cyber security Crossword Puzzles

Privacy Day Crossword 2022-12-07

Privacy Day Crossword crossword puzzle
Across
  1. Acronym for the international standard development organization publishing norms related to privacy, security and information management.
  2. If you suspect a privacy or security breach, you must report it immediately to___@bmc.com.
  3. My date of birth is an example of___data.
  4. Process by which a readable message is converted to an unreadable form, to prevent unauthorized parties from reading it.
  5. The GDPR sets a maximum___of €20 million or 4% of annual global turnover.
  6. Acronym for the European general data protection law entered into force in 2018.
  7. Lawyer and activist who became famous suing Facebook in Europe for privacy violations.
  8. _ is responsible for data security & privacy.
  9. Acronym for California’s privacy law approved in November 2020.
  10. Sending fraudulent messages to steal confidential information such as login credentials is also called___.
Down
  1. Medical records, political opinions, biometrics are examples of___personal information.
  2. Acronym for BMC’s Lead Data Protection Authority in Europe.
  3. Small text files that may be placed on your computer by websites that you visit.
  4. ___from individuals is necessary for email marketing campaigns.
  5. The right to be___is when you can ask an organisation that holds data about you to delete that data.
  6. Acronym for the ‘gold standard’ transfer mechanism, which BMC has since 2015.
  7. Data___is any entity that processes personal data on behalf of and as instructed by the data controller.
  8. What the P stands for in LGPD, the statutory law on data protection and privacy in Brazil.
  9. Privacy by___means that the privacy protection rules are taken into account already when IT systems and procedures are designed.
  10. Right to be let alone, or freedom from interference or intrusion.

20 Clues: My date of birth is an example of___data._ is responsible for data security & privacy.Acronym for BMC’s Lead Data Protection Authority in Europe.___from individuals is necessary for email marketing campaigns.Acronym for California’s privacy law approved in November 2020.Right to be let alone, or freedom from interference or intrusion....

Chapter 2 2022-11-22

Chapter 2 crossword puzzle
Across
  1. Stock Exchanges
  2. Largest category of deposit institution.
  3. A financial institution that provides services for businesses.
  4. A document guaranteeing payment of a specific amount of money.
  5. Money for real estate, equipment, and so on.
  6. A document guaranteeing that a buyer will pay the seller the agreed-upon amount and within the time specified.
  7. Those people who do the work.
  8. A financial institution that makes money by using loans.
  9. People who lend money to the business in return for a contracted rate of interest or return for their investment.
  10. Someone who assists you with purchasing stocks and bonds.
  11. Over-the-counter (OTC)
  12. Federal Deposit Insurance Corporation
  13. Largest category of deposit institution.
Down
  1. A bank account is used by depositors to accumulate money for future use.
  2. People who buy shares of stock in the company.
  3. Any organization that provides services related to money.
  4. Publicly traded corporations are required to have their annual reports prepared by an outside accounting firm.
  5. Stock Exchanges
  6. People who buy shares of stock in the company.
  7. For-profit businesses that sell insurance products.
  8. A security that pays interest over terms of ten to thirty years.
  9. Shares can be traded openly.
  10. A security that matures in a year or less.
  11. A written order for the bank to pay a specific amount to the person or organization to which the check is written.
  12. A type of EFT transaction, money is deposited directly into a customer's checking account.
  13. Allows customers to pay for purchases and withdraw cash.
  14. An action to manage supply of money and interest.
  15. A security that pays interest over terms ranging from two to ten years.
  16. A bank account that allows the account owner to make deposits, write checks, and withdrawl money.
  17. A prearranged amount of credit that is available for a business to use as needed.

30 Clues: Stock ExchangesStock ExchangesOver-the-counter (OTC)Shares can be traded openly.Those people who do the work.Federal Deposit Insurance CorporationLargest category of deposit institution.Largest category of deposit institution.A security that matures in a year or less.Money for real estate, equipment, and so on....

ITS2210 Module 6 Crossword 2019-04-02

ITS2210 Module 6 Crossword crossword puzzle
Across
  1. Using interpersonal skills to extract information about a computer system and its security
  2. Perform system patches, probe for flaws, check logs, and review policies
  3. the most basic rule of computer security is to install these
  4. The minimum frequency for system probing and audits
  5. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  6. One who hacks into systems to accomplish some goal that they feel is ethically valid
  7. The most prestigious certification for networking professionals
  8. The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
  9. this should be done to large networks to break them up into more manageable networks
  10. A reference to how long a user has used a password
Down
  1. Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
  2. preferred location for storing backups
  3. Hackers who hack only for legal/ethical purposes
  4. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
  5. The process to scan a network looking for vulnerabilities
  6. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. A numerical designation for a connection point on a computer
  8. Someone who attempts to compromise a system to assess its vulnerability
  9. this should be done to all unneeded programs/software on a server
  10. the six Ps of security are: ports, patch, _____, probe, policies, physical

20 Clues: preferred location for storing backupsHackers who hack only for legal/ethical purposesA reference to how long a user has used a passwordThe minimum frequency for system probing and auditsThe process to scan a network looking for vulnerabilitiesthe most basic rule of computer security is to install these...

PC Pro Chapter 7 2020-02-03

PC Pro Chapter 7 crossword puzzle
Across
  1. A profile designed for use on unknown networks.
  2. A smart speaker that controls your smart appliances and performs other actions through voice commands
  3. A profile designed to be used in a SOHO.
  4. A network devices that connects Wi-Fil devices to forma Wi-Fi network
  5. The internet of things.
  6. An optional component of the 802.11 specifications.
  7. A method for remapping one IP address space into another by modifying network address information in packets' IP headers while they are in transit.
  8. A small office/home office network.
  9. Communication technology that enables communication between two devices in close proximity.
  10. A wireless network access protocol that uses WEP.
  11. Communication technology that uses radio waves in the 2.4 ghz range
  12. Communication technology that uses invisible light waves.
  13. A network security standard for wireless home networks
  14. A wireless security that adheres to 801.11i specifications
  15. An IoT standard based protocol.
Down
  1. An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network.
  2. An enhancement to MIMO that allows a set of devices with individual antennas, rather than just one device with an antenna, to communicate with each other.
  3. IoT standard based protocol. Simpler and less expensive than Zigbee.
  4. The network name
  5. A wireless security based on 802.11i specifications
  6. An enhancement that allows multiple antennas to use the same radio frequency
  7. An authentication standard that uses username/passwords, certificates, or devices such as smart cards to authenticate clients.
  8. A temporary peer-to-peer mode network
  9. An token-based authentication standard that requires a MAC address to use.
  10. A profile designed for networks in which you know and trust every device
  11. Combining channels into one to increase bandwidth

26 Clues: The network nameThe internet of things.An IoT standard based protocol.A small office/home office network.A temporary peer-to-peer mode networkA profile designed to be used in a SOHO.A profile designed for use on unknown networks.Combining channels into one to increase bandwidthA wireless network access protocol that uses WEP....

