cyber security Crossword Puzzles

Stock Market Game Crossword 2024-12-10

Stock Market Game Crossword crossword puzzle
Across
  1. Ownership share
  2. Gross domestic product
  3. Financial marketplace
  4. Return on investments
  5. Real state investment fund
  6. Valuable property
  7. Rising prices
  8. Profit distribution
  9. Pooled investment vehicle
Down
  1. Employee retirement plan
  2. Debt security
  3. Investment collection
  4. Cost of borrowing
  5. Mutual fund
  6. Exchange-traded fund
  7. Return on investment
  8. Potential loss
  9. Profit or loss
  10. Individual retirement account

19 Clues: Mutual fundDebt securityRising pricesPotential lossProfit or lossOwnership shareCost of borrowingValuable propertyProfit distributionExchange-traded fundReturn on investmentInvestment collectionFinancial marketplaceReturn on investmentsGross domestic productEmployee retirement planPooled investment vehicleReal state investment fund...

¡Vamos de vacaciones! (Parte I) 2024-02-28

¡Vamos de vacaciones! (Parte I) crossword puzzle
Across
  1. to go by plane
  2. flight attendant (feminine)
  3. the gate
  4. to take the subway
  5. arrivals
  6. to check the luggage
  7. to take the train
  8. airport
  9. departures
Down
  1. flight
  2. to go shopping
  3. passport
  4. traveler (masculine)
  5. to board
  6. to go through customs
  7. to go through security
  8. traveler
  9. pilot
  10. to take a trip
  11. to take a boat

20 Clues: pilotflightairportpassportthe gateto boardarrivalstravelerdeparturesto go by planeto go shoppingto take a tripto take a boatto take the trainto take the subwaytraveler (masculine)to check the luggageto go through customsto go through securityflight attendant (feminine)

Red Chair Report Q4 2022-09-28

Red Chair Report Q4 crossword puzzle
Across
  1. NHL 2022 Champions
  2. Morning ___
  3. Rick & Carl's alma mater
  4. AgilLink's App
  5. A favorite winter sport
  6. A colorado view
  7. Broncos
  8. CEO
Down
  1. ___ Trail Road
  2. Challenges & ___
  3. Code storage
  4. City where Risclarity HQ is located
  5. Time Tracker
  6. The color of the chair lift
  7. Security Training
  8. ___ is coming

16 Clues: CEOBroncosMorning ___Code storageTime Tracker___ is coming___ Trail RoadAgilLink's AppA colorado viewChallenges & ___Security TrainingNHL 2022 ChampionsA favorite winter sportRick & Carl's alma materThe color of the chair liftCity where Risclarity HQ is located

Amazing AKHLAK 2022-11-04

Amazing AKHLAK crossword puzzle
Across
  1. agen perubahan
  2. gas alam cair
  3. way of lives
  4. nilai-nilai utama
  5. bagian hulu
  6. bertindak proaktif
  7. memiliki kemampuan
  8. saling bekerjasama
Down
  1. menghargai perbedaan
  2. pekerja pertamina
  3. menjaga kepercayaan
  4. mengutamakan perusahaan
  5. bagian dari holding
  6. health safety security environment
  7. cara meraih tujuan
  8. pertamina reference level

16 Clues: bagian huluway of livesgas alam cairagen perubahanpekerja pertaminanilai-nilai utamacara meraih tujuanbertindak proaktifmemiliki kemampuansaling bekerjasamamenjaga kepercayaanbagian dari holdingmenghargai perbedaanmengutamakan perusahaanpertamina reference levelhealth safety security environment

16 Career Clusters 2024-04-11

16 Career Clusters crossword puzzle
Across
  1. _____ technology, engineering and mathematics
  2. ______ accountant
  3. ______ and construction
  4. ______ science
  5. ______ services
  6. Aircraft Assembler
  7. ______ technology
  8. ______ food and natural resources
  9. _______ public safety, corrections and security
Down
  1. ______ and public administration
  2. ______ management and administration
  3. ______ distribution and logistics
  4. advertising manager
  5. ______ and training
  6. ______ A/V technology and communications
  7. ______ and tourism

16 Clues: ______ science______ services______ accountant______ technologyAircraft Assembler______ and tourismadvertising manager______ and training______ and construction______ and public administration______ distribution and logistics______ food and natural resources______ management and administration______ A/V technology and communications...

Service Desk Puzzle 2021-01-21

Service Desk Puzzle crossword puzzle
Across
  1. Medication dispensing system
  2. Software used by Food Services for patient diet orders
  3. System used to manage schedules, call recordings, and QA processes
  4. Cisco System that allows phone calls and work to be routed to individuals
  5. Abbreviation for the Stanley Healthcare infant protection system
  6. Image management system for OB/GYN ultrasound
  7. System used by Physical Security for badging, door access control, and intrusion alerts
Down
  1. Security camera monitoring software
  2. Application used for e-prescribing
  3. Used by Pharmacy for workflow management and drug/dose documentation
  4. System used for online learning/compliance videos

11 Clues: Medication dispensing systemApplication used for e-prescribingSecurity camera monitoring softwareImage management system for OB/GYN ultrasoundSystem used for online learning/compliance videosSoftware used by Food Services for patient diet ordersAbbreviation for the Stanley Healthcare infant protection system...

LPSCS: Operational Strategies 2024-11-12

LPSCS: Operational Strategies crossword puzzle
Across
  1. law that established minimum wage
  2. responsibility of LPSCS employees to act in accordance with laws and regulations, promoting transparency and trust.
  3. Activities aimed at enhancing community safety.
  4. procedure
  5. federal law that protects employee safety in the workplace
Down
  1. Services that provide immediate medical care during emergencies.
  2. The entry-level position in law enforcement.
  3. geographical area that someone has power within
  4. The highest-ranking officer in a law enforcement agency, responsible for overall operations.
  5. type of security is when a company hires an outside security company to provide specific services.
  6. personal protective equipment

11 Clues: procedurepersonal protective equipmentlaw that established minimum wageThe entry-level position in law enforcement.geographical area that someone has power withinActivities aimed at enhancing community safety.federal law that protects employee safety in the workplaceServices that provide immediate medical care during emergencies....

Noah's crossword for bullying 2023-03-21

Noah's crossword for bullying crossword puzzle
Across
  1. a person the watches someone get bullied.
  2. a person that gets picked on continuously.
  3. a type of bullying that happens on social media.
  4. a person that picks on people continuously.
  5. something that happens continuously.
Down
  1. a type of bullying that is physical.
  2. a type of bullying that you are rejected from your friend group or not invited into a group.
  3. bullying you don't get physically hurt but emotionally and mentally

8 Clues: a type of bullying that is physical.something that happens continuously.a person the watches someone get bullied.a person that gets picked on continuously.a person that picks on people continuously.a type of bullying that happens on social media.bullying you don't get physically hurt but emotionally and mentally...

Safe, ethical and responsible use of social media for teenagers 2024-04-25

Safe, ethical and responsible use of social media for teenagers crossword puzzle
Across
  1. plagiarism What is the unattributed use of information from the web?
  2. What is understood as the process of boundary management and control of information sharing and access
  3. When someone receives unwanted sexual communications
  4. What does the N mean in SNS?
Down
  1. The Internet presents special challenges to behaving how?
  2. When someone provides sexually explicit images
  3. When someone is being cruel to others sending or posting harmful material
  4. An example of a SNS

8 Clues: An example of a SNSWhat does the N mean in SNS?When someone provides sexually explicit imagesWhen someone receives unwanted sexual communicationsThe Internet presents special challenges to behaving how?plagiarism What is the unattributed use of information from the web?When someone is being cruel to others sending or posting harmful material...

Human Rights 2020-12-14

Human Rights crossword puzzle
Across
  1. treatment
  2. security
  3. declaration
  4. spirit brotherhood
  5. recogniton
Down
  1. limitation of sovereignty
  2. arrest
  3. servitude
  4. discrimination
  5. cruel

10 Clues: cruelarrestsecuritytreatmentservituderecognitondeclarationdiscriminationspirit brotherhoodlimitation of sovereignty

GDHSRJHS 2019-08-10

GDHSRJHS crossword puzzle
Across
  1. cereal
  2. stores
  3. sweater
  4. stop fire
Down
  1. emergency
  2. Nike
  3. popcorn
  4. to play
  5. security
  6. Buzz lightyear

10 Clues: Nikecerealstorespopcornto playsweatersecurityemergencystop fireBuzz lightyear

Spelling 34 2020-06-14

Spelling 34 crossword puzzle
Across
  1. what you do with a question
  2. ____ a sound
  3. knocking over pins
  4. how loud
  5. save
  6. how you respond
  7. simple
  8. where it should be
Down
  1. straight ahead
  2. flat land
  3. the people in the world
  4. but
  5. angry dog sounds
  6. the lesson learned
  7. keeping safe
  8. finished

16 Clues: butsavesimplehow loudfinishedflat land____ a soundkeeping safestraight aheadhow you respondangry dog soundsknocking over pinsthe lesson learnedwhere it should bethe people in the worldwhat you do with a question

Dog Breeds 2019-02-20

Dog Breeds crossword puzzle
Across
  1. The Most Famous is Uga
  2. Lassie Lineage
  3. Sled Propeller
  4. Speed King
  5. Security Guard
  6. Deutschland Herder
  7. Peek-a-boo Hairdo
Down
  1. Firehouse Favorite
  2. Pampered Pooch
  3. Yellow Go Getter
  4. Snoopy is One
  5. Ravishing Redhead
  6. A Crocheted Blanket
  7. Sniffs out Bad Guys
  8. Gives Directions
  9. PA State Dog

16 Clues: Speed KingPA State DogSnoopy is OnePampered PoochLassie LineageSled PropellerSecurity GuardYellow Go GetterGives DirectionsRavishing RedheadPeek-a-boo HairdoFirehouse FavoriteDeutschland HerderA Crocheted BlanketSniffs out Bad GuysThe Most Famous is Uga

Credit Card 2023-11-02

Credit Card crossword puzzle
Across
  1. - Common use
  2. - Cost of borrowing
  3. - Cost of purchases
  4. - Financial institution
  5. - Spending cap
  6. - Card material
  7. - Buying goods or services
  8. - Where charges are recorded
Down
  1. - Use now, pay later
  2. - Key benefit
  3. - First credit card company
  4. - Financial trust
  5. - Money owed
  6. - Protection against theft
  7. - Card provider
  8. - Transaction method

16 Clues: - Common use- Money owed- Key benefit- Spending cap- Card provider- Card material- Financial trust- Cost of borrowing- Cost of purchases- Use now, pay later- Transaction method- Financial institution- Protection against theft- Buying goods or services- First credit card company- Where charges are recorded

