cyber security Crossword Puzzles
Stock Market Game Crossword 2024-12-10
Across
- Ownership share
- Gross domestic product
- Financial marketplace
- Return on investments
- Real state investment fund
- Valuable property
- Rising prices
- Profit distribution
- Pooled investment vehicle
Down
- Employee retirement plan
- Debt security
- Investment collection
- Cost of borrowing
- Mutual fund
- Exchange-traded fund
- Return on investment
- Potential loss
- Profit or loss
- Individual retirement account
19 Clues: Mutual fund • Debt security • Rising prices • Potential loss • Profit or loss • Ownership share • Cost of borrowing • Valuable property • Profit distribution • Exchange-traded fund • Return on investment • Investment collection • Financial marketplace • Return on investments • Gross domestic product • Employee retirement plan • Pooled investment vehicle • Real state investment fund • ...
¡Vamos de vacaciones! (Parte I) 2024-02-28
20 Clues: pilot • flight • airport • passport • the gate • to board • arrivals • traveler • departures • to go by plane • to go shopping • to take a trip • to take a boat • to take the train • to take the subway • traveler (masculine) • to check the luggage • to go through customs • to go through security • flight attendant (feminine)
Red Chair Report Q4 2022-09-28
16 Clues: CEO • Broncos • Morning ___ • Code storage • Time Tracker • ___ is coming • ___ Trail Road • AgilLink's App • A colorado view • Challenges & ___ • Security Training • NHL 2022 Champions • A favorite winter sport • Rick & Carl's alma mater • The color of the chair lift • City where Risclarity HQ is located
Amazing AKHLAK 2022-11-04
Across
- agen perubahan
- gas alam cair
- way of lives
- nilai-nilai utama
- bagian hulu
- bertindak proaktif
- memiliki kemampuan
- saling bekerjasama
Down
- menghargai perbedaan
- pekerja pertamina
- menjaga kepercayaan
- mengutamakan perusahaan
- bagian dari holding
- health safety security environment
- cara meraih tujuan
- pertamina reference level
16 Clues: bagian hulu • way of lives • gas alam cair • agen perubahan • pekerja pertamina • nilai-nilai utama • cara meraih tujuan • bertindak proaktif • memiliki kemampuan • saling bekerjasama • menjaga kepercayaan • bagian dari holding • menghargai perbedaan • mengutamakan perusahaan • pertamina reference level • health safety security environment
16 Career Clusters 2024-04-11
Across
- _____ technology, engineering and mathematics
- ______ accountant
- ______ and construction
- ______ science
- ______ services
- Aircraft Assembler
- ______ technology
- ______ food and natural resources
- _______ public safety, corrections and security
Down
- ______ and public administration
- ______ management and administration
- ______ distribution and logistics
- advertising manager
- ______ and training
- ______ A/V technology and communications
- ______ and tourism
16 Clues: ______ science • ______ services • ______ accountant • ______ technology • Aircraft Assembler • ______ and tourism • advertising manager • ______ and training • ______ and construction • ______ and public administration • ______ distribution and logistics • ______ food and natural resources • ______ management and administration • ______ A/V technology and communications • ...
Service Desk Puzzle 2021-01-21
Across
- Medication dispensing system
- Software used by Food Services for patient diet orders
- System used to manage schedules, call recordings, and QA processes
- Cisco System that allows phone calls and work to be routed to individuals
- Abbreviation for the Stanley Healthcare infant protection system
- Image management system for OB/GYN ultrasound
- System used by Physical Security for badging, door access control, and intrusion alerts
Down
- Security camera monitoring software
- Application used for e-prescribing
- Used by Pharmacy for workflow management and drug/dose documentation
- System used for online learning/compliance videos
11 Clues: Medication dispensing system • Application used for e-prescribing • Security camera monitoring software • Image management system for OB/GYN ultrasound • System used for online learning/compliance videos • Software used by Food Services for patient diet orders • Abbreviation for the Stanley Healthcare infant protection system • ...
LPSCS: Operational Strategies 2024-11-12
Across
- law that established minimum wage
- responsibility of LPSCS employees to act in accordance with laws and regulations, promoting transparency and trust.
- Activities aimed at enhancing community safety.
- procedure
- federal law that protects employee safety in the workplace
Down
- Services that provide immediate medical care during emergencies.
- The entry-level position in law enforcement.
- geographical area that someone has power within
- The highest-ranking officer in a law enforcement agency, responsible for overall operations.
- type of security is when a company hires an outside security company to provide specific services.
- personal protective equipment
11 Clues: procedure • personal protective equipment • law that established minimum wage • The entry-level position in law enforcement. • geographical area that someone has power within • Activities aimed at enhancing community safety. • federal law that protects employee safety in the workplace • Services that provide immediate medical care during emergencies. • ...
Noah's crossword for bullying 2023-03-21
Across
- a person the watches someone get bullied.
- a person that gets picked on continuously.
- a type of bullying that happens on social media.
- a person that picks on people continuously.
- something that happens continuously.
Down
- a type of bullying that is physical.
- a type of bullying that you are rejected from your friend group or not invited into a group.
- bullying you don't get physically hurt but emotionally and mentally
8 Clues: a type of bullying that is physical. • something that happens continuously. • a person the watches someone get bullied. • a person that gets picked on continuously. • a person that picks on people continuously. • a type of bullying that happens on social media. • bullying you don't get physically hurt but emotionally and mentally • ...
Safe, ethical and responsible use of social media for teenagers 2024-04-25
Across
- plagiarism What is the unattributed use of information from the web?
- What is understood as the process of boundary management and control of information sharing and access
- When someone receives unwanted sexual communications
- What does the N mean in SNS?
Down
- The Internet presents special challenges to behaving how?
- When someone provides sexually explicit images
- When someone is being cruel to others sending or posting harmful material
- An example of a SNS
8 Clues: An example of a SNS • What does the N mean in SNS? • When someone provides sexually explicit images • When someone receives unwanted sexual communications • The Internet presents special challenges to behaving how? • plagiarism What is the unattributed use of information from the web? • When someone is being cruel to others sending or posting harmful material • ...
Human Rights 2020-12-14
GDHSRJHS 2019-08-10
Spelling 34 2020-06-14
16 Clues: but • save • simple • how loud • finished • flat land • ____ a sound • keeping safe • straight ahead • how you respond • angry dog sounds • knocking over pins • the lesson learned • where it should be • the people in the world • what you do with a question
Dog Breeds 2019-02-20
16 Clues: Speed King • PA State Dog • Snoopy is One • Pampered Pooch • Lassie Lineage • Sled Propeller • Security Guard • Yellow Go Getter • Gives Directions • Ravishing Redhead • Peek-a-boo Hairdo • Firehouse Favorite • Deutschland Herder • A Crocheted Blanket • Sniffs out Bad Guys • The Most Famous is Uga
Credit Card 2023-11-02
Across
- - Common use
- - Cost of borrowing
- - Cost of purchases
- - Financial institution
- - Spending cap
- - Card material
- - Buying goods or services
- - Where charges are recorded
Down
- - Use now, pay later
- - Key benefit
- - First credit card company
- - Financial trust
- - Money owed
- - Protection against theft
- - Card provider
- - Transaction method
16 Clues: - Common use • - Money owed • - Key benefit • - Spending cap • - Card provider • - Card material • - Financial trust • - Cost of borrowing • - Cost of purchases • - Use now, pay later • - Transaction method • - Financial institution • - Protection against theft • - Buying goods or services • - First credit card company • - Where charges are recorded
Gunsss 2024-11-19
16 Clues: A gun • Weapons • US lawmakers • Citizen army • Long firearm • Interest group • Safety measures • Change to a law • Fundamental laws • Tool for defense • Lawmaking process • A problem or topic • To control something • Causing disagreement • Someone who lives through hardship • control Regulation of firearms
UNICEF Crossword 2024-04-11
16 Clues: School • Security • To defend • Look after • Misuse of power • For every child • Future builders • Make a difference • No one left behind • Keeps out the storm • Wishful expectation • Kind heart's reward • Cheerful expression • Good to be together • Should be a priority • An eradicated disease
Cyberbullying, Miss Audrey's Class 2022-11-03
5 Clues: relating to computers • mean and hurtful behavior • a telephone service providing help • a person who stands up for something • used to prove something is true or not true
Crossword 2019-07-17
Across
- Internet Fraud
- Violation of SLA or Security rule
- A common term used both in hospitals and in IT.
