renew prescriptions, or view medical records.
  10. With this implementation, practitioners can access the hospital’s internet guidelines in what way?
  11. The term __________ health has become visible as a new capability of information management within health delivery organizations (HDOs).
  12. Where should policy makers and program managers need to be aware of privacy security issues to ensure appropriate policies and strategies are developed and implemented?
  13. Studies predict mHealth has the potential to reduce the __________ burden of healthcare delivery for clinicians by 20 to 30 percent.
  14. The functional categories of MHCDs each have different requirements for __________, security, communication, and systems integration.
  15. mHealth is also part of an organization’s ___________ health record and is subject to requests for disclosures, subpoenas, and e-discovery.
  16. It is also empowering the elderly by providing them with __________involvement in their treatment.
  17. What type of devices do practitioners use in order to access databases, drug details, or drug reactions?
  18. What must be replaced in order for information updates to be done?
  19. Message ___________ security and data storage security can put citizen information at risk if the necessary precautions are not taken.
  20. The use of these technologies can __________ healthcare costs by supporting care delivery, promoting healthy behavior changes in patients, and transforming the caregiver-to-patient and care-giver-to caregiver relationships.
  21. Many functions that can be performed and being ported to mobile platforms are using what kind of clinical information system?
  22. To avoid problems, assessing the validity of the quality of mHealth applications should include privacy, security, ___________, and content features.
  23. Many challenges include preventing unauthorized access to, ensuring that it is not stored on a mobile device, and particularly dealing with what kind of sensitive patient information?
  24. Physicians are increasingly using smartphones which allows them to access medical resources in order to support __________ based decision making.
  25. mHealth implementers must pay attention to storage issues and the concept of the extensive amount of health data being generated is called?
  26. mHealth also has the potential to reduce the per __________ cost of healthcare, while simultaneously maintaining or improving care quality.
  27. What control concerns are related to these mobile devices that must be dealt with and resolved?
  28. Policies may be involved in how mobile devices are handled when the information they contain may become involved in what potential legal action?

49 Clues: This must be required to access a mobile device.Internet standard that has security vulnerabilities.Intermittently connected MHCD’s pose what great risk?Policies would need to address mobile device ____________.Wifi access provides clinicians with more mobility and what?Security __________ must be in place prior to its implementation....

Competency 5, Information Security 2020-10-10

Competency 5, Information Security crossword puzzle
Across
  1. A method for confirming users' identities.
  2. A virus and worm are two types.
  3. Right to choose the conditions and the extent to which information and beliefs are shared with others. Informed consent for the release of medical records represents the application of information privacy.
  4. The protection of physical items, objects, or areas from unauthorized access and misuse.
  5. US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
  6. Electronic tool that can track system access by individual user, by user class, or by all persons who viewed a specific client record.
  7. Unspoken understanding that private information shared in a situation in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
  8. Freedom to do things without other people watching you or knowing what you are doing. Privacy includes the right to determine what information is collected, how it is used, and the ability to access collected information to review its security and accuracy.
  9. Acronym for the exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies.
  10. Acronym for Health Insurance Portability and Accountability Act.
Down
  1. Protection of information systems and the information housed on them from unauthorized use or threats to integrity.
  2. The exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies
  3. The protection of non-tangible items such as software and data integrity from unauthorized access and misuse.
  4. Programs written for the purpose of stealing information, causing annoyance or performing covert actions.
  5. Data that has been interpreted.
  6. Type of gateway designed to protect private network resources from outside hackers, network damage, and theft or misuse of information.

16 Clues: A virus and worm are two types.Data that has been interpreted.A method for confirming users' identities.Acronym for Health Insurance Portability and Accountability Act.The protection of physical items, objects, or areas from unauthorized access and misuse....

Security awareness month 2021 2021-10-04

Security awareness month 2021 crossword puzzle
Across
  1. Tide's bug bounty program
  2. This is commonly assigned to bank customers for use with ATMs and for use with debit cards.
  3. Security is the job of __________.
  4. A service that both encrypts your data and hides your IP address
  5. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. Tide's Information classification procedure has four colours. Green, Amber, Red and _________.
  7. Unauthorised person follows an authorised individual to enter a typically secured area.
  8. Any data that could potentially be used to identify a particular person.
Down
  1. You should _____ a device before stepping away from it.
  2. Where is Tide's Information Security Management System kept
  3. You message in this channel if an incident occurs.
  4. For a password to be secure, it should contain upper and lower case letters, numbers, and ________
  5. You should never share your __________.
  6. Who is Tide's Ciso?
  7. A type of online scam where criminals impersonate legitimate organisations via email
  8. A malicious code that can infect your system.

16 Clues: Who is Tide's Ciso?Tide's bug bounty programSecurity is the job of __________.You should never share your __________.A malicious code that can infect your system.You message in this channel if an incident occurs.You should _____ a device before stepping away from it.Where is Tide's Information Security Management System kept...