Gunsss 2024-11-19

Gunsss crossword puzzle
Across
  1. A gun
  2. Lawmaking process
  3. US lawmakers
  4. Fundamental laws
  5. Safety measures
  6. Change to a law
  7. Interest group
Down
  1. Someone who lives through hardship
  2. Weapons
  3. To control something
  4. Causing disagreement
  5. A problem or topic
  6. Citizen army
  7. Long firearm
  8. control Regulation of firearms
  9. Tool for defense

16 Clues: A gunWeaponsUS lawmakersCitizen armyLong firearmInterest groupSafety measuresChange to a lawFundamental lawsTool for defenseLawmaking processA problem or topicTo control somethingCausing disagreementSomeone who lives through hardshipcontrol Regulation of firearms

UNICEF Crossword 2024-04-11

UNICEF Crossword crossword puzzle
Across
  1. An eradicated disease
  2. Wishful expectation
  3. Misuse of power
  4. Look after
  5. School
  6. For every child
  7. Good to be together
  8. No one left behind
Down
  1. To defend
  2. Keeps out the storm
  3. Kind heart's reward
  4. Security
  5. Make a difference
  6. Should be a priority
  7. Cheerful expression
  8. Future builders

16 Clues: SchoolSecurityTo defendLook afterMisuse of powerFor every childFuture buildersMake a differenceNo one left behindKeeps out the stormWishful expectationKind heart's rewardCheerful expressionGood to be togetherShould be a priorityAn eradicated disease

Cyberbullying, Miss Audrey's Class 2022-11-03

Cyberbullying, Miss Audrey's Class crossword puzzle
Across
  1. a telephone service providing help
  2. relating to computers
Down
  1. used to prove something is true or not true
  2. a person who stands up for something
  3. mean and hurtful behavior

5 Clues: relating to computersmean and hurtful behaviora telephone service providing helpa person who stands up for somethingused to prove something is true or not true

Crossword 2019-07-17

Crossword crossword puzzle
Across
  1. Internet Fraud
  2. Violation of SLA or Security rule
  3. A common term used both in hospitals and in IT.
  4. Combination of practices, and tools that increases ability to deliver services at high velocity.
  5. Process that ensures and confirms a user’s identity
  6. Title of current Week.
  7. A network security device that monitors traffic to or from your network
Down
  1. A set period of time during which specific work has to be completed.
  2. What does 'FI' stands for in WI-FI.
  3. This you should never share with anyone.
  4. A task or process should always be________.
  5. A collection of rules that determine the way of communication between computers.
  6. An Agile way to manage a project.
  7. The 'R' in RIO stands for

14 Clues: Internet FraudTitle of current Week.The 'R' in RIO stands forViolation of SLA or Security ruleAn Agile way to manage a project.What does 'FI' stands for in WI-FI.This you should never share with anyone.A task or process should always be________.A common term used both in hospitals and in IT.Process that ensures and confirms a user’s identity...

Sambas Riot 1999 2020-11-23

Sambas Riot 1999 crossword puzzle
Across
  1. concealed
  2. symbol
  3. approach
  4. dayaks
  5. of war
  6. brought
  7. run away
Down
  1. conflict occurred in Sambas Town
  2. in sambas
  3. law
  4. that

11 Clues: lawthatsymboldayaksof warbroughtapproachrun awayconcealedin sambasconflict occurred in Sambas Town

Only specific people can solve this 2025-11-03

Only specific people can solve this crossword puzzle
Across
  1. Security/Sniper
  2. Pilot Apprentice
  3. Technician/Pilot
  4. Chef
  5. Gardener
  6. Gunsmith Apprentice
Down
  1. Leader/Boss
  2. Chef's Apprentice
  3. Soldier
  4. Gunsmith
  5. Gunsmith Apprentice x2

11 Clues: ChefSoldierGunsmithGardenerLeader/BossSecurity/SniperPilot ApprenticeTechnician/PilotChef's ApprenticeGunsmith ApprenticeGunsmith Apprentice x2

May 2021 Newsletter Crossword Puzzle 2021-05-07

May 2021 Newsletter Crossword Puzzle crossword puzzle
Across
  1. The name of the Wi-Fi network that is being set up.
  2. An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
  3. Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
  4. An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
  1. Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
  2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
  3. Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
  4. The speed at which data is transmitted and received among the devices on your wireless network.
  5. Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
  6. A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.

10 Clues: The name of the Wi-Fi network that is being set up.The speed at which data is transmitted and received among the devices on your wireless network.A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data....

It words 2024-12-17

It words crossword puzzle
Across
  1. The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
  2. An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
  3. The maximum rate of data transfer across a given path, measured in bits per second (bps).
  4. A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
  5. A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
  1. The practice of dividing a network into two or more smaller networks, improving performance and security.
  2. A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
  3. The creation of a virtual version of something, such as a server, a storage device, or network resources.
  4. The delay before a transfer of data begins following an instruction for its transfer.

10 Clues: The delay before a transfer of data begins following an instruction for its transfer.The maximum rate of data transfer across a given path, measured in bits per second (bps).The practice of dividing a network into two or more smaller networks, improving performance and security....

cc 2025-02-18

cc crossword puzzle
Across
  1. A security update that must be applied immediately
  2. If you observe a security breach, where should you report it ?
  3. A security principle that ensures data is available when needed
Down
  1. A security principle that ensures that data is not accessed by unauthorized parties
  2. A digital wall that prevents unauthorized users from accessing a network
  3. A lock that needs a fingerprint

6 Clues: A lock that needs a fingerprintA security update that must be applied immediatelyIf you observe a security breach, where should you report it ?A security principle that ensures data is available when neededA digital wall that prevents unauthorized users from accessing a network...

HIPAA Compliance 2023-10-05

HIPAA Compliance crossword puzzle
Across
  1. Health _________ ________ ________ ________
  2. Ensuring the security, privacy, and protection of patients' healthcare data
  3. Text messages are not ___________ and should never be used to discuss PHI
  4. __________ of _________ __________
  5. The act of adhering to federal healthcare laws and regulations
Down
  1. MEDICAL RECORDS RELEASE FORM This must be signed by the patient in order to obtain a copy of their medical records
  2. Never share your _________ with anyone
  3. OF CONDUCT
  4. _______ is your right to decide when, how, and to what extent others may access your health information
  5. An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information
  6. The digital version of medical records
  7. _________ Health ____________

12 Clues: OF CONDUCT_________ Health ______________________ of _________ __________Never share your _________ with anyoneThe digital version of medical recordsHealth _________ ________ ________ ________The act of adhering to federal healthcare laws and regulationsText messages are not ___________ and should never be used to discuss PHI...

A Dog Day Afternoon 2019-02-20

A Dog Day Afternoon crossword puzzle
Across
  1. A Crocheted Blanket
  2. Pampered Pooch
  3. Gives Directions
  4. PA State Dog
  5. Sniffs out Bad Guys
  6. Rescues Skiers
  7. The Most Famous is Uga
  8. Speed King
  9. Deutschland Herder
  10. Snoopy is One
Down
  1. Lassie Lineage
  2. Peek-a-boo Hairdo
  3. Short Legs Long Ears
  4. Mexican Mut
  5. Firehouse Favorite
  6. Yellow Go Getter
  7. Hot Dog Dog
  8. Sled Propeller
  9. Security Guard
  10. Ravishing Redhead

20 Clues: Speed KingMexican MutHot Dog DogPA State DogSnoopy is OneLassie LineagePampered PoochRescues SkiersSled PropellerSecurity GuardGives DirectionsYellow Go GetterPeek-a-boo HairdoRavishing RedheadFirehouse FavoriteDeutschland HerderA Crocheted BlanketSniffs out Bad GuysShort Legs Long EarsThe Most Famous is Uga

The London life 2015-11-11

The London life crossword puzzle
Across
  1. fähre
  2. square
  3. flight
  4. palace
  5. danger
  6. traffic
  7. youth
  8. fine
  9. loud
  10. train
  11. detective
  12. airport
  13. gate
  14. stand
  15. respect
  16. security
  17. keep
  18. pickpockets
  19. queen
  20. arrival
  21. famous
  22. safe
  23. throw
Down
  1. travel
  2. point
  3. departure
  4. bell
  5. plane
  6. escalator
  7. sights
  8. begin
  9. bus
  10. tower
  11. king
  12. mean
  13. fight
  14. ticket

37 Clues: busbellfineloudgatekeepkingmeansafefährepointplaneyouthtrainbeginstandtowerqueenfightthrowtravelsquareflightpalacedangersightsticketfamoustrafficairportrespectarrivalsecuritydepartureescalatordetectivepickpockets

En avion! 2023-03-16

En avion! crossword puzzle
Across
  1. subway station
  2. airport
  3. boarding gate
  4. flight
  5. train station
  6. check in luggage
  7. abroad (in another country)
  8. world
  9. bus stop
  10. flight attendant (male)
  11. people
  12. ticket counter
Down
  1. country
  2. flight attendant
  3. exit
  4. plane ticket
  5. customs
  6. arrival
  7. round-trip ticket
  8. to take off (plane)
  9. to land (plane)
  10. to go through security
  11. capital
  12. countryside
  13. departure

25 Clues: exitworldflightpeoplecountrycustomsairportarrivalcapitalbus stopdeparturecountrysideplane ticketboarding gatetrain stationsubway stationticket counterto land (plane)flight attendantcheck in luggageround-trip ticketto take off (plane)to go through securityflight attendant (male)abroad (in another country)

Group 7 2018-03-18

Group 7 crossword puzzle
Across
  1. 돈,화폐
  2. small,tiny
  3. 화해시키다,결말짓다,해결하다
  4. 눈에 띄는,두드러진
  5. safety,protection
  6. make worse
  7. 감소하다
  8. 두렵게 하여 비키게 하다,방해하다,단념하다
  9. copy,reproduction
Down
  1. 합의,일치
  2. 자발적인 행위,의지,의도
  3. 힘,정력,끈기
  4. 상상의,거짓의
  5. 사이에 끼다,사이에 있다,중재하다,간섭하다
  6. 얼룩이없는,아주 흠이없는
  7. skill,guile
  8. 싸움을 좋아하는,도전적인
  9. 시골의
  10. 비겁한,비열한,소심한
  11. group of five

20 Clues: 시골의돈,화폐감소하다합의,일치힘,정력,끈기상상의,거짓의small,tiny눈에 띄는,두드러진make worseskill,guile비겁한,비열한,소심한자발적인 행위,의지,의도얼룩이없는,아주 흠이없는싸움을 좋아하는,도전적인group of five화해시키다,결말짓다,해결하다safety,protectioncopy,reproduction사이에 끼다,사이에 있다,중재하다,간섭하다두렵게 하여 비키게 하다,방해하다,단념하다