- Combination of practices, and tools that increases ability to deliver services at high velocity.
- Process that ensures and confirms a user’s identity
- Title of current Week.
- A network security device that monitors traffic to or from your network
Down
- A set period of time during which specific work has to be completed.
- What does 'FI' stands for in WI-FI.
- This you should never share with anyone.
- A task or process should always be________.
- A collection of rules that determine the way of communication between computers.
- An Agile way to manage a project.
- The 'R' in RIO stands for
14 Clues: Internet Fraud • Title of current Week. • The 'R' in RIO stands for • Violation of SLA or Security rule • An Agile way to manage a project. • What does 'FI' stands for in WI-FI. • This you should never share with anyone. • A task or process should always be________. • A common term used both in hospitals and in IT. • Process that ensures and confirms a user’s identity • ...
Sambas Riot 1999 2020-11-23
Only specific people can solve this 2025-11-03
11 Clues: Chef • Soldier • Gunsmith • Gardener • Leader/Boss • Security/Sniper • Pilot Apprentice • Technician/Pilot • Chef's Apprentice • Gunsmith Apprentice • Gunsmith Apprentice x2
May 2021 Newsletter Crossword Puzzle 2021-05-07
Across
- The name of the Wi-Fi network that is being set up.
- An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
- Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
- An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
- Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
- A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
- Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
- The speed at which data is transmitted and received among the devices on your wireless network.
- Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
- A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.
10 Clues: The name of the Wi-Fi network that is being set up. • The speed at which data is transmitted and received among the devices on your wireless network. • A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data. • ...
It words 2024-12-17
Across
- The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
- An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
- The maximum rate of data transfer across a given path, measured in bits per second (bps).
- A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
- A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- The practice of dividing a network into two or more smaller networks, improving performance and security.
- A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
- The creation of a virtual version of something, such as a server, a storage device, or network resources.
- The delay before a transfer of data begins following an instruction for its transfer.
10 Clues: The delay before a transfer of data begins following an instruction for its transfer. • The maximum rate of data transfer across a given path, measured in bits per second (bps). • The practice of dividing a network into two or more smaller networks, improving performance and security. • ...
cc 2025-02-18
Across
- A security update that must be applied immediately
- If you observe a security breach, where should you report it ?
- A security principle that ensures data is available when needed
Down
- A security principle that ensures that data is not accessed by unauthorized parties
- A digital wall that prevents unauthorized users from accessing a network
- A lock that needs a fingerprint
6 Clues: A lock that needs a fingerprint • A security update that must be applied immediately • If you observe a security breach, where should you report it ? • A security principle that ensures data is available when needed • A digital wall that prevents unauthorized users from accessing a network • ...
HIPAA Compliance 2023-10-05
Across
- Health _________ ________ ________ ________
- Ensuring the security, privacy, and protection of patients' healthcare data
- Text messages are not ___________ and should never be used to discuss PHI
- __________ of _________ __________
- The act of adhering to federal healthcare laws and regulations
Down
- MEDICAL RECORDS RELEASE FORM This must be signed by the patient in order to obtain a copy of their medical records
- Never share your _________ with anyone
- OF CONDUCT
- _______ is your right to decide when, how, and to what extent others may access your health information
- An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information
- The digital version of medical records
- _________ Health ____________
12 Clues: OF CONDUCT • _________ Health ____________ • __________ of _________ __________ • Never share your _________ with anyone • The digital version of medical records • Health _________ ________ ________ ________ • The act of adhering to federal healthcare laws and regulations • Text messages are not ___________ and should never be used to discuss PHI • ...
A Dog Day Afternoon 2019-02-20
Across
- A Crocheted Blanket
- Pampered Pooch
- Gives Directions
- PA State Dog
- Sniffs out Bad Guys
- Rescues Skiers
- The Most Famous is Uga
- Speed King
- Deutschland Herder
- Snoopy is One
Down
- Lassie Lineage
- Peek-a-boo Hairdo
- Short Legs Long Ears
- Mexican Mut
- Firehouse Favorite
- Yellow Go Getter
- Hot Dog Dog
- Sled Propeller
- Security Guard
- Ravishing Redhead
20 Clues: Speed King • Mexican Mut • Hot Dog Dog • PA State Dog • Snoopy is One • Lassie Lineage • Pampered Pooch • Rescues Skiers • Sled Propeller • Security Guard • Gives Directions • Yellow Go Getter • Peek-a-boo Hairdo • Ravishing Redhead • Firehouse Favorite • Deutschland Herder • A Crocheted Blanket • Sniffs out Bad Guys • Short Legs Long Ears • The Most Famous is Uga
The London life 2015-11-11
37 Clues: bus • bell • fine • loud • gate • keep • king • mean • safe • fähre • point • plane • youth • train • begin • stand • tower • queen • fight • throw • travel • square • flight • palace • danger • sights • ticket • famous • traffic • airport • respect • arrival • security • departure • escalator • detective • pickpockets
En avion! 2023-03-16
Across
- subway station
- airport
- boarding gate
- flight
- train station
- check in luggage
- abroad (in another country)
- world
- bus stop
- flight attendant (male)
- people
- ticket counter
Down
- country
- flight attendant
- exit
- plane ticket
- customs
- arrival
- round-trip ticket
- to take off (plane)
- to land (plane)
- to go through security
- capital
- countryside
- departure
25 Clues: exit • world • flight • people • country • customs • airport • arrival • capital • bus stop • departure • countryside • plane ticket • boarding gate • train station • subway station • ticket counter • to land (plane) • flight attendant • check in luggage • round-trip ticket • to take off (plane) • to go through security • flight attendant (male) • abroad (in another country)
Group 7 2018-03-18
20 Clues: 시골의 • 돈,화폐 • 감소하다 • 합의,일치 • 힘,정력,끈기 • 상상의,거짓의 • small,tiny • 눈에 띄는,두드러진 • make worse • skill,guile • 비겁한,비열한,소심한 • 자발적인 행위,의지,의도 • 얼룩이없는,아주 흠이없는 • 싸움을 좋아하는,도전적인 • group of five • 화해시키다,결말짓다,해결하다 • safety,protection • copy,reproduction • 사이에 끼다,사이에 있다,중재하다,간섭하다 • 두렵게 하여 비키게 하다,방해하다,단념하다
3EMES JOBS CROSSWORD PUZZLE 2023-09-17
Across
- marchand de poisson
- pharmacien
- keeper, commerçant
- grossiste
- couturière
- boulanger
- guard, agent de sécurité
- réparateur
- teinturier
- comptable
- traiteur
- sage-femme
- boucher
- chauffeur
Down
- kiné
- agent, agent immobilier
- officer, douanier
- chirurgien
- maire
- driver, chauffeur routier
- secouriste
- bijoutier
- peintre
- jardinier
- marin
- présentateur météo
- plombier
- attendant, hôtesse de l'air
28 Clues: kiné • maire • marin • peintre • boucher • traiteur • plombier • grossiste • boulanger • bijoutier • comptable • jardinier • chauffeur • pharmacien • chirurgien • couturière • secouriste • réparateur • teinturier • sage-femme • officer, douanier • présentateur météo • marchand de poisson • keeper, commerçant • agent, agent immobilier • guard, agent de sécurité • driver, chauffeur routier • attendant, hôtesse de l'air
Occupations and professions 2023-10-07
30 Clues: Guru • Sales • Supir • Kasir • Pilot • Polisi • Petani • Musisi • Dokter • Arsitek • Nelayan • Perawat • Tentara • Insinyur • Astronot • Penjahit • Pengacara • Pramusaji • Juru masak • Tukang kayu • Dokter gigi • Resepsionis • Dokter hewan • Tukang kebun • Pemandu wisata • Petugas keamanan • Pemadam Kebakaran • Pemain sepak bola • Pekerja konstruksi • Petugas kebersihan
Occupations and professions 2023-10-07
30 Clues: Guru • Kasir • Sales • Pilot • Supir • Dokter • Polisi • Musisi • Petani • Nelayan • Arsitek • Perawat • Tentara • Astronot • Penjahit • Insinyur • Pramusaji • Pengacara • Juru masak • Dokter gigi • Tukang kayu • Resepsionis • Tukang kebun • Dokter hewan • Pemandu wisata • Petugas keamanan • Pemadam Kebakaran • Pemain sepak bola • Petugas kebersihan • Pekerja konstruksi
Crossword History puzzle 2024-09-23
Across
- Renaissance
- Land Boom
- Security
- Age
- movement
- Civil Liberties Union (ACLU)
- Tuesday
- Naval ConferenEqual Rights Amendmentual rights amendment (ERA)
- Tariff Act
- on margin
Down
- League (ADL)
- Industrial Recovery Act
- of Women Voters
- Adjustment Administration (AAA)
- of Industrial Organizations (CIO
- WagnerAct
- Dome Scandal
- Conservation Corps (CCC)
- Progress Administration (WPA)
- Jones Industrial Average
20 Clues: Age • Tuesday • Security • movement • Land Boom • WagnerAct • on margin • Tariff Act • Renaissance • League (ADL) • Dome Scandal • of Women Voters • Industrial Recovery Act • Conservation Corps (CCC) • Jones Industrial Average • Civil Liberties Union (ACLU) • Progress Administration (WPA) • Adjustment Administration (AAA) • of Industrial Organizations (CIO • ...