Infant Safety and Security 2016-11-19

Infant Safety and Security crossword puzzle
Across
  1. Function allowing caregivers to adjust/change banding material
  2. Code name for infant abduction
  3. Allows caregiver to automatically enroll infant in the Safe Place system 60 seconds after the infant in banded with transmitter
  4. Never assume an alarm is ________
  5. In case of a code pink, use Vocera to "__________ to Everyone Everywhere"
  6. Allows caregiver to pre-assign a transmitter to a specific infant before banding the infant
  7. Information alarm color (auto-enroll, transfer complete, expired alarms)
  8. Color for check band, device fault and client missing alarms
  9. Function allowing movement between monitored units
Down
  1. Function allowing movement to unmonitored areas (MRI, CT, etc)
  2. On employee badges letting families know who is authorized to transport the baby
  3. Staff should ALWAYS respond __________ to all alarms
  4. The number to call to report a Code Pink can be found on most unit
  5. Function to remove the infant from the system
  6. Infant safety and security is the responsibility of _________ in the healthcare facility.
  7. Color for cut band, door alarm, no signal and 'band off" alarms

16 Clues: Code name for infant abductionNever assume an alarm is ________Function to remove the infant from the systemFunction allowing movement between monitored unitsStaff should ALWAYS respond __________ to all alarmsColor for check band, device fault and client missing alarmsFunction allowing movement to unmonitored areas (MRI, CT, etc)...

Security Awareness Month 2025 2025-09-25

Security Awareness Month 2025 crossword puzzle
Across
  1. Locks files and demands you pay money
  2. Pressing on something with your mouse. Think before you do this
  3. A formal rule set by the company to govern behavior
  4. A saved copy of your files
  5. What you should do if you spot a phishing email
  6. Watches what you do on your computer
  7. A secret word used to log in
  8. What you click to open a webpage
Down
  1. Bad software that harms your computer
  2. People who break into computer systems
  3. A warning about something important
  4. A message sent over the internet
  5. Adds new features and fixes security problems on devices
  6. Keeping personal info safe
  7. Fake emails that try to trick you
  8. We do this every month via Terranova

16 Clues: A saved copy of your filesKeeping personal info safeA secret word used to log inA message sent over the internetWhat you click to open a webpageFake emails that try to trick youA warning about something importantWatches what you do on your computerWe do this every month via TerranovaBad software that harms your computer...

Cyber safety-by Bridget Graham 2016-05-24

Cyber safety-by Bridget Graham crossword puzzle
Across
  1. to decline or not accept a request on a game
  2. private information that you don't share with with other people
  3. when you post something on the internet so everyone can see it
  4. to copy a file from one computer system to another via the Internet
  5. something that is important not to tell people on the internet or they can track you down
  6. a saved link to a website
  7. allows people to share things online
  8. when you close a screen to save it for later
  9. when an unknown number or email address appears on your emails
  10. a search engine
  11. to upload information to the web
Down
  1. when someone pretends to be your friend on games but their really not
  2. a little chip that is is in your computer that you can turn off and on
  3. when someone is being mean to you on line
  4. a web address
  5. never tell anyone about it because you don't know what's going to happen
  6. information stored on your computer or device
  7. your personal address on your computer
  8. a location on the internet
  9. little pictures to express your feeling
  10. ups when browsing a new window appears that you don't want

21 Clues: a web addressa search enginea saved link to a websitea location on the internetto upload information to the weballows people to share things onlineyour personal address on your computerlittle pictures to express your feelingwhen someone is being mean to you on lineto decline or not accept a request on a game...

Cyber safety words-Lance Zafico 2016-05-21

Cyber safety words-Lance Zafico crossword puzzle
Across
  1. instant messaging online
  2. guidance
  3. popups
  4. get info from
  5. when bullies do bad things
  6. info you don't want to share
  7. someone you don't know
  8. someone following you without you knowing
  9. when you're using the internet
  10. another name for the internet
Down
  1. id for logging in
  2. says mean things
  3. computer guide
  4. bad people
  5. personal info
  6. secret word or phrase
  7. people getting your info
  8. a place where everyone chats to each other
  9. messages sent to your email address
  10. safe

20 Clues: safepopupsguidancebad peoplepersonal infoget info fromcomputer guidesays mean thingsid for logging insecret word or phrasesomeone you don't knowinstant messaging onlinepeople getting your infowhen bullies do bad thingsinfo you don't want to shareanother name for the internetwhen you're using the internetmessages sent to your email address...

SBLI Cyber Month Crossword Puzzle! 2024-10-06

SBLI Cyber Month Crossword Puzzle! crossword puzzle
Across
  1. A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
  2. A service that creates a secure connection over the internet, often used for privacy. (acronym)
  3. Device used to secure doors or containers, often requiring a key or combination. (1 word)
  4. Software that detects and removes malicious software from a computer. (1 word)
  5. Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
  6. Device used to watch and record activity in a specific area for safety purposes.(2 words)
  7. The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
  8. A type of malware that locks users out of their data, demanding payment for access. (1 word)
  9. Unique pattern of ridges and valleys on the skin of a finger, used for identification.
  10. The process of converting information into a code to prevent unauthorized access. (1 word)
  11. A list of trusted entities or applications that are granted access. (1 word)
Down
  1. An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
  2. A method of bypassing normal authentication, often used for malicious purposes. (1 word)
  3. Ethan and Brian make up this team (2 words)
  4. A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
  5. Software that secretly monitors user activity and collects personal information. (1 word)
  6. Team that handles SBLI's tech (acronym)
  7. Manipulating individuals into divulging confidential information. (2 words)
  8. A software update designed to fix vulnerabilities or bugs. (1 word)
  9. Malware disguised as legitimate software to trick users into installing it. (1 word)
  10. Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
  11. A weakness in a system that can be exploited by threats. (1 word)
  12. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
  13. A network security system that monitors and controls incoming and outgoing traffic. (1 word)
  14. An incident where unauthorized access to data occurs. (1 word)