3EMES JOBS CROSSWORD PUZZLE 2023-09-17

3EMES JOBS CROSSWORD PUZZLE crossword puzzle
Across
  1. marchand de poisson
  2. pharmacien
  3. keeper, commerçant
  4. grossiste
  5. couturière
  6. boulanger
  7. guard, agent de sécurité
  8. réparateur
  9. teinturier
  10. comptable
  11. traiteur
  12. sage-femme
  13. boucher
  14. chauffeur
Down
  1. kiné
  2. agent, agent immobilier
  3. officer, douanier
  4. chirurgien
  5. maire
  6. driver, chauffeur routier
  7. secouriste
  8. bijoutier
  9. peintre
  10. jardinier
  11. marin
  12. présentateur météo
  13. plombier
  14. attendant, hôtesse de l'air

28 Clues: kinémairemarinpeintrebouchertraiteurplombiergrossisteboulangerbijoutiercomptablejardinierchauffeurpharmacienchirurgiencouturièresecouristeréparateurteinturiersage-femmeofficer, douanierprésentateur météomarchand de poissonkeeper, commerçantagent, agent immobilierguard, agent de sécuritédriver, chauffeur routierattendant, hôtesse de l'air

Occupations and professions 2023-10-07

Occupations and professions crossword puzzle
Across
  1. Pemadam Kebakaran
  2. Dokter hewan
  3. Sales
  4. Tukang kebun
  5. Pemandu wisata
  6. Polisi
  7. Pengacara
  8. Petani
  9. Pekerja konstruksi
  10. Musisi
  11. Supir
  12. Perawat
  13. Petugas keamanan
  14. Petugas kebersihan
  15. Dokter
Down
  1. Pemain sepak bola
  2. Insinyur
  3. Tukang kayu
  4. Juru masak
  5. Guru
  6. Dokter gigi
  7. Resepsionis
  8. Astronot
  9. Arsitek
  10. Pramusaji
  11. Nelayan
  12. Tentara
  13. Kasir
  14. Penjahit
  15. Pilot

30 Clues: GuruSalesSupirKasirPilotPolisiPetaniMusisiDokterArsitekNelayanPerawatTentaraInsinyurAstronotPenjahitPengacaraPramusajiJuru masakTukang kayuDokter gigiResepsionisDokter hewanTukang kebunPemandu wisataPetugas keamananPemadam KebakaranPemain sepak bolaPekerja konstruksiPetugas kebersihan

Occupations and professions 2023-10-07

Occupations and professions crossword puzzle
Across
  1. Juru masak
  2. Tukang kebun
  3. Dokter
  4. Dokter gigi
  5. Astronot
  6. Nelayan
  7. Pilot
  8. Pramusaji
  9. Dokter hewan
  10. Pengacara
  11. Insinyur
  12. Arsitek
  13. Pemandu wisata
  14. Perawat
  15. Musisi
  16. Petani
  17. Pekerja konstruksi
  18. Tentara
Down
  1. Pemadam Kebakaran
  2. Pemain sepak bola
  3. Kasir
  4. Sales
  5. Petugas kebersihan
  6. Polisi
  7. Tukang kayu
  8. Penjahit
  9. Guru
  10. Petugas keamanan
  11. Resepsionis
  12. Supir

30 Clues: GuruKasirSalesPilotSupirDokterPolisiMusisiPetaniNelayanArsitekPerawatTentaraAstronotPenjahitInsinyurPramusajiPengacaraJuru masakDokter gigiTukang kayuResepsionisTukang kebunDokter hewanPemandu wisataPetugas keamananPemadam KebakaranPemain sepak bolaPetugas kebersihanPekerja konstruksi

Crossword History puzzle 2024-09-23

Crossword History puzzle crossword puzzle
Across
  1. Renaissance
  2. Land Boom
  3. Security
  4. Age
  5. movement
  6. Civil Liberties Union (ACLU)
  7. Tuesday
  8. Naval ConferenEqual Rights Amendmentual rights amendment (ERA)
  9. Tariff Act
  10. on margin
Down
  1. League (ADL)
  2. Industrial Recovery Act
  3. of Women Voters
  4. Adjustment Administration (AAA)
  5. of Industrial Organizations (CIO
  6. WagnerAct
  7. Dome Scandal
  8. Conservation Corps (CCC)
  9. Progress Administration (WPA)
  10. Jones Industrial Average

20 Clues: AgeTuesdaySecuritymovementLand BoomWagnerActon marginTariff ActRenaissanceLeague (ADL)Dome Scandalof Women VotersIndustrial Recovery ActConservation Corps (CCC)Jones Industrial AverageCivil Liberties Union (ACLU)Progress Administration (WPA)Adjustment Administration (AAA)of Industrial Organizations (CIO...

Applying for Jobs and Housing 2023-02-01

Applying for Jobs and Housing crossword puzzle
Across
  1. Federal and state aid for limited income
  2. Unable to work and has enough work credits
  3. Supplemental security income
  4. unable to work at least 12 months due to disability
  5. Prohibits discrimination against disabilities
Down
  1. Makes fair to person with proven need
  2. An individual who can do essential requirements
  3. Action requiring difficulty or expense
  4. For people 65 and older or listed disabilities
  5. Social security disability insurance
  6. Americans with Disabilities Act

11 Clues: Supplemental security incomeAmericans with Disabilities ActSocial security disability insuranceMakes fair to person with proven needAction requiring difficulty or expenseFederal and state aid for limited incomeUnable to work and has enough work creditsProhibits discrimination against disabilitiesFor people 65 and older or listed disabilities...

U03 CH4 Key Terms 2024-02-27

U03 CH4 Key Terms crossword puzzle
Across
  1. Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
  2. traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
  3. (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
  4. (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
  5. (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
  6. conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
  7. methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
  1. (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
  2. (4,3,4) Passwords, passphrases, or PINs are all examples
  3. (4,3,4) Smart cards and security key fobs are both examples
  4. (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  5. controls what a user can and cannot do on the network after successful authentication.
  6. (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
  7. Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
  8. replaces data with authentic looking values to apply anonymity to the data records.

15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples(4,3,4) Smart cards and security key fobs are both examplesreplaces data with authentic looking values to apply anonymity to the data records.controls what a user can and cannot do on the network after successful authentication....

Supranationalism 2021-01-04

Supranationalism crossword puzzle
Across
  1. mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
  2. promotes unity and solidarity and spurs economic development in Africa
  3. organization governing common economic, social, and security issues in its European member states
  4. trading bloc between the countries of North America
  5. military alliance of countries in Western Europe and North America
Down
  1. high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
  2. integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
  3. global international organization that maintains peace and security and promotes economic and social development
  4. maintains peace and security and accelerates economic growth in Southeast Asia

9 Clues: trading bloc between the countries of North Americamilitary alliance of countries in Western Europe and North Americapromotes unity and solidarity and spurs economic development in Africamaintains peace and security and accelerates economic growth in Southeast Asia...

SID 3b Hass im Netz 2021-04-30

SID  3b Hass im Netz crossword puzzle
Across
  1. Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
  2. Unwahre Nachrichten/Informationen im Internet
  3. Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
Down
  1. Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
  2. Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
  3. Man sollte wegen ... -accounts im Internet vorsichtig sein.
  4. erfundene „Tatsachen“.

7 Clues: erfundene „Tatsachen“.Unwahre Nachrichten/Informationen im InternetMan sollte wegen ... -accounts im Internet vorsichtig sein.Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der......

Global Unrest & Conflict 2025-09-13

Global Unrest & Conflict crossword puzzle
Across
  1. Volunteer group that helped Ukraine during cyberattacks
  2. Middle Eastern region central to ongoing conflict with Israel
  3. One of the superpowers in the Cold War
  4. Type of warfare heavily used in Russia–Ukraine conflict
Down
  1. Peninsula annexed by Russia in 2014
  2. Indian state affected by ethnic unrest in 2023
  3. City claimed as the capital by both Israel and Palestine

7 Clues: Peninsula annexed by Russia in 2014One of the superpowers in the Cold WarIndian state affected by ethnic unrest in 2023Volunteer group that helped Ukraine during cyberattacksType of warfare heavily used in Russia–Ukraine conflictCity claimed as the capital by both Israel and PalestineMiddle Eastern region central to ongoing conflict with Israel

The London life 2015-11-11

The London life crossword puzzle
Across
  1. loud
  2. ticket
  3. traffic
  4. flight
  5. escalator
  6. departure
  7. security
  8. pickpockets
  9. palace
  10. plane
  11. fine
  12. danger
  13. gate
  14. mean
  15. safe
  16. begin
  17. point
  18. stand
  19. arrival
Down
  1. square
  2. throw
  3. detective
  4. train
  5. queen
  6. respect
  7. travel
  8. tower
  9. youth
  10. airport
  11. bell
  12. fight
  13. bus
  14. famous
  15. keep
  16. fähre
  17. king

36 Clues: busloudfinebellgatemeankeepsafekingthrowtrainqueentoweryouthplanefightfährebeginpointstandsquareticketflighttravelpalacedangerfamoustrafficrespectairportarrivalsecuritydetectiveescalatordeparturepickpockets

DO YOU KNOW NWACC? 2017-04-27

DO YOU KNOW NWACC? crossword puzzle
Across
  1. 1989 accredited by
  2. BH street address
  3. 1st NWACC president
  4. Inspire _____
  5. 1st DIR NWACC Homeland Security
  6. Place for Kudos
  7. Shipping/Receiving address
  8. Adult Ed Bldg
Down
  1. NWACC mascot
  2. Springdale hub
  3. school without _____
  4. empower _____
  5. Shewmaker Global CTR
  6. BOT chair
  7. Current president
  8. New CTR Food Study
  9. Minimart in SC
  10. Strengthen _____
  11. August 21, 2017
  12. Year of first NWACC hires 19--

20 Clues: BOT chairNWACC mascotempower _____Inspire _____Adult Ed BldgSpringdale hubMinimart in SCAugust 21, 2017Place for KudosStrengthen _____BH street addressCurrent president1989 accredited byNew CTR Food Study1st NWACC presidentschool without _____Shewmaker Global CTRShipping/Receiving addressYear of first NWACC hires 19--1st DIR NWACC Homeland Security

P.J. MacLayne 2017-11-19

P.J. MacLayne crossword puzzle
Across
  1. Dog
  2. neutral territory
  3. enemy pack
  4. The ____ Flamingo
  5. red convertible
  6. security chief
  7. found in empty book
  8. Harmony's last name
  9. blue Pinto
  10. number of steps to the library
  11. Dot's transportation
  12. Gavin's pack
Down
  1. wolves kryptonite
  2. chief librarian
  3. The Marquesa's _______
  4. gentleman jewel thief
  5. Harmony's landlord
  6. police detective
  7. Where Tasha trained
  8. type of home
  9. FBI agent
  10. Florida businessman

22 Clues: DogFBI agentenemy packblue Pintotype of homeGavin's packsecurity chiefchief librarianred convertiblepolice detectivewolves kryptoniteneutral territoryThe ____ FlamingoHarmony's landlordWhere Tasha trainedfound in empty bookHarmony's last nameFlorida businessmanDot's transportationgentleman jewel thiefThe Marquesa's _______...