Applying for Jobs and Housing 2023-02-01
Across
- Federal and state aid for limited income
- Unable to work and has enough work credits
- Supplemental security income
- unable to work at least 12 months due to disability
- Prohibits discrimination against disabilities
Down
- Makes fair to person with proven need
- An individual who can do essential requirements
- Action requiring difficulty or expense
- For people 65 and older or listed disabilities
- Social security disability insurance
- Americans with Disabilities Act
11 Clues: Supplemental security income • Americans with Disabilities Act • Social security disability insurance • Makes fair to person with proven need • Action requiring difficulty or expense • Federal and state aid for limited income • Unable to work and has enough work credits • Prohibits discrimination against disabilities • For people 65 and older or listed disabilities • ...
U03 CH4 Key Terms 2024-02-27
Across
- Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
- traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
- (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
- (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
- (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
- conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
- methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
- (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
- (4,3,4) Passwords, passphrases, or PINs are all examples
- (4,3,4) Smart cards and security key fobs are both examples
- (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- controls what a user can and cannot do on the network after successful authentication.
- (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
- Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
- replaces data with authentic looking values to apply anonymity to the data records.
15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are both examples • replaces data with authentic looking values to apply anonymity to the data records. • controls what a user can and cannot do on the network after successful authentication. • ...
Supranationalism 2021-01-04
Across
- mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
- promotes unity and solidarity and spurs economic development in Africa
- organization governing common economic, social, and security issues in its European member states
- trading bloc between the countries of North America
- military alliance of countries in Western Europe and North America
Down
- high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
- integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
- global international organization that maintains peace and security and promotes economic and social development
- maintains peace and security and accelerates economic growth in Southeast Asia
9 Clues: trading bloc between the countries of North America • military alliance of countries in Western Europe and North America • promotes unity and solidarity and spurs economic development in Africa • maintains peace and security and accelerates economic growth in Southeast Asia • ...
SID 3b Hass im Netz 2021-04-30
Across
- Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
- Unwahre Nachrichten/Informationen im Internet
- Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
Down
- Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
- Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
- Man sollte wegen ... -accounts im Internet vorsichtig sein.
- erfundene „Tatsachen“.
7 Clues: erfundene „Tatsachen“. • Unwahre Nachrichten/Informationen im Internet • Man sollte wegen ... -accounts im Internet vorsichtig sein. • Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun? • Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden. • Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der... • ...
Global Unrest & Conflict 2025-09-13
Across
- Volunteer group that helped Ukraine during cyberattacks
- Middle Eastern region central to ongoing conflict with Israel
- One of the superpowers in the Cold War
- Type of warfare heavily used in Russia–Ukraine conflict
Down
- Peninsula annexed by Russia in 2014
- Indian state affected by ethnic unrest in 2023
- City claimed as the capital by both Israel and Palestine
7 Clues: Peninsula annexed by Russia in 2014 • One of the superpowers in the Cold War • Indian state affected by ethnic unrest in 2023 • Volunteer group that helped Ukraine during cyberattacks • Type of warfare heavily used in Russia–Ukraine conflict • City claimed as the capital by both Israel and Palestine • Middle Eastern region central to ongoing conflict with Israel
The London life 2015-11-11
36 Clues: bus • loud • fine • bell • gate • mean • keep • safe • king • throw • train • queen • tower • youth • plane • fight • fähre • begin • point • stand • square • ticket • flight • travel • palace • danger • famous • traffic • respect • airport • arrival • security • detective • escalator • departure • pickpockets
DO YOU KNOW NWACC? 2017-04-27
Across
- 1989 accredited by
- BH street address
- 1st NWACC president
- Inspire _____
- 1st DIR NWACC Homeland Security
- Place for Kudos
- Shipping/Receiving address
- Adult Ed Bldg
Down
- NWACC mascot
- Springdale hub
- school without _____
- empower _____
- Shewmaker Global CTR
- BOT chair
- Current president
- New CTR Food Study
- Minimart in SC
- Strengthen _____
- August 21, 2017
- Year of first NWACC hires 19--
20 Clues: BOT chair • NWACC mascot • empower _____ • Inspire _____ • Adult Ed Bldg • Springdale hub • Minimart in SC • August 21, 2017 • Place for Kudos • Strengthen _____ • BH street address • Current president • 1989 accredited by • New CTR Food Study • 1st NWACC president • school without _____ • Shewmaker Global CTR • Shipping/Receiving address • Year of first NWACC hires 19-- • 1st DIR NWACC Homeland Security
P.J. MacLayne 2017-11-19
Across
- Dog
- neutral territory
- enemy pack
- The ____ Flamingo
- red convertible
- security chief
- found in empty book
- Harmony's last name
- blue Pinto
- number of steps to the library
- Dot's transportation
- Gavin's pack
Down
- wolves kryptonite
- chief librarian
- The Marquesa's _______
- gentleman jewel thief
- Harmony's landlord
- police detective
- Where Tasha trained
- type of home
- FBI agent
- Florida businessman
22 Clues: Dog • FBI agent • enemy pack • blue Pinto • type of home • Gavin's pack • security chief • chief librarian • red convertible • police detective • wolves kryptonite • neutral territory • The ____ Flamingo • Harmony's landlord • Where Tasha trained • found in empty book • Harmony's last name • Florida businessman • Dot's transportation • gentleman jewel thief • The Marquesa's _______ • ...