Unit 7 2023-02-24

Unit 7 crossword puzzle
Across
  1. the process of making connections and building relationships
  2. Income includes your wages, dividends, capital gains, business income, retirement distributions as well as other income
  3. Letter tter sent with, and explaining the contents of, another document
  4. Market the supply of and demand for labor, in which employees provide the supply and employers provide the demand
  5. Insurance A contract that requires your health insurer to pay some or all of your
  6. Wage the minimum amount of money someone can make
  7. mention or refer to
  8. a meeting usually face to face especially for the purpose
  9. a sum of money paid to an employee upon completion of a task, usually selling a certain
  10. money or value that an individual or business entity receives in exchange for providing a good
  11. U.S. federal payroll tax
  12. the average wage for a worker in a specified position or occupation,
  13. of Recommendation a letter written on behalf of an applicant by someone who can vouch for that person's educational
Down
  1. the practicing of an activity, especially a sport, by professional rather than amateur players.
  2. a professional learning experience that offers meaningful, practical work related to a student's field of study or career interest.
  3. business, calling, métier, occupation, pursuit, and work
  4. document summarizing a person's professional and academic background, relevant skills, and accomplishments
  5. Plan individual retirement accounts
  6. the amount of money you make
  7. Income type of tax that governments impose on income generated by businesses and individuals within
  8. 65 or older
  9. Skills people skills
  10. Security Social Security” is the term used for the Old-Age, Survivors, and Disability Insurance (OASDI) program in the United States, which is run by the Social Security Administration (SSA), a federal

23 Clues: 65 or oldermention or refer toSkills people skillsU.S. federal payroll taxthe amount of money you makePlan individual retirement accountsWage the minimum amount of money someone can makebusiness, calling, métier, occupation, pursuit, and worka meeting usually face to face especially for the purpose...

AWS CP CW 1 2023-06-29

AWS CP CW 1 crossword puzzle
Across
  1. an intelligent threat detection system that uncovers unauthorized behavior
  2. offers on-demand access to aws security and compliance reports
  3. a dns service that routes users to applications
  4. this pillar focuses on environmental impact, especially energy consumption and efficiency
  5. allows you to assess, audit, and evaluate the configurations of your resources
  6. helps you control access to mobile and web applications
  7. causes a traffic jam on a website or application in an attempt to cause it to crash
  8. helps you discover and protect sensitive data
  9. allows you to generate and store encryption keys
  10. upgrades an existing instances
  11. this pillar focuses on designing systems that work consistently and recover quickly
  12. this pillar focuses on putting mechanisms in place that help protect your systems and data
  13. giving a user the min access required to get a job done
Down
  1. helps protect your web application against common web attacks
  2. used to describe design principles and best practices for running workloads in the cloud
  3. provides recommendations that help you follow AWS best practices
  4. models the shared security of the cloud
  5. this pillar focuses on creating applications that effectively support production workloads
  6. this pillar focuses on delivering optimum and resilient solutions at least to the cost to the user
  7. adds or replaces instances
  8. automatically distributes your incoming application traffic across multiple ec2 instances
  9. this pillar focuses on the effective use of computing resources to meet system and business requirements while removing bottlenecks
  10. adds or replaces ec2 instances across AZs, based on need and changing demand
  11. a managed ddos protection service
  12. allows you to manage and retrieve secrets
  13. works with ec2 instances to uncover and report vulnerabilities

26 Clues: adds or replaces instancesupgrades an existing instancesa managed ddos protection servicemodels the shared security of the cloudallows you to manage and retrieve secretshelps you discover and protect sensitive dataa dns service that routes users to applicationsallows you to generate and store encryption keys...

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) crossword puzzle
Across
  1. Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
  2. Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
  3. Conducting meetings between people in different locations using video and audio connections.
  4. Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
  5. The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
  6. The science or practice of encoding information to prevent unauthorized access, especially in information security.
  7. Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
  8. Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
  9. The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
  10. Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
  1. Employing data and algorithms to create models that predict future outcomes or behaviors.
  2. The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
  3. Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
  4. The commitment to complying with established standards, specifications, or regulations.
  5. Catering to a specific segment or group with unique preferences or needs.
  6. The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
  7. Alternative problem-solving methods employed when conventional approaches fail.
  8. The capability of being customized or adapted to suit individual preferences or needs.
  9. Losing interest or focus during discussions, indicating a lack of engagement or understanding.
  10. A systematic approach or set of procedures for solving a problem or accomplishing a task.

20 Clues: Catering to a specific segment or group with unique preferences or needs.Alternative problem-solving methods employed when conventional approaches fail.The capability of being customized or adapted to suit individual preferences or needs.The commitment to complying with established standards, specifications, or regulations....

