cyber security Crossword Puzzles
Economies Crossword 2022-10-04
Across
- a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.
- retirement savings plans that serve employees of public schools and tax-exempt organizations
- a savings product that earns interest on a lump sum for a fixed period of time.
- a security that represents the ownership of a fraction of the issuing corporation.
- a consistent means of measuring the value of things
- an interest-bearing deposit account held at a bank or other financial institution.
- a debt security, similar to an IOU.
- a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
- A store of value is an asset, commodity, or currency that maintains its value without depreciating.
- a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
- Every purchase you made over time.
Down
- a number from 300 to 850 that rates a consumer’s creditworthniess
- a retirement savings and investing plan that employers offer.
- is a detailed breakdown of your credit history prepared by a credit bureau.
- type of financial cooperative that provides traditional banking services.
- grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
- an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
- a type of tax-advantaged
- a financial institution that is licensed to accept checking and savings deposits and make loans
- is a risk management strategy that mixes a wide variety of investments within a portfolio.
20 Clues: a type of tax-advantaged • Every purchase you made over time. • a debt security, similar to an IOU. • a consistent means of measuring the value of things • a retirement savings and investing plan that employers offer. • a number from 300 to 850 that rates a consumer’s creditworthniess • type of financial cooperative that provides traditional banking services. • ...
Financial Math 2021-09-20
Across
- amount of sales produced by that employee
- care covers only the employee
- depends pn the social security percentage and the
- paid for by fica taxes
- the hourly wage an employee receive for any overtime hours
- typically benefits are in forms
- addition to your salary
- care for sick children or newborns
- offered as an employee benefit
- you work at a job covered by social security you must pay
- most part-time jobs that have students hold pay a set amount for each hour they work
- compensation that an employee receives from an employer
- overtime rate could be there three times the hourly rate
- for each item they complete
- paid for by fica taxes
- fixed period of employment
- businesses pay their employees twice a month or
Down
- is unique nine digits
- another benefit that is required by the government
- are paid a certain amount
- overtime hours calculated as 1.5 times the regular hourly rate
- mean their paycheck amount are automatically deposited electronically into their bank
- total pay which is the sum of your hourly and your overtime pay
- government program that offers benefits
- required the employee to work only a specific number of hours per week
- they receive 26 paychecks per year
- rate two times the hourly rate
- president franklin d. roosvelt started social security in 1935
- money that employees or other receive base on sales
- care cover all members of the immediate family for health care bills
- combined into paid time off
- an insurance program available through the u.s
- paid holiday time
- paid sick time
- childcare leave;and more
- extra hours are more than the full-time number of hours
- there are federal and state laws on the lowest hourly rate
37 Clues: paid sick time • paid holiday time • is unique nine digits • paid for by fica taxes • paid for by fica taxes • addition to your salary • childcare leave;and more • are paid a certain amount • fixed period of employment • combined into paid time off • for each item they complete • care covers only the employee • rate two times the hourly rate • offered as an employee benefit • ...
Personal Finance Vocabulary 2022-10-19
Across
- a debt security
- an interest-bearing deposit account held at a bank or other financial institution
- the interest you earn on interest
- what employees earn before taxes, benefits and other payroll deductions are withheld from their wages
- the amount an employee receives after all deductions and taxes are taken out
- a statement of all transactions made between entities
- a financial institution that is licensed to accept checking and savings deposits and make loans
- a loan that requires an asset as collateral
- a type of short-term borrowing where a lender will extend high-interest credit based on your income
- predicts how likely you are to pay back a loan on time
- a security that represents the ownership of a fraction of the issuing corporation
- a company that pools money from many investors and invests the money in securities
Down
- a quick and easy method of calculating the interest charge on a loan
- the process of shifting an economy away from a single income source toward multiple sources from a growing range of sectors and markets
- an interest rate on a loan or security that fluctuates over time because it is based on an underlying benchmark interest rate or index that changes periodically
- a savings account that holds a fixed amount of money for a fixed period of time
- a statement that has information about your credit activity and current credit situation
- profits gained from the sale of capital assets
- a financial institution that offers services like banks but is run by its members
- an unchanging rate charged on a liability, such as a loan or mortgage
20 Clues: a debt security • the interest you earn on interest • a loan that requires an asset as collateral • profits gained from the sale of capital assets • a statement of all transactions made between entities • predicts how likely you are to pay back a loan on time • a quick and easy method of calculating the interest charge on a loan • ...
SOP Engineering - Keamanan Penyediaan Daya Listrik (PM-ASRI/ENG-04) dan SOP Security - Penanganan Saat Kondisi Listrik Padam (PM-ASRI/SEC-02) 2019-08-04
Across
- Spv GEA dan TR bertugas untuk …. penanganan listrik padam.
- Jika terdapat insiden (injured) maka wajib dibuatkan dokumen …..
- Tindakan yang diambil jika terdapat kondisi ada orang yang terjebak di dalam lift.
- Jabatan pada Dept Engineering yang bertanggung jawab untuk memantau pemakaian beban listrik, memeriksa kebutuhan beban listrik, memeriksa tegangan listrik, dan memeriksa kesiapan genset (rutin).
- Surat ….. dari PLN akan diberikan TR kepada pihak tenant jika terdapat informasi pemadaman listrik.
- Security, Spv GEA, Spv TR, Engineering melakukan ….. keliling ke seluruh area Mall dan Kawasan untuk memastikan situasi kondusif, aman dan terkendali.
- Laporan/ BAK/ analisa terhadap kejadian listrik padam akan dibuat oleh ….. Engineering dan diserahkan kepada Manager dan GM Ops.
- Khusus untuk ….. apabila pada keadaan normal, ada kebutuhan kenaikan beban yang cukup significant (>300 KW) harus diinformasikan ke pihak penyedia supply listrik.
- Jika power sudah normal, maka genset akan segera digantikan kembali dengan power listrik dari …..
Down
- Kondisi dimana supply listrik kebutuhan mall terpenuhi.
- Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall.
- Saat perpindahan listrik PLN ke genset, Spv Engineering akan melakukan pemantauan beban listrik (serta melakukan ….. semua peralatan).
- Kondisi dimana supply listrik tidak ada/ mati.
- Security akan menghubungi pihak ….. jika terdapat kondisi listrik padam.
- Staff/ Spv Engineering akan mencari …. listrik padam dan lamanya listrik padam.
- Salah satu hal yang dipantau dari pemakaian beban listrik.
- Pihak Security juga wajib membuat BAK listrik ….. setelah kejadian.
- Untuk listrik padam ….., pihak pengelola melalui Dept. Tenant Relations akan memberikan informasi ke pihak tenant terlebih dahulu.
- Jika listrik sudah normal/ menyala maka akan diinfomasikan oleh GEA via …..
- Mesin untuk membantu back up power jika terdapat kondisi listrik padam.
20 Clues: Kondisi dimana supply listrik tidak ada/ mati. • Kondisi dimana supply listrik kebutuhan mall terpenuhi. • Spv GEA dan TR bertugas untuk …. penanganan listrik padam. • Salah satu hal yang dipantau dari pemakaian beban listrik. • Jika terdapat insiden (injured) maka wajib dibuatkan dokumen ….. • Kondisi dimana supply listrik tidak dapat memenuhi kebutuhan mall. • ...
Investment Unit 2024-03-20
Across
- when the market is trending upward
- the size of a company in the stock market
- required minimum distribution
- dollar cost averaging
- a retirement account that you put money in after tax
- federal insurance contributions act
- for long term goals
- the return in 2023 for S&P 500 (percentage)
- Security the largest social programs in the United States, providing retirement
- measures the price performance of a basket of securities
- price to earning ratio
- the max amount you can contribute to your ira and rothira annually
- when the market is trending downward
- for short term goals
- currencies that are created and backed by the government, but not tied or backed by the value of any physical commodity
- out of the account annually
- the age to collect social security benefits
- a type of security under which the issuer owes the holder a debt, and is obliged
Down
- a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
- never lose money (rule)
- virtual currency
- a retirement account that you put money in before tax
- the increase in the value of an asset, usually recognized when it is sold for a higher amount
- 1.45% is deducted from your paycheck monthly
- a series of letters used to represent a companies stock
- the age you can start investing
- a retirement system that state employees and trades pay into
- a piece of a company in the stockmarket
- Far worse shape than Social Security
- never forget rule one
- the distribution of some of a company's earnings to a class of its shareholders
- Distribution When you turn 73, you must take the
- inital price offering of a stock
33 Clues: virtual currency • for long term goals • for short term goals • dollar cost averaging • never forget rule one • price to earning ratio • never lose money (rule) • out of the account annually • required minimum distribution • the age you can start investing • inital price offering of a stock • when the market is trending upward • federal insurance contributions act • ...
RU ITEC411 Chapter 5 2024-11-24
Across
- a written form of defamation
- the 2010 act that aimed to combat libel tourism
- the act that came after the September 11th attacks that increased surveillance
- acronym for the 1984 act that aimed to combat hacking by punishing people who accessed a computer without proper authorization
- technique attackers use to send people to fake web sites pretending to be the real one to steal personal information
- the concept of hacking with the purpose of a political or social cause
- the action of someone exposing wrongdoing, usually by the government
- word that comes before hat hacker, this type of hacker hacks with good intent to expose vulnerabilities and strengthen a system's security
Down
- this can be used to protect personal information by scrambling it up
- when you receive a text message from a scammer pretending to be a company to steal your personal information
- suppressing or prohibiting something from being shared
- when you receive an email from a scammer pretending to be a company to steal your personal information
- 2008 computer worm that caused damage to Iran's nuclear program
- this retailer was victim to a major security breach in fall of 2013 where over 70 million customer records were stolen
- intellectual property law that gives protection from unauthorized use or distribution and gives ownership to creative works
- physical and behavioral features of a person
- acronym for the organization that manages trade rules globally
- when you receive a phone call from a scammer pretending to be a company to steal your personal information
- a network security feature that restricts and monitors traffic
- type of computer malware that has the ability to spread from computer to computer by itself
20 Clues: a written form of defamation • physical and behavioral features of a person • the 2010 act that aimed to combat libel tourism • suppressing or prohibiting something from being shared • acronym for the organization that manages trade rules globally • a network security feature that restricts and monitors traffic • ...