Dog Breeds 2019-02-20

Dog Breeds crossword puzzle
Across
  1. Mexican Mut
  2. Security Guard
  3. A Crocheted Blanket
  4. Deutschland Herder
  5. Speed King
  6. Firehouse Favorite
  7. Sniffs out Bad Guys
  8. Sled Propeller
  9. Peek-a-boo Hairdo
  10. Gives Directions
  11. Ravishing Redhead
  12. Hot Dog Dog
Down
  1. Rescues Skiers
  2. Yellow Go Getter
  3. PA State Dog
  4. The Most Famous is Uga
  5. Short Legs Long Ears
  6. Snoopy is One
  7. Pampered Pooch
  8. Lassie Lineage

20 Clues: Speed KingMexican MutHot Dog DogPA State DogSnoopy is OneRescues SkiersSecurity GuardSled PropellerPampered PoochLassie LineageYellow Go GetterGives DirectionsPeek-a-boo HairdoRavishing RedheadDeutschland HerderFirehouse FavoriteA Crocheted BlanketSniffs out Bad GuysShort Legs Long EarsThe Most Famous is Uga

OS types 2024-04-30

OS types crossword puzzle
Across
  1. turvalisus
  2. arendama
  3. ennustus
  4. määrama (mälu, ressurssi)
  5. arve
  6. sisend
  7. viivitus
  8. väljund
  9. konto, arve
  10. tabeliprogramm, arvutustabel
  11. pakk (töötlusüksuste (nt töödete) kogum)
  12. arvutama
  13. eemaldama
  14. talletama
  15. salasõna, parool
  16. liides
Down
  1. majanduslik, tulus
  2. laiendus, pikendus
  3. tuum
  4. luba
  5. korras hoidma, hooldama, teenindama
  6. lubama, võimaldama
  7. multitegumtöö
  8. saadaval, kättesadav
  9. looma
  10. vahnd, võimalus, funktsioon
  11. ligipääs
  12. suurarvuti

28 Clues: tuumlubaarveloomasisendliidesväljundarendamaennustusviivitusligipääsarvutamaeemaldamatalletamaturvalisussuurarvutikonto, arvemultitegumtöösalasõna, paroolmajanduslik, tuluslaiendus, pikenduslubama, võimaldamasaadaval, kättesadavmäärama (mälu, ressurssi)vahnd, võimalus, funktsioontabeliprogramm, arvutustabelkorras hoidma, hooldama, teenindama...

Robo Cap. 2 Vocabulario 2023-02-20

Robo Cap. 2 Vocabulario crossword puzzle
Across
  1. to shout, yell, shriek
  2. drives
  3. nickname for Costa Ricans
  4. security
  5. earthquake
  6. gardener
  7. to explain
  8. Pure life
  9. capital de Costa Rica
  10. rivers
  11. building
  12. doctors
  13. bamboo
  14. they get off (the plane)
  15. estate,ranch
Down
  1. toward
  2. chauffeur
  3. dictator
  4. trees
  5. seismic activity
  6. golf cart
  7. shouts, yells, shrieks
  8. to get off a mode of transportation

23 Clues: treestowarddrivesriversbamboodoctorsdictatorsecuritygardenerbuildingchauffeurgolf cartPure lifeearthquaketo explainestate,ranchseismic activityto shout, yell, shriekshouts, yells, shriekscapital de Costa Ricathey get off (the plane)nickname for Costa Ricansto get off a mode of transportation

Dog Breeds 2023-03-25

Dog Breeds crossword puzzle
Across
  1. He’s a Fighter
  2. Ears are longer then legs
  3. Georgia's Uga
  4. Firehouse Favorite
  5. Gives Directions
  6. Lassie Lineage
  7. Little Rascal Petey
  8. PA State Dog
  9. Sled Propeller
  10. Ravishing Redhead
Down
  1. Peek-a-boo Hairdo
  2. Deutschland Herder
  3. Yellow Go Getter
  4. Snoopy is One
  5. The Crime Dog
  6. Security Guard
  7. Has an ugly Mug
  8. Speed King
  9. A Footlong Hot Dog
  10. Pampered Pooch

20 Clues: Speed KingPA State DogSnoopy is OneGeorgia's UgaThe Crime DogHe’s a FighterSecurity GuardLassie LineagePampered PoochSled PropellerHas an ugly MugYellow Go GetterGives DirectionsPeek-a-boo HairdoRavishing RedheadDeutschland HerderFirehouse FavoriteA Footlong Hot DogLittle Rascal PeteyEars are longer then legs

Travel vocab with accents Sp 2 2021-05-12

Travel vocab with accents Sp 2 crossword puzzle
Across
  1. luggage
  2. layover
  3. first class
  4. coach
  5. passport
  6. passenger
  7. trip, travel
  8. event ticket
  9. on time
  10. delayed
  11. suitcase
  12. window
  13. security agent
  14. in the airport
  15. customs
Down
  1. International airport
  2. controller
  3. carry-on luggage
  4. seatbelt
  5. connection
  6. train car
  7. second class
  8. aisle
  9. ticket (2)
  10. departure
  11. seat
  12. arrival
  13. waiting room
  14. ticket (1)

29 Clues: seatcoachaislewindowluggagelayoveron timedelayedarrivalcustomsseatbeltpassportsuitcasetrain carpassengerdeparturecontrollerconnectionticket (2)ticket (1)first classsecond classtrip, travelevent ticketwaiting roomsecurity agentin the airportcarry-on luggageInternational airport

HATCHET VOCABULARY 2024-03-13

HATCHET VOCABULARY crossword puzzle
Across
  1. hence indistinct
  2. amount
  3. amount of fuel entering an engine
  4. caught on fire
  5. rounded hills
  6. travel on water and land
  7. engrossing completely
  8. height
  9. very careful way
Down
  1. burning sulfur in odor
  2. without knowledge
  3. make steady
  4. lessen
  5. violent twisting
  6. sorrowful way
  7. hindquarters
  8. shrinking back involuntarily
  9. crime or attack
  10. rejoice greatly
  11. existing in the earlies time

20 Clues: lessenamountheightmake steadyhindquarterssorrowful wayrounded hillscaught on firecrime or attackrejoice greatlyviolent twistinghence indistinctvery careful waywithout knowledgeengrossing completelyburning sulfur in odortravel on water and landshrinking back involuntarilyexisting in the earlies timeamount of fuel entering an engine

Crime and safety 2025-07-10

Crime and safety crossword puzzle
Across
  1. – xavfsizlik
  2. – xodim (politsiya yoki rasmiy)
  3. – adolat
  4. – xavf
  5. – politsiya
  6. – guvoh
  7. – xavfsizlik (umumiy)
  8. – xabar bermoq / hisobot
  9. – zo‘ravonlik
  10. – qoidalar
  11. – o‘g‘irlik
  12. – himoya qilmoq
  13. – turmada (qamoqda)
  14. – talonchilik
  15. – jamoa / aholi
Down
  1. – favqulodda holat
  2. – oldini olish
  3. – jarima
  4. – sud
  5. – qamoqxona
  6. – jazo
  7. – qonun
  8. – gumon qilinuvchi
  9. – jinoyat
  10. – kuzatuv kamerasi
  11. – hibsga olish
  12. – qo‘riqchi
  13. – qonuniy
  14. – tahdid
  15. – jabrlanuvchi / qurbon

30 Clues: – sud– xavf– jazo– qonun– guvoh– jarima– adolat– tahdid– jinoyat– qonuniy– qoidalar– qamoqxona– politsiya– qo‘riqchi– o‘g‘irlik– xavfsizlik– zo‘ravonlik– talonchilik– oldini olish– hibsga olish– himoya qilmoq– jamoa / aholi– favqulodda holat– gumon qilinuvchi– kuzatuv kamerasi– turmada (qamoqda)– xavfsizlik (umumiy)– jabrlanuvchi / qurbon...

TẬP SỰ - DAY 6 - POSITIONS & DEPARTMENTS 2022-07-28

TẬP SỰ - DAY 6 - POSITIONS & DEPARTMENTS crossword puzzle
Across
  1. phòng nhân sự
  2. phòng kho
  3. phòng an ninh
  4. người giám sát
  5. phó chủ tịch
  6. phòng kế toán
  7. thư ký
  8. quản lý
  9. phòng kế hoạch
  10. phòng tiếp thị
Down
  1. phòng bảo trì
  2. cổ đông
  3. lễ tân
  4. phòng quản lý chất lượng
  5. phòng kinh doanh
  6. trợ lý
  7. giám đốc
  8. phòng sản xuất
  9. phòng mua hàng
  10. kế toán

20 Clues: lễ tântrợ lýthư kýcổ đôngquản lýkế toángiám đốcphòng khophó chủ tịchphòng bảo trìphòng nhân sựphòng an ninhphòng kế toánphòng sản xuấtngười giám sátphòng mua hàngphòng kế hoạchphòng tiếp thịphòng kinh doanhphòng quản lý chất lượng

Autumn 2022-12-14

Autumn crossword puzzle
Across
  1. Expiriment 626
  2. Old Blues Owner
  3. Barbie
  4. Cronk
  5. Mae
  6. the family hairdresser
  7. lil Rickey
  8. Sister in heart
  9. Master Hunter
  10. The Senior
  11. married in
  12. the Jr
  13. Hulks big brother
  14. Same as her Gramma
Down
  1. Lee
  2. Pond
  3. The Rose
  4. MeatHead
  5. Mooska
  6. Younger Sister
  7. Dory
  8. Bob
  9. Older Sister
  10. Lil Hulk
  11. Presidential Security
  12. Spoke "Nataleese"

26 Clues: LeeBobMaePondDoryCronkMooskaBarbiethe JrThe RoseMeatHeadLil Hulklil RickeyThe Seniormarried inOlder SisterMaster HunterExpiriment 626Younger SisterOld Blues OwnerSister in heartSpoke "Nataleese"Hulks big brotherSame as her GrammaPresidential Securitythe family hairdresser

MMHC 2025-08-30

MMHC crossword puzzle
Across
  1. Beland & Ames
  2. Building for sewing, cooking,
  3. Coffee Break place
  4. Not so marvelous
  5. Drove a Porche
  6. Claire
  7. ____ Roy
  8. Fig or Greg
  9. Next to Annex
  10. CPS Secretary
  11. MSW Sykes
Down
  1. Blaine
  2. Fund
  3. Tall Mike
  4. Restrains
  5. Transpotation Boss
  6. Old Lady Social Worker
  7. Thomss
  8. Health Care Unit
  9. Joan on Quine
  10. Head Social Worker
  11. Blanche
  12. Eddie&Eddie

23 Clues: FundBlaineThomssClaireBlanche____ RoyTall MikeRestrainsMSW SykesFig or GregEddie&EddieBeland & AmesJoan on QuineNext to AnnexCPS SecretaryDrove a PorcheHealth Care UnitNot so marvelousTranspotation BossCoffee Break placeHead Social WorkerOld Lady Social WorkerBuilding for sewing, cooking,

King of Tokyo Crossword 2022-08-15

King of Tokyo Crossword crossword puzzle
Across
  1. The oldest King of Tokyo robot that is still around today
  2. Which monster is an Egyptian God?
  3. This monster's name rhymes
  4. Which monster is based on King Kong?
  5. This monster was the same colour and food type as the promo monster 'Orange Death'
  6. The monster from the latest Monster Pack
Down
  1. Which monster is based on Godzilla?
  2. Who replaced 'Kraken' in the 2nd edition game?
  3. This monster was in a famous 1933 movie
  4. This monster was a 'Target' exclusive
  5. Which monster was in the Power Up expansion?
  6. The name of the game all of these monsters belong to
  7. The monster who replaced 'Cyber Bunny' in the 2nd edition game
  8. Which monster is first alphabetically?
  9. The monster who 'Kraken' from the original game was based on

15 Clues: This monster's name rhymesWhich monster is an Egyptian God?Which monster is based on Godzilla?Which monster is based on King Kong?This monster was a 'Target' exclusiveWhich monster is first alphabetically?This monster was in a famous 1933 movieThe monster from the latest Monster PackWhich monster was in the Power Up expansion?...