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. The top 500 hundred stocks
  2. it represents a loan from a buyer to the issuer of the bond
  3. Someone who invest in the market long term
  4. What is Crypto backed by
  5. the age you can claim social security benefits
  6. take cash from a large group of investors and invest in stocks and bonds
  7. you get the money when you cant work anymore
  8. Long term goals with a time horizon of 10-16 years
  9. Companies will often match you contribution up to a certain percentage
  10. Market is rising 20% from resents
  11. the age that you can start investing
  12. Currencies backed by government but not physical commodity
  13. Someone who buys stocks low and sells high
  14. Social security and medicare together is called
  15. What category of investing does crypto fall under
Down
  1. Issued by the Government and no interest is paid
  2. A security that represents the ownership of a fraction of a corporation
  3. short term goal have more liquid
  4. the increase of value of an asset
  5. something that does not directly involve the company like pandemic
  6. the distribution of some of a company's earnings to a class of shareholder
  7. You can put 7000 dollars pre-taxed per year
  8. Money you contribute goes in after tax
  9. Market is down 20% from recent highs
  10. How old you have to be to withdraw from an IRA
  11. many unionized workforce's have this
  12. Sum of money saved and available for a particular purpose
  13. tells us how big the company is in the stock market
  14. Investing all the money you have available at the given time into the market
  15. Letters and symbols of a companys stock

30 Clues: What is Crypto backed byThe top 500 hundred stocksshort term goal have more liquidthe increase of value of an assetMarket is rising 20% from resentsMarket is down 20% from recent highsmany unionized workforce's have thisthe age that you can start investingMoney you contribute goes in after taxLetters and symbols of a companys stock...

Ch 3 Crossword 2024-11-14

Ch 3 Crossword crossword puzzle
Across
  1. Taxes paid by the employee and employer that are used to finance the federal Social Security and Medicare programs; also known as Social Security and Medicare taxes.
  2. Money added to an employee’s base pay.
  3. wage- Amount paid for working time in a week that is beyond the standard 40-hour workweek.
  4. balance- Amount of time an individual spends at work compared to the amount of time spent in a personal life.
  5. Subtraction from gross pay.
  6. Earnings from sources other than work.
  7. Income paid as a percentage of sales made by a salesperson.
  8. Form of noncash compensation received in addition to a wage or salary; also known as fringe benefit.
  9. Fixed payment for work expressed as an annual figure.
  10. Payment for work that is usually calculated on an hourly, daily, or piecework basis.
  11. Amount on which taxes are calculated.
  12. Gross pay (plus bonuses) minus payroll deductions; also known as take-home pay.
  13. Money paid for service beyond what is required; also known as gratuity.
Down
  1. Wages or salaries and benefits paid to employees.
  2. Employee’s Withholding Certificate that helps an employer determine how much income tax to withhold from an employee’s paychecks as payroll deductions.
  3. All the income an individual receives in a year including both earned and unearned income.
  4. Wage based on a rate per unit of work completed.
  5. Total income before payroll deductions.
  6. Government expects individuals and businesses to voluntarily report all income that is subject to the income tax.
  7. Wage and Tax Statement that shows your earnings and the amounts of income, Social Security, and Medicare taxes withheld from your earned income during the year.
  8. Income received from employment, including self-employment.
  9. return- Report containing information used to calculate taxes owed by the taxpayer.

22 Clues: Subtraction from gross pay.Amount on which taxes are calculated.Money added to an employee’s base pay.Earnings from sources other than work.Total income before payroll deductions.Wage based on a rate per unit of work completed.Wages or salaries and benefits paid to employees.Fixed payment for work expressed as an annual figure....

Cloud Deployment Essentials Crossword 2025-03-07

Cloud Deployment Essentials Crossword crossword puzzle
Across
  1. A system for managing users and their access permissions in the cloud.
  2. The practice of distributing workloads across multiple servers to prevent overload.
  3. Storing multiple copies of data to prevent failure-related losses.
  4. A method of storing data as independent units rather than in files or blocks.
  5. The process of reducing downtime when moving systems to the cloud.
  6. A service that logs and records user activities to track security issues.
  7. The process of modifying applications to fully utilize cloud-native features.
  8. A way to store and organize files using directories like on a traditional system.
  9. A method of storing backup data in remote servers to prevent data loss.
  10. The duplication of data across locations to improve reliability.
  11. A tool that allows multiple operating systems to run on a single physical machine.
  12. The act of determining which applications should be moved to the cloud first.
  13. Moving a virtual machine from one host to another without turning it off.
Down
  1. A security process requiring more than one form of verification for access.
  2. A security approach that involves planning data protection before migration.
  3. A lightweight, self-contained computing environment for applications.
  4. A storage method that divides data into blocks for faster access.
  5. The practice of predicting cloud service costs before migration.
  6. A method that controls system access based on a user's job or role.
  7. The process of evaluating IT infrastructure before moving to the cloud.
  8. A process that allows multiple users to share computing resources efficiently.
  9. Moving existing IT infrastructure to the cloud without major modifications.
  10. A system that allows a single login to provide access to multiple applications.

23 Clues: The practice of predicting cloud service costs before migration.The duplication of data across locations to improve reliability.A storage method that divides data into blocks for faster access.Storing multiple copies of data to prevent failure-related losses.The process of reducing downtime when moving systems to the cloud....

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Gaining unauthorized access to a secured area by following an authorized person.
  3. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Security documentation that details system resource usage by users and processes for auditing.
Down
  1. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Process of transforming information into a scrambled format to secure it.
  4. Criminal use of the internet or other electronic means to persistently harass an individual.
  5. Attack that uses a list of commonly used words or phrases to guess a password.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Cloud-based vulnerability management platform with scanning and reporting.
  8. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  9. Code examination performed without running the malicious program.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  11. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  12. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  13. Policy-based accept or deny of network traffic.
  14. Graphic object used in reports to visualize the correlation between an object and its performance.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

AI & IT key words 2026-01-21

AI & IT key words crossword puzzle
Across
  1. Software that acts as a bridge between an operating system or database and applications
  2. a secret method of bypassing normal authentication or encryption in a computer system
  3. the delay before a transfer of data begins following an instruction.
  4. A secure "tunnel" used to encrypt a user's connection to a network.
  5. A program that looks legitimate but contains a hidden malicious function.
  6. A highly targeted phishing attack aimed at senior executives or "big fish" (CEOs, CFOs) to steal large sums of money or highly sensitive data
  7. The act of following laws, regulations, and ethical guidelines (like GDPR)
  8. Malware that locks your files and demands money for the key.
  9. An incident where data is stolen, accessed, or exposed by an unauthorized person.
Down
  1. A set of tools used by hackers to gain deep, hidden control over a computer.
  2. A collection of compromised computers controlled remotely to perform massive attacks.
  3. Software that secretly monitors a user's activity and collects personal info.
  4. A security measure where a computer or network is physically isolated from the unsecured internet or other local networks.
  5. A simulated cyberattack performed to evaluate the security of a system.
  6. An isolated environment where suspicious code can be executed safely without risk to the system.
  7. The action of reducing the severity, seriousness, or paintfulness of a security risk.
  8. A set of rules that defines how data is transmitted between devices.
  9. The maximum rate of data transfer across a given path
  10. A deceptive technique using fake emails to steal sensitive data or login credentials.
  11. Technical term for body measurements and calculations related to human characteristics used for identification

20 Clues: The maximum rate of data transfer across a given pathMalware that locks your files and demands money for the key.A secure "tunnel" used to encrypt a user's connection to a network.the delay before a transfer of data begins following an instruction.A set of rules that defines how data is transmitted between devices....