Investing Crossword Answers & Clues 2025-03-25
Across
- buying and selling stocks for quick money
- if you leave your company you can roll over your 401k funds to a new investment account
- a sum of money saved for a particular purpose
- buying and investing long term
- a collection of stocks, bonds, or other assets that trades on a stock exchange
- a security that represents the ownership of a fraction of the corporation
- the process of offering shares of a private corporation to the public in a new stock issuance
- age you receive full social security benefits
- the total value of a company’s stock
- ceo of berkshire hathaway
- represents the loan of a buyer, payed back at a stated interest rate
Down
- pain is longer than the thrill
- having worked for a certain amount of time with a company, to own 100% of the money your company has matched in your 401k
- the increase in value of an asset, usually recognized when it is sold for a higher amount
- stock prices are rising
- stock prices are declining
- the distribution of some of a company's earnings to a class of its shareholders
- take money from investors and purchase a portfolio that may include stocks, bonds, or a combination of assets
- measures the price performance of a basket of securities
- a strategy in which you invest your money in equal amounts, at regular intervals
- social security and medicare taxes
- the availability of cash or the ease in which an asset an asset can be converted to cash
- government medical health plan
- takes cash from a large group of investors and invests in stocks, bonds, and other securities
- investing all the money you have available at that given time, and putting it into the market
25 Clues: stock prices are rising • ceo of berkshire hathaway • stock prices are declining • pain is longer than the thrill • buying and investing long term • government medical health plan • social security and medicare taxes • the total value of a company’s stock • buying and selling stocks for quick money • a sum of money saved for a particular purpose • ...
Financial market 2025-05-15
Across
- — The value of an ownership interest in a company, typically in the form of stocks.
- — An entity that develops, registers, and sells securities to finance its operations.
- — A person or institution that allocates capital with the expectation of receiving financial returns.
- — A type of security that represents ownership in a corporation.
- — Money placed in a bank or financial institution for safekeeping or earning interest.
- — A public authority or agency responsible for overseeing and enforcing financial market laws.
- — An organized marketplace where securities, commodities, or other financial instruments are traded.
- — A fixed-income security representing a loan made by an investor to a borrower.
- — A tradable financial asset, such as stocks, bonds, or options.
- — A contract that provides financial protection against specific risks in exchange for premium payments.
Down
- — A system or place where financial instruments are bought and sold.
- — The income return on an investment, expressed as a percentage of its cost or market value.
- — The rate at which the general level of prices for goods and services rises over time.
- — The provision of money, goods, or services with the expectation of future repayment.
- — The ease with which an asset can be converted into cash without affecting its price.
- — The possibility of losing some or all of the original investment.
- — A system of money in general use in a particular country.
- — An intermediary who facilitates transactions between buyers and sellers in financial markets.
- — A financial derivative that gives the holder the right, but not the obligation, to buy or sell an asset.
- — Financial assets or the financial value of assets used to fund operations and growth.
20 Clues: — A system of money in general use in a particular country. • — A type of security that represents ownership in a corporation. • — A tradable financial asset, such as stocks, bonds, or options. • — The possibility of losing some or all of the original investment. • — A system or place where financial instruments are bought and sold. • ...
Financial Fundamentals 2025-05-27
Across
- Studies the transfer of money(any item that serves as a method of payment) between individuals, businesses, and governments
- A type of debt security issued by a company or government to raise capital
- Employment taxes such as Social Security
- A strategy where an investor spreads their investments across a variety of different assets to reduce overall risk
- Regulates business activities within own boundaries; intrastate commerce
- Play an important role in many communities by providing with easy, fast way to borrow small amounts of money
- Ability to convert an investment to cash for full value; includes items like demand deposits, CDs, Treasury bills, and money market funds
- Corporation and other organizations sell items, pay expenses, and borrow to finance business operations
- Tax based on land and buildings
- The debts or financial obligations that a person or company owes to others
Down
- The cost of borrowing money
- Regulates banks
- Federal, state, and local agencies collect taxes and borrow money to pay for public goods and services
- Tax where everyone pays the same amount
- Insures bank deposits
- Certificate or other financial instrument that has monetary value and can be traded; bonds, debt securities, stocks
- Regulates stock markets
- Tax based on purchases
- Oversees the activities that involve two or more states; regulates foreign trade; regulates interstate commerce
- A rise in the general level of prices (consumer price index)
- _____ are consumers and households who make purchases, save, invest, and pay taxes
- Where the tax rate increases along with the amount
- County boards; city or town councils; services for an orderly society
- Potential of an investment
24 Clues: Regulates banks • Insures bank deposits • Tax based on purchases • Regulates stock markets • Potential of an investment • The cost of borrowing money • Tax based on land and buildings • Tax where everyone pays the same amount • Employment taxes such as Social Security • Where the tax rate increases along with the amount • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attack that uses a list of commonly used words or phrases to guess a password.
- Injecting malicious scripts into webpages viewed by other users
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Matching known patterns of threats against security event data to find potential matches.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Policy-based accept or deny of network traffic.
Down
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Process of transforming information into a scrambled format to secure it.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Code examination performed without running the malicious program.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Cloud-based vulnerability management platform with scanning and reporting.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Attacks that overwhelm a target system or network with a flood of traffic
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
Industrial Security Concept Crossword Puzzle 2025-10-25
Across
- – minimizing the probability of the potential loss
- – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
- – sound and good judgement to arrive at wise and timely decision
- - is the potential that a chosen action or activity will lead to a loss
- – being watchful in spotting violator, a person, a vehicle or an accident
- – moving the financial impact of the potential loss over to an insurance company
- – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
- – an indication of impending danger or harm
- – Removing the risk totally from the business
- – includes any person who offers or renders personal service to watch or secure
- – it is a state or quality of being free from fear or danger, assurance, certainty.
- – spreading the risk through decentralization to limit the impact of the potential loss
Down
- – it deters man from committing acts of fear being caught, charged in court or get dismissed
- – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
- - it uses barriers being placed between the potential intruder and the object/matter to be protected
- – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
- – a person who does detective work for hire, reward or commission
- – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
- – a chance of being injured or harmed
- – ability to deal with others successfully without offending
20 Clues: – a chance of being injured or harmed • – an indication of impending danger or harm • – Removing the risk totally from the business • – minimizing the probability of the potential loss • – ability to deal with others successfully without offending • – sound and good judgement to arrive at wise and timely decision • ...
AI & IT key words 2026-01-21
Across
- Software that acts as a bridge between an operating system or database and applications
- a secret method of bypassing normal authentication or encryption in a computer system
- the delay before a transfer of data begins following an instruction.
- A secure "tunnel" used to encrypt a user's connection to a network.
- A program that looks legitimate but contains a hidden malicious function.
- A highly targeted phishing attack aimed at senior executives or "big fish" (CEOs, CFOs) to steal large sums of money or highly sensitive data
- The act of following laws, regulations, and ethical guidelines (like GDPR)
- Malware that locks your files and demands money for the key.
- An incident where data is stolen, accessed, or exposed by an unauthorized person.
Down
- A set of tools used by hackers to gain deep, hidden control over a computer.
- A collection of compromised computers controlled remotely to perform massive attacks.
- Software that secretly monitors a user's activity and collects personal info.
- A security measure where a computer or network is physically isolated from the unsecured internet or other local networks.
- A simulated cyberattack performed to evaluate the security of a system.
- An isolated environment where suspicious code can be executed safely without risk to the system.
- The action of reducing the severity, seriousness, or paintfulness of a security risk.
- A set of rules that defines how data is transmitted between devices.
- The maximum rate of data transfer across a given path
- A deceptive technique using fake emails to steal sensitive data or login credentials.
- Technical term for body measurements and calculations related to human characteristics used for identification
20 Clues: The maximum rate of data transfer across a given path • Malware that locks your files and demands money for the key. • A secure "tunnel" used to encrypt a user's connection to a network. • the delay before a transfer of data begins following an instruction. • A set of rules that defines how data is transmitted between devices. • ...
Shell shocker weapons 2022-01-19
Across
- Shotgun blasts do critical damage up close.
- The number of primary weapons in the game.
- The classic, high rate of fire. Medium range, never jams.
- Inspired by another BWD game, Nuke Zone.
- Bolt action sniper - One shot stopping power.
- Small magazine, medium range, big damage!
- 3-round burst. Accurate, medium range specialist.
Down
- Semi automatic sniper - Destroy from a distance.
- Pull the pin and it goes kaboom!
- Fancier versions of the regular weapons
- Fancier versions of the regular that could only be bought from January 1st to January 18th.
- The secondary weapon.
- Large clip full of egg cracking bullets. Close to medium range.
13 Clues: The secondary weapon. • Pull the pin and it goes kaboom! • Fancier versions of the regular weapons • Inspired by another BWD game, Nuke Zone. • Small magazine, medium range, big damage! • The number of primary weapons in the game. • Shotgun blasts do critical damage up close. • Bolt action sniper - One shot stopping power. • ...
Bullying crossword 2022-04-26
Across
- someone who tries to help those who have been victimized around them
- someone who you can tell if you are being bullied and has authority at school
- bullying through exclusion
- someone who ignores an act of violence
Down
- bullying through insults and threats
- a bullying form rooted in violence
- something that can happen from being bullied, another word for sadness
- a person who actively attempts to harm others physically or mentally
- a type of bullying commonly found online
9 Clues: bullying through exclusion • a bullying form rooted in violence • bullying through insults and threats • someone who ignores an act of violence • a type of bullying commonly found online • someone who tries to help those who have been victimized around them • a person who actively attempts to harm others physically or mentally • ...
Abiotic not living 2025-01-27
13 Clues: view • Theory • living • Theory • resource • Security • extraction • not living • populations • Water Scarcity • Climate Change • Water Scarcity • Greenhouse Gases
Bullying Crossword Puzzle 2015-11-15
Across
- What does the "H" stand for in "HERO"?
- Bullying can be done by an individual or ___.
- Bullying online is called ___ bullying
- The "S" in "SAFE" stands for "Stand ____".
- What does the "E" stand for in "HERO"?
- ____ someone from a group is a form of bullying.
- Bullying can be physical or ___.
- A bully is identified not how they look, but rather by their ___.
- What acronym reminds us how to act if you are bullied?
Down
- The "A" in "SAFE" stands for "Ask for ____".
- Bullies can get you in ___.
- If you see bullying, do not be a _____.
- What does the "R" stand for in "HERO"?
- Bullies can call you ____.
- This acronym is great to remember if you see bullying occuring.
- The "E" in "SAFE" stands for "End it ____".
- Being a bully makes you a smaller person. Helping others makes you a __ person.
- The "O" in "HERO" stands for___ communication.
- If you are bullied, tell an ___.
19 Clues: Bullies can call you ____. • Bullies can get you in ___. • Bullying can be physical or ___. • If you are bullied, tell an ___. • What does the "H" stand for in "HERO"? • Bullying online is called ___ bullying • What does the "R" stand for in "HERO"? • What does the "E" stand for in "HERO"? • If you see bullying, do not be a _____. • The "S" in "SAFE" stands for "Stand ____". • ...