25 Clues: Team that handles SBLI's tech (acronym)Ethan and Brian make up this team (2 words)An incident where unauthorized access to data occurs. (1 word)A weakness in a system that can be exploited by threats. (1 word)A software update designed to fix vulnerabilities or bugs. (1 word)...

Cyber Ethics Puzzle, Chapter 7 2024-11-22

Cyber Ethics Puzzle, Chapter 7 crossword puzzle
Across
  1. Commerce that takes place over the internet instead of at physical stores.
  2. A prominent writer espousing Neo-luddism and associated ideologies.
  3. Being responsible for something, such as the results of an action.
  4. Forms of remote communication made possible through the use of technology.
  5. A group of farmers concerned that technology would render them obsolete.
  6. Textual data that is received over the internet and formatted via HTML and CSS.
  7. The (often non-consentual) removal of data from a consumer device by the producer of that device.
  8. This company is, among other things, the primary maintainer of the android operating system, and got into controversy after removing applications from the mobile phones of users.
  9. A compendium of information, either in general or on a specific topic.
  10. An online encyclopedia who's easily editable nature has been abused by many organizations over the years.
  11. This company is known for maintaining strict controls over their software ecosystem.
  12. This company is known for its extremely popular computer operating system.
Down
  1. A group similar to Luddites, but with a view that most forms of technology are evil, and do more harm than good.
  2. A computer program designed to search the internet for websites matching a user's query.
  3. A worldwide network of connected devices that facilitate the sharing of information.
  4. A way of simulating a process through software so that one may predict the results of a course of action.
  5. A type of medicine that is performed at long distance using technological assistance.
  6. A term used to refer to field of producing and using computers.
  7. Sensors and other devices that are networked together and communicate via wirelessly.
  8. This company stirred up controversy by removing books from the digital reading devices of customers.

20 Clues: A term used to refer to field of producing and using computers.Being responsible for something, such as the results of an action.A prominent writer espousing Neo-luddism and associated ideologies.A compendium of information, either in general or on a specific topic.A group of farmers concerned that technology would render them obsolete....

Cyber Fund Final Exam Vocab 2025-05-12

Cyber Fund Final Exam Vocab crossword puzzle
Across
  1. a computer system on the internet that is expressly set up to attract and trap intruders
  2. the state of being complete or uncorrupted
  3. data can be accessed when needed
  4. spoofed emails and fraudulent websites designed to fool recipients into divulging PII
  5. small text files that are saved on the computer for use with web browsers and websites
  6. another word for "technical" skills
  7. Governs the type of traffic that is and isn't allowed through a firewall
  8. a governmental organization for standardizing measurement, technology, and industrial standards
  9. the physical part of a computer that you can touch
  10. a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
  11. the condition of being private or secret
Down
  1. using a lie or scam to obtain private info
  2. the #1 cause of information security breaches for organizations
  3. This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
  4. deploys when conditions exist that malware is seeking
  5. the internet protocol that has 128 bits
  6. the Act that ensures that financial businesses are protecting your private data
  7. a tool that intercepts raw data traveling on a network
  8. a malicious website using a URL similar to a real one (ex.: www.aple.com)
  9. malware hidden inside other software that seems harmless
  10. acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
  11. a flaw or potential for harm
  12. a program or code that replicates by being copied or initiating its copying to another program
  13. the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam

24 Clues: a flaw or potential for harmdata can be accessed when neededanother word for "technical" skillsthe internet protocol that has 128 bitsthe condition of being private or secretusing a lie or scam to obtain private infothe state of being complete or uncorruptedthe physical part of a computer that you can touch...

PLACES AT ASCHOOL 2025-03-18

PLACES AT ASCHOOL crossword puzzle
Across
  1. Area^Area Parkir
  2. Field^Lapangan Olahraga
  3. Area^Area Loker
  4. Perpustakaan
  5. Room^Ruang Seni
  6. Office^Ruang Kepala Sekolah
  7. Room^Ruang Guru
  8. Post^Pos Keamanan
  9. Hall^Aula Sekolah
  10. Bermain
Down
  1. Olahraga
  2. Room^Ruang Kesehatan
  3. Room^Mushola
  4. Ruang Kelas
  5. Kantin
  6. Room^Ruang Komputer
  7. Room^Ruang Musik
  8. Yard Halaman Sekolah

18 Clues: KantinBermainOlahragaRuang KelasRoom^MusholaPerpustakaanArea^Area LokerRoom^Ruang SeniRoom^Ruang GuruArea^Area ParkirRoom^Ruang MusikPost^Pos KeamananHall^Aula SekolahRoom^Ruang KomputerRoom^Ruang KesehatanField^Lapangan OlahragaYard Halaman SekolahOffice^Ruang Kepala Sekolah