Dog Breeds 2019-02-20
Across
- Mexican Mut
- Security Guard
- A Crocheted Blanket
- Deutschland Herder
- Speed King
- Firehouse Favorite
- Sniffs out Bad Guys
- Sled Propeller
- Peek-a-boo Hairdo
- Gives Directions
- Ravishing Redhead
- Hot Dog Dog
Down
- Rescues Skiers
- Yellow Go Getter
- PA State Dog
- The Most Famous is Uga
- Short Legs Long Ears
- Snoopy is One
- Pampered Pooch
- Lassie Lineage
20 Clues: Speed King • Mexican Mut • Hot Dog Dog • PA State Dog • Snoopy is One • Rescues Skiers • Security Guard • Sled Propeller • Pampered Pooch • Lassie Lineage • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Crocheted Blanket • Sniffs out Bad Guys • Short Legs Long Ears • The Most Famous is Uga
OS types 2024-04-30
Across
- turvalisus
- arendama
- ennustus
- määrama (mälu, ressurssi)
- arve
- sisend
- viivitus
- väljund
- konto, arve
- tabeliprogramm, arvutustabel
- pakk (töötlusüksuste (nt töödete) kogum)
- arvutama
- eemaldama
- talletama
- salasõna, parool
- liides
Down
- majanduslik, tulus
- laiendus, pikendus
- tuum
- luba
- korras hoidma, hooldama, teenindama
- lubama, võimaldama
- multitegumtöö
- saadaval, kättesadav
- looma
- vahnd, võimalus, funktsioon
- ligipääs
- suurarvuti
28 Clues: tuum • luba • arve • looma • sisend • liides • väljund • arendama • ennustus • viivitus • ligipääs • arvutama • eemaldama • talletama • turvalisus • suurarvuti • konto, arve • multitegumtöö • salasõna, parool • majanduslik, tulus • laiendus, pikendus • lubama, võimaldama • saadaval, kättesadav • määrama (mälu, ressurssi) • vahnd, võimalus, funktsioon • tabeliprogramm, arvutustabel • korras hoidma, hooldama, teenindama • ...
Robo Cap. 2 Vocabulario 2023-02-20
Across
- to shout, yell, shriek
- drives
- nickname for Costa Ricans
- security
- earthquake
- gardener
- to explain
- Pure life
- capital de Costa Rica
- rivers
- building
- doctors
- bamboo
- they get off (the plane)
- estate,ranch
Down
- toward
- chauffeur
- dictator
- trees
- seismic activity
- golf cart
- shouts, yells, shrieks
- to get off a mode of transportation
23 Clues: trees • toward • drives • rivers • bamboo • doctors • dictator • security • gardener • building • chauffeur • golf cart • Pure life • earthquake • to explain • estate,ranch • seismic activity • to shout, yell, shriek • shouts, yells, shrieks • capital de Costa Rica • they get off (the plane) • nickname for Costa Ricans • to get off a mode of transportation
Dog Breeds 2023-03-25
Across
- He’s a Fighter
- Ears are longer then legs
- Georgia's Uga
- Firehouse Favorite
- Gives Directions
- Lassie Lineage
- Little Rascal Petey
- PA State Dog
- Sled Propeller
- Ravishing Redhead
Down
- Peek-a-boo Hairdo
- Deutschland Herder
- Yellow Go Getter
- Snoopy is One
- The Crime Dog
- Security Guard
- Has an ugly Mug
- Speed King
- A Footlong Hot Dog
- Pampered Pooch
20 Clues: Speed King • PA State Dog • Snoopy is One • Georgia's Uga • The Crime Dog • He’s a Fighter • Security Guard • Lassie Lineage • Pampered Pooch • Sled Propeller • Has an ugly Mug • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Footlong Hot Dog • Little Rascal Petey • Ears are longer then legs
Travel vocab with accents Sp 2 2021-05-12
29 Clues: seat • coach • aisle • window • luggage • layover • on time • delayed • arrival • customs • seatbelt • passport • suitcase • train car • passenger • departure • controller • connection • ticket (2) • ticket (1) • first class • second class • trip, travel • event ticket • waiting room • security agent • in the airport • carry-on luggage • International airport
HATCHET VOCABULARY 2024-03-13
Across
- hence indistinct
- amount
- amount of fuel entering an engine
- caught on fire
- rounded hills
- travel on water and land
- engrossing completely
- height
- very careful way
Down
- burning sulfur in odor
- without knowledge
- make steady
- lessen
- violent twisting
- sorrowful way
- hindquarters
- shrinking back involuntarily
- crime or attack
- rejoice greatly
- existing in the earlies time
20 Clues: lessen • amount • height • make steady • hindquarters • sorrowful way • rounded hills • caught on fire • crime or attack • rejoice greatly • violent twisting • hence indistinct • very careful way • without knowledge • engrossing completely • burning sulfur in odor • travel on water and land • shrinking back involuntarily • existing in the earlies time • amount of fuel entering an engine
Crime and safety 2025-07-10
Across
- – xavfsizlik
- – xodim (politsiya yoki rasmiy)
- – adolat
- – xavf
- – politsiya
- – guvoh
- – xavfsizlik (umumiy)
- – xabar bermoq / hisobot
- – zo‘ravonlik
- – qoidalar
- – o‘g‘irlik
- – himoya qilmoq
- – turmada (qamoqda)
- – talonchilik
- – jamoa / aholi
Down
- – favqulodda holat
- – oldini olish
- – jarima
- – sud
- – qamoqxona
- – jazo
- – qonun
- – gumon qilinuvchi
- – jinoyat
- – kuzatuv kamerasi
- – hibsga olish
- – qo‘riqchi
- – qonuniy
- – tahdid
- – jabrlanuvchi / qurbon
30 Clues: – sud • – xavf • – jazo • – qonun • – guvoh • – jarima • – adolat • – tahdid • – jinoyat • – qonuniy • – qoidalar • – qamoqxona • – politsiya • – qo‘riqchi • – o‘g‘irlik • – xavfsizlik • – zo‘ravonlik • – talonchilik • – oldini olish • – hibsga olish • – himoya qilmoq • – jamoa / aholi • – favqulodda holat • – gumon qilinuvchi • – kuzatuv kamerasi • – turmada (qamoqda) • – xavfsizlik (umumiy) • – jabrlanuvchi / qurbon • ...
TẬP SỰ - DAY 6 - POSITIONS & DEPARTMENTS 2022-07-28
20 Clues: lễ tân • trợ lý • thư ký • cổ đông • quản lý • kế toán • giám đốc • phòng kho • phó chủ tịch • phòng bảo trì • phòng nhân sự • phòng an ninh • phòng kế toán • phòng sản xuất • người giám sát • phòng mua hàng • phòng kế hoạch • phòng tiếp thị • phòng kinh doanh • phòng quản lý chất lượng
Autumn 2022-12-14
26 Clues: Lee • Bob • Mae • Pond • Dory • Cronk • Mooska • Barbie • the Jr • The Rose • MeatHead • Lil Hulk • lil Rickey • The Senior • married in • Older Sister • Master Hunter • Expiriment 626 • Younger Sister • Old Blues Owner • Sister in heart • Spoke "Nataleese" • Hulks big brother • Same as her Gramma • Presidential Security • the family hairdresser
MMHC 2025-08-30
23 Clues: Fund • Blaine • Thomss • Claire • Blanche • ____ Roy • Tall Mike • Restrains • MSW Sykes • Fig or Greg • Eddie&Eddie • Beland & Ames • Joan on Quine • Next to Annex • CPS Secretary • Drove a Porche • Health Care Unit • Not so marvelous • Transpotation Boss • Coffee Break place • Head Social Worker • Old Lady Social Worker • Building for sewing, cooking,
King of Tokyo Crossword 2022-08-15
Across
- The oldest King of Tokyo robot that is still around today
- Which monster is an Egyptian God?
- This monster's name rhymes
- Which monster is based on King Kong?
- This monster was the same colour and food type as the promo monster 'Orange Death'
- The monster from the latest Monster Pack
Down
- Which monster is based on Godzilla?