NORMA 2024-01-14
Across
- Larangan diskriminasi berdasarkan jenis kelamin disebut?
- Norma dalam mengelola konflik secara damai?
- Kewajiban dan hak yang dimiliki oleh warga negara disebut?
- Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
- Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
- Norma yang menjamin kebebasan berserikat disebut?
- Sikap saling menghargai dalam keberagaman budaya?16.Integritas Norma yang melarang korupsi dan penyalahgunaan kekuasaan?17. Keselamatan Ketaatan terhadap norma keselamatan di tempat kerja?
- Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
- Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
- Tanggung jawab menjaga kelestarian lingkungan?
Down
- Tanggung jawab individu terhadap diri sendiri dan masyarakat?
- Norma yang mengatur hubungan antarindividu dalam masyarakat?
- Norma etika dalam penggunaan teknologi informasi?
- Kesetaraan hak dan peluang bagi semua warga negara disebut?
- Hak asasi manusia yang perlu dijunjung tinggi?
- Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
- Tanggung jawab individu terhadap kepentingan bersama disebut?
- Norma agama yang menjadi pedoman hidup?
18 Clues: Norma agama yang menjadi pedoman hidup? • Norma dalam mengelola konflik secara damai? • Hak asasi manusia yang perlu dijunjung tinggi? • Tanggung jawab menjaga kelestarian lingkungan? • Norma etika dalam penggunaan teknologi informasi? • Norma yang menjamin kebebasan berserikat disebut? • Larangan diskriminasi berdasarkan jenis kelamin disebut? • ...
Facts of Love 2026-02-13
Across
- Using force to make someone do something is __ violence.
- ____ communication is speaking openly and honestly
- One partner picks a fight with/antagonizes the other.
- True/False: It's normal to do things without your romantic partner
- Someone you know but don't know very well.
- Unhealthy relationships can cause ____ & anxiety
- True/False: Always make sure someone knows where you are when meeting someone new.
- True/False: Only romantic relationships can be toxic
- Texting you all day, asking where you are is an example of ____ behavior
- Dating violence can happen in person or _____
Down
- ____ relationship: love between friends.
- ____ love between partners, spouses, etc
- In a relationship you should be able to be ____
- familial ____ love between family members
- _____: One partner feels like they “cannot live without” the other.
- True/False: It's okay for a female to hit a male.
- Really ____ when the other person speaks
- ___ bullying occurs online or over the phone.
- No is a complete ____
- In healthy relationships there should be mutual __
20 Clues: No is a complete ____ • ____ relationship: love between friends. • ____ love between partners, spouses, etc • Really ____ when the other person speaks • familial ____ love between family members • Someone you know but don't know very well. • ___ bullying occurs online or over the phone. • Dating violence can happen in person or _____ • ...
June Security Quiz 2017-05-18
Across
- / never let a _____ behind the secured area unless we have called for their service.
- / managers are responsible for visiting their external safe haven _____
- / do not leave the ______ area, evwn at police request
- / managers are responsible to test the _____ ______ monthly.
- / the glass is bullet _____
Down
- / any business that has three false alarms in a one-year period has their ______ service suspended for a period of one year.
- / media person
- / cell phones are not to be used for _______
- / regardless of circumstance, only authorized ______ may speak to the media on Cash Money's behalf.
- / all returned keys must be _____ ____ by the manager.
- / managers are responsible to ensure that all cell phones are accounted for during store ______
11 Clues: / media person • / the glass is bullet _____ • / cell phones are not to be used for _______ • / all returned keys must be _____ ____ by the manager. • / do not leave the ______ area, evwn at police request • / managers are responsible to test the _____ ______ monthly. • / managers are responsible for visiting their external safe haven _____ • ...
Safety and Security 2021-07-20
12 Clues: Health risks • Jack sparrow • Favourite module • Online safety drill • The Tasmanian devil • Jail on a cruise ship • Rare but catastrophic • Cruise Recent covid case • Dr. Liu's favourite fruit • "Rose, promise me you'll survive" • Sound of the emergency alarm on cruise • Sound of the emergency alarm on cruise
Safety and Security 2024-01-17
Across
- The knowledge or perception of a situation or fact
- measures taken to guard against espionage or sabotage, crime, or cyberattack
- the provision or exchanging of information, reports or news
- The condition of being protected from danger, risk, or injury
- a spoken or written account of something that one has observed, heard, done, or investigated
- the reporting system used by Bradken
Down
- administered under ITAR and EAR
- systems and procedures to control who enters Bradken property/facilities
- intentional or unintentional non-compliance with policy, procedure or law
- the action or fact of observing controls or procedures
- teaching, or developing in oneself or others, any skills and knowledge or fitness that relate to specific useful competencies
11 Clues: administered under ITAR and EAR • the reporting system used by Bradken • The knowledge or perception of a situation or fact • the action or fact of observing controls or procedures • the provision or exchanging of information, reports or news • The condition of being protected from danger, risk, or injury • ...
internet privacy 2025-05-18
Across
- Private Network encrypts traffic between devices and the internetand protects sensitive data. Users can bypass geographic restrictions as internet traffic is routed.
- This is an individual who gains unauthorized access and exploits weaknesses in the information.
- Loading the data into unreadable format by applying an algorithm
- It is the identity verification before granting access. Authentication enhances the security and privacy of systems. Common methods include passwords, biometrics (fingerprints or facial recognition), and security tokens. Most widely use Multi-factor authentication (MFA) enhances security by requiring more than one form of verification.
Down
- a hidden way of bypassing normal authentication or encryption in a system. It is an illegal way to gain unauthorized access by bypassing the standard security methods. Backdoors can be installed by malware or intentionally left for debugging. It can control the system remotely and poses risks to data.
- The monitoring of incoming and outgoing traffic based on security rules that already had been determined. The system is a barrier between trusted and untrusted networks. it is based on both hardware and software, which analyzes data packets if they should be allowed or blocked. The sensitive information is secured.
- A broad category 9 of malicious software to damage computer systems.
- tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses
8 Clues: Loading the data into unreadable format by applying an algorithm • A broad category 9 of malicious software to damage computer systems. • This is an individual who gains unauthorized access and exploits weaknesses in the information. • tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses • ...
LA NETIQUETTE 2021-11-11
5 Clues: bullismo bullismo online • news informazioni false nel web • codice segreto per accedere a un dispositivo • diritto alla riservatezza delle informazioni • violare un sistema informatico per danneggiarlo
Unit 1 Terms 2024-12-16
Across
- To further the development of a relationship
- Period of time between childhood and adulthood
- Dating Dating only one person on a regular basis
- Undergoing continuous change
Down
- Feeling of love and emotional attachment to another person
- Dating Going out in a group rather than just as a couple
- Dating Casual dating that involves no commitment to continue the relationship
- To use in an improper way; improper treatment
- stalker A person who uses the Internet as a means to stalk or harass someone
- Someone who obsessively follows, observes, or contacts another person without their consent
- Violence Abuse in a family or household
11 Clues: Undergoing continuous change • Violence Abuse in a family or household • To further the development of a relationship • To use in an improper way; improper treatment • Period of time between childhood and adulthood • Dating Dating only one person on a regular basis • Dating Going out in a group rather than just as a couple • ...
Cyber Safety: Be eSmart! 2021-09-09
Across
- A safe place for searching stuff up
- To send something to someone
- A character used for math and to call someone
- Unwanted email
- Opposite of Offline
- Shielded from harm
- Something to follow
Down
- Your parent
- A place where places you visited is kept
- Synonym for reliable
- Something that belongs to you
- Someone you don't know
- Someone who hurts someone else deliberately
- The act of being safe
14 Clues: Your parent • Unwanted email • Shielded from harm • Opposite of Offline • Something to follow • Synonym for reliable • The act of being safe • Someone you don't know • To send something to someone • Something that belongs to you • A safe place for searching stuff up • A place where places you visited is kept • Someone who hurts someone else deliberately • ...
ic3 lesson 30 vocab 2015-05-15
Across
- hacker program that sits in your computer recording personal information
- hacker program that records keystrokes
- programs that use a dictionary to try and guess the password by entering in a whole lot of words until the right one is found
- invading someone else's computer
- hacker program for finding out log ins and passwords
- decrypts information
Down
- a secure physical device that provides a strong firewall
- hacking technique that controls your browser, benefiting the hacker
- encrypts information
- repetitive strain injury, caused by repetitive motions over long periods of time
- transport layer security, for security of a server
- complex and secure password
12 Clues: encrypts information • decrypts information • complex and secure password • invading someone else's computer • hacker program that records keystrokes • transport layer security, for security of a server • hacker program for finding out log ins and passwords • a secure physical device that provides a strong firewall • ...
Cybersecurity 2024-06-04
Across
- This malicious software holds your data hostage until a ransom is paid
- The process of verifying a user's identity
- A deceptive email attempt to steal personal information
- Malicious software designed to harm a computer system
- Scrambling data to make it unreadable without a key
- Process of identifying and correcting security vulnerabilities in a
Down
- A security incident where sensitive data is exposed
- Software program designed to block unauthorized access while
- An attack that overwhelms a server with traffic, making it unavailable
- Software that scans for and neutralizes viruses and other malicious
- system.
- authorized communications.
12 Clues: system. • authorized communications. • The process of verifying a user's identity • A security incident where sensitive data is exposed • Scrambling data to make it unreadable without a key • Malicious software designed to harm a computer system • A deceptive email attempt to steal personal information • Software program designed to block unauthorized access while • ...
confidentiality 2025-02-06
Across
- work history, date of birth, social security number, criminal record,
- information
- Data records of an employee’s performance on the job such as performance reports,
- Data information which may arise from employment-related physicals, drug tests and
- of information
Down
- Espionage form of espionage conducted for commercial purposes rather than security;
- set of rules or promises which limits access or places restrictions on certain
- or Sensitive Data information about an employee prior to employment such as a résumé,
- in the Workplace keeping employee, customer and client information private
- actions, supervisory notations
- religion, etc.
- insurance information
- involves individuals hired to steal trade secrets, new products or
13 Clues: information • religion, etc. • of information • insurance information • actions, supervisory notations • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • set of rules or promises which limits access or places restrictions on certain • ...