Computer Language 2025-06-01

Computer Language crossword puzzle
Across
  1. Data storage unit
  2. Internet safety term
  3. Computer type
  4. Computer input device
  5. Computer security term
  6. Computer operating system
  7. Computer graphics term
  8. Computer coding term
  9. Computer software
  10. Computer hardware part
Down
  1. Computer Term
  2. Computer input device
  3. Webpage address
  4. Computer software term
  5. Programming language
  6. Computer graphics term
  7. Computer programming term
  8. Computer network term
  9. Computer network
  10. Computer coding term

20 Clues: Computer TermComputer typeWebpage addressComputer networkData storage unitComputer softwareInternet safety termProgramming languageComputer coding termComputer coding termComputer input deviceComputer input deviceComputer network termComputer software termComputer security termComputer graphics termComputer graphics termComputer hardware part...

CSAM 2022 - Be Cyber Smart 2022-10-02

CSAM 2022 - Be Cyber Smart crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
  2. THe A in the C-I-A Triad. It ensures authorized users have access.
  3. A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. Verifying identity
  5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  2. Facebook, Twitter, Instagram, etc. (two words)
  3. Hardware or software designed to prevent unauthorized access to or from private network.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
  7. Threatening behavior facilitated through electronic means such as texting.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Unauthorize access to a network, information systems, or application.
  10. The I in the C-I-A Triad; protection from unauthorized changes.
  11. Should be constructed of upper and lower case letters, numbers, and special characters.
  12. A fraudalent email purportedly from a reputable company attempting to get personal information.

20 Clues: Verifying identityFacebook, Twitter, Instagram, etc. (two words)The I in the C-I-A Triad; protection from unauthorized changes.THe A in the C-I-A Triad. It ensures authorized users have access.Unauthorize access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Super Cryptic Cyber Crossword 9000 2022-02-02

Super Cryptic Cyber Crossword 9000 crossword puzzle
Across
  1. Password 2.0.
  2. Spoofing, at the very top of the company’s hierarchy.
  3. Protecting your door with a lock made of Cheetos
  4. Online advertising used to spread malware.
  5. Much stronger than SMS, but weaker than U2F.
  6. A Wi-Fi access point that wants to hurt you, bad…
  7. Oh you wanted access to your system? NOPE.
  8. Everyone needs protection… even Wi-Fi connections in hotel lobbies!
  9. Reason #999 not to use SMS as an MFA mechanism.
  10. Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
  11. registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
  12. Pay us money… or else have fun having no access to your files!
  13. Don’t get (personally) hooked!
  14. A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
  15. An item of value and/or importance to our business operations.
Down
  1. Hide this to have a (minor) edge over your Wi-Fi attackers!
  2. Lets you authenticate by the way you sign your name or walk the walk!
  3. An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
  4. This is how I prove who I claim to be to a system.
  5. You swipe your card into the reader, I will blindly follow.
  6. The risk posture of our company is situated somewhere between a bank and this.
  7. Ninja IT’s meaner and nastier cousin.
  8. A security model which assumes that there is always at least one person on every team that is compromised or coerced.
  9. The internet’s telephone directory.
  10. A vendor assessment a day keeps external audits away.
  11. Phishing for those partial to phone calls.
  12. Don’t get hooked to this social “experiment”!
  13. Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
  14. The practice and study of methods for hiding information.
  15. I will execute independently and self-replicate through your network connections. Sounds cool, eh?
  16. Defines and manages controls that an organization needs to implement.

31 Clues: Password 2.0.Don’t get (personally) hooked!The internet’s telephone directory.Ninja IT’s meaner and nastier cousin.Online advertising used to spread malware.Phishing for those partial to phone calls.Oh you wanted access to your system? NOPE.Much stronger than SMS, but weaker than U2F.Don’t get hooked to this social “experiment”!...

Networking Concepts and Cyber Ethics 2025-06-04

Networking Concepts and Cyber Ethics crossword puzzle
Across
  1. Local Area Network
  2. Information about a person that exists on the internet because of their online activities
  3. Bulk Emails
  4. Distributing copied software illigaly
  5. this topology forms a circle
  6. Safety Rules and regulations on the internet
  7. It is requires the cheapest topology setup
  8. Does not broadcast the message on the entire internet
  9. Metropolitan Area Network
Down
  1. Used in wireless networking
  2. One of the most common type of topology
  3. Presenting someone else's work as your own
  4. Combination of two terms 'net' and 'etiquette'
  5. Enables you to connect to the available internet
  6. Illegally using someone else's identity
  7. Illigal activities done online
  8. This topology uses a single communication line
  9. Connect two internets together,LAN and WAN
  10. A network device used to connect all computers
  11. World Area Network

20 Clues: Bulk EmailsLocal Area NetworkWorld Area NetworkMetropolitan Area NetworkUsed in wireless networkingthis topology forms a circleIlligal activities done onlineDistributing copied software illigalyOne of the most common type of topologyIllegally using someone else's identityPresenting someone else's work as your own...