TCI Lesson 33 Crossword 2026-02-06

TCI Lesson 33 Crossword crossword puzzle
Across
  1. The last name of the leader of the United Mine Workers (sect 4)
  2. The Michigan city where the Sit Down Strike occurred (sect 4 Look at the pictures)
  3. The "P" in WPA (sect 3)
  4. Huey Long wanted to share wealth, claiming "Every man a ____" (sect 2)
  5. The last name of the first woman in the Cabinet (section 4)
  6. The "S" in SEC. (sect 1)
  7. The River Valley that was one of the poorest regions in the country. (sect 1)
  8. Under the Fair Labor Standards Act, 44 hours was the __________ you could work per week (sect 3)
  9. They did not like the growth of size and power of government (sect 5)
  10. Health insurance for older Americans or Food Stamps are known as _________ programs (sect 5)
Down
  1. Two words, this is where Marian Anderson gave an important concert (sect 4)
  2. Two words, the branch of government that struck down parts of the New Deal (sect 3)
  3. The last name of the Supreme Court Chief Justice who upheld Social Security and the Wagner Act (sect 3)
  4. Fire Side chats were broadcast over this medium (sect 1)
  5. Before the New Deal these were the main help of people in need (sect 5)
  6. The "P" in Upton Sinclair's EPIC program. (sect 2)
  7. The last name of the Dr. who called for Social Security payments (sect 2)
  8. The number of digits in a Social Security number (sect 5 pictures)
  9. Farmers were at risk of losing their farms if they could not repay these. (sect 1)
  10. People in the middle of the left or right wings (sect 2)

20 Clues: The "P" in WPA (sect 3)The "S" in SEC. (sect 1)The "P" in Upton Sinclair's EPIC program. (sect 2)Fire Side chats were broadcast over this medium (sect 1)People in the middle of the left or right wings (sect 2)The last name of the first woman in the Cabinet (section 4)The last name of the leader of the United Mine Workers (sect 4)...

Our Policies 2026-03-04

Our Policies crossword puzzle
Across
  1. What type of software must devices accessing organizational resources have up-to-date?
  2. What structured process is used for developing and maintaining software?
  3. What must remote work and BYOD users use as an additional security measure?
  4. What must automated monitoring systems trigger within fifteen minutes of performance threshold violations?
  5. What must system owners conduct prior to deployment and on a quarterly basis to prevent fairness issues?
  6. What type of board reviews all new AI systems and significant changes?
  7. What must all AI systems clearly disclose to users regarding their nature?
  8. What approach should be used as the primary strategy to validate and sanitize all inputs?
  9. What acronym describes users who must comply with additional security measures when using their own devices?
  10. Who should you contact before hitting the send button if you are in doubt?
  11. What type of data category includes racial or ethnic origin, genetic data, and biometric data?
Down
  1. What e-mail address prefix should you use to report a breach immediately?
  2. What should you respect and not use if it is not yours?
  3. Who provides overall oversight for ensuring that secure development practices align with organizational objectives?
  4. What must users not send, in relation to unsolicited emails?
  5. What type of media involves blogs, wikis, and forms where you are personally responsible for published content?
  6. What is a huge factor when reviewing content before publishing to avoid discomfort?
  7. How many hours do we have to report a personal data breach to supervisory authorities?
  8. What process is used during the design phase to identify, prioritize, and mitigate potential security threats?
  9. What type of address, along with IP, is listed as a personal data identifier?

20 Clues: What should you respect and not use if it is not yours?What must users not send, in relation to unsolicited emails?What type of board reviews all new AI systems and significant changes?What structured process is used for developing and maintaining software?What e-mail address prefix should you use to report a breach immediately?...

NETWORK MANAGEMENT 2022-10-20

NETWORK MANAGEMENT crossword puzzle
Across
  1. Responsible for maintaining the essential such as OS, application, security tools, devices in network (related to software and hardware)
  2. _______is the standard adopted by the International Organization for Standardization (ISO)
  3. _________runs between the managing entity and managed devices
  4. Detecting the problem symptoms-->Isolating the problem-->Fixing the problem automatically or manually-->Fixing the problem automatically (if possible) or manually. This steps refer to ________
Down
  1. Involves in the configuration of security hardware and software (firewall, antivirus, OS update) and perform security audit
  2. ______is one of the example of SNMP agents
  3. _____was installed to displays/analyzes data from management agents
  4. Responsible for designing and maintaining the computer network solving any problem related to network connection
  5. This person have overall control of the server
  6. Concern with daily operations in providing network services

10 Clues: ______is one of the example of SNMP agentsThis person have overall control of the serverConcern with daily operations in providing network services_________runs between the managing entity and managed devices_____was installed to displays/analyzes data from management agents...

Cyber safety-by Bridget Graham 2016-05-24

Cyber safety-by Bridget Graham crossword puzzle
Across
  1. when you post something on the internet so everyone can see it
  2. information stored on your computer or device
  3. never tell anyone about it because you don't know what's going to happen
  4. a search engine
  5. little pictures to express your feeling
  6. a location on the internet
  7. allows people to share things online
  8. something that is important not to tell people on the internet or they can track you down
  9. when an unknown number or email address appears on your emails
Down
  1. ups when browsing a new window appears that you don't want
  2. a web address
  3. when someone is being mean to you on line
  4. when someone pretends to be your friend on games but their really not
  5. a little chip that is is in your computer that you can turn off and on
  6. to decline or not accept a request on a game
  7. private information that you don't share with with other people
  8. when you close a screen to save it for later
  9. your personal address on your computer
  10. to copy a file from one computer system to another via the Internet
  11. a saved link to a website
  12. to upload information to the web

21 Clues: a web addressa search enginea saved link to a websitea location on the internetto upload information to the weballows people to share things onlineyour personal address on your computerlittle pictures to express your feelingwhen someone is being mean to you on lineto decline or not accept a request on a game...