Wordfrenzy 2025-01-08
Across
- Street , It’s the world’s biggest stock exchange, based in Manhattan
- , Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
- , A stock that goes up and down quickly
- Selling , Selling a security you don't own to buy it back later
- , A natural or legal person who holds shares in a company
Down
- , The ability to buy or sell assets quickly in large quantities
- , A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
- , An intermediary in charge of placing buy and sell orders on the markets
- , A very sharp rise of a market
- , The earnings a company equally shared among the shareholders in proportion to the number of shares they hold
10 Clues: , A very sharp rise of a market • , A stock that goes up and down quickly • , A natural or legal person who holds shares in a company • , The ability to buy or sell assets quickly in large quantities • Selling , Selling a security you don't own to buy it back later • Street , It’s the world’s biggest stock exchange, based in Manhattan • ...
Narnia Ch 1-3 2023-11-08
AVIATION 2024-09-08
13 Clues: ATL • WLG • Icing • Loader • Jackson • Auckland • Operator • Water trucks • facility Toilets • facility Duty free • security AVSEC • word for passengers PAX • vehicle Belt loader
Unit2-word_file 2014-12-24
12 Clues: Blut • Dieb • Alarm • Polizei • Fußabdruck • Fingerabdruck • stehlen/ klauen • festnehmen/ verhaften • Sicherheit/ Wachmannschaft • Polizeimeister/ Wachtmeister • Wachposten/ Wärter/ Posten/ Wachmann • Waffe/ Pistole/ Revolver/ Schusswaffe
Airports 2021-02-11
Across
- three ounces one quart one zip top bag
- Check-in is on which side
- in NZ all pax are required to fill out a departure card if travelling internationally
- the area before departing passengers pass through security
- this is a secure area only for international travellers
- abbreviation of Liquids, Aerosols, Gels
- a facility everyone uses in the airport
- this was established in NZ in 1977
- is it okay to joke around and fake threats in an airport
- what is the airport code for nelson?
- these types of vehicles are mostly used to push an aircraft
Down
- making announcements that the plane is ready for boarding
- ZQN
- the area where you go through security and hand over your passport for inspection
- sacred space in an airport
- ROT
- taking off your shoes, removing your belt buckle and putting metal items in a tray is....
- duty free is on what side
- another name for customs/security
- Airport code for Amsterdam
- who is in charge of getting passengers from a to b
21 Clues: ZQN • ROT • Check-in is on which side • duty free is on what side • sacred space in an airport • Airport code for Amsterdam • another name for customs/security • this was established in NZ in 1977 • what is the airport code for nelson? • three ounces one quart one zip top bag • abbreviation of Liquids, Aerosols, Gels • a facility everyone uses in the airport • ...
Yo Recuerdo Worksheet Crossword 2021-09-20
INFORMATION TECHNOLOGY 2017-05-08
Vocabulary - Unit 3 2023-12-05
Cybercrime Investigation 2021-07-25
Across
- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, etc.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- The act of one individual harassing or intimidating another individual via the Internet.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
- The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- refers to a set of instructions executed by the computer to achieve intended results.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- the interactional space or environment created by linking computers together into a communication net5work.
- refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- refers to the modification or change, in form or substance, of an existing computer data or program.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- SYSTEM The overarching program that runs all the functions on a computer or other electronic device.
- A politically- or ideologically-motivated cyber attack or hack.
- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- An online journal. Contraction of the term “web log.”
- The access to the whole or any part of a computer system without right.
- A camera connected to a computer, generally used to then stream videos to the Internet.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- A software robot that performs automated tasks.
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, etc.
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- refers to a computer or a computer network, the electronic medium in which online communication takes place.
- A group of computers that is linked to share data and other information.
- stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same
Down
- A company that offers access to the Internet.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- Amassed data that is used to describe large amounts of other Internet data.
- An individual who manages and oversees a network.
- The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
- the act of copying digital material posted online into the storage medium on one’s computer.
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
- refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
- an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- refers to the transmission of information through ICT media, including voice, video and other forms of data.
- The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
- The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
- terrorist activity that targets computer networks and information systems for attack.
- A way to access an electronic system by bypassing some or all security mechanisms.
- ENGINE A website that finds information across the Internet based on a set of search criteria.
- Unsolicited advertising or other information sent out via email or other messaging service.
51 Clues: A company that offers access to the Internet. • A software robot that performs automated tasks. • An individual who manages and oversees a network. • An online journal. Contraction of the term “web log.” • A politically- or ideologically-motivated cyber attack or hack. • The access to the whole or any part of a computer system without right. • ...
can you beat it 2018-10-11
Across
- when a child is forced to work its called child____
- you can put this over your bed to keep the bugs off
- U.S national bird
- where you go to check out books
- what mold did Dr. Fleming find on a petri dish
- when someone is forced out of there home there are what
- were you go to get a education
Down
- when someone is illegally transported from country to country
- not on ______ what is the definition of accident
- when someone is trying to lose weight they can go on a
- what is the definition of cyber
- when a child is forced to work it is called what
12 Clues: U.S national bird • were you go to get a education • what is the definition of cyber • where you go to check out books • what mold did Dr. Fleming find on a petri dish • not on ______ what is the definition of accident • when a child is forced to work it is called what • when a child is forced to work its called child____ • ...
Bullying 2014-11-21
Across
- When someone talks about someone else country or religion in a vey bad way.
- Scare a person.
- Bullying This is when someone use words to hurt your feelings
- Bullying This when you say a word like gay.
- Bullying This when a person actually hit, punch or push a person.
- Torment for fun.
- When someone does something bad over and over again to have power over you.
Down
- Calling Is when you call someone bad names.
- bullying When you use a person sexual for bad purpose's
- Oppress by fear or violence
- Bullying Something that makes you unhappy.
- Bullying This bullying takes place on the internet.
12 Clues: Scare a person. • Torment for fun. • Oppress by fear or violence • Bullying Something that makes you unhappy. • Calling Is when you call someone bad names. • Bullying This when you say a word like gay. • Bullying This bullying takes place on the internet. • bullying When you use a person sexual for bad purpose's • ...
Anti-Bullying Week Crossword Puzzle 2021-11-17
Across
- What you wear on the first day of Anti-Bullying Week
- Where the majority of bullying takes place.
- How bullies behave.
- When someone uses phones, computers or other technology to bully people.
- Who you can hang out with after you have been bullied.
- What you should tell bullies to do if you catch them in the act.
Down
- Who to tell if you are or have been bullied.
- When people use their bodies or objects to harm someone.
- What kids can develop if they are bullied.
- When someone uses words to hurt someone.
- The month of Anti-Bullying Week.
- A reason why someone is bullied.
12 Clues: How bullies behave. • The month of Anti-Bullying Week. • A reason why someone is bullied. • When someone uses words to hurt someone. • What kids can develop if they are bullied. • Where the majority of bullying takes place. • Who to tell if you are or have been bullied. • What you wear on the first day of Anti-Bullying Week • ...
Business and Information-set4 2023-11-21
Across
- Language commonly used for data analysis and machine learning
- Exclusive legal rights to a creation or invention
- Language used for web development and design
- The process of researching, designing, and launching new products or services
- An algorithmic problem-solving approach mimicking the process of natural selection
- A methodical examination of financial accounts
Down
- Total monetary value of all finished goods and services within a country in a year
- Process of concealing information in digital communication
- Cryptographic technique for verifying data integrity
- Money owed to a company by its clients
- Cyber attack exploiting vulnerabilities in a database
- System of managing and analyzing large sets of data
12 Clues: Money owed to a company by its clients • Language used for web development and design • A methodical examination of financial accounts • Exclusive legal rights to a creation or invention • System of managing and analyzing large sets of data • Cryptographic technique for verifying data integrity • Cyber attack exploiting vulnerabilities in a database • ...
Wąsik 1E 2023-02-28
Across
- zbiór zasad bezpiecznego poruszania się w sieci
- lęk przed wypadnięciem z obiegu
- przemocy w internecie Cyberprzemoc
- rodzaj cyber ataku
- dynamiczne regularnie aktualizowane strony internetowe które dostarczają istotnych informacji na dany temat
- to działania mające na celu złamanie zabezpieczeń systemu lub oprogramowania w celu ich wykorzystania
- zamierzona i konsekwentna formuła przekazu informacji i fabrykowanie takiego przekazu poprzez tworzenie różnego rodzaju fałszywych dokumentów
Down
- osoba która w internecie porusza kontrowersyjny temat po to aby wywołać kłótnię
- fałszywa bądź zmanipulowana informacja
- technika obróbki obrazu polegająca na łączeniu obrazów twarzy ludzkich przy użyciu technik sztucznej inteligencji
- przekaz seksualnie sugestywny obraz lub treści
- rodzaj rozmowy za pośrednictwem internetu
12 Clues: rodzaj cyber ataku • lęk przed wypadnięciem z obiegu • przemocy w internecie Cyberprzemoc • fałszywa bądź zmanipulowana informacja • rodzaj rozmowy za pośrednictwem internetu • przekaz seksualnie sugestywny obraz lub treści • zbiór zasad bezpiecznego poruszania się w sieci • osoba która w internecie porusza kontrowersyjny temat po to aby wywołać kłótnię • ...
PPKN KELOMPOK 5 2025-02-22
Across
- Negara Kesatuan Republik Indonesia di singkat menjadi?
- Pernyataan bersama, merupakan pengertian dari kata?
- Toleransi juga mengandung makna?
- Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
- Sebutan lain dari tantangan dari luar?
- Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
Down
- Sebutan lain dari kata serangan (Siber) adalah?
- Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
- Contoh sikap yang baik di lingkungan sekolah adalah?
- Sebutan lain dari tantangan dari dalam?
- Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
- Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
12 Clues: Toleransi juga mengandung makna? • Sebutan lain dari tantangan dari luar? • Sebutan lain dari tantangan dari dalam? • Sebutan lain dari kata serangan (Siber) adalah? • Pernyataan bersama, merupakan pengertian dari kata? • Contoh sikap yang baik di lingkungan sekolah adalah? • Negara Kesatuan Republik Indonesia di singkat menjadi? • ...
Cybersecurity Crossword Challenge 2025-08-19
Across
- A fake email or text that tries to steal information.
- Keeping personal and health information protected.
- Written rules that guide safe and compliant practices.
- Software designed to damage or steal data.
- Must be sent from a secured machine when it contains PHI.
- When private or confidential information is accessed without permission.
- What you should file if you notice a privacy or security issue.
Down
- Information that must not be shared with unauthorized people.
- A secret word used to log in securely.
- The law that protects patient health information.
- How systems, files, and conversations should always be kept.
- Extra login security using a code or device.
- What staff must wear to access the building.
- Abbreviation for Protected Health Information.
- A review process to check compliance with rules.
- What you do to computers, doors, or files when unattended.