IT: Networking and Cyber Ethics 2025-05-27

IT: Networking and Cyber Ethics crossword puzzle
Across
  1. Device that connects devices in a network
  2. Online manners and rules
  3. Copying work without giving credit
  4. Security system that controls network traffic
  5. Protecting data by converting it into code
  6. Wide Area Network
  7. Fraud attempt to obtain sensitive data
  8. Unauthorized access to data
  9. Device that forwards data packets between networks
  10. Local Area Network
Down
  1. Common wired networking technology
  2. Malicious software
  3. Online harassment or bullying
  4. Set of rules for data transmission
  5. Converts signals for internet access
  6. Data transfer capacity of a network
  7. Address: Unique string identifying a device on a network
  8. Legal right to protect creative work
  9. Footprint: Online trail of user activity
  10. Right to control personal data

20 Clues: Wide Area NetworkMalicious softwareLocal Area NetworkOnline manners and rulesUnauthorized access to dataOnline harassment or bullyingRight to control personal dataCommon wired networking technologySet of rules for data transmissionCopying work without giving creditData transfer capacity of a networkConverts signals for internet access...

Cyber Awareness Passwords and MFAs 2025-08-14

Cyber Awareness Passwords and MFAs crossword puzzle
Across
  1. The process of verifying a user's identity.
  2. These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
  3. This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
  4. This type of attack uses a predefined list of common words and phrases to guess passwords.
  5. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  6. Changing this immediately is recommended on accounts you suspect may have been compromised.
  7. Avoid using easily __________ information like names or birthdays in your passwords.
  8. This type of attack tries out countless password combinations until the correct one is found.
Down
  1. A strong password should be at least ______ characters long, according to NIST recommendations.
  2. A method of authentication using unique patterns on an individual's fingertip.
  3. An unauthorized user who attempts to gain access to an information system.
  4. A common bad habit where users employ the same credentials across different websites and services.
  5. The process of converting data into a format unreadable to anyone except those possessing a "key".
  6. Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
  7. A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
  8. This type of authentication adds an extra layer of security beyond just a password.
  9. Should be at least 16 characters long and combine random words to be strong.
  10. A specific form of phishing that targets high-profile business executives.
  11. A sequence of words or text used to control access to a computer; similar to a password.
  12. and Clues (Word TAB Clue)
  13. Passkeys often rely on this type of factor, like a fingerprint or facial scan.
  14. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.

22 Clues: and Clues (Word TAB Clue)The process of verifying a user's identity.An unauthorized user who attempts to gain access to an information system.A specific form of phishing that targets high-profile business executives.Should be at least 16 characters long and combine random words to be strong....

Supranationalism 2021-01-04

Supranationalism crossword puzzle
Across
  1. mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
  2. promotes unity and solidarity and spurs economic development in Africa
  3. organization governing common economic, social, and security issues in its European member states
  4. trading bloc between the countries of North America
  5. military alliance of countries in Western Europe and North America
Down
  1. high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
  2. integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
  3. global international organization that maintains peace and security and promotes economic and social development
  4. maintains peace and security and accelerates economic growth in Southeast Asia

9 Clues: trading bloc between the countries of North Americamilitary alliance of countries in Western Europe and North Americapromotes unity and solidarity and spurs economic development in Africamaintains peace and security and accelerates economic growth in Southeast Asia...

Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29

Whaine V. ~ 7/8 Internet Safety CrossWord! crossword puzzle
Across
  1. A hostile and insulting interaction between internet users.
  2. An image that is captured of what is shown on a phone, tablet, or computer screen
  3. Rules or manners for interacting courteously with others online
  4. unwanted emails
Down
  1. Online communities, also known as social networks
  2. Sharing someone’s secrets or embarrassing information online
  3. Setting up a fake online profile
  4. malware,cyber-destroyer, break your technology
  5. A technology that allows us to access our files through the internet from anywhere in the world.
  6. Someone who posts rude or off-topic messages in an online community

10 Clues: unwanted emailsSetting up a fake online profilemalware,cyber-destroyer, break your technologyOnline communities, also known as social networksA hostile and insulting interaction between internet users.Sharing someone’s secrets or embarrassing information onlineRules or manners for interacting courteously with others online...

Text Bullying 2019-05-22

Text Bullying crossword puzzle
Across
  1. its never too late to do / make the _____ thing / choice
  2. when someone is mean to someone else on purpose
  3. everyone is unique and ______ in their own way
  4. having _____ can give you the courage to help and stop bullying
  5. bystanders are equally evolved if they don't ____
  6. bully is identified not by their looks, but rather by their ____
Down
  1. bullying can be done by an individual or by a _____
  2. bullies often have problems with ________ and have their own way to deal with it
  3. bullying online is called ______ bullying
  4. bullying is unfair and one-______

10 Clues: bullying is unfair and one-______bullying online is called ______ bullyingeveryone is unique and ______ in their own waywhen someone is mean to someone else on purposebystanders are equally evolved if they don't ____bullying can be done by an individual or by a _____its never too late to do / make the _____ thing / choice...