Crime vocabulary 2017-03-13

Crime vocabulary crossword puzzle
Across
  1. / A type of punishment whereby the offender has to pay money
  2. / To intentionally set fire to property
  3. / To attack someone
  4. / Repeatedly watching or following another person without them knowing
  5. / Criminal activity carried out online
  6. / Dishonest actions by those who hold power or authority
  7. / The consequences of committing a crime
  8. / Taking or receiving something to gain something more
Down
  1. / To betray one's own country
  2. / The action of taking someone else's property from them, without their consent
  3. / Assault or threatening of a partner, spouse or family member
  4. / A criminal offense of using threats or intimidation to make a gain
  5. / Treatment that is considered fair and equal
  6. / To fake or copy an important piece of document
  7. / A place where people are held for a crime they have committed

15 Clues: / To attack someone/ To betray one's own country/ Criminal activity carried out online/ To intentionally set fire to property/ The consequences of committing a crime/ Treatment that is considered fair and equal/ To fake or copy an important piece of document/ Taking or receiving something to gain something more...

CAB 2021-05-04

CAB crossword puzzle
Across
  1. A mean moment is what kind of event?
  2. By the age of 25 , 1/4 who have bullied will spend time where?
  3. The what of power is unequal when it is bullying?
  4. what kind of bullying is online?
  5. what is the C in ABCD of bullying?
  6. excluding, spreading rumors is what king of bullying?
  7. An action that does not happen regularly is a mean what?
Down
  1. The D in ABCD of bullying is what?
  2. Name calling, threatening is what type of bullying?
  3. teasing is when everyone is having what?
  4. punching, kicking is what type of bullying?
  5. what is repeatitive, aggressive unwanted behavior?
  6. What is the A in ABCD of bullying?
  7. There's a solution to the problem..
  8. when everyone is having fun it is?

15 Clues: what kind of bullying is online?The D in ABCD of bullying is what?What is the A in ABCD of bullying?when everyone is having fun it is?what is the C in ABCD of bullying?There's a solution to the problem..A mean moment is what kind of event?teasing is when everyone is having what?punching, kicking is what type of bullying?...

Tech terms 2019-08-23

Tech terms crossword puzzle
Across
  1. A method of giving a false appearances of a helpful program when in reality it is a virus
  2. A physical device and anything attached to the physical computer
  3. Permeant storage inside of the computer
  4. A type of zip file
  5. A picture that jumps you to a new document
  6. Programs you add to the existing comp
  7. Bad software made to change settings without permission
Down
  1. The address of your tech assigned through the roughter
  2. The max amount of data transfer
  3. Joint photographic expert
  4. Cyber ethics, unwritten rules of the internet
  5. Graphic interface format
  6. A graphic on screen interface that represents a program
  7. A function used on twitter and other services that signs a post word used to sort post
  8. Allows you to send and receive over the telephone lines

15 Clues: A type of zip fileGraphic interface formatJoint photographic expertThe max amount of data transferPrograms you add to the existing compPermeant storage inside of the computerA picture that jumps you to a new documentCyber ethics, unwritten rules of the internetThe address of your tech assigned through the roughter...

Cyber Month Crossword Puzzle 2024-08-26

Cyber Month Crossword Puzzle crossword puzzle
Across
  1. The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
  2. Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
  3. An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
  4. Process of determining whether someone or something is who or what they say they are.
  5. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
  6. A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
  1. Characters used to verify identity, usually to gain access to an account, website, or system. For more information
  2. Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
  3. Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
  4. The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  5. An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
  6. An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
  7. Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
  8. A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.

14 Clues: Process of determining whether someone or something is who or what they say they are.A type of malicious software designed to block access to a computer system or data until a sum of money is paid.Characters used to verify identity, usually to gain access to an account, website, or system. For more information...

CMPC Puzzle 2013-11-25

CMPC Puzzle crossword puzzle
Across
  1. The abbreviation, CMC , stands for Classified Matter __________.
  2. Classification level must be marked on the __________ and bottom of all pages of a classified document.
  3. Cover sheets are required on a document when __________ from a GSA-approved security container.
  4. The __________ is responsible for applying appropriate classification markings on a printed e-mail message.
  5. A classified working paper must be finalized or __________ after a 180 day retention period.
  6. You must have a Q-Clearance and assigned authorities to review classified matter with a _________ caveat.
  7. Using an inner and outer envelope to transmit a classified document is considered __________ __________. (2 words)
  8. Individual responsible for reviewing a document prior to dissemination outside the laboratory is called a __________ classifier.
  9. A classified __________ receipt must be used when mailing/transferring accountable and secret information outside the Laboratory.
  10. Classifier information for parts is maintained on the __________.
  11. In addition to proper clearance, sigma authorities, and required training, what does an individual require for accessing/view classified matter? (3 words, no spaces).
  12. Classified mail must be delivered to a primary/alternate CMC or other __________ individual at a designated classified mail stop.
  13. FedEx service cannot be used on __________ or day before a holiday.
  14. Addresses for recipients of classified matter shipped outside the laboratory must be verified by accessing the Mail __________ Directory.
  15. Workers must obtain originator approval before reproducing classified matter marked with ORCON, Sigma 14, or __________ caveats. (1 word+number – no space)
  16. You should never leave a security container _____.
  17. __________ identify special handling instructions and dissemination requirements.
  18. The only form you are allowed to write down the combination to a security container is the SF700 __________. (1 word+number – no space)
  19. Top Secret, Secret, and Confidential are classification __________.
Down
  1. The retention period for the SF70 is __________ months past the last date of entry.
  2. Protection methods used for classified matter are referred to as physical, visual, and __________ protection.
  3. All accountable matter must be assigned a __________ identifier, such as a document number, barcode, or serial number.
  4. Receipts must be retained for 2 years for Secret and __________ matter.
  5. RD, FRD, and NSI are abbreviations for classification __________.
  6. Shredders to be used for destruction of classified matter must be __________ before destroying classified matter.
  7. Secret level documents can be sent outside the laboratory using __________ mail or FedEx.
  8. Highest level and category of information and “L” cleared worker can access. __________ (abbreviation)
  9. The caveat ORCON identifies what type of classified matter? (2 words, no space)
  10. When do you report a security event or incident?
  11. You get approval of the destruction method from __________ when preparing to destroy classified parts. (1 word+number – no space)
  12. What category of classified document does not require a category admonishment marking? __________ (abbreviation)
  13. If a __________ copier has an image overwrite security feature and is clearly marked, you do not need to power down the machine for 30 seconds.
  14. All classified matter must be __________ and brought up to current marking standards when released from LANL or a multi-site work group.
  15. __________ copiers are cleared by running three blank pages using same process for copying.
  16. __________ are not a type of classified matter.

35 Clues: __________ are not a type of classified matter.When do you report a security event or incident?You should never leave a security container _____.The abbreviation, CMC , stands for Classified Matter __________.RD, FRD, and NSI are abbreviations for classification __________.Classifier information for parts is maintained on the __________....

Imagined Universes Exploration 2022-11-30

Imagined Universes Exploration crossword puzzle
Across
  1. green.
  2. .....
  3. release
  4. not Feng Shui.
  5. where everything is perfect.
  6. Marvel.
  7. impartial
  8. what we're doing.
Down
  1. somewhat united.
  2. once upon many times.
  3. intentional
  4. it's enlightening.
  5. believed to exist or be so.
  6. free from danger.
  7. we mean authentic, not powerful.
  8. fam!
  9. related to fingers.
  10. addictive song for some people.

18 Clues: fam!.....green.releaseMarvel.impartialintentionalnot Feng Shui.somewhat united.free from danger.what we're doing.it's enlightening.related to fingers.once upon many times.believed to exist or be so.where everything is perfect.addictive song for some people.we mean authentic, not powerful.

Hollywood Bowl 2023-07-28

Hollywood Bowl crossword puzzle
Across
  1. Ops Boss
  2. The bowl sister venue
  3. P90 Cook
  4. Who can get me a wheelchair?
  5. Before Dreima
  6. Before Angelina
  7. Before "X" Gate
  8. 91 year old conductor
  9. Graphic Designer ops
Down
  1. Human Resources
  2. Venezuelan LA Phil Conductor
  3. Ex PAAS Ops
  4. Ops Magician
  5. Burgundy Uniform
  6. House Manager
  7. Russian Ops
  8. Bowl Security
  9. Boston P90

18 Clues: Ops BossP90 CookBoston P90Ex PAAS OpsRussian OpsOps MagicianBefore DreimaHouse ManagerBowl SecurityHuman ResourcesBefore AngelinaBefore "X" GateBurgundy UniformGraphic Designer opsThe bowl sister venue91 year old conductorVenezuelan LA Phil ConductorWho can get me a wheelchair?