- Who replaced 'Kraken' in the 2nd edition game?
- This monster was in a famous 1933 movie
- This monster was a 'Target' exclusive
- Which monster was in the Power Up expansion?
- The name of the game all of these monsters belong to
- The monster who replaced 'Cyber Bunny' in the 2nd edition game
- Which monster is first alphabetically?
- The monster who 'Kraken' from the original game was based on
15 Clues: This monster's name rhymes • Which monster is an Egyptian God? • Which monster is based on Godzilla? • Which monster is based on King Kong? • This monster was a 'Target' exclusive • Which monster is first alphabetically? • This monster was in a famous 1933 movie • The monster from the latest Monster Pack • Which monster was in the Power Up expansion? • ...
Crime vocabulary 2017-03-13
Across
- / A type of punishment whereby the offender has to pay money
- / To intentionally set fire to property
- / To attack someone
- / Repeatedly watching or following another person without them knowing
- / Criminal activity carried out online
- / Dishonest actions by those who hold power or authority
- / The consequences of committing a crime
- / Taking or receiving something to gain something more
Down
- / To betray one's own country
- / The action of taking someone else's property from them, without their consent
- / Assault or threatening of a partner, spouse or family member
- / A criminal offense of using threats or intimidation to make a gain
- / Treatment that is considered fair and equal
- / To fake or copy an important piece of document
- / A place where people are held for a crime they have committed
15 Clues: / To attack someone • / To betray one's own country • / Criminal activity carried out online • / To intentionally set fire to property • / The consequences of committing a crime • / Treatment that is considered fair and equal • / To fake or copy an important piece of document • / Taking or receiving something to gain something more • ...
CAB 2021-05-04
Across
- A mean moment is what kind of event?
- By the age of 25 , 1/4 who have bullied will spend time where?
- The what of power is unequal when it is bullying?
- what kind of bullying is online?
- what is the C in ABCD of bullying?
- excluding, spreading rumors is what king of bullying?
- An action that does not happen regularly is a mean what?
Down
- The D in ABCD of bullying is what?
- Name calling, threatening is what type of bullying?
- teasing is when everyone is having what?
- punching, kicking is what type of bullying?
- what is repeatitive, aggressive unwanted behavior?
- What is the A in ABCD of bullying?
- There's a solution to the problem..
- when everyone is having fun it is?
15 Clues: what kind of bullying is online? • The D in ABCD of bullying is what? • What is the A in ABCD of bullying? • when everyone is having fun it is? • what is the C in ABCD of bullying? • There's a solution to the problem.. • A mean moment is what kind of event? • teasing is when everyone is having what? • punching, kicking is what type of bullying? • ...
Tech terms 2019-08-23
Across
- A method of giving a false appearances of a helpful program when in reality it is a virus
- A physical device and anything attached to the physical computer
- Permeant storage inside of the computer
- A type of zip file
- A picture that jumps you to a new document
- Programs you add to the existing comp
- Bad software made to change settings without permission
Down
- The address of your tech assigned through the roughter
- The max amount of data transfer
- Joint photographic expert
- Cyber ethics, unwritten rules of the internet
- Graphic interface format
- A graphic on screen interface that represents a program
- A function used on twitter and other services that signs a post word used to sort post
- Allows you to send and receive over the telephone lines
15 Clues: A type of zip file • Graphic interface format • Joint photographic expert • The max amount of data transfer • Programs you add to the existing comp • Permeant storage inside of the computer • A picture that jumps you to a new document • Cyber ethics, unwritten rules of the internet • The address of your tech assigned through the roughter • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
CMPC Puzzle 2013-11-25
Across
- The abbreviation, CMC , stands for Classified Matter __________.
- Classification level must be marked on the __________ and bottom of all pages of a classified document.
- Cover sheets are required on a document when __________ from a GSA-approved security container.
- The __________ is responsible for applying appropriate classification markings on a printed e-mail message.
- A classified working paper must be finalized or __________ after a 180 day retention period.
- You must have a Q-Clearance and assigned authorities to review classified matter with a _________ caveat.
- Using an inner and outer envelope to transmit a classified document is considered __________ __________. (2 words)
- Individual responsible for reviewing a document prior to dissemination outside the laboratory is called a __________ classifier.
- A classified __________ receipt must be used when mailing/transferring accountable and secret information outside the Laboratory.
- Classifier information for parts is maintained on the __________.
- In addition to proper clearance, sigma authorities, and required training, what does an individual require for accessing/view classified matter? (3 words, no spaces).
- Classified mail must be delivered to a primary/alternate CMC or other __________ individual at a designated classified mail stop.
- FedEx service cannot be used on __________ or day before a holiday.
- Addresses for recipients of classified matter shipped outside the laboratory must be verified by accessing the Mail __________ Directory.
- Workers must obtain originator approval before reproducing classified matter marked with ORCON, Sigma 14, or __________ caveats. (1 word+number – no space)
- You should never leave a security container _____.
- __________ identify special handling instructions and dissemination requirements.
- The only form you are allowed to write down the combination to a security container is the SF700 __________. (1 word+number – no space)
- Top Secret, Secret, and Confidential are classification __________.
Down
- The retention period for the SF70 is __________ months past the last date of entry.
- Protection methods used for classified matter are referred to as physical, visual, and __________ protection.
- All accountable matter must be assigned a __________ identifier, such as a document number, barcode, or serial number.
- Receipts must be retained for 2 years for Secret and __________ matter.
- RD, FRD, and NSI are abbreviations for classification __________.
- Shredders to be used for destruction of classified matter must be __________ before destroying classified matter.
- Secret level documents can be sent outside the laboratory using __________ mail or FedEx.
- Highest level and category of information and “L” cleared worker can access. __________ (abbreviation)
- The caveat ORCON identifies what type of classified matter? (2 words, no space)
- When do you report a security event or incident?
- You get approval of the destruction method from __________ when preparing to destroy classified parts. (1 word+number – no space)
- What category of classified document does not require a category admonishment marking? __________ (abbreviation)
- If a __________ copier has an image overwrite security feature and is clearly marked, you do not need to power down the machine for 30 seconds.
- All classified matter must be __________ and brought up to current marking standards when released from LANL or a multi-site work group.
- __________ copiers are cleared by running three blank pages using same process for copying.
- __________ are not a type of classified matter.
35 Clues: __________ are not a type of classified matter. • When do you report a security event or incident? • You should never leave a security container _____. • The abbreviation, CMC , stands for Classified Matter __________. • RD, FRD, and NSI are abbreviations for classification __________. • Classifier information for parts is maintained on the __________. • ...
Imagined Universes Exploration 2022-11-30
18 Clues: fam! • ..... • green. • release • Marvel. • impartial • intentional • not Feng Shui. • somewhat united. • free from danger. • what we're doing. • it's enlightening. • related to fingers. • once upon many times. • believed to exist or be so. • where everything is perfect. • addictive song for some people. • we mean authentic, not powerful.
Hollywood Bowl 2023-07-28
18 Clues: Ops Boss • P90 Cook • Boston P90 • Ex PAAS Ops • Russian Ops • Ops Magician • Before Dreima • House Manager • Bowl Security • Human Resources • Before Angelina • Before "X" Gate • Burgundy Uniform • Graphic Designer ops • The bowl sister venue • 91 year old conductor • Venezuelan LA Phil Conductor • Who can get me a wheelchair?