16 Clues: A secret word used to log in securely. • Software designed to damage or steal data. • Extra login security using a code or device. • What staff must wear to access the building. • Abbreviation for Protected Health Information. • A review process to check compliance with rules. • The law that protects patient health information. • ...
Social Security Crossword Puzzle 2023-03-27
Across
- _______ describe the in-built flexibility of existing state benefits and taxes to respond automatically to expansion and contraction of the economy. [two words w/o space]
- A programme that requires participants to work in exchange for social security benefits.
- “[In the UK,] The extension of benefit _______ to many more single parents since 2008 has led many to move into paid work, but that work has been almost entirely part-time and low-earning”
- The principle describes the state taking on the role of providing benefits and insuring against risks from the mutual aid societies and private market, due to the state’s ability to manage risk more efficiently and create a larger pool of resources. [two words w/o space]
- “the degree to which individual adults can uphold a socially acceptable standard of living independently of family relationships”
- The proportion of the population that is eligible for and/or receives a particular social security benefit.
- Household-level means-tested benefits can _______ work within the couple.
- A reduction in the amount of benefits paid as a family's income increases, often referred to as benefit _______
Down
- While on the one hand cash-for-care recognises the important societal and economic contribution of unpaid care, it can potentially also reinforce _______ inequalities over the long-term.
- “A collective action to protect individuals against income deficiencies” [two words w/o space].
- A core purpose of pension systems is to _______ income within individuals – from their working years to retired years – or between individuals – from richer to poorer individuals.
- Acronym for an unconditional cash benefit paid regularly to every citizen independently on the amount of income they have or hours they work.
- A situation where reliance on benefits creates a cycle of dependency, making it difficult to escape poverty and leading to a _________.
- Pension systems where the person gets a pension income equal to the contributions they have paid in plus the market return on them.
- A set of public policies that aim to reduce government budget deficits.
- A key goal of social security systems worldwide is to reduce/prevent _______
16 Clues: A set of public policies that aim to reduce government budget deficits. • Household-level means-tested benefits can _______ work within the couple. • A key goal of social security systems worldwide is to reduce/prevent _______ • A programme that requires participants to work in exchange for social security benefits. • ...
3-7 2024-12-10
Across
- Term used to describe the simulated representation of cyberspace
- The city where Molly and Case share a breakfast in the text
- This term refers to the technology allowing a person's consciousness to be replicated in cyberspace
- A type of painkiller used by Molly after an injury
- Surgical implant in the skull, mentioned as a common feature
- Thief who stole an AI
- AI stands for this (two words)
- The city in Turkey where Case and Molly are traveling to
- Molly's specific type of suit worn for protection and blending in
- The substance that Armitage claims is slowly dissolving inside Case’s arteries
- Virtual reality term, used when "keying in"
- The device used to connect the Flatline’s construct to Case’s system
- Armitage is diagnosed with this mental disability
- High-security location at the tip of the spindle
Down
- Subculture involved in surreal violence and media manipulation (two words)
- A term used for an electronic entity that mimics a deceased person's skills and behavior
- The axis of the Sprawl that includes Boston and Atlanta
- The system used to access and hack information protected by security
- City where the Panther Moderns were involved
- Case’s former mentor (two words)
- Short term for a substitute used to replace human senses in cyberspace (two words)
- Technology company referenced as the source of security systems (two words)
- The operation that Corto was involved in, which caused his severe injuries (two words)
- Leader of the group from # across/down (two words)
- Armitage was heavily injured while flying into this country
- The flat, origami-wrapped object Molly gives Case
- The high-tech deck Case uses (two words)
27 Clues: Thief who stole an AI • AI stands for this (two words) • Case’s former mentor (two words) • The high-tech deck Case uses (two words) • Virtual reality term, used when "keying in" • City where the Panther Moderns were involved • High-security location at the tip of the spindle • The flat, origami-wrapped object Molly gives Case • ...
Access controls 2 2025-07-07
Across
- 2 doors enclosing a vestibule
- Maglock components consist of a electromagnet and ...
- Access control must interface with this system
- This is the best hardware type to be in compliance with egress requirements
- Used to ensure that the alarm is valid
- This door type is primarily used in finished office spaces
- Two way radio is form of security ...
- A mantrap for cars
- The power requirement for Maglocks
- Alarm Secure and Bypass are considered .... in a security alarm system
- Category detection system of interior volumetric detection systems
- Access control panels need to be in these locations
- light color is measured in ...
- Hollow metal frames are most common in this type of building
Down
- One of the most common communication protocols for AC systems
- Most basic dead bolt equipped electrified lock legal in occupied rooms
- This lock type is not considered Free Egress
- The number of security countermeasures types in an access control system
- The range in which a camera has the ability to differentiate extreme light and dark in a frame
- This type of glass door is also known as Storefront Door
- Three types of threat actors include Terrorist Petty and ...
- The minimum number of hours allowed for battery backup power on an AC panel
- Type of event log allowed to be used in a court of law
- Type of electrified lock that lacks physical strength
- Redundancy helps ensure reliability when things ...
- This alarm type can be avoided by alarm filtering
- Device required on all maglock doors
- Type of door frame that can withstand low use and low impact
28 Clues: A mantrap for cars • 2 doors enclosing a vestibule • light color is measured in ... • The power requirement for Maglocks • Device required on all maglock doors • Used to ensure that the alarm is valid • Two way radio is form of security ... • This lock type is not considered Free Egress • Access control must interface with this system • ...
Chapter 2 crossword 2025-11-14
Across
- The colony of Massachusetts was the first colony to issue what currency in the Us
- The Chinese began using this as money
- Money can be saved and used at a later date
- The federal government issued what.
- Putting money aside so it will be available when you need it
- A bill security that matures in a year or less
- What was created in 1913 by Woodrow Wilson
- A document guaranteeing payment of a specific amount of money
- what corporation can Shares be traded openly
- Ownership of Gold by US citizens was illegal until when.
- An analysis of the company itself, its operations, its positions within the industry
- Anything of value that is accepted in return for goods
- The Lydian King Croesus created the which true coin
- Maintain its value over time
- Who signed the National Banking Act
- People who buy shares of stock in the company
- The mechanism a nation uses to provide and manage money for itself
Down
- what corporation can Shares not sold publicly
- Investing can help you beat ...
- Federal Reserve System is what bank of the United States.
- The Federal Reserve System is divided into how many districts.
- A note of security that pays interest over terms ranging from 2-10 years
- Someone who assists you with buying stocks and bonds
- selling stocks and bonds directly to public investors
- A financial investment issued by a corporation
- Those people who do the work for a business
- People who lend money to the business for a contracted rate of interest
- The what bank of the U.S was chartered in 1789 by Alexander Hamilton
- Money for real estate, equipment, and so on
- Taking measures to make money grow
30 Clues: Maintain its value over time • Investing can help you beat ... • Taking measures to make money grow • The federal government issued what. • Who signed the National Banking Act • The Chinese began using this as money • What was created in 1913 by Woodrow Wilson • Money can be saved and used at a later date • Those people who do the work for a business • ...
Investment essentails 2024-03-11
Across
- Contracts that give the buyer the right, but not the obligation, to buy or sell an asset at a specified price on or before a certain date.
- A market condition marked by falling stock prices.
- Stocks of large, reputable companies known for their ability to operate profitably in good times and bad.
- The benchmark index of the NSE.
- The Bombay Stock Exchange, one of the oldest in Asia.
- The income return on an investment, such as the interest or dividends received from holding a particular security.
- A person or company that buys and sells goods or assets for others.
- An investor's share of a company's profit, usually paid out quarterly.
- The degree to which an asset or security can be quickly bought or sold in the market without affecting its price.
- The value of shares issued by a company.
Down
- Financial contracts obligating the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.
- A place where stocks and other securities are bought and sold.
- The degree of variation of a trading price series over time, usually measured by the standard deviation of logarithmic returns.
- The National Stock Exchange of India.
- Partial ownership in a company.
- The benchmark index of the BSE.
- A market condition marked by rising stock prices.
- The first sale of stock by a private company to the public.
- A financial security with a value that is reliant upon or derived from, an underlying asset or group of assets.
- A collection of investments held by an institution or a private individual.
20 Clues: Partial ownership in a company. • The benchmark index of the BSE. • The benchmark index of the NSE. • The National Stock Exchange of India. • The value of shares issued by a company. • A market condition marked by rising stock prices. • A market condition marked by falling stock prices. • The Bombay Stock Exchange, one of the oldest in Asia. • ...
Ethics & Compliance 2019-05-28
16 Clues: Bravery • Wellbeing • Behaviour • Observance • Nimbleness • Honesty, honour • Safeguard, shield • Care and security • Provision, supply • Battles, struggles • Beliefs, Integrity • Attention, concern • Teamwork, cooperation • Presents and generosity • Confidential reporting tool • Who we are and how we strive to be everyday
Information Security Quiz #15 2015-05-27
Across
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- This can slow down your computer AND watch everywhere you go on the internet.
- Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- Tapping confidential information from trash
- You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- Use this tool to dispose of documents that contain personal or financial information.
Down
- The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- The front line of defence in information security!
- Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- Destruction of computer equipment or records
- Records of IS activities
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
16 Clues: Records of IS activities • Tapping confidential information from trash • Destruction of computer equipment or records • The front line of defence in information security! • This can slow down your computer AND watch everywhere you go on the internet. • Use this tool to dispose of documents that contain personal or financial information. • ...
Security-07-29-2024 2024-07-29
Across
- Cryptographic algorithm
- Open source web server software
- Synthetic media that has been digitally manipulated
- Attack method that uses trial and error to crack passwords
- Tool that records what a person types on a device
- The 'B' in BSOD
- Attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- The process of verifying the identity or other attributes of an entity
Down
- Class of malware designed to automate cybercrime
- Software that caused global IT outage
- Vulnerability Management software vendor
- Malware designed to deny a user or organization access to files
- Microsoft Web Browser
- Device for stealing credit card information
- Ai Chip Maker
- An unexpected and relatively small defect, fault, flaw
16 Clues: Ai Chip Maker • The 'B' in BSOD • Microsoft Web Browser • Cryptographic algorithm • Open source web server software • Software that caused global IT outage • Vulnerability Management software vendor • Device for stealing credit card information • Class of malware designed to automate cybercrime • Tool that records what a person types on a device • ...
Security of the Believer 2025-06-13
Across
- Nothing can separate us from the ____ __ ___ (Romans 8:39)
- Death is not an accident; it is an ________ (Page 13)
- The wages of sin is ______ (Romans 6:23)
- This is who paid the death penalty for our sins
- We are saved BY this (Ephesians 2:8)
- This is when you are not sure about something
- We are saved THROUGH this (Ephesians 2:8)
Down
- All that come to Jesus will in no way be ____ ___ (John 6:37)
- The title of our book is "Your life as a _______"
- This is who we studied about in Bible School this week.