Ashley and Jen 2024-12-08

Ashley and Jen crossword puzzle
Across
  1. anniversary month
  2. your hangout
  3. I love you time
  4. month we met f2f
  5. artsy girl
  6. favorite boy
  7. kitty comfort
  8. crazy kitty
  9. not jens favorite
  10. Ms. Independence
  11. home security system
Down
  1. furry Buddha
  2. your birth day date
  3. where we met
  4. furry favorite boy
  5. our favorite flowers
  6. your happy place

17 Clues: artsy girlcrazy kittyfurry Buddhayour hangoutwhere we metfavorite boykitty comfortI love you timemonth we met f2fyour happy placeMs. Independenceanniversary monthnot jens favoritefurry favorite boyyour birth day dateour favorite flowershome security system

Crossword 2023-07-19

Crossword crossword puzzle
Across
  1. Insurance which provides protection to farmer
  2. Supervises the functioning of insurance business in India
Down
  1. An insurance company providing business and cyber insurance
  2. An amount to be paid for a contract of insurance
  3. A type of policy offered under property insurance
  4. A type of health insurance

6 Clues: A type of health insuranceInsurance which provides protection to farmerAn amount to be paid for a contract of insuranceA type of policy offered under property insuranceSupervises the functioning of insurance business in IndiaAn insurance company providing business and cyber insurance

Types of bulling 2022-10-24

Types of bulling crossword puzzle
Across
  1. harassment is to touch someone inappropriate to make them fell uncomfortable
  2. bullying is to hurt someone intentionally
  3. pressure is to force people to do some thing even if they don’t want to
  4. when someone give off suicidal signs
Down
  1. bulling it to tease someone
  2. making to make a decision to do good
  3. bulling is to make fun of someone online

7 Clues: bulling it to tease someonemaking to make a decision to do goodwhen someone give off suicidal signsbulling is to make fun of someone onlinebullying is to hurt someone intentionallypressure is to force people to do some thing even if they don’t want toharassment is to touch someone inappropriate to make them fell uncomfortable

Teachers at School 2025-04-08

Teachers at School crossword puzzle
Across
  1. ELPT
  2. Third grade teacher
  3. Language teacher in room 208
  4. Lunchroom worker
  5. Office clerk
  6. Interventionist
  7. Kindergarten teacher
Down
  1. Clinician
  2. Teaches middle school social studies
  3. Teaches driver's Ed
  4. Security guard
  5. PK SECA
  6. Cheer Coach and SECA
  7. Speech therapist
  8. Middle school science teacher
  9. Art teacher
  10. Common sub at LaSalle

17 Clues: ELPTPK SECAClinicianArt teacherOffice clerkSecurity guardInterventionistSpeech therapistLunchroom workerTeaches driver's EdThird grade teacherCheer Coach and SECAKindergarten teacherCommon sub at LaSalleLanguage teacher in room 208Middle school science teacherTeaches middle school social studies

Computer Language 2025-06-01

Computer Language crossword puzzle
Across
  1. Data storage unit
  2. Internet safety term
  3. Computer type
  4. Computer input device
  5. Computer security term
  6. Computer operating system
  7. Computer graphics term
  8. Computer coding term
  9. Computer software
  10. Computer hardware part
Down
  1. Computer term
  2. Computer input device
  3. Webpage address
  4. Computer software term
  5. Programming language
  6. Computer graphics term
  7. Computer programming term
  8. Computer network term
  9. Computer network
  10. Computer coding term

20 Clues: Computer termComputer typeWebpage addressComputer networkData storage unitComputer softwareInternet safety termProgramming languageComputer coding termComputer coding termComputer input deviceComputer input deviceComputer network termComputer software termComputer security termComputer graphics termComputer graphics termComputer hardware part...

Logistics 2021-11-29

Logistics crossword puzzle
Across
  1. Any person
  2. Free and Secure trade
  3. Container Security Initiative
  4. Least expensive dock
Down
  1. A substance or material that the USDOT says is unsafe
  2. Customs-Trade Partnership against terrorism
  3. Most commonly used dock
  4. Provides the most security and protection from weather

8 Clues: Any personLeast expensive dockFree and Secure tradeMost commonly used dockContainer Security InitiativeCustoms-Trade Partnership against terrorismA substance or material that the USDOT says is unsafeProvides the most security and protection from weather

Read articles to solve 2023-04-17

Read articles to solve crossword puzzle
Across
  1. say how to fix it
  2. security information and event management
  3. Does it explain clearly what went wrong? (Two words)
  4. Fiona's journey to Technical writing
Down
  1. Something that you cant buy
  2. Data security and Encryption
  3. Morning runners
  4. instructions on how to use a product (Two words)

8 Clues: Morning runnerssay how to fix itSomething that you cant buyData security and EncryptionFiona's journey to Technical writingsecurity information and event managementinstructions on how to use a product (Two words)Does it explain clearly what went wrong? (Two words)

Gramm Leach Bliley 2021-11-09

Gramm Leach Bliley crossword puzzle
Across
  1. OUT
  2. ESTABLISHED
  3. POLICY
  4. INSTITUTION
  5. SECURITY NUMBER
Down
  1. COLLECTION
  2. THIRD PARTIES
  3. NUMBER
  4. NOTICE
  5. LANGUAGE
  6. PRIVACY
  7. PERSONAL INFORMATION

12 Clues: OUTNUMBERNOTICEPOLICYPRIVACYLANGUAGECOLLECTIONESTABLISHEDINSTITUTIONTHIRD PARTIESSECURITY NUMBERPERSONAL INFORMATION

La Crisis del Hambre en Africa 2019-10-10

La Crisis del Hambre en Africa crossword puzzle
Across
  1. Poverty
  2. Security
  3. To starve
  4. To waste
  5. Drought
  6. Crops
Down
  1. To prevent
  2. Famine
  3. Deserts
  4. Malnutrition

10 Clues: CropsFaminePovertyDesertsDroughtSecurityTo wasteTo starveTo preventMalnutrition

TC Team 2021/22 2021-11-19

TC Team 2021/22 crossword puzzle
Across
  1. The sponsor for the Space & Environment stream.
  2. The number of formal sessions in the Program.
  3. The sponsor for the Space & Security stream.
  4. This person studies Aeronautical Engineering and Science at USYD.
  5. This person studies Law and International Security at ANU.
Down
  1. The main deliverable in the Astra Program.
  2. The name of the formal sessions of the Astra Program.
  3. The sponsor for the Space & Industry stream.
  4. This person currently works as a Compliance and Administration officer.
  5. This person studies Aerospace Engineering and Commerce at Monash University.
  6. The speakers and presenters in the Astra Program. An acronym.
  7. This person studies Mechatronics Engineering and Computer Science at USYD.
  8. This person studies Law and Arts at Monash University.

13 Clues: The main deliverable in the Astra Program.The sponsor for the Space & Industry stream.The sponsor for the Space & Security stream.The number of formal sessions in the Program.The sponsor for the Space & Environment stream.The name of the formal sessions of the Astra Program.This person studies Law and Arts at Monash University....

Computer Science 07 2020-01-22

Computer Science 07 crossword puzzle
Across
  1. xxx controls, methods to stop children accessing inappropriate content on the internet.
  2. xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
  3. act helps to protect intellectual property, copyright, designs and patents, written and recorded content
  4. xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
  5. xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
  6. if computer hardware is not recycled properly it can lead to
  7. xxx divide, Some people have greater access to technology than others
  8. xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
  1. possible result of impact of cyberbullying.
  2. unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
  3. xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
  4. Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
  5. xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
  6. xxx misuse act is the legislation that can be used to prosecute hackers
  7. Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection

15 Clues: possible result of impact of cyberbullying.if computer hardware is not recycled properly it can lead toxxx divide, Some people have greater access to technology than othersxxx misuse act is the legislation that can be used to prosecute hackersunauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop...

Bullying 2020-06-07

Bullying crossword puzzle
Across
  1. they bully you with a screen.
  2. its bad otherwise the person you hurt will become
  3. This bullying is very bad because it makes people sad,scared.
Down
  1. This bullying makes people sad and depressed
  2. can not only mentally hurt someone but get people physically hurt.
  3. This bullying makes people lonely and sad and depressed.
  4. you.

7 Clues: you.they bully you with a screen.This bullying makes people sad and depressedits bad otherwise the person you hurt will becomeThis bullying makes people lonely and sad and depressed.This bullying is very bad because it makes people sad,scared.can not only mentally hurt someone but get people physically hurt.

cyber safety 2013-11-07

cyber safety crossword puzzle
Across
  1. someone that steals your details electronically
  2. something used to keep your details safe and private
  3. mail sent electronically
Down
  1. something on your computer that protects you from hackers and viruses
  2. something people give your computer to harm it
  3. some on that bullies others electronically

6 Clues: mail sent electronicallysome on that bullies others electronicallysomething people give your computer to harm itsomeone that steals your details electronicallysomething used to keep your details safe and privatesomething on your computer that protects you from hackers and viruses

Latin Crossword 2024-02-15

Latin Crossword crossword puzzle
Across
  1. look up
  2. hamlet
  3. 🦇
  4. not want
  5. 🏢
Down
  1. ☀️
  2. ancient______
  3. security
  4. runs the house

10 Clues: 🦇🏢☀️hamletlook upsecuritynot wantancient______runs the house

U03 CH4 Key Terms 2024-02-27

U03 CH4 Key Terms crossword puzzle
Across
  1. Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
  2. traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
  3. (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
  4. (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
  5. (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
  6. conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
  7. methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
  1. (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
  2. (4,3,4) Passwords, passphrases, or PINs are all examples
  3. (4,3,4) Smart cards and security key fobs are both examples
  4. (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  5. controls what a user can and cannot do on the network after successful authentication.
  6. (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
  7. Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
  8. replaces data with authentic looking values to apply anonymity to the data records.

15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples(4,3,4) Smart cards and security key fobs are both examplesreplaces data with authentic looking values to apply anonymity to the data records.controls what a user can and cannot do on the network after successful authentication....

Location & Venues 2018-11-18

Location & Venues crossword puzzle
Across
  1. Who played at the Cavern Club?
  2. What is a large venue likely to make more of?
  3. What sort of venue is a nightclub?
  4. Who was the lead singer for Queen?
  5. What does every venue need to make audiences safe?
  6. What is the missing word? The Royal ___ Hall?
Down
  1. What sort of venue is Manchester Arena?
  2. Who is the world's richest musician?
  3. What is the UK's largest music venue?
  4. What is another name for security guards?

10 Clues: Who played at the Cavern Club?What sort of venue is a nightclub?Who was the lead singer for Queen?Who is the world's richest musician?What is the UK's largest music venue?What sort of venue is Manchester Arena?What is another name for security guards?What is a large venue likely to make more of?What is the missing word? The Royal ___ Hall?...

Compliance Corner Crossword 2024-04-11

Compliance Corner Crossword crossword puzzle
Across
  1. Alternate to filling out the Privacy security incident form
  2. Data Loss Prevention
  3. Health Insurance Portability and Accountability Act
  4. Personal Identifiable Information
  5. Provide this when reporting a privacy incident
  6. This type of incident has resulted in (or could result in) unauthorized use or disclosure of PII/PHI.
Down
  1. Website where you can find the privacy and security incident form
  2. Protected Health Information
  3. Who is responsible for reporting privacy incidents
  4. First action to recognizing a privacy incident

10 Clues: Data Loss PreventionProtected Health InformationPersonal Identifiable InformationFirst action to recognizing a privacy incidentProvide this when reporting a privacy incidentWho is responsible for reporting privacy incidentsHealth Insurance Portability and Accountability ActAlternate to filling out the Privacy security incident form...