Ashley and Jen 2024-12-08
17 Clues: artsy girl • crazy kitty • furry Buddha • your hangout • where we met • favorite boy • kitty comfort • I love you time • month we met f2f • your happy place • Ms. Independence • anniversary month • not jens favorite • furry favorite boy • your birth day date • our favorite flowers • home security system
Crossword 2023-07-19
6 Clues: A type of health insurance • Insurance which provides protection to farmer • An amount to be paid for a contract of insurance • A type of policy offered under property insurance • Supervises the functioning of insurance business in India • An insurance company providing business and cyber insurance
Types of bulling 2022-10-24
Across
- harassment is to touch someone inappropriate to make them fell uncomfortable
- bullying is to hurt someone intentionally
- pressure is to force people to do some thing even if they don’t want to
- when someone give off suicidal signs
Down
- bulling it to tease someone
- making to make a decision to do good
- bulling is to make fun of someone online
7 Clues: bulling it to tease someone • making to make a decision to do good • when someone give off suicidal signs • bulling is to make fun of someone online • bullying is to hurt someone intentionally • pressure is to force people to do some thing even if they don’t want to • harassment is to touch someone inappropriate to make them fell uncomfortable
Teachers at School 2025-04-08
Across
- ELPT
- Third grade teacher
- Language teacher in room 208
- Lunchroom worker
- Office clerk
- Interventionist
- Kindergarten teacher
Down
- Clinician
- Teaches middle school social studies
- Teaches driver's Ed
- Security guard
- PK SECA
- Cheer Coach and SECA
- Speech therapist
- Middle school science teacher
- Art teacher
- Common sub at LaSalle
17 Clues: ELPT • PK SECA • Clinician • Art teacher • Office clerk • Security guard • Interventionist • Speech therapist • Lunchroom worker • Teaches driver's Ed • Third grade teacher • Cheer Coach and SECA • Kindergarten teacher • Common sub at LaSalle • Language teacher in room 208 • Middle school science teacher • Teaches middle school social studies
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
Logistics 2021-11-29
8 Clues: Any person • Least expensive dock • Free and Secure trade • Most commonly used dock • Container Security Initiative • Customs-Trade Partnership against terrorism • A substance or material that the USDOT says is unsafe • Provides the most security and protection from weather
Read articles to solve 2023-04-17
8 Clues: Morning runners • say how to fix it • Something that you cant buy • Data security and Encryption • Fiona's journey to Technical writing • security information and event management • instructions on how to use a product (Two words) • Does it explain clearly what went wrong? (Two words)
Gramm Leach Bliley 2021-11-09
La Crisis del Hambre en Africa 2019-10-10
TC Team 2021/22 2021-11-19
Across
- The sponsor for the Space & Environment stream.
- The number of formal sessions in the Program.
- The sponsor for the Space & Security stream.
- This person studies Aeronautical Engineering and Science at USYD.
- This person studies Law and International Security at ANU.
Down
- The main deliverable in the Astra Program.
- The name of the formal sessions of the Astra Program.
- The sponsor for the Space & Industry stream.
- This person currently works as a Compliance and Administration officer.
- This person studies Aerospace Engineering and Commerce at Monash University.
- The speakers and presenters in the Astra Program. An acronym.
- This person studies Mechatronics Engineering and Computer Science at USYD.
- This person studies Law and Arts at Monash University.
13 Clues: The main deliverable in the Astra Program. • The sponsor for the Space & Industry stream. • The sponsor for the Space & Security stream. • The number of formal sessions in the Program. • The sponsor for the Space & Environment stream. • The name of the formal sessions of the Astra Program. • This person studies Law and Arts at Monash University. • ...
Computer Science 07 2020-01-22
Across
- xxx controls, methods to stop children accessing inappropriate content on the internet.
- xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
- act helps to protect intellectual property, copyright, designs and patents, written and recorded content
- xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
- xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
- if computer hardware is not recycled properly it can lead to
- xxx divide, Some people have greater access to technology than others
- xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
- possible result of impact of cyberbullying.
- unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
- xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
- Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
- xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
- xxx misuse act is the legislation that can be used to prosecute hackers
- Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection
15 Clues: possible result of impact of cyberbullying. • if computer hardware is not recycled properly it can lead to • xxx divide, Some people have greater access to technology than others • xxx misuse act is the legislation that can be used to prosecute hackers • unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop • ...
Bullying 2020-06-07
Across
- they bully you with a screen.
- its bad otherwise the person you hurt will become
- This bullying is very bad because it makes people sad,scared.
Down
- This bullying makes people sad and depressed
- can not only mentally hurt someone but get people physically hurt.
- This bullying makes people lonely and sad and depressed.
- you.
7 Clues: you. • they bully you with a screen. • This bullying makes people sad and depressed • its bad otherwise the person you hurt will become • This bullying makes people lonely and sad and depressed. • This bullying is very bad because it makes people sad,scared. • can not only mentally hurt someone but get people physically hurt.
cyber safety 2013-11-07
6 Clues: mail sent electronically • some on that bullies others electronically • something people give your computer to harm it • someone that steals your details electronically • something used to keep your details safe and private • something on your computer that protects you from hackers and viruses
Latin Crossword 2024-02-15
U03 CH4 Key Terms 2024-02-27
Across
- Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
- traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
- (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
- (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
- (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
- conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
- methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
- (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
- (4,3,4) Passwords, passphrases, or PINs are all examples
- (4,3,4) Smart cards and security key fobs are both examples
- (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- controls what a user can and cannot do on the network after successful authentication.
- (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
- Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
- replaces data with authentic looking values to apply anonymity to the data records.
15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are both examples • replaces data with authentic looking values to apply anonymity to the data records. • controls what a user can and cannot do on the network after successful authentication. • ...
Location & Venues 2018-11-18
Across
- Who played at the Cavern Club?
- What is a large venue likely to make more of?
- What sort of venue is a nightclub?
- Who was the lead singer for Queen?
- What does every venue need to make audiences safe?
- What is the missing word? The Royal ___ Hall?
Down
- What sort of venue is Manchester Arena?
- Who is the world's richest musician?
- What is the UK's largest music venue?
- What is another name for security guards?
10 Clues: Who played at the Cavern Club? • What sort of venue is a nightclub? • Who was the lead singer for Queen? • Who is the world's richest musician? • What is the UK's largest music venue? • What sort of venue is Manchester Arena? • What is another name for security guards? • What is a large venue likely to make more of? • What is the missing word? The Royal ___ Hall? • ...
Compliance Corner Crossword 2024-04-11
Across
- Alternate to filling out the Privacy security incident form
- Data Loss Prevention
- Health Insurance Portability and Accountability Act
- Personal Identifiable Information
- Provide this when reporting a privacy incident
- This type of incident has resulted in (or could result in) unauthorized use or disclosure of PII/PHI.
Down
- Website where you can find the privacy and security incident form
- Protected Health Information
- Who is responsible for reporting privacy incidents
- First action to recognizing a privacy incident
10 Clues: Data Loss Prevention • Protected Health Information • Personal Identifiable Information • First action to recognizing a privacy incident • Provide this when reporting a privacy incident • Who is responsible for reporting privacy incidents • Health Insurance Portability and Accountability Act • Alternate to filling out the Privacy security incident form • ...
Computer Science 07 2020-01-22
Across
- xxx controls, methods to stop children accessing inappropriate content on the internet.
- xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
- act helps to protect intellectual property, copyright, designs and patents, written and recorded content
- xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
- xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
- if computer hardware is not recycled properly it can lead to
- xxx divide, Some people have greater access to technology than others
- xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
- possible result of impact of cyberbullying.
- unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
- xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
- Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
- xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
- xxx misuse act is the legislation that can be used to prosecute hackers
- Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection
15 Clues: possible result of impact of cyberbullying. • if computer hardware is not recycled properly it can lead to • xxx divide, Some people have greater access to technology than others • xxx misuse act is the legislation that can be used to prosecute hackers • unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop • ...