- This is the gift God gives us when we believe and ask forgiveness (Page 11)
- We are NOT saved through these (Ephesians 2:9)
- By hearing and believing, we are given _____ life (John 5:24)
- This is anything we do that is wrong and contrary to what God wants
- This is another gift from God through Jesus (Page 11)
- When we confess, God is ______ and just to forgive us (1 John 1:9)
16 Clues: We are saved BY this (Ephesians 2:8) • The wages of sin is ______ (Romans 6:23) • We are saved THROUGH this (Ephesians 2:8) • This is when you are not sure about something • We are NOT saved through these (Ephesians 2:9) • This is who paid the death penalty for our sins • The title of our book is "Your life as a _______" • ...
Continuing Education 2025-10-24
14 Clues: 8099 • fire • dial 88 • medication • one source • quality rounds • active shooter • cardiac arrest • winter weather • slow heart rate • empty oxygen tank • hold beta blockers • gas shut off valves • patient interactions
assignment 1 and 2 2025-02-19
Across
- The obtaining of money by legal process through seizure and sale of property; the raising of the money for which an execution has been issued. So, where the sheriff or other state official, armed with a writ, seizes a debtor’s property in order to satisfy a judgment.
- A way to settle a foreclosure case, or preempt one, by voluntarily surrendering the deed to the property in exchange for not defending the foreclosure and for not.exercising a right of redemption.
- A power of sale is not the same thing as a short sale. For an explanation of the difference between the two,
- Tort for wrongful taking/use of property. A debtor’s remedy against an unsecured creditor that attempts to use self-help.
- A security interest in real property.
- the legal process of enforcing the judgment,usually be seizing and selling property of the debtor
- Any transfer made with actual intent to hinder, delay or defraud any creditor is voidable. See UVTA Sections 4(a), 5(a) and 8.
- Taking property without going through a judicial process, in order to use the property to satisfy a debt. Not available to unsecured creditors.
- When one amount owing is cancelled in light of another amount owing. See also ,
Down
- A “lease” is really a sale with a security interest if the term of the lease extends for the entire remaining economic life of the collateral, so that the lease is just like a financed purchase. See UCC 1-203. This is in keeping with the Intended as a Security Doctrine. See also the Bright-Line and Economics of the Transactions Test (Assignment 22).
- The process by which the creditor compels application of the value of the collateral to payment of the debt when the creditor holds a lien interest in the collateral. Usually involves a sale of the collateral; the sale cuts off the right to redeem, and completes theforeclosure.
- Statutes that render certain property untouchable by creditors seeking to compel repayment. Generally only helps individuals retain their property, not corporations. Generally only applies vis-à-vis a debtor and an unsecured creditor. Exemption statutes generally cannot protect a debtor’s property from secured creditors.
- If a factor purchases the accounts of another with contractual provisions that make it so that they don’t really bear any risk of loss, but instead have recourse against the seller of the accounts for the value of the sale, then the sale is not really a sale, it is a security agreement secured by the accounts. See UCC 9-102(a). This is in keeping with the Intended as a Security Doctrine.
- An interest in property, contingent on the non-payment of a debt. See UCC 1-201(35). See also the Intended as a Security Doctrine and UCC 9-109(a)(1).
- “[T]he debtor’s right to pay the secured debt even after default and retain ownership of the collateral.” (LoPucki et. al. pg 26)
15 Clues: A security interest in real property. • When one amount owing is cancelled in light of another amount owing. See also , • the legal process of enforcing the judgment,usually be seizing and selling property of the debtor • A power of sale is not the same thing as a short sale. For an explanation of the difference between the two, • ...
Bullying 2024-08-20
Across
- Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
- Tindakan yang melibatkan perundungan secara berkelompok.
- Mempermalukan seseorang di depan orang lain
- Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
- Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
- Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
- Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
- Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
- Tindakan menyebar informasi palsu tentang seseorang.
- Perasaan tidak berdaya dan tertekan akibat tindakan bullying
- Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
- Kata untuk seseorang yang melakukan bullying.
- Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
- Jenis bullying yang terjadi melalui media sosial atau teknologi digital
14 Clues: Mempermalukan seseorang di depan orang lain • Kata untuk seseorang yang melakukan bullying. • Tindakan menyebar informasi palsu tentang seseorang. • Tindakan yang melibatkan perundungan secara berkelompok. • Perasaan tidak berdaya dan tertekan akibat tindakan bullying • Kata untuk mengidentifikasi individu yang menjadi sasaran bullying • ...
Vocabulary - Unit 3 2023-12-05
Vocabulary 2022-12-31
ICT Cyber security Work 2021-10-06
3 Clues: An error in code • If you get sent a fraudulent email its called? • door-Are bits of code embedded in programs by the programmer to quickly gain access later
ICT Cyber security Work 2021-10-06
3 Clues: An error in code • If you get sent a fraudulent email its called? • Are bits of code embedded in programs by the programmer to quickly gain access later
Air Travel 2 2024-02-03
Nathan's eSafety 2021-04-29
Across
- luring someone in with scams
- something that secures your data
- your internet
- spamming is someone saying something over and over
- if you go back to that website again, the website knows you've already been there before.
- someone trying to steal personal information
- something that affects your computer and steals info and more
Down
- is a app that know where you are
- something that is saying your info is private
- mining is a process used by companies to turn raw data into useful information.
- Something that controls if you lag or don't and allows you on the internet
- a video game or something else that u can access
- cyber attack like hacking and ddosing
13 Clues: your internet • luring someone in with scams • is a app that know where you are • something that secures your data • cyber attack like hacking and ddosing • someone trying to steal personal information • something that is saying your info is private • a video game or something else that u can access • spamming is someone saying something over and over • ...
November Newspaper 2023-11-21
Across
- Name of the monday after Black Friday: "_____ Monday"
- Color of light that has the most energy
- Smoking is a physical and ______ addiction
- Name of the ship the Pilgrims used to travel to America
- Traditional sauce served on Thanksgiving
- Epidemic of the past 30 years
Down
- Idiom meaning the most important person "the big ____"
- City in Virginia where the national cemetery is located
- Name of ID that shows permission to work "Employment _____"
- State where the Gateway Arch is located
- Idiom for somebody who has crazy ideas "off one's ____"
- Where did Columbus think he was when he arrived to America? "the ____"
- Name for the little car that takes people to the top of the Gateway Arch
13 Clues: Epidemic of the past 30 years • Color of light that has the most energy • State where the Gateway Arch is located • Traditional sauce served on Thanksgiving • Smoking is a physical and ______ addiction • Name of the monday after Black Friday: "_____ Monday" • Idiom meaning the most important person "the big ____" • ...
Industrial Revolution 2024-11-06
Across
- A skillful worker who makes goods by hand.
- The process of large-scale production using machines.
- Materials Raw materials that are processed into products.
- Raw materials used in making flour, often ground from wheat.
- A type of system integrating computing with physical processes.
Down
- The process of creating products through machinery in mass quantities.
- The product of factories or manufacturing plants.
- Large vehicles designed to transport people and goods.
- Line A continuous process in which products are assembled step-by-step.
- Machines used in manufacturing processes.
- A system of transport for goods across regions.
- A place where industrial processes occur, especially in bulk.
- A metal alloy used widely in construction and manufacturing.
13 Clues: Machines used in manufacturing processes. • A skillful worker who makes goods by hand. • A system of transport for goods across regions. • The product of factories or manufacturing plants. • The process of large-scale production using machines. • Large vehicles designed to transport people and goods. • Materials Raw materials that are processed into products. • ...
Entering the Unknown 2024-03-13
Across
- This trophy is one of the collected items.
- This monster snapped the main protagonist's roommate's neck
- The name of the side protagonist and Helia's friend group
- The person who is caught on Experimentation's fire exit
- The main protagonist and first OC of TheOrangePick's
- A side protagonist and former persona of TheOrangePick
- The antagonist that escapes capture from a clan cell
- The name of the group Reginald Copperbottom is in
- This Minecraft collectable is one of the collected items
Down
- This largest item is one of the collected items
- This blind monster killed the main protagonist
- This moldy item is one of the collected items
- The main antagonist
- The main protagonist's roommate (in a historical way)
- This mannequin monster killed Cyber
- The game the series was based on
- This glue item is one of the collected items
- This scrappy monster killed Red Ender
18 Clues: The main antagonist • The game the series was based on • This mannequin monster killed Cyber • This scrappy monster killed Red Ender • This trophy is one of the collected items. • This glue item is one of the collected items • This moldy item is one of the collected items • This blind monster killed the main protagonist • This largest item is one of the collected items • ...
Georgia Milestones Testing Training 2016-03-29
Across
- o'clock is the time proctors should arrive in rooms they are proctoring
- should be covered in testing rooms
- must be kept secure at all times
- is permitted during breaks
- must monitor the integrity of the assessment, through circulation and checking in
- can write in the test books
Down
- are used for each student for each section of the online assessment
- responsible for test security
- of test security occurs when examiners fail to follow administration directions for the test
- begins on April 12
- during the entire testing period
- electronic devices should be used during testing sessions (by teachers or students)
12 Clues: begins on April 12 • is permitted during breaks • can write in the test books • responsible for test security • must be kept secure at all times • during the entire testing period • should be covered in testing rooms • are used for each student for each section of the online assessment • o'clock is the time proctors should arrive in rooms they are proctoring • ...
Trade/Globalization 2024-10-30
Across
- A limited quantity of a particular product which under official controls can be produced, exported, or imported.
- An organization intended to coordinate and unify the petroleum policies of its member countries and ensure stabilization of oil markets
- A regulation or policy that restricts international trade.
- Safeguards the freedom and security of its members.
- The ability of an individual or group to carry out a particular economic activity more efficiently than another country.
- Federal laws that prohibit the unlicensed export of certain commodities or information for reasons of national security.
- Operates a global system of trade rules.
Down
- The Ability of and individual or group to carry out a particular economic activity more efficiently than another individual or group.
- A practice that when applied allows a country to partake in unfair currency practices to get a trade advantage.
- Goods or services leaving a country.
- A sum of money granted by the government or a public body to assist an industry or business.
- Goods or services entering a country.
- Established a free trade zone in North America
- The withdraw of customary trade and financial relations for foreign and security purposes.
- A tax or duty to be paid on a particular class of imports or exports.
- When a country or company exports a product at a price that is lower in the foreign importing market than the exporters domestic market.