Computer Science 07 2020-01-22

Computer Science 07 crossword puzzle
Across
  1. xxx controls, methods to stop children accessing inappropriate content on the internet.
  2. xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
  3. act helps to protect intellectual property, copyright, designs and patents, written and recorded content
  4. xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
  5. xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
  6. if computer hardware is not recycled properly it can lead to
  7. xxx divide, Some people have greater access to technology than others
  8. xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
  1. possible result of impact of cyberbullying.
  2. unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
  3. xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
  4. Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
  5. xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
  6. xxx misuse act is the legislation that can be used to prosecute hackers
  7. Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection

15 Clues: possible result of impact of cyberbullying.if computer hardware is not recycled properly it can lead toxxx divide, Some people have greater access to technology than othersxxx misuse act is the legislation that can be used to prosecute hackersunauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop...

EMR Teams 2022-09-14

EMR Teams crossword puzzle
Across
  1. Outpatient Facilities
  2. Laboratory(blood)
  3. Medical Records, OnBase, Rightfax
  4. charges generated in an outpatient setting
  5. Inpatient charges
  6. registration and scheduling
  7. baby delivery
  8. Dorothy
  9. all things surgery
Down
  1. Account provisioning
  2. Reports
  3. Cancer(oncology)
  4. I dont know how to do something
  5. Radiology
  6. Pharmacy
  7. Heart(cardiology)
  8. admitting discharges and transfers
  9. Emergency Department
  10. Admitted to a hospital floor

19 Clues: ReportsDorothyPharmacyRadiologybaby deliveryCancer(oncology)Laboratory(blood)Heart(cardiology)Inpatient chargesall things surgeryAccount provisioningEmergency DepartmentOutpatient Facilitiesregistration and schedulingAdmitted to a hospital floorI dont know how to do somethingMedical Records, OnBase, Rightfaxadmitting discharges and transfers...

Safety Day Challenge 2024-05-29

Safety Day Challenge crossword puzzle
Across
  1. Emergency Response Team
  2. vessel to transport product
  3. Help desk
  4. Quality Process
  5. Lock out Tag out
  6. GMP, ISO
  7. to perform maintenance
  8. Personal Proctective Equipment
  9. spare parts
Down
  1. Product ready to ship
  2. Site communication Meeting
  3. PPE
  4. industrial truck
  5. Gate Keeper
  6. Fall Protection
  7. To rid or remove

16 Clues: PPEGMP, ISOHelp deskGate Keeperspare partsQuality ProcessFall Protectionindustrial truckLock out Tag outTo rid or removeProduct ready to shipto perform maintenanceEmergency Response TeamSite communication Meetingvessel to transport productPersonal Proctective Equipment

Terrorism Case Study - 9/11 2014-05-10

Terrorism Case Study - 9/11 crossword puzzle
Across
  1. The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
  2. Hijackers aboard Flight 77 crash the plane into the western front of the
  3. The use of force or threats to frighten people and the government
  4. Agents that move to a country, blend into a community, and then carry out terrorist attacks Patriot / USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
  5. Letters containing bacteria that cause _____ were sent to members of Congress
  6. The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
  7. Terrorist group responsible for September 11th attacks.
Down
  1. _____ bin Laden was responsible for coordinating the attacks
  2. The fourth plane crashed in an empty field in ______ due to heroic passengers
  3. The Department of _______ Security was created to coordinate national efforts against terrorism

10 Clues: Terrorist group responsible for September 11th attacks._____ bin Laden was responsible for coordinating the attacksThe use of force or threats to frighten people and the governmentHijackers aboard Flight 77 crash the plane into the western front of theThe fourth plane crashed in an empty field in ______ due to heroic passengers...

stay safe online 2025-10-03

stay safe online crossword puzzle
Across
  1. importantly / gravely
  2. careful / alert
  3. enter / reach
  4. refresh / improve
  5. online trick
  6. cheat / fraud
  7. refuse / decline
  8. say / declare
Down
  1. safety / protection
  2. carelessly / relaxedly
  3. worried / nervous
  4. false / not real
  5. set up / put in

13 Clues: online trickenter / reachcheat / fraudsay / declarecareful / alertset up / put infalse / not realrefuse / declineworried / nervousrefresh / improvesafety / protectionimportantly / gravelycarelessly / relaxedly

Coding 2022-06-10

Coding crossword puzzle
Across
  1. relating to or characteristic of the culture of computers, information technology, and virtual reality
  2. the process or activity of writing computer programs
  3. Lines of code
  4. involving or relating to the use of computer technology
  5. A type of code
Down
  1. The creator of a computer program
  2. relating to, using, or denoting a system of numerical notation that has 2 rather than 10 as a base.
  3. the set of instructions, or a system of rules, written in a particular programming language
  4. the state of being free from public attention

9 Clues: Lines of codeA type of codeThe creator of a computer programthe state of being free from public attentionthe process or activity of writing computer programsinvolving or relating to the use of computer technologythe set of instructions, or a system of rules, written in a particular programming language...

Bullying 2022-11-15

Bullying crossword puzzle
Across
  1. True or False 1 in 5 people between the ages of 8 and 15 have been cyber bullied
  2. True or False does everyone realise they are bullying
  3. you should be an _____ if you see bullying occur
  4. when you bully someone with words
  5. why do people behave different online
Down
  1. when you bully online
  2. _____.com is a place where you can go to get help for bullying
  3. when you bully someone by touching them
  4. who do you talk to when you have a problem with bullying

9 Clues: when you bully onlinewhen you bully someone with wordswhy do people behave different onlinewhen you bully someone by touching themyou should be an _____ if you see bullying occurTrue or False does everyone realise they are bullyingwho do you talk to when you have a problem with bullying_____.com is a place where you can go to get help for bullying...

e-commerce 2020-12-03

e-commerce crossword puzzle
Across
  1. Si dice lo sia il lavoro agile
  2. software progettato per simulare una conversazione con un essere umano
  3. parola che serve per identificare un documento o per compiere ricerche in un database
Down
  1. Applicativo web più utilizzato per le videoconference
  2. vendere un prodotto senza possederlo materialmente in magazzino
  3. attività per migliorare il posizionamento di contenuti
  4. Lo è la sicurezza online
  5. Page utilizzata come destinazione di link o pubblicità
  6. paradigma di erogazione di servizi offerti su richiesta da un fornitore a un cliente finale

9 Clues: Lo è la sicurezza onlineSi dice lo sia il lavoro agileApplicativo web più utilizzato per le videoconferenceattività per migliorare il posizionamento di contenutiPage utilizzata come destinazione di link o pubblicitàvendere un prodotto senza possederlo materialmente in magazzinosoftware progettato per simulare una conversazione con un essere umano...

Le projet de Mariam et Leila 2023-04-29

Le projet de Mariam et Leila crossword puzzle
Across
  1. Le harcèlement en utilisant les différentes formes de communication électronique.
  2. Le harcèlement qui se trouve au travail, les magasins...
  3. Violence qui se répète constamment
  4. Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
  1. Façon pour lutter contre le harcèlement
  2. Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
  3. Le harcèlement qui se trouve à l'école, l'université...
  4. Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
  5. Façon pour sensibiliser à un sujet

9 Clues: Violence qui se répète constammentFaçon pour sensibiliser à un sujetFaçon pour lutter contre le harcèlementLe harcèlement qui se trouve à l'école, l'université...Le harcèlement qui se trouve au travail, les magasins...Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement...

Bullying 2013-11-07

Bullying crossword puzzle
Across
  1. to make verbal or physical attacks on someone
  2. bullying that is spoken
  3. bullying it is a type of bullying that happens over the internet
  4. bullying it is a type of bullying that hurts someones feelings
Down
  1. someone who is harming or harassing another person
  2. bullying it is a type of bullying that harms another person.
  3. is a person who is being tormented or harassed by a bully or group of bullies
  4. to cause suffering to someone else
  5. a person who is a viewer of someone else's bullying.

9 Clues: bullying that is spokento cause suffering to someone elseto make verbal or physical attacks on someonesomeone who is harming or harassing another persona person who is a viewer of someone else's bullying.bullying it is a type of bullying that harms another person.bullying it is a type of bullying that hurts someones feelings...

Tinkerers Lab + Kludge 2023-03-27

Tinkerers Lab + Kludge crossword puzzle
Across
  1. What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
  2. Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
  3. What animal could a firefox be called
  4. What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
  5. What does the T in reCAPTCHA stand for
  6. A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
  7. WinVru was the virus first made for which OS
  8. According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
  9. The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
  1. What does the first "D" stand for in the common cybercrime known as a DDoS attack?
  2. A makeshift solution to a problem, especially a computer or programming problem.
  3. A computer connected to a network that a hacker has compromised
  4. The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
  5. What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
  6. A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
  7. Hacking for a cause
  8. A person who enjoys fixing and experimenting with machines and their parts.
  9. What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt

18 Clues: Hacking for a causeWhat animal could a firefox be calledWhat does the T in reCAPTCHA stand forWinVru was the virus first made for which OSA computer connected to a network that a hacker has compromisedA person who enjoys fixing and experimenting with machines and their parts....

Sambas Riot 1999 2020-11-23

Sambas Riot 1999 crossword puzzle
Across
  1. symbol
  2. law
  3. conflict occurred in Sambas Town
  4. run away
  5. concealed
Down
  1. brought
  2. dayaks
  3. of war
  4. in sambas
  5. that
  6. approach

11 Clues: lawthatsymboldayaksof warbroughtrun awayapproachin sambasconcealedconflict occurred in Sambas Town

AIRPORT VOCABULARY 2023-11-24

AIRPORT VOCABULARY crossword puzzle
Across
  1. luggage
  2. passport
  3. suitcases
  4. departure
  5. planeticket
  6. boardingpass
Down
  1. checkin counter
  2. seat(on the plane)
  3. gate(for boarding)
  4. security checkpoint
  5. securitybelt

11 Clues: luggagepassportsuitcasesdepartureplaneticketsecuritybeltboardingpasscheckin counterseat(on the plane)gate(for boarding)security checkpoint

YN BIBLIOGRAPHIES 2020-01-31

YN BIBLIOGRAPHIES crossword puzzle
Across
  1. M-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAM
  2. VOLUME 9 TRAVEL POLICY
  3. ADVANCEMENT MANUAL FOR ENLISTED PERSONNEL OF THE U.S. NAVY AND U.S. NAVY RESERVE
  4. NAVY AND MARINE CORPS AWARDS MANUAL
  5. DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM
  6. DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL
Down
  1. NAVAL MILITARY PERSONNEL MANUAL
  2. VOLUME 7A MILITARY PAY POLICY - ACTIVE DUTY AND RESERVE PAY
  3. SOCIAL USAGE AND PROTOCOL HANDBOOK
  4. CERTIFICATE OF RELEASE OR DISCHARGE FROM ACTIVE DUTY
  5. DEPARTMENT OF THE NAVY INFORMATION REQUIREMENTS (REPORTS) MANUAL
  6. DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM
  7. DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL
  8. DEPARTMENT OF THE NAVY NAVY RECORDS MANAGEMENT PROGRAM RECORDS MANAGEMENT MANUAL; PART I, II, III

14 Clues: VOLUME 9 TRAVEL POLICYNAVAL MILITARY PERSONNEL MANUALSOCIAL USAGE AND PROTOCOL HANDBOOKNAVY AND MARINE CORPS AWARDS MANUALDEPARTMENT OF THE NAVY CORRESPONDENCE MANUALDEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUALM-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAMDEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM...