CSAM 2022 - Be Cyber Smart 2022-10-02

CSAM 2022 - Be Cyber Smart crossword puzzle
Across
  1. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
  2. The process of taking plain text and scrambling it into an unreadable format.
  3. Should be constructed of upper and lower case letters, numbers, and special characters.
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  6. A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
  7. Hardware or software designed to prevent unauthorized access to or from private network.
  8. The I in the C-I-A Triad; protection from unauthorized changes.
  9. Verifying identity
  10. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  11. The address of a webpage. Check the validity of it before clicking on it.
  12. Threatening behavior facilitated through electronic means such as texting.
  13. A fraudalent email purportedly from a reputabld companty attempting to get personal information.
Down
  1. A sequence of words or text used to control access to a computer; similar to a password.
  2. A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  4. THe A in the C-I-A Triad. It ensures authorized users have access.
  5. Facebook, Twitter, Instagram, etc. (two words)
  6. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
  7. Unauthorize access to a network, information systems, or application.

20 Clues: Verifying identityFacebook, Twitter, Instagram, etc. (two words)The I in the C-I-A Triad; protection from unauthorized changes.THe A in the C-I-A Triad. It ensures authorized users have access.Unauthorize access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Networking concept and Cyber Ethics 2025-05-19

Networking concept and Cyber Ethics crossword puzzle
Across
  1. The unwanted bulk emails that come from unknown sources are called.
  2. A computer ion a network.
  3. Equivalent form of Hacking.
  4. simplest way to prevent plagiarism.
  5. Program that disrupts the normal functioning of a computer.
  6. It is wireless technology.
  7. Protecting the data and resources from any unauthorized access.
  8. Refers to criminal activities that involve the use of computer, network and internet.
  9. Group of computers or other peripheral devices.
  10. Refers to an illegal intrusion in a computer system or a network.
  11. It is a legal right granted by law to the creator for his original work.
  12. Is used to connect a computer to the available internet connection over the existing telephone line.
Down
  1. Certain sets of rule determine how data should be transferred over networks and so on.
  2. Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
  3. Ranges less than 10 meters.
  4. It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
  5. Refers to computer network restricted to a organization.
  6. Group of star figured workstations connected to a linear backbone cable.
  7. It is a network device that is used to connect all computers to a network.
  8. Metropolitan Area Network.

20 Clues: A computer ion a network.It is wireless technology.Metropolitan Area Network.Ranges less than 10 meters.Equivalent form of Hacking.simplest way to prevent plagiarism.Group of computers or other peripheral devices.Refers to computer network restricted to a organization.Program that disrupts the normal functioning of a computer....

ICS/OT Cyber Cryptic Crossword 2026-02-08

ICS/OT Cyber Cryptic Crossword crossword puzzle
Across
  1. Crude plant fiery nurse germinates.
  2. Evil Scholar's voice from leaders of fraudulent insidious new scripture.
  3. Stage 2 pivot pastry ordered, Ken Burns?
  4. RIP! Victor over Romeo.
  5. Model loses 50. Method?
  6. Industrial routine scrambled in DoD grid call.
  7. Basic control hidden in truth.
  8. Polling leaders mask operational drift between unstable systems.
  9. Initially, some cyber alerts disrupt automation control system.
  10. Safety-critical broadcasts enter, Scottish lake.
  11. Industrial middleware confused cop and initially district attorney.
  12. Knightly honorific with no time or energy in vote rotating.
  13. Energy exchanged hour after spilling tea.
  14. Rare minerals opt for Caribbean spirits.
  15. B-grade gold multiplies as pirate cuts rap hacktivist.
Down
  1. Throttles as wolf inverts, trapped in rival vendor.
  2. Mother confused teams with pair sensing heat.
  3. Mickey overheard whole OPC-UA component.
  4. Display mirrors myself, Mike, and hotel.
  5. Holding sliced assassin who phoned home.
  6. Package installer adds final code including strangely armed hallucination.
  7. Noisy attempt joins sibling malware.
  8. Factory efficiency: TV award announced down south.
  9. Lap pool's reflection.
  10. Assess the first couple of guests connection with the last outage.
  11. Automation formed from Dragos CEO and operational technology.
  12. Roman wares looted digital extortion.
  13. A legal assistant deletes files and directories -- PANIC!
  14. Race runner's first after elite law school reversed.
  15. Individual broke IDS before largest Greek island.

30 Clues: Lap pool's reflection.RIP! Victor over Romeo.Model loses 50. Method?Basic control hidden in truth.Crude plant fiery nurse germinates.Noisy attempt joins sibling malware.Roman wares looted digital extortion.Mickey overheard whole OPC-UA component.Display mirrors myself, Mike, and hotel.Holding sliced assassin who phoned home....

ESCAPE ROOM 2023 2023-08-23

ESCAPE ROOM 2023 crossword puzzle
Across
  1. Harmonious Relationship
  2. Fifth, 1st Day
  3. The big F Word
  4. We Are
  5. Core,Curriculumn
  6. The Chief
Down
  1. Location
  2. Red, Danger
  3. Principal
  4. Priority
  5. Out of here
  6. Thomas
  7. Camp, Training

13 Clues: We AreThomasLocationPriorityPrincipalThe ChiefRed, DangerOut of hereFifth, 1st DayThe big F WordCamp, TrainingCore,CurriculumnHarmonious Relationship

Bullying Crossword Puzzle 2015-11-15

Bullying Crossword Puzzle crossword puzzle
Across
  1. What acronym reminds us how to act if you are bullied?
  2. What does the "R" stand for in "HERO"?
  3. Bullies can call you ____.
  4. What does the "E" stand for in "HERO"?
  5. The "E" in "SAFE" stands for "End it ____".
  6. A bully is identified not how they look, but rather by their ___.
  7. What does the "H" stand for in "HERO"?
Down
  1. Bullying online is called ___ bullying
  2. If you see bullying, do not be a _____.
  3. The "O" in "HERO" stands for___ communication.
  4. Bullying can be done by an individual or ___.
  5. Bullying can be physical or ___.
  6. Being a bully makes you a smaller person. Helping others makes you a __ person.
  7. ____ someone from a group is a form of bullying.
  8. The "S" in "SAFE" stands for "Stand ____".
  9. This acronym is great to remember if you see bullying occuring.
  10. Bullies can get you in ___.
  11. If you are bullied, tell an ___.