16 Clues: Goods or services leaving a country. • Goods or services entering a country. • Operates a global system of trade rules. • Established a free trade zone in North America • Safeguards the freedom and security of its members. • A regulation or policy that restricts international trade. • A tax or duty to be paid on a particular class of imports or exports. • ...
TTS SEJARAH PERKEMBANGAN IPTEK 2020-11-18
Across
- negara yang meluncurkan manusia pertama ke bulan
- pesawat ulang-alik buatan rusia
- badan penerbangan dan antariksa Amerika Serikat
- pemindahan manusia atau barang dari satu tempat ke tempat lainnya dengan menggunakan sebuah wahana yang digerakkan oleh tenaga manusia atau mesin
- nama pimpinan ilmuwan roket jerman yang mengembangkan pelurur kendali V2
- tempat menguji senjata buatan AS
Down
- seorang mayor Angkatan Udara Rusia yang menjadi orang rusia pertama ke luar angkasa
- contoh serat optik
- memberikan pelayanan yang lebih luas serta keamanan bagi negara merupakan manfaat transportasi terhadap
- salah satu teknologi komunikasi yang menggunakan teknologi cyber/internet
- badan pengawasan teknologi rudal
- light amplification by stimulated emission of radiation
12 Clues: contoh serat optik • pesawat ulang-alik buatan rusia • badan pengawasan teknologi rudal • tempat menguji senjata buatan AS • badan penerbangan dan antariksa Amerika Serikat • negara yang meluncurkan manusia pertama ke bulan • light amplification by stimulated emission of radiation • nama pimpinan ilmuwan roket jerman yang mengembangkan pelurur kendali V2 • ...
PPKN KELOMPOK 5 2025-02-22
Across
- Toleransi juga mengandung makna?
- Sebutan lain dari kata serangan (Siber) adalah?
- Paham kebangsaan yang berupa semangat dan kesadaran cinta terhadap tanah air. Merupakan pengertian dari?
- Salah satu contoh mencintai tanah air di lingkungan sekolah adalah kegiatan?
- Sikap menahan diri, bersabar, dan berlapang dada terhadap berbagai macam perbedaan. Merupakan pengertian dari?
- Pernyataan bersama, merupakan pengertian dari kata?
- Sebutan lain dari tantangan dari dalam?
- Masuknya budaya budaya asing dapat merusak... dan moral anak bangsa.
Down
- Contoh sikap yang baik di lingkungan sekolah adalah?
- Negara Kesatuan Republik Indonesia di singkat menjadi?
- Masuknya paham paham ekstrim yang dapat membahayakan ideologi?
- Sebutan lain dari tantangan dari luar?
12 Clues: Toleransi juga mengandung makna? • Sebutan lain dari tantangan dari luar? • Sebutan lain dari tantangan dari dalam? • Sebutan lain dari kata serangan (Siber) adalah? • Pernyataan bersama, merupakan pengertian dari kata? • Contoh sikap yang baik di lingkungan sekolah adalah? • Negara Kesatuan Republik Indonesia di singkat menjadi? • ...
INFORMATION TECHNOLOGY 2017-05-08
Crossword Test 2021-09-13
spanish 2022-10-07
Quiz 1: Computational Science 2025-02-03
p22 2024-07-11
5 Clues: Online storage for data • Small file stored by websites • A program to surf the internet • Turn coded text into readable text • Related to computers or the internet
Unit 1 Key Terms 2024-12-17
Across
- dating- dating only one person on a regular basis
- undergoing continuous change
- further the development of a relationship
- period of time between childhood and adulthood
- who obsessively follows,observes, or contacts another person without their consent
Down
- feeling of love and emotional attachment to another person
- stalker- a person who uses the internet as a means to stalker harass someone
- dating- casual dating that involves no commitment to continue the relationship
- dating- going out in a group rather than just as a couple
- violence- abuse in a family or household
- to use in an improper way , improper treatment
11 Clues: undergoing continuous change • violence- abuse in a family or household • further the development of a relationship • period of time between childhood and adulthood • to use in an improper way , improper treatment • dating- dating only one person on a regular basis • dating- going out in a group rather than just as a couple • ...
No crackers Gromit, we’ve forgotten the Christmas crackers 2024-11-20
Across
- Who is the creator of Wallace and Gromit?
- Who is the original voice of Wallace?
- What does Wendolene's shop sell in A Close Shave?
- Where is the villain taken at the end of The Wrong Trousers?
- What is the moon made of?
Down
- What toy is used in the famous chase scene in The Wrong Trousers?
- What is the name of the cyber dog in A Close Shave?
- What are the Wrong Trousers originally intended for?
- What kind of bird is Feathers McGraw?
- Wallace's go to cheese
- What colour is the rocket in a Grand Day Out?
11 Clues: Wallace's go to cheese • What is the moon made of? • What kind of bird is Feathers McGraw? • Who is the original voice of Wallace? • Who is the creator of Wallace and Gromit? • What colour is the rocket in a Grand Day Out? • What does Wendolene's shop sell in A Close Shave? • What is the name of the cyber dog in A Close Shave? • ...
Avenger Cast Movies 2025-07-10
Across
- remake of a book about a man and his sidekick who solve mysteries RDJ
- the lost city of z
- famous sweater mystery movie
- to infinity and beyond
- scifi movieabout clones with ewan mcgregor
- movie about a hacker who helps track down a cyber criminal starring hemsworth
Down
- the devil all the time
- a dualmovie war battle WW2
- two marvel actors renner and olsen investigate to find out about a murder on a reservation
- science fiction movie starring scarlet about a womanwho gets a drug in her stream
- men in black internationsl
- played a lawyer in the poor things
12 Clues: the lost city of z • the devil all the time • to infinity and beyond • a dualmovie war battle WW2 • men in black internationsl • famous sweater mystery movie • played a lawyer in the poor things • scifi movieabout clones with ewan mcgregor • remake of a book about a man and his sidekick who solve mysteries RDJ • ...
Revision 2025-09-16
Across
- Noticing what is happening in the present
- Spreading rumors about someone is an example of which type of bullying?
- When two or more people do not agree on the same thing
- Being thankful and appreciative
- Which type of bullying takes place online?
Down
- Appreciating yourself and doing things you like
- Purposely troubling someone else through actions or words
- Kindness/Patience/Honesty and Forgiveness are examples of
- Stepping into other's shoes to understand how they are feeling
- Doing things to take care of yourself
- I tell my teacher if I haven't done the homework. How is my behaviour?
11 Clues: Being thankful and appreciative • Doing things to take care of yourself • Noticing what is happening in the present • Which type of bullying takes place online? • Appreciating yourself and doing things you like • When two or more people do not agree on the same thing • Purposely troubling someone else through actions or words • ...
SOP 4.0 2014-08-29
Across
- Maximum length of a PDX access ticket for security in years.
- Maximum length of a GovCloud ticket for security in years.
- The Temporary Employee badge color.
- The Vendor badge color.
- Critical Site Event acronym
Down
- Acronym for who can provide escort in PDT.
- The Amazon FTE badge color.
- Large Scale Event acronym.
- The visitor badge color.
9 Clues: The Vendor badge color. • The visitor badge color. • Large Scale Event acronym. • The Amazon FTE badge color. • Critical Site Event acronym • The Temporary Employee badge color. • Acronym for who can provide escort in PDT. • Maximum length of a GovCloud ticket for security in years. • Maximum length of a PDX access ticket for security in years.
The SEC 2026-02-18
Across
- putting money into companies hoping for a profit
- people who steal money
- Security Exchange Commission
- a paper currency
Down
- independent middleman
- hands off
- a debt security where an investor loans money to an entity
- an individual who watches over others to make sure they are following the rules
- ownership interest in a company, usually in stocks
9 Clues: hands off • a paper currency • independent middleman • people who steal money • Security Exchange Commission • putting money into companies hoping for a profit • ownership interest in a company, usually in stocks • a debt security where an investor loans money to an entity • an individual who watches over others to make sure they are following the rules
Financial Management 2015-04-16
Across
- - An ____________________ used to save money for retirement
- - A transaction that reduces the risk of an investment.
- - the value of ownership interest in the business, calculated by deducting liabilities from assets. See also owner's equity.
- - is when a private company offers shares in the company to the public for the first time.
- - It is a financially wise choice to borrow ______, for things like owning a home (tax-deduction advantage), paying for higher education (tuition), and to help you in times of illness.
- - an agent in the buying and selling of stocks and bonds
- - document issued to possible buyers of a stocks and bonds outlining the financial condition of the company issuing those securities
- - Is money you take out of your banking, brokerage firm, or other accounts.
- - Is the amount that employers subtract from their employees' gross pay for a variety of taxes and benefits, including Social Security and Medicare taxes, federal and state income taxes, health insurance premiums, retirement savings, education savings, or flexible spending plan contributions, union dues, or prepaid transportation.
- - Buying and selling securities.
- - A percentage that investors pay in order to enter a mutual fund
- - Gains equal losses.
- - the amount of money borrowed
- - Piece of paper that proves ownership of stocks, bonds and other investments. Traditionally, a security was a physical document, such as stock or bond certificate, that represented your investment in that stock or bond.
- - An agreement in which one party sells a security to another party and agrees to repurchase it on a specified date for a specified price. See: repurchase agreement.
- - Is a unit of ownership in a corporation or mutual fund, or an interest in a general or limited partnership. Though the word is sometimes used interchangeably with the word stock, you actually own shares of stock.
Down
- - Is a legal document proving ownership of a piece of property.
- - the money an investor receives above and beyond the sum of money initially invested
- - A ______ asset is one that is currently being used as security or collateral for a loan.
- - Is a withdrawal from a bank account that exceeds the funds you have available.
- - Is the length of time between when a fixed-income security, such as a bond or note, is offered for sale and its maturity date.
- - Person or entity that owns share in a corporation. If you own stock in a corporation, you are a shareholder of that corporation.
- - A measure of risk based on the standard deviation of the asset return. Volatility is a variable that appears in option pricing formulas. This formula denotes the volatility of the underlying asset return from now to the expiration of the option. Some have created volatility indices. Example: scale is 1-9; higher rating indirectly higher risk.
- - is the money you collect for providing a product or service.
- - Broadly defined, a recession is a downturn in a nation's economic activity. The consequences typically include increased unemployment, decreased consumer and business spending, and declining stock prices.
- - the chance an entrepreneur takes of losing time and money on a business that may not prove profitable
- - ownership of a corporation which is represented by shares which represent a piece of the corporations’ assets and earnings.