Safety Crossword 2023-05-05

Safety Crossword crossword puzzle
Across
  1. Cyber-attack that is sent via SMS/Text messaging
  2. Known as scam phone calls
  3. Program to identify and assist those who may require assistance during an evacuation
  4. How many life-saving rules are there
  5. Location of buried utilities prior to a mechanical excavation cover which life-saving rule
Down
  1. Someone enters behind you without your knowledge
  2. Malicious or threatening emails sent
  3. What is the 4th value recently added to Enbridge's values
  4. Type of training to ensure our workstations are setup properly
  5. What type of alarm system does Enbridge Centre and Manulife have

10 Clues: Known as scam phone callsMalicious or threatening emails sentHow many life-saving rules are thereSomeone enters behind you without your knowledgeCyber-attack that is sent via SMS/Text messagingWhat is the 4th value recently added to Enbridge's valuesType of training to ensure our workstations are setup properly...

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Bullying and Decision Making 2023-09-01

Bullying and Decision Making crossword puzzle
Across
  1. Something you think and contemplate about everyday
  2. different types are racial, cyber, and physical
  3. a synonym of abuse
  4. a person who supports a person that’s is doing through bullying
  5. a mean person who physically, mentally, socially abuses for their own personal gain
Down
  1. a person who is experiencing abuse from a bully
  2. a person who teaches and gets reports about bullying
  3. of bully- a person who supports the bully and close friend
  4. a person who usually gives a bully silent approval or doesn’t want to get involved
  5. when someone gets bullied through technology

10 Clues: a synonym of abusewhen someone gets bullied through technologya person who is experiencing abuse from a bullydifferent types are racial, cyber, and physicalSomething you think and contemplate about everydaya person who teaches and gets reports about bullyingof bully- a person who supports the bully and close friend...

words often confused 2022-04-07

words often confused crossword puzzle
Across
  1. a part of something
  2. a flying object
  3. form of they
  4. hurled
  5. revealed
  6. writing paper
  7. a place
  8. still and peaceful
  9. simple, common
  10. detail
Down
  1. the head of a school
  2. to a great extent
  3. quiet order and security
  4. a rule of conduct
  5. glowed
  6. they + are
  7. comparisons
  8. in a fixed position
  9. at that time

19 Clues: glowedhurleddetaila placerevealedthey + arecomparisonsform of theyat that timewriting papersimple, commona flying objectto a great extenta rule of conductstill and peacefula part of somethingin a fixed positionthe head of a schoolquiet order and security

Erica 2025-12-16

Erica crossword puzzle
Across
  1. Painting acquired
  2. Georigan Adventure
  3. Canoe Camping 2025
  4. Atlanta School
  5. Fastest Runners in Person
  6. Tall active activity
  7. Elias Tatiana First
  8. _ challenge
  9. New Haven "Her"
  10. Wakeup Beverage
Down
  1. No Security Red Bull
  2. Heatsource
  3. First African Nation
  4. Travel Goal, 50
  5. Ferdi & Tamara Present
  6. Snowpants Feature
  7. Best Bike
  8. Animal seen from tent
  9. Backyard Structure

19 Clues: Best BikeHeatsource_ challengeAtlanta SchoolTravel Goal, 50New Haven "Her"Wakeup BeveragePainting acquiredSnowpants FeatureGeorigan AdventureCanoe Camping 2025Backyard StructureElias Tatiana FirstNo Security Red BullFirst African NationTall active activityAnimal seen from tentFerdi & Tamara PresentFastest Runners in Person

PKN Group kevin, akio, nelson, daniel 2023-03-15

PKN Group kevin, akio, nelson, daniel crossword puzzle
Across
  1. sebuah contoh dari integrasi nasional adalah pembangunan ______ oleh pemerintahan R.I,
  2. apa kata benda dari integritas?
  3. kampanye yang berbau ______ bisa menjadi ancaman terbangunnya integrasi nasional
  4. Dunia maya disebut juga dengan ______
  5. integrasi nilai indonesia ada dalam ______
  6. Sikap percaya diri merupakan khas nasionalisme Indonesia menurut _______
  7. _______ menjadi ciri khas bangsa indonesia
  8. salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah
  9. penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI
Down
  1. kita harus menghadapi bersama ancaman supaya _______ nasional dapat terwujud
  2. budaya beragam seharusnya menjadi ______ bukan untuk merendahkan budaya lain
  3. mencintai produk lokal dan budaya bangsa sendiri merupakan implementasi dari ______
  4. untuk mencegah terjadinya disintegrasi di masa depan, perlu ada ________ kebudayaan yang menyeluruh & berkesinambungan
  5. memelihara lingkungan hidup merupakan bentuk partisipasi warga negara dilingkungan ______ dan negara
  6. ________ menyediakan segala macam bentuk kekuatan manusia melalui berbagai proses
  7. dalam uud 1945 dinyatakan 4 tujuan ______

16 Clues: apa kata benda dari integritas?Dunia maya disebut juga dengan ______dalam uud 1945 dinyatakan 4 tujuan ______integrasi nilai indonesia ada dalam _____________ menjadi ciri khas bangsa indonesiapenguatan ______ perlu ditempuh untuk menjaga wilayah NKRIsalah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah...