EMR Teams 2022-09-14
Across
- Outpatient Facilities
- Laboratory(blood)
- Medical Records, OnBase, Rightfax
- charges generated in an outpatient setting
- Inpatient charges
- registration and scheduling
- baby delivery
- Dorothy
- all things surgery
Down
- Account provisioning
- Reports
- Cancer(oncology)
- I dont know how to do something
- Radiology
- Pharmacy
- Heart(cardiology)
- admitting discharges and transfers
- Emergency Department
- Admitted to a hospital floor
19 Clues: Reports • Dorothy • Pharmacy • Radiology • baby delivery • Cancer(oncology) • Laboratory(blood) • Heart(cardiology) • Inpatient charges • all things surgery • Account provisioning • Emergency Department • Outpatient Facilities • registration and scheduling • Admitted to a hospital floor • I dont know how to do something • Medical Records, OnBase, Rightfax • admitting discharges and transfers • ...
Safety Day Challenge 2024-05-29
16 Clues: PPE • GMP, ISO • Help desk • Gate Keeper • spare parts • Quality Process • Fall Protection • industrial truck • Lock out Tag out • To rid or remove • Product ready to ship • to perform maintenance • Emergency Response Team • Site communication Meeting • vessel to transport product • Personal Proctective Equipment
Terrorism Case Study - 9/11 2014-05-10
Across
- The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
- Hijackers aboard Flight 77 crash the plane into the western front of the
- The use of force or threats to frighten people and the government
- Agents that move to a country, blend into a community, and then carry out terrorist attacks Patriot / USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
- Letters containing bacteria that cause _____ were sent to members of Congress
- The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
- Terrorist group responsible for September 11th attacks.
Down
- _____ bin Laden was responsible for coordinating the attacks
- The fourth plane crashed in an empty field in ______ due to heroic passengers
- The Department of _______ Security was created to coordinate national efforts against terrorism
10 Clues: Terrorist group responsible for September 11th attacks. • _____ bin Laden was responsible for coordinating the attacks • The use of force or threats to frighten people and the government • Hijackers aboard Flight 77 crash the plane into the western front of the • The fourth plane crashed in an empty field in ______ due to heroic passengers • ...
stay safe online 2025-10-03
13 Clues: online trick • enter / reach • cheat / fraud • say / declare • careful / alert • set up / put in • false / not real • refuse / decline • worried / nervous • refresh / improve • safety / protection • importantly / gravely • carelessly / relaxedly
Coding 2022-06-10
Across
- relating to or characteristic of the culture of computers, information technology, and virtual reality
- the process or activity of writing computer programs
- Lines of code
- involving or relating to the use of computer technology
- A type of code
Down
- The creator of a computer program
- relating to, using, or denoting a system of numerical notation that has 2 rather than 10 as a base.
- the set of instructions, or a system of rules, written in a particular programming language
- the state of being free from public attention
9 Clues: Lines of code • A type of code • The creator of a computer program • the state of being free from public attention • the process or activity of writing computer programs • involving or relating to the use of computer technology • the set of instructions, or a system of rules, written in a particular programming language • ...
Bullying 2022-11-15
Across
- True or False 1 in 5 people between the ages of 8 and 15 have been cyber bullied
- True or False does everyone realise they are bullying
- you should be an _____ if you see bullying occur
- when you bully someone with words
- why do people behave different online
Down
- when you bully online
- _____.com is a place where you can go to get help for bullying
- when you bully someone by touching them
- who do you talk to when you have a problem with bullying
9 Clues: when you bully online • when you bully someone with words • why do people behave different online • when you bully someone by touching them • you should be an _____ if you see bullying occur • True or False does everyone realise they are bullying • who do you talk to when you have a problem with bullying • _____.com is a place where you can go to get help for bullying • ...
e-commerce 2020-12-03
Across
- Si dice lo sia il lavoro agile
- software progettato per simulare una conversazione con un essere umano
- parola che serve per identificare un documento o per compiere ricerche in un database
Down
- Applicativo web più utilizzato per le videoconference
- vendere un prodotto senza possederlo materialmente in magazzino
- attività per migliorare il posizionamento di contenuti
- Lo è la sicurezza online
- Page utilizzata come destinazione di link o pubblicità
- paradigma di erogazione di servizi offerti su richiesta da un fornitore a un cliente finale
9 Clues: Lo è la sicurezza online • Si dice lo sia il lavoro agile • Applicativo web più utilizzato per le videoconference • attività per migliorare il posizionamento di contenuti • Page utilizzata come destinazione di link o pubblicità • vendere un prodotto senza possederlo materialmente in magazzino • software progettato per simulare una conversazione con un essere umano • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Tinkerers Lab + Kludge 2023-03-27
Across
- What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
- Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
- What animal could a firefox be called
- What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
- What does the T in reCAPTCHA stand for
- A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
- WinVru was the virus first made for which OS
- According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
- The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
- What does the first "D" stand for in the common cybercrime known as a DDoS attack?
- A makeshift solution to a problem, especially a computer or programming problem.
- A computer connected to a network that a hacker has compromised
- The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
- What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
- A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
- Hacking for a cause
- A person who enjoys fixing and experimenting with machines and their parts.
- What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt
18 Clues: Hacking for a cause • What animal could a firefox be called • What does the T in reCAPTCHA stand for • WinVru was the virus first made for which OS • A computer connected to a network that a hacker has compromised • A person who enjoys fixing and experimenting with machines and their parts. • ...
Sambas Riot 1999 2020-11-23
AIRPORT VOCABULARY 2023-11-24
11 Clues: luggage • passport • suitcases • departure • planeticket • securitybelt • boardingpass • checkin counter • seat(on the plane) • gate(for boarding) • security checkpoint
YN BIBLIOGRAPHIES 2020-01-31
Across
- M-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAM
- VOLUME 9 TRAVEL POLICY
- ADVANCEMENT MANUAL FOR ENLISTED PERSONNEL OF THE U.S. NAVY AND U.S. NAVY RESERVE
- NAVY AND MARINE CORPS AWARDS MANUAL
- DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM
- DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL
Down
- NAVAL MILITARY PERSONNEL MANUAL
- VOLUME 7A MILITARY PAY POLICY - ACTIVE DUTY AND RESERVE PAY
- SOCIAL USAGE AND PROTOCOL HANDBOOK
- CERTIFICATE OF RELEASE OR DISCHARGE FROM ACTIVE DUTY
- DEPARTMENT OF THE NAVY INFORMATION REQUIREMENTS (REPORTS) MANUAL
- DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM
- DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL
- DEPARTMENT OF THE NAVY NAVY RECORDS MANAGEMENT PROGRAM RECORDS MANAGEMENT MANUAL; PART I, II, III
14 Clues: VOLUME 9 TRAVEL POLICY • NAVAL MILITARY PERSONNEL MANUAL • SOCIAL USAGE AND PROTOCOL HANDBOOK • NAVY AND MARINE CORPS AWARDS MANUAL • DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL • DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL • M-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAM • DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM • ...
Know Your Customer 2020-05-14
Across
- This stands for National Insurance Number
- Security Level to make changes
- KYC information is first collected during this process
- It can be found in Sophia
- A KYC check is also this check at application
- Never use this with a customer
Down
- This is the DPA principle that states our customer's details must be kept accurate and up to date.
- This stands for Know Your Customer
- Remember to do this to the KYC Date
- This is the security level for checking
- Show this when the customer is annoyed you want to carry out a KYC check.
- This source is part of Savings KYC
- We act on these when required
13 Clues: It can be found in Sophia • We act on these when required • Security Level to make changes • Never use this with a customer • This stands for Know Your Customer • This source is part of Savings KYC • Remember to do this to the KYC Date • This is the security level for checking • This stands for National Insurance Number • A KYC check is also this check at application • ...
Lesson 9 Crossword Answers 2025-07-12
Across
- Returned from exile to restore correct observance of Law.
- Nation that conquered Babylon.
- People from the south first mentioned in this period.
- Prophet who predicted the number of years until Messiah
- Jews grouped years by _________.