- - Is a legal document you use to transfer assets you have accumulated during your lifetime to the people and institutions you want to have them after your death.
- - a payment required for not fulfilling a contract
- - You should probabaly have enough of this before getting married or buying a nice sports car
- - A package containing two or more different kinds of risk management instruments that are usually interactive.
31 Clues: - Gains equal losses. • - the amount of money borrowed • - Buying and selling securities. • - a payment required for not fulfilling a contract • - A transaction that reduces the risk of an investment. • - an agent in the buying and selling of stocks and bonds • - An ____________________ used to save money for retirement • ...
Cybermobbing 2020-04-17
Across
- Elektronisches Gerät mit Tasten
- Lernende Menschen die normalerweise in einem Klassenzimmer feststecken
Down
- Werder Kind noch erwachsene Menschen
- Ein Mann oder eine Frau die entweder stielt, jemanden ermordet oder was anderes
- ein Kind das gemobbt wird
- Meist übers Internet gesteuerte Demütigung einer Person
6 Clues: ein Kind das gemobbt wird • Elektronisches Gerät mit Tasten • Werder Kind noch erwachsene Menschen • Meist übers Internet gesteuerte Demütigung einer Person • Lernende Menschen die normalerweise in einem Klassenzimmer feststecken • Ein Mann oder eine Frau die entweder stielt, jemanden ermordet oder was anderes
Cyber Words 2017-04-25
6 Clues: a book on a device • mail sent from electronics • bullying through technology • very popular and looks like a number sign • can be for learning but most commonly as games • commercials that pop up on the side of your screen
Being a Cyber Citizen 2021-04-24
Across
- To decrease in extent, volume, or scope
- Electronic content or media platforms
- One who is present but not part of a situation
- Annoy persistently; create an unpleasant situation
- Exclusive legal right to reproduce works
- To use for a business; for profit
- Increase in extent, volume, or scope
- Electronic bullying; often done anonymously
Down
- Result of actions
- Unknown authorship or origin
- Principles and morals that guide behavior
- Copyright allowed if author gets credit
- Usage of copywritten material without permission
- Standards on which judgment or decision is made
14 Clues: Result of actions • Unknown authorship or origin • To use for a business; for profit • Increase in extent, volume, or scope • Electronic content or media platforms • To decrease in extent, volume, or scope • Copyright allowed if author gets credit • Exclusive legal right to reproduce works • Principles and morals that guide behavior • ...
Cyber Among Us - 1 2025-08-25
Across
- Unsolicited junk mail or advertising
- Malware that is difficult to get rid of
- Most common malicious attachment, not just for AP
- Strategy for longer passwords using sentences
- Malware that can self-replicate across a network
- Added to an internet browser to use your favorite software
- Malware that tracks your keystrokes
- A program that can run on its own
- Scan this to go to a website
Down
- Malware that uses your fear to get you to click
- Email that is malicious in nature
- The 'main' brand of software we use
- Forward malicious emails to this group email
- A bad link may do this
14 Clues: A bad link may do this • Scan this to go to a website • Email that is malicious in nature • A program that can run on its own • The 'main' brand of software we use • Malware that tracks your keystrokes • Unsolicited junk mail or advertising • Malware that is difficult to get rid of • Forward malicious emails to this group email • Strategy for longer passwords using sentences • ...
Swimlane crossword 2024-10-03
Across
- Type of management Rancher Prime simplifies
- Network level where NeuVector can identify and block threats
- Assistant Intelligent support feature offered by Rancher Prime (EA)
- NeuVector secures containers throughout this
- Rancher Prime's trusted distribution platform
Down
- Security principle NeuVector is built on
- Feature simplified by NeuVector's built-in audits and reporting
- Certification available on-demand with Rancher Prime
- Rancher Prime component with up to 5 years of support
- Workflow NeuVector seamlessly incorporates security into
10 Clues: Security principle NeuVector is built on • Type of management Rancher Prime simplifies • NeuVector secures containers throughout this • Rancher Prime's trusted distribution platform • Certification available on-demand with Rancher Prime • Rancher Prime component with up to 5 years of support • Workflow NeuVector seamlessly incorporates security into • ...
SURVEILLANCE 2025-02-19
Across
- link between the computer and user
- global web
- provides internet access,often provide a modem and router to the customer
- unauthorized surveillance
- security camera system
- security barrier in a network
Down
- network connected server that stores website file that can be accssible by users of the internet
- information about data
- allows computer to connect with wired or wireless network
- breach access of stored data without the permission of those holding it
10 Clues: global web • information about data • security camera system • unauthorized surveillance • security barrier in a network • link between the computer and user • allows computer to connect with wired or wireless network • breach access of stored data without the permission of those holding it • provides internet access,often provide a modem and router to the customer • ...
Puzzle #17 – “MySSA Account” 2025-06-29
Across
- - You can apply for this benefit through MySSA
- - Your account is designed to be this
- - You can update this payment method online
- - You can apply for this benefit using your account
- - Online account to manage Social Security benefits
- - You need this to access your account
Down
- - Protects your online Social Security account
- - The process of creating your MySSA account
- - You can estimate these through your account
- - You can view this document online through MySSA
10 Clues: - Your account is designed to be this • - You need this to access your account • - You can update this payment method online • - The process of creating your MySSA account • - You can estimate these through your account • - Protects your online Social Security account • - You can apply for this benefit through MySSA • - You can view this document online through MySSA • ...
Workplace Words Worth Solving 2025-07-31
Across
- Main street running through Sanctuary Cove
- Logged with a contractor to get a job done
- Acronym for the committee who oversee building approvals
- Recorded at a meeting
- Team responsible for safety and surveillance
Down
- Everything goes dark (except the complaints)
- What Security do at night and on rotation
- That magical number needed before a meeting can legally become a meeting
- Approved annually, reviewed often, debated always
- Rules that govern community behaviour
10 Clues: Recorded at a meeting • Rules that govern community behaviour • What Security do at night and on rotation • Main street running through Sanctuary Cove • Logged with a contractor to get a job done • Everything goes dark (except the complaints) • Team responsible for safety and surveillance • Approved annually, reviewed often, debated always • ...
computer languages 2025-05-23
Across
- One of the high-level languages.
- Example of fifth generation computer language.
- Convert high level language to low level language and vice versa.
- A network security system that protects networks from unauthorised access.
- A type of software protects computers from malicious software.
- It is used in assembly languages (2 words).
- The first interactive computer game.
Down
- First-generation language.
- Illegal activities involving computers and the internet.
- Unauthorized access to computer network security systems.
- The set of instruction that tells the computer what to do.
- Feature of fifth generation computer language (2 words).
- A social engineering attack that used to steal user data.
- A storage location of computer memory that stores data.
- Secret string of characters used to identify the user.
- Set of rules that define structure and formed a programing language.
16 Clues: First-generation language. • One of the high-level languages. • The first interactive computer game. • It is used in assembly languages (2 words). • Example of fifth generation computer language. • Secret string of characters used to identify the user. • A storage location of computer memory that stores data. • Illegal activities involving computers and the internet. • ...
Safety Week#4_10 2014-10-27
10 Clues: / กล่อง • / สกปรก • / ปนเปื้อน • / การประชุม • / สติ๊กเกอร์ • / คอมพิวเตอร์ • / รถจักรยานยนต์ • / ซุปเปอร์ไวเซอร์ • / การรักษาความปลอดภัย • / คุ้มกัน หรือ อุปกรณ์ป้องกัน
La Crisis del Hambre en África 2019-10-17
week 6 2025-10-03
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
Banking can be SCARY 2023-10-30
Across
- The RG run when there is an unauthorized transaction on a members debit/credit card
- a digital asset that exist outside the control of governments and central authorities
- If the payee, dollar amount, or date was changed after a check was written it is considered “__________”
- Abbreviation for a “Questionable Activity Report”
- “___________ theft” occurs when someone steals your personal information or credentials to commit fraud
- The fraudulent practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information
- “Money __________” is concealing of the origins of illegally obtained money
- The RG used to submit a report of elder abuse
- Short for the “Bank Secrecy Act”
Down
- A security feature on new bills and some checks consisting of tiny repetitive text that makes it nearly impossible to reproduce or counterfeit
- Abbreviation for the report filed for daily cash transactions exceeding $10,000
- A security feature on ID’s, new bills, and some checks that is invisible to the naked eye but can seen under “___________ light”
- If a bill lacks certain security features it may be “____________”
- A device by fraudsters on point of sale device to steam debit/credit card information
- “Office of Foreign Assets Control“ is also called “_______”
- wrongful or criminal deception intended to result in financial or personal gain
- A fraudulent or deceptive act or operation such as buying gift cards or sending money to someone you do not know
17 Clues: Short for the “Bank Secrecy Act” • The RG used to submit a report of elder abuse • Abbreviation for a “Questionable Activity Report” • “Office of Foreign Assets Control“ is also called “_______” • If a bill lacks certain security features it may be “____________” • “Money __________” is concealing of the origins of illegally obtained money • ...
Personal Finance Chapter 11 Activity 2022-09-22
Across
- Growth stocks, growth-oriented mutual funds, and rental property
- A corporate bond secured by various assets of the issuing firm.
- A legal document that details all of the conditions relating to a bond issue.
- A financially independent firm that acts as the bondholders' representative.
- For a corporate bond, the date on which the corporation is to repay the borrowed money.
- A bond that is backed only by the reputation of the issuing corporation.
- Speculative stocks, options, commodities, and other high-risk investments
- A bond backed by the full faith, credit, and unlimited taxing power of the government that issued it.
- U.S. securities, selected corporate and municipal bonds, income stocks, and conservative mutual funds
Down
- The written pledge of government or a municipality to repay a specified sum of money, along with the rest
- A corporation's written pledge to repay a specified amount of money with interest.
- A feature that allows the corporation to call in, or buy, outstanding bonds from current bondholders before the maturity date.
- A bond that is repaid from the income generated by the project it is designed to finance.
- A ____ is a debt security, similar to an IOU
- A bond that can be exchanged, at the owner's option, for a specified number of shares of the corporation's common stock.
- A corporate bond that pays higher interest but also has a higher risk of default.
- A debt security issued by a state or local government.
- The dollar amount the bondholder will receive at the bond's maturity.
- Cash, CDs, money market mutual funds, and U.S. government bonds
- a security that represents the ownership of a fraction of the issuing corporation.
20 Clues: A ____ is a debt security, similar to an IOU • A debt security issued by a state or local government. • A corporate bond secured by various assets of the issuing firm. • Cash, CDs, money market mutual funds, and U.S. government bonds • Growth stocks, growth-oriented mutual funds, and rental property • ...