Know Your Customer 2020-05-14

Know Your Customer crossword puzzle
Across
  1. This stands for National Insurance Number
  2. Security Level to make changes
  3. KYC information is first collected during this process
  4. It can be found in Sophia
  5. A KYC check is also this check at application
  6. Never use this with a customer
Down
  1. This is the DPA principle that states our customer's details must be kept accurate and up to date.
  2. This stands for Know Your Customer
  3. Remember to do this to the KYC Date
  4. This is the security level for checking
  5. Show this when the customer is annoyed you want to carry out a KYC check.
  6. This source is part of Savings KYC
  7. We act on these when required

13 Clues: It can be found in SophiaWe act on these when requiredSecurity Level to make changesNever use this with a customerThis stands for Know Your CustomerThis source is part of Savings KYCRemember to do this to the KYC DateThis is the security level for checkingThis stands for National Insurance NumberA KYC check is also this check at application...

Lesson 9 Crossword Answers 2025-07-12

Lesson 9 Crossword Answers crossword puzzle
Across
  1. Returned from exile to restore correct observance of Law.
  2. Nation that conquered Babylon.
  3. People from the south first mentioned in this period.
  4. Prophet who predicted the number of years until Messiah
  5. Jews grouped years by _________.
  6. Returned from exile to ensure Jerusalem's security.
  7. Enemies of the Jews of mixed Israelite and Gentile blood.
Down
  1. Jewish official in the court of Persia with a beautiful niece. who
  2. Rebuilding these was the key to Jerusalem's security.
  3. Along with Zechariah, he urged completion of a second Temple.
  4. Led 50,000 Jews from exile back to Judea.
  5. She remained exile with her uncle and married a Persian king.
  6. Jerusalem's surrounding bulwark was completed in an amazing _______-two days!

13 Clues: Nation that conquered Babylon.Jews grouped years by _________.Led 50,000 Jews from exile back to Judea.Returned from exile to ensure Jerusalem's security.Rebuilding these was the key to Jerusalem's security.People from the south first mentioned in this period.Prophet who predicted the number of years until Messiah...

Global Issues 2024-11-12

Global Issues crossword puzzle
Across
  1. photo 1
  2. photo 7
  3. photo 3
  4. photo 12
  5. photo 11
  6. photo 10
Down
  1. photo 8
  2. photo 6
  3. photo 4
  4. photo 2
  5. photo 9
  6. photo 5

12 Clues: photo 8photo 6photo 1photo 7photo 4photo 2photo 3photo 9photo 5photo 12photo 11photo 10

STOP BULLYING 2024-09-29

STOP BULLYING crossword puzzle
Across
  1. Jenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemanan
  2. Jenis bullying yang menggunakan teknologi seperti media sosial
  3. Bentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain
Down
  1. Jenis bullying yang melalui lisan dan tulisan
  2. Seseorang yang mengalami tindakan bullying
  3. Jenis bullying berupa menendang dan memukul

6 Clues: Seseorang yang mengalami tindakan bullyingJenis bullying berupa menendang dan memukulJenis bullying yang melalui lisan dan tulisanJenis bullying yang menggunakan teknologi seperti media sosialJenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemananBentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain

CyberBullying 2022-10-27

CyberBullying crossword puzzle
Across
  1. A person who stands up against bullies.
  2. A bullying that uses the internet.
Down
  1. An effect of cyberbullying(starts with D).
  2. A place where a cyber bully can bully you(starts with C)
  3. we should be a _____, not a bully
  4. An example of cyberbullying(starts with H).

6 Clues: we should be a _____, not a bullyA bullying that uses the internet.A person who stands up against bullies.An effect of cyberbullying(starts with D).An example of cyberbullying(starts with H).A place where a cyber bully can bully you(starts with C)

CNN Student News 11/4/13 2013-11-04

CNN Student News 11/4/13 crossword puzzle
Across
  1. Continent where Iraq is located
  2. Largest religion in India
  3. World series champs home city
  4. Government group in charge of airport security
Down
  1. Annual Hindu festival in India
  2. Reason there was no NYC Marathon last year
  3. Nickname for the Affordable Care Act
  4. Mascot for all of the "Roll Call" schools on todays CNN Student News
  5. major concern for NYC Marathon organizers

9 Clues: Largest religion in IndiaWorld series champs home cityAnnual Hindu festival in IndiaContinent where Iraq is locatedNickname for the Affordable Care Actmajor concern for NYC Marathon organizersReason there was no NYC Marathon last yearGovernment group in charge of airport securityMascot for all of the "Roll Call" schools on todays CNN Student News

SEC Crossword 2024-12-13

SEC Crossword crossword puzzle
Across
  1. was a program intended for ______
  2. the SEC helped prevent _______ trading
  3. the SEC protects _________
  4. first chairman of the SEC (last name)
Down
  1. president that established the program (last name)
  2. the SEC has adapted to technological advancements like ______currency
  3. the SEC enforces ________ laws (singular)
  4. abbreviation for the main security exchange that was regulated
  5. number of divisions of the SEC as of 2024

9 Clues: the SEC protects _________was a program intended for ______first chairman of the SEC (last name)the SEC helped prevent _______ tradingthe SEC enforces ________ laws (singular)number of divisions of the SEC as of 2024president that established the program (last name)abbreviation for the main security exchange that was regulated...

CYBERCRIME INVESTIGATION (PUZZEL) 2021-07-12

CYBERCRIME INVESTIGATION (PUZZEL) crossword puzzle
Across
  1. a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
  2. Internet Auctions online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
  3. and thefts stealing( money, property), e.g. credit card fraud, intellectual property violations ( a.k.a piracy)
  4. The Salami Slice an employee sets up a dummy account in the company’s computerized records. A small amount-even a few pennies- is subtracted from customers’ account and added to the account of the thief.
  5. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  6. or Cartridges these can be used to store copies of files from the computer for use in his investigation
  7. market economic activity undertaken via the internet or similar electronic communication networks.
  8. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  9. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  10. the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  11. Internet Securities Fraud some criminals make use of internet chat rooms in their fraudulent schemes.
  12. The Logic Bomb a program is secretly attached to the company’s computer system. The new program monitors the company’s work and wait for a sign of error to appear, some illogic that was designed for the computer to follow. Illogic causes the logic bomb to kick into an action and exploit the weakness.
  13. Property property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  14. Screwdrivers and other tools used to dismantle the hardware for seizure.
  15. terrorism terrorist activity that targets computer networks and information systems for attack.
  16. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  17. a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  18. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  19. Horses malicious software programs which are infiltrated into computers disguised as benign applications or data.
  20. leakage a person illegally obtains data from a computer system by leaking it out in small amounts.
  21. Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  22. stalking stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  23. of Service an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
Down
  1. crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
  2. doing psychological harm to, or inciting physical harm against others, thereby breaching laws relating to the protection of the person, e.g. hate speech, stalking.
  3. political activism and social protest that uses hacking tools and techniques
  4. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  5. most computer programs used in business have built-in anti-theft safeguards. However employees can use a repair or maintenance program to supersede the antitheft program. Some tinkering with the program is required, But the “super-zapper” is soon able to order the system to issue checks to his or her private account.
  6. Software or malware a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  7. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  8. pornography breaching laws on obscenity and decency
  9. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
  10. Defacement the activity of altering the code organizing a website so as to alter the visible screen content.
  11. The Trojan Horseone computer is used to reprogram another for illicit purposes.
  12. remember that often, latent prints can be taken from disks or other storage media or hardware.
  13. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  14. Camera equipment to videotape and photograph the scene.
  15. Society a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
  16. Crime criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
  17. the act of copying digital material posted online into the storage medium on one’s computer.
  18. materials rubber bands, tape, boxes, bubble wrap, and if he does not have access to anti-static wrap, paper bags should be used, because they have less static charge than plastic bags.
  19. Rights legally institutionalized rights to own and control goods.
  20. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  21. Impersonationan unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  22. Sharing the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
  23. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  24. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  25. Privacy the right to be left alone; freedom from observation and interference from others.
  26. the interactional space or environment created by linking computers together into a communication net5work.
  27. to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.

50 Clues: pornography breaching laws on obscenity and decencyCamera equipment to videotape and photograph the scene.Rights legally institutionalized rights to own and control goods.Screwdrivers and other tools used to dismantle the hardware for seizure.political activism and social protest that uses hacking tools and techniques...

SID 3b Hass im Netz 2021-04-30

SID  3b Hass im Netz crossword puzzle
Across
  1. Unwahre Nachrichten/Informationen im Internet
  2. Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
  3. Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
Down
  1. Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
  2. Man sollte wegen ... -accounts im Internet vorsichtig sein.
  3. Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
  4. erfundene „Tatsachen“.

7 Clues: erfundene „Tatsachen“.Unwahre Nachrichten/Informationen im InternetMan sollte wegen ... -accounts im Internet vorsichtig sein.Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der......

Investing 2024-05-29

Investing crossword puzzle
Across
  1. fixed point of time in the future
  2. portfolio of stocks or bonds designed to mimic
  3. type of security where issuer owes holder debt
  4. income that you earn and recieve
  5. the ownership certificates of any company
Down
  1. a good sold for production or consumption
  2. payments made into or out of a business,project,etc.
  3. action of diversifying something
  4. direction given to a broker to buy or sell security
  5. statement of assets, liabilities, and cap. of a business

10 Clues: action of diversifying somethingincome that you earn and recievefixed point of time in the futurea good sold for production or consumptionthe ownership certificates of any companyportfolio of stocks or bonds designed to mimictype of security where issuer owes holder debtdirection given to a broker to buy or sell security...

CW Sample 2024-05-16

CW Sample crossword puzzle
Across
  1. A popular DEX platform on the Binance Smart Chain.
  2. The ability of a blockchain to handle increased transactions.
  3. The ability of different blockchains to communicate.
  4. A community-governed organization on the blockchain.
Down
  1. A virtual world with a digital economy.
  2. Financial contracts derived from the value of other assets.
  3. Self-executing code that powers DEX functionality.
  4. Program that rewards hackers for finding security bugs.
  5. Ethical hacker who identifies security vulnerabilities.
  6. Digital version of a fiat currency.

10 Clues: Digital version of a fiat currency.A virtual world with a digital economy.A popular DEX platform on the Binance Smart Chain.Self-executing code that powers DEX functionality.The ability of different blockchains to communicate.A community-governed organization on the blockchain.Program that rewards hackers for finding security bugs....