Know your Products 2016-01-29

Know your Products crossword puzzle
Across
  1. 140+ channels
  2. Two Services
  3. Communities with contracted services
  4. Our Guarantee
  5. 240+ Channels
  6. Ultimate video package
  7. 25 Mbps Internet
  8. Home Security
  9. 75 Mbps Internet
Down
  1. Three Services
  2. Telephone
  3. Four Services
  4. High Speed Internet
  5. Customers not in Community Contract
  6. Keeping our customers
  7. 150 Mbps Internet
  8. Discounted Telephone

17 Clues: TelephoneTwo Services140+ channelsFour ServicesOur Guarantee240+ ChannelsHome SecurityThree Services25 Mbps Internet75 Mbps Internet150 Mbps InternetHigh Speed InternetDiscounted TelephoneKeeping our customersUltimate video packageCustomers not in Community ContractCommunities with contracted services

Computer Language 2025-06-01

Computer Language crossword puzzle
Across
  1. Data storage unit
  2. Internet safety term
  3. Computer type
  4. Computer input device
  5. Computer security term
  6. Computer operating system
  7. Computer graphics term
  8. Computer coding term
  9. Computer software
  10. Computer hardware part
Down
  1. Computer Term
  2. Computer input device
  3. Webpage address
  4. Computer software term
  5. Programming language
  6. Computer graphics term
  7. Computer programming term
  8. Computer network term
  9. Computer network
  10. Computer coding term

20 Clues: Computer TermComputer typeWebpage addressComputer networkData storage unitComputer softwareInternet safety termProgramming languageComputer coding termComputer coding termComputer input deviceComputer input deviceComputer network termComputer software termComputer security termComputer graphics termComputer graphics termComputer hardware part...

Business Law 123 2014-01-23

Business Law 123 crossword puzzle
Across
  1. Another word for a law.
  2. Law for offenses against society.
  3. Method of settling a dispute when a third party's advice is sought, but is not legally binding
  4. Court that reviews the decisions of lower courts.
  5. Laws that govern the use of computers and the Internet.
  6. Term used to add provisions to the constitution
  7. Method of settling a dispute when a third party's decision is legally binding.
  8. Decision of a court.
  9. Method of settling a dispute when both parties reach an agreement by themselves
  10. Settling a dispute through the courts.
  11. Court of original jurisdiction.
  12. Court for individuals under the age of 18.
Down
  1. Court responsible for handling wills and estates.
  2. Branch of government that may rule laws unconstitutional.
  3. Law based on current standards or customs.
  4. A law passed at the city level.
  5. Verbatim (word-for-word) record of court proceedings.
  6. Branch of government that can veto laws.
  7. Authority of a court to decide a case
  8. Law used to provide remedy for wrongs against individuals.

20 Clues: Decision of a court.Another word for a law.A law passed at the city level.Court of original jurisdiction.Law for offenses against society.Authority of a court to decide a caseSettling a dispute through the courts.Branch of government that can veto laws.Law based on current standards or customs.Court for individuals under the age of 18....

Code 2016-02-08

Code crossword puzzle
Across
  1. When something bad gets into your computer
  2. A block to a puzzle for games or programs
  3. When you add something onto your computer
  4. A place where power or information leaves a system
  5. A programming language is formal constructed language that is programmed in the computer
  6. block A block that repeats how many times in coding
  7. to identify or remove errors from the computer
  8. A conditional clause or conjunction
  9. When you are working on a website and it needs to be ___
  10. Get mail from the computer, phone, tablet, and computers
Down
  1. A system
  2. A folder that items
  3. A part of a puzzle for coding
  4. The use of parallel in computers
  5. A virus on the computer
  6. A site that you visit or when you install a game on a software
  7. bully Bullies that are online
  8. citizenship Behaviors online
  9. A logic gate is an elementary building block on a digital circuit
  10. When something repeats it self

20 Clues: A systemA folder that itemsA virus on the computercitizenship Behaviors onlineA part of a puzzle for codingbully Bullies that are onlineWhen something repeats it selfThe use of parallel in computersA conditional clause or conjunctionA block to a puzzle for games or programsWhen you add something onto your computer...

Health Period 2 2023-04-24

Health Period 2 crossword puzzle
Across
  1. natural sweet tasting substance found in most foods
  2. most popular sport at Malden High
  3. nutrient found in meat, dairy, eggs, nuts
  4. a chronic relapsing disorder often associated with drugs and alcohol
  5. structured conversation with questions to evaluate qualifications
  6. type of health related to a persons psychological and emotional well-being
  7. group of people united by blood or experience
  8. my sisters son Asher is my
  9. Michelle Conrad was convicted of this
  10. state of complete physical, mental, and social well-being
  11. "some people are worth melting for"
Down
  1. online bullying
  2. unwanted aggressive behavior that involves a real or perceived power imbalance
  3. family value based on right or wrong behavior
  4. unit of energy in a food or drink item
  5. second leading cause of death amongst teens
  6. custom passed down from previous generations
  7. parking between two cars aligned with the street
  8. most commonly the highest fixed expense
  9. how the body converts nutrients to energy

20 Clues: online bullyingmy sisters son Asher is mymost popular sport at Malden High"some people are worth melting for"Michelle Conrad was convicted of thisunit of energy in a food or drink itemmost commonly the highest fixed expensenutrient found in meat, dairy, eggs, nutshow the body converts nutrients to energysecond leading cause of death amongst teens...