18 Clues: Bullies can call you ____.Bullies can get you in ___.Bullying can be physical or ___.If you are bullied, tell an ___.Bullying online is called ___ bullyingWhat does the "R" stand for in "HERO"?What does the "E" stand for in "HERO"?What does the "H" stand for in "HERO"?If you see bullying, do not be a _____.The "S" in "SAFE" stands for "Stand ____"....

NORMA 2024-01-14

NORMA crossword puzzle
Across
  1. Nilai moral yang dijunjung tinggi dalam masyarakat disebut?
  2. Kesepakatan bersama mengenai perilaku yang dianggap benar disebut?
  3. Hak asasi manusia yang perlu dijunjung tinggi?
  4. Norma yang menjamin kebebasan berserikat disebut?
  5. Sikap saling menghargai dalam keberagaman budaya?16.Integritas Norma yang melarang korupsi dan penyalahgunaan kekuasaan?17. Keselamatan Ketaatan terhadap norma keselamatan di tempat kerja?
  6. Kesetaraan hak dan peluang bagi semua warga negara disebut?
  7. Norma dalam mengelola konflik secara damai?
  8. Larangan diskriminasi berdasarkan jenis kelamin disebut?
  9. Tanggung jawab individu terhadap kepentingan bersama disebut?
  10. Asas hukum yang menjunjung tinggi keadilan dan kebenaran?
  11. Apa istilah untuk aturan tertulis yang diatur oleh pemerintah?
Down
  1. Tanggung jawab individu terhadap diri sendiri dan masyarakat?
  2. Norma agama yang menjadi pedoman hidup?
  3. Nilai yang diyakini dan dijunjung tinggi dalam suatu masyarakat?
  4. Kewajiban dan hak yang dimiliki oleh warga negara disebut?
  5. Norma yang mengatur hubungan antarindividu dalam masyarakat?
  6. Norma etika dalam penggunaan teknologi informasi?
  7. Tanggung jawab menjaga kelestarian lingkungan?

18 Clues: Norma agama yang menjadi pedoman hidup?Norma dalam mengelola konflik secara damai?Hak asasi manusia yang perlu dijunjung tinggi?Tanggung jawab menjaga kelestarian lingkungan?Norma yang menjamin kebebasan berserikat disebut?Norma etika dalam penggunaan teknologi informasi?Larangan diskriminasi berdasarkan jenis kelamin disebut?...

EXTREME SPORTS 2021-09-23

EXTREME SPORTS crossword puzzle
Across
  1. An object used for Ski.
  2. Used in dark places.
  3. Sport in charge of exploring caves.
  4. Used to protect the knees from scrapes.
  5. Helps keep hands clean.
  6. They favor the execution of turns and curves and are very useful to propel yourself in places where the slope is little or even non-existent
  7. A security element to protect the head.
Down
  1. Consists of jumping from a plane.
  2. A security element to protect the eyes.
  3. An Object used for rafting.
  4. It is used in places where descent is otherwise difficult.
  5. It must be used obligatorily to avoid serious accidents.
  6. An object used to practice parachuting.
  7. It is necessary to learn to use equipment and techniques to breathe underwater.
  8. It is a support element to climb.

15 Clues: Used in dark places.An object used for Ski.Helps keep hands clean.An Object used for rafting.Consists of jumping from a plane.It is a support element to climb.Sport in charge of exploring caves.A security element to protect the eyes.Used to protect the knees from scrapes.An object used to practice parachuting.A security element to protect the head....

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Cybersecurity 2025-10-20

Cybersecurity crossword puzzle
Across
  1. Software that secretly collects information about you
  2. A scam using fake emails to steal personal information
  3. Installing the latest software fixes and security patches
  4. A system that blocks unauthorized access to a network
  5. Manipulating people into revealing confidential information
  6. An added layer of security requiring a code or device confirmation
  7. The process of verifying a user’s identity
  8. A tool used to securely store and create strong passwords
  9. The process of converting data into code to prevent access
Down
  1. When unauthorized access to data occurs
  2. A copy of important data stored separately for safety
  3. A secret word or phrase used to access an account
  4. A tool that hides your IP address and encrypts your internet traffic
  5. Software that detects and removes malicious programs
  6. Software designed to damage or disrupt systems

15 Clues: When unauthorized access to data occursThe process of verifying a user’s identitySoftware designed to damage or disrupt systemsA secret word or phrase used to access an accountSoftware that detects and removes malicious programsA copy of important data stored separately for safetySoftware that secretly collects information about you...

Civics Unit 20 Vocabulary 2021-04-13

Civics Unit 20 Vocabulary crossword puzzle
Across
  1. official record
  2. safety against crime
  3. providing help
  4. someone walking
  5. paper money
  6. import/export tax
  7. trickery
Down
  1. a husband or wife
  2. import illegally
  3. wheel cover
  4. a sudden event
  5. careful examination
  6. fake
  7. put in place
  8. gun, rifle, etc.