- Returned from exile to ensure Jerusalem's security.
- Enemies of the Jews of mixed Israelite and Gentile blood.
Down
- Jewish official in the court of Persia with a beautiful niece. who
- Rebuilding these was the key to Jerusalem's security.
- Along with Zechariah, he urged completion of a second Temple.
- Led 50,000 Jews from exile back to Judea.
- She remained exile with her uncle and married a Persian king.
- Jerusalem's surrounding bulwark was completed in an amazing _______-two days!
13 Clues: Nation that conquered Babylon. • Jews grouped years by _________. • Led 50,000 Jews from exile back to Judea. • Returned from exile to ensure Jerusalem's security. • Rebuilding these was the key to Jerusalem's security. • People from the south first mentioned in this period. • Prophet who predicted the number of years until Messiah • ...
Global Issues 2024-11-12
STOP BULLYING 2024-09-29
Across
- Jenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemanan
- Jenis bullying yang menggunakan teknologi seperti media sosial
- Bentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain
Down
- Jenis bullying yang melalui lisan dan tulisan
- Seseorang yang mengalami tindakan bullying
- Jenis bullying berupa menendang dan memukul
6 Clues: Seseorang yang mengalami tindakan bullying • Jenis bullying berupa menendang dan memukul • Jenis bullying yang melalui lisan dan tulisan • Jenis bullying yang menggunakan teknologi seperti media sosial • Jenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemanan • Bentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain
CyberBullying 2022-10-27
6 Clues: we should be a _____, not a bully • A bullying that uses the internet. • A person who stands up against bullies. • An effect of cyberbullying(starts with D). • An example of cyberbullying(starts with H). • A place where a cyber bully can bully you(starts with C)
CNN Student News 11/4/13 2013-11-04
Across
- Continent where Iraq is located
- Largest religion in India
- World series champs home city
- Government group in charge of airport security
Down
- Annual Hindu festival in India
- Reason there was no NYC Marathon last year
- Nickname for the Affordable Care Act
- Mascot for all of the "Roll Call" schools on todays CNN Student News
- major concern for NYC Marathon organizers
9 Clues: Largest religion in India • World series champs home city • Annual Hindu festival in India • Continent where Iraq is located • Nickname for the Affordable Care Act • major concern for NYC Marathon organizers • Reason there was no NYC Marathon last year • Government group in charge of airport security • Mascot for all of the "Roll Call" schools on todays CNN Student News
SEC Crossword 2024-12-13
Across
- was a program intended for ______
- the SEC helped prevent _______ trading
- the SEC protects _________
- first chairman of the SEC (last name)
Down
- president that established the program (last name)
- the SEC has adapted to technological advancements like ______currency
- the SEC enforces ________ laws (singular)
- abbreviation for the main security exchange that was regulated
- number of divisions of the SEC as of 2024
9 Clues: the SEC protects _________ • was a program intended for ______ • first chairman of the SEC (last name) • the SEC helped prevent _______ trading • the SEC enforces ________ laws (singular) • number of divisions of the SEC as of 2024 • president that established the program (last name) • abbreviation for the main security exchange that was regulated • ...
CYBERCRIME INVESTIGATION (PUZZEL) 2021-07-12
Across
- a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
- Internet Auctions online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
- and thefts stealing( money, property), e.g. credit card fraud, intellectual property violations ( a.k.a piracy)
- The Salami Slice an employee sets up a dummy account in the company’s computerized records. A small amount-even a few pennies- is subtracted from customers’ account and added to the account of the thief.
- visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- or Cartridges these can be used to store copies of files from the computer for use in his investigation
- market economic activity undertaken via the internet or similar electronic communication networks.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- Internet Securities Fraud some criminals make use of internet chat rooms in their fraudulent schemes.
- The Logic Bomb a program is secretly attached to the company’s computer system. The new program monitors the company’s work and wait for a sign of error to appear, some illogic that was designed for the computer to follow. Illogic causes the logic bomb to kick into an action and exploit the weakness.
- Property property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- Screwdrivers and other tools used to dismantle the hardware for seizure.
- terrorism terrorist activity that targets computer networks and information systems for attack.
- any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- Horses malicious software programs which are infiltrated into computers disguised as benign applications or data.
- leakage a person illegally obtains data from a computer system by leaking it out in small amounts.
- Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- stalking stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- of Service an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
Down
- crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
- doing psychological harm to, or inciting physical harm against others, thereby breaching laws relating to the protection of the person, e.g. hate speech, stalking.
- political activism and social protest that uses hacking tools and techniques
- a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- most computer programs used in business have built-in anti-theft safeguards. However employees can use a repair or maintenance program to supersede the antitheft program. Some tinkering with the program is required, But the “super-zapper” is soon able to order the system to issue checks to his or her private account.
- Software or malware a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- pornography breaching laws on obscenity and decency
- those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
- Defacement the activity of altering the code organizing a website so as to alter the visible screen content.
- The Trojan Horseone computer is used to reprogram another for illicit purposes.
- remember that often, latent prints can be taken from disks or other storage media or hardware.
- Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- Camera equipment to videotape and photograph the scene.
- Society a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- Crime criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
- the act of copying digital material posted online into the storage medium on one’s computer.
- materials rubber bands, tape, boxes, bubble wrap, and if he does not have access to anti-static wrap, paper bags should be used, because they have less static charge than plastic bags.
- Rights legally institutionalized rights to own and control goods.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- Impersonationan unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- Sharing the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
- the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- Privacy the right to be left alone; freedom from observation and interference from others.
- the interactional space or environment created by linking computers together into a communication net5work.
- to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
50 Clues: pornography breaching laws on obscenity and decency • Camera equipment to videotape and photograph the scene. • Rights legally institutionalized rights to own and control goods. • Screwdrivers and other tools used to dismantle the hardware for seizure. • political activism and social protest that uses hacking tools and techniques • ...
SID 3b Hass im Netz 2021-04-30
Across
- Unwahre Nachrichten/Informationen im Internet
- Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
- Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
Down
- Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
- Man sollte wegen ... -accounts im Internet vorsichtig sein.
- Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
- erfundene „Tatsachen“.
7 Clues: erfundene „Tatsachen“. • Unwahre Nachrichten/Informationen im Internet • Man sollte wegen ... -accounts im Internet vorsichtig sein. • Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun? • Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden. • Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der... • ...
Investing 2024-05-29
Across
- fixed point of time in the future
- portfolio of stocks or bonds designed to mimic
- type of security where issuer owes holder debt
- income that you earn and recieve
- the ownership certificates of any company
Down
- a good sold for production or consumption
- payments made into or out of a business,project,etc.
- action of diversifying something
- direction given to a broker to buy or sell security
- statement of assets, liabilities, and cap. of a business
10 Clues: action of diversifying something • income that you earn and recieve • fixed point of time in the future • a good sold for production or consumption • the ownership certificates of any company • portfolio of stocks or bonds designed to mimic • type of security where issuer owes holder debt • direction given to a broker to buy or sell security • ...
CW Sample 2024-05-16
Across
- A popular DEX platform on the Binance Smart Chain.
- The ability of a blockchain to handle increased transactions.
- The ability of different blockchains to communicate.
- A community-governed organization on the blockchain.
Down
- A virtual world with a digital economy.
- Financial contracts derived from the value of other assets.
- Self-executing code that powers DEX functionality.
- Program that rewards hackers for finding security bugs.
- Ethical hacker who identifies security vulnerabilities.
- Digital version of a fiat currency.
10 Clues: Digital version of a fiat currency. • A virtual world with a digital economy. • A popular DEX platform on the Binance Smart Chain. • Self-executing code that powers DEX functionality. • The ability of different blockchains to communicate. • A community-governed organization on the blockchain. • Program that rewards hackers for finding security bugs. • ...