Digital Media Literacy 2021-11-03

Digital Media Literacy crossword puzzle
Across
  1. place where you can see all the content from a creator
  2. documentary about social media apps
  3. videos or images selling a product
  4. social media app owned by Facebook
  5. owner of Facebook
  6. if someone wants to say something about a video they do this
  7. a person who gives away secrets
  8. red pin to car
  9. harassment or bullying on the internet
Down
  1. Owner of YouTube
  2. a messaging app owned by Facebook
  3. social media which name sounds like what noise a bird makes
  4. if someone wants to let their friends see a video they do this
  5. if someone doesn’t enjoy a video they click this
  6. popular social media app that sounds like a clock
  7. massive social media company
  8. users that have subscribed to certain content
  9. online conspiracy to do with pizzerias
  10. The recording, reproducing, or broadcasting of moving visual images
  11. if someone enjoys a video they click this

20 Clues: red pin to carOwner of YouTubeowner of Facebookmassive social media companya person who gives away secretsa messaging app owned by Facebookvideos or images selling a productsocial media app owned by Facebookdocumentary about social media appsonline conspiracy to do with pizzeriasharassment or bullying on the internet...

Digital Media Literacy 2021-11-03

Digital Media Literacy crossword puzzle
Across
  1. place where you can see all the content from a creator
  2. documentary about social media apps
  3. videos or images selling a product
  4. social media app owned by Facebook
  5. owner of Facebook
  6. if someone wants to say something about a video they do this
  7. a person who gives away secrets
  8. red pin to car
  9. harassment or bullying on the internet
Down
  1. Owner of YouTube
  2. a messaging app owned by Facebook
  3. social media which name sounds like what noise a bird makes
  4. if someone wants to let their friends see a video they do this
  5. if someone doesn’t enjoy a video they click this
  6. popular social media app that sounds like a clock
  7. massive social media company
  8. users that have subscribed to certain content
  9. online conspiracy to do with pizzerias
  10. The recording, reproducing, or broadcasting of moving visual images
  11. if someone enjoys a video they click this

20 Clues: red pin to carOwner of YouTubeowner of Facebookmassive social media companya person who gives away secretsa messaging app owned by Facebookvideos or images selling a productsocial media app owned by Facebookdocumentary about social media appsonline conspiracy to do with pizzeriasharassment or bullying on the internet...

TTS informatika 2024-03-23

TTS informatika crossword puzzle
Across
  1. kegiatan jual beli dengan media elektronik
  2. perintah untuk mematikan komputer
  3. Rumus ms.word untuk menampilkan nilai pada kumpulan data yang bersumber dari suatu tabel dengan format susunan vertikal
  4. sebuah kejahatan cyber yang bertujuan untuk merusak atau memanipulasi data
  5. layanan mobile perbankan melalui jaringan Short Message Services atau SMS
  6. aplikasi untuk membuat sebuah games dan simulasi pembelajan tanpa harus berkutat dengan bahasa pemrograman
  7. layanan perbankan yang menggunakan media telepon
  8. nama fitur pada google collab untuk mengganti nama file
  9. rumus untuk menghitung rata rata pada ms.excel
Down
  1. rumus untuk menjumlahkan angka pada ms.excel
  2. aplikasi pengolah kata
  3. persimpangan baris dan kolom
  4. aktivitas yang dibatasi dalam google collab
  5. Central Processing Unit
  6. berita atau informasi yang tidak benar
  7. bahasa pemrograman yang digunakan pada google collab
  8. kejahatan yang ada dalam media sosial
  9. aktivitas yang berusaha menyusupi,mengakses,atau memodifikasi sistem atau jaringan tanpa izin
  10. "CTRL+S" merupakan perintah untuk
  11. lembar kerja yang ada dalam ms.excel
  12. aplikasi pengolah angka

21 Clues: aplikasi pengolah kataCentral Processing Unitaplikasi pengolah angkapersimpangan baris dan kolomperintah untuk mematikan komputer"CTRL+S" merupakan perintah untuklembar kerja yang ada dalam ms.excelkejahatan yang ada dalam media sosialberita atau informasi yang tidak benarkegiatan jual beli dengan media elektronik...

Red Chair Report Q4 2022-09-28

Red Chair Report Q4 crossword puzzle
Across
  1. NHL 2022 Champions
  2. Morning ___
  3. Rick & Carl's alma mater
  4. AgilLink's App
  5. A favorite winter sport
  6. A colorado view
  7. Broncos
  8. CEO
Down
  1. ___ Trail Road
  2. Challenges & ___
  3. Code storage
  4. City where Risclarity HQ is located
  5. Time Tracker
  6. The color of the chair lift
  7. Security Training
  8. ___ is coming

16 Clues: CEOBroncosMorning ___Code storageTime Tracker___ is coming___ Trail RoadAgilLink's AppA colorado viewChallenges & ___Security TrainingNHL 2022 ChampionsA favorite winter sportRick & Carl's alma materThe color of the chair liftCity where Risclarity HQ is located