15 Clues: faketrickerywheel coverpaper moneyput in placea sudden eventproviding helpofficial recordsomeone walkingimport illegallygun, rifle, etc.a husband or wifeimport/export taxcareful examinationsafety against crime

Study Guide 2022-09-02

Study Guide crossword puzzle
Across
  1. A form that tells how much money your employer will withhold
  2. Expenses you can claim to decrease your gross income
  3. yearly pay
  4. Benefits given to the retirees
  5. Taxable Income
  6. A form your employer gives you that shows how much money you made
  7. subtracted from your gross income when you calculate your taxes
  8. Pay after taxes and deductions
  9. Pay before taxes and deductions
Down
  1. Compensation in addition to your salary or wage
  2. the form you use to file your taxes
  3. hourly, daily, monthly pay
  4. adjusted gross income
  5. Medicare and Social Security tax
  6. A person supported by another person.
  7. amount of money the IRS sets each year that can be subtracted from your gross income
  8. Items that reduce the actual amount of taxes you need to pay
  9. Tax to pay for the health of retirees

18 Clues: yearly payTaxable Incomeadjusted gross incomehourly, daily, monthly payBenefits given to the retireesPay after taxes and deductionsPay before taxes and deductionsMedicare and Social Security taxthe form you use to file your taxesA person supported by another person.Tax to pay for the health of retireesCompensation in addition to your salary or wage...

SvD Review 2014-11-07

SvD Review crossword puzzle
Across
  1. These customers must manually run Radia
  2. The team for remote escalations that have a warm transfer
  3. Default Certificate
  4. The type of account that is created upon login and prevents a user from logging in to their account
  5. The location of Urgent Items
  6. The location of Outages
  7. The location of HPSM ESS portal
  8. Used to modify and view accounts
Down
  1. On-site Support
  2. When escalating to this group we create an Interaction and then close it
  3. Background connection to files
  4. The acronym for the website that allows ISSMs to manage exceptions
  5. This stores user account information, authenticates usees and enforces security policy for a windows domain
  6. the tool we use to connect to the foreground of the user's computer
  7. The name of the group we contact if we have witnessed a security violation
  8. Software Team
  9. Check this everyday before you auto in

17 Clues: Software TeamOn-site SupportDefault CertificateThe location of OutagesThe location of Urgent ItemsBackground connection to filesThe location of HPSM ESS portalUsed to modify and view accountsCheck this everyday before you auto inThese customers must manually run RadiaThe team for remote escalations that have a warm transfer...

Investment 2024-03-20

Investment crossword puzzle
Across
  1. Security representing ownership of a fraction of a operation.
  2. Measuring price performance of a basket of securities.
  3. Owning 100 percent your the money the company matched in your 401k plan.
  4. Paid when you hit so many years of service.
  5. Increase value of an asset
  6. Age most women start investing in the stock market.
  7. Age for withdrawal of money in your IRA account.
  8. Percentage of paycheck contributed to your 401k plan each month.
  9. Usually paid back at a stated interest rate.
  10. Recorded information that makes it difficult to cheat the system.
Down
  1. Investing into the market all the money you have.
  2. Appropriate age to invest in Crypto.
  3. Getting money when you can't work anymore.
  4. Contribution to your IRA combined each year.
  5. Currencies created and backed by government.
  6. Age to gain full social security benefit.
  7. Sum of money saved for a purpose

17 Clues: Increase value of an assetSum of money saved for a purposeAppropriate age to invest in Crypto.Age to gain full social security benefit.Getting money when you can't work anymore.Paid when you hit so many years of service.Contribution to your IRA combined each year.Currencies created and backed by government....

Risk Interest Group 2025-12-05

Risk Interest Group crossword puzzle
Across
  1. Access Control List defining allowed/denied permissions.
  2. Single software instance serves multiple customers with isolation.
  3. Public Key Infrastructure that manages certificates and trust.
  4. Algorithm that performs encryption and decryption.
  5. Cryptographic proof of data integrity and signer authenticity.
  6. Learning Algorithms that learn patterns from data to make predictions/decisions.
  7. AI Models that create new content (text, images, code) from learned patterns.
  8. Language Processing AI field enabling computers to understand and generate human language.
  9. Cloud model delivering virtualized compute, storage, and networking.
Down
  1. Automated coordination/management of services, containers, and workloads.
  2. Model memorizes noise in training data, hurting generalization.
  3. Authority Trusted entity that issues and validates digital certificates.
  4. Learning Machine learning using deep neural networks with many layers.
  5. Packaging apps and dependencies into portable, isolated containers.
  6. Controls network traffic based on security policies.
  7. Security Information and Event Management for log aggregation and analytics.
  8. Transforming plaintext into ciphertext using cryptographic keys.

17 Clues: Algorithm that performs encryption and decryption.Controls network traffic based on security policies.Access Control List defining allowed/denied permissions.Public Key Infrastructure that manages certificates and trust.Cryptographic proof of data integrity and signer authenticity.Model memorizes noise in training data, hurting generalization....

Organizing Homeland Security 2017-04-26

Organizing Homeland Security crossword puzzle
Across
  1. A federal law designed to prevent political interference with the decisions and actions of governmental organizations.
  2. Information law enforcement agencies, military units, or other security forces can use to prevent an attack or operation.
  3. favoring the process over accomplishments
  4. A multiagency operation in West Virginia that evaluates information gathered from a variety of governmental sources
  5. The criminal and social actions of individuals and groups before a terrorist attack
  6. Any outcome or output of analyzed information that can be used by law enforcement agencies, military units, or security forces to take an immediate action
Down
  1. A federal law designed to prevent political interference in the management of federal governmental organizations and to increase the efficiency of management
  2. Preparations from any agency to deal with natural, accidental, or man-made disasters
  3. The process of examining a community to determine the areas that might be subject to attack
  4. As used in this text, the ability to stay focused on the primary mission of an organization
  5. adding too many secondary tasks to a unit. Too many jobs divert a unit from its primary mission

11 Clues: favoring the process over accomplishmentsThe criminal and social actions of individuals and groups before a terrorist attackPreparations from any agency to deal with natural, accidental, or man-made disastersThe process of examining a community to determine the areas that might be subject to attack...

Security Awareness News 2024-03-12

Security Awareness News crossword puzzle
Across
  1. This layer of the internet is intentionally hidden. It's where a variety of questionable or illegal activities sometimes occur.
  2. Represents the largest percentage of the internet. It hosts information that is hidden from the public, like online banking.
  3. When stolen usernames and passwords allow attackers to completely take over online accounts.
  4. Malware that can lock up systems or data until the victim agrees to pay a specified ransom.
  5. A combination of words that are easy for you to remember but hard for others to guess.
Down
  1. These attackers use manipulation to mislead people into doing something that they shouldn't.
  2. Refers to malicious code or software that can steal data and spy on people.
  3. Happens when a scammer uses stolen personal information to open fraudulent accounts, file insurance claims, and apply for credit applications in the victim's name.
  4. One of the leading causes or breaches.
  5. These passwords make a cybercriminal's job easier.
  6. Where people spend most of their time when using the internet.

11 Clues: One of the leading causes or breaches.These passwords make a cybercriminal's job easier.Where people spend most of their time when using the internet.Refers to malicious code or software that can steal data and spy on people.A combination of words that are easy for you to remember but hard for others to guess....

Cyberbullying Crossword 2021-05-06

Cyberbullying Crossword crossword puzzle
Across
  1. types of schools where rules and sanctions are stricter
  2. motivates victims more to seek help when they realize such people have also been in their shoes.
  3. a form of communication that can have more psychologically lasting effects on the victim.
  4. monitored very strictly in schools
Down
  1. same problem in a new guise
  2. an app used to curate
  3. attempt to steal, intercept usernames, passwords and financial credentials
  4. Last name of star that quit online chat over the abuse he receives
  5. country of elevated online abuse in mirror article
  6. an interventive strategy to cyber bullying

10 Clues: an app used to curatesame problem in a new guisemonitored very strictly in schoolsan interventive strategy to cyber bullyingcountry of elevated online abuse in mirror articletypes of schools where rules and sanctions are stricterLast name of star that quit online chat over the abuse he receives...

Internet, Networking and Computers. 2021-08-04

Internet, Networking and Computers. crossword puzzle
Across
  1. What is the highest directory in a file system?
  2. a popular method of cyber attack involving repeated requests
  3. the part of a computer that blocks unauthorized access to communications
  4. What measurement of space is 1024 megabytes?
Down
  1. The software that operates and controls devices on a computer
  2. a wired connection to the internet via a router/modem
  3. The network cabling system that uses copper
  4. What protocol is used to send files over the internet?
  5. What is the name of a smaller sized desktop?
  6. Temporary storage using memory for a faster experience

10 Clues: The network cabling system that uses copperWhat is the name of a smaller sized desktop?What measurement of space is 1024 megabytes?What is the highest directory in a file system?a wired connection to the internet via a router/modemWhat protocol is used to send files over the internet?Temporary storage using memory for a faster experience...

A Stronger Me 2012-07-15

A Stronger Me crossword puzzle
Across
  1. Hitting someone repeatedly is what kind of abuse?
  2. You life is what?
  3. The mourning of someone is called what?
  4. To be discluded from the world is to be what?
  5. The given name to a type of technological bullying?
Down
  1. A group of people either family or friends or helpline
  2. To be uncomfortable in a situation is what type of sign?
  3. To be in control is having all the what?
  4. Attacking someone either physically, emotionally or verbally is called what?
  5. Someone who abuses someone to have power of them

10 Clues: You life is what?The mourning of someone is called what?To be in control is having all the what?To be discluded from the world is to be what?Someone who abuses someone to have power of themHitting someone repeatedly is what kind of abuse?The given name to a type of technological bullying?A group of people either family or friends or helpline...

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
  2. Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
  3. Bei was werden gefälschte Webseiten umgeleitet ?
  4. Mithilfe von elektronischen Medien wird ... durchgeführt
  5. Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
Down
  1. Was versteckt sich in einem scheinbar nützlichen Programm ?
  2. und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
  3. Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
  4. Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
  5. Was ist der Überbegriff für unerwünschte, schädliche Software?

10 Clues: Bei was werden gefälschte Webseiten umgeleitet ?Mithilfe von elektronischen Medien wird ... durchgeführtWas versteckt sich in einem scheinbar nützlichen Programm ?und Junke E-Mails Wie werden unerwünschte Werbemails genannt?Sie sind in ein Dokument/Datei eingebettet und nennen sich ...Was ist der Überbegriff für unerwünschte, schädliche Software?...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Suicide Awareness and Prevention 2023-09-21

Suicide Awareness and Prevention crossword puzzle
Across
  1. Early diagnosis & treatment of mental disorders can lead to a _____ life
  2. Talking about suicide can help spread ________ of mental health
  3. Targets of _____ are at a greater risk of self-harm & suicidal behaviors
  4. Mean age of onset of adolescent depression
  5. Suicide _______ is a critical goal of the NJROTC program
Down
  1. Condition associated with cyber and other bullying
  2. CDC says 20% of youth experience social __________
  3. A potential warning sign of impending suicide is giving away _________
  4. A potential warning sign of impending suicide is long-term ____________
  5. Mental health is often overlooked and called the "silent ________"

10 Clues: Mean age of onset of adolescent depressionCondition associated with cyber and other bullyingCDC says 20% of youth experience social __________Suicide _______ is a critical goal of the NJROTC programTalking about suicide can help spread ________ of mental healthMental health is often overlooked and called the "silent ________"...

Suicide Awareness and Prevention 2023-09-21

Suicide Awareness and Prevention crossword puzzle
Across
  1. CDC says 20% of youth experience social __________
  2. A warning sign of impending suicide is long-term ____________
  3. Suicide _______ is a critical goal of the NJROTC program
  4. Condition associated with cyber and other bullying
  5. Talking about suicide can help spread ________ of mental health
  6. Mean age of onset of adolescent depression
Down
  1. Early diagnosis & treatment of mental disorders can lead to a _____ life
  2. Targets of _____ are at a greater risk of self-harm
  3. A warning sign of impending suicide is giving away _________
  4. Mental health is often overlooked and called the "silent ________"

10 Clues: Mean age of onset of adolescent depressionCDC says 20% of youth experience social __________Condition associated with cyber and other bullyingTargets of _____ are at a greater risk of self-harmSuicide _______ is a critical goal of the NJROTC programA warning sign of impending suicide is giving away _________...

UX Word Wizard - 5 2024-11-19

UX Word Wizard - 5 crossword puzzle
Across
  1. A test to differentiate humans from bots
  2. A component to scroll through images or content horizontally
  3. A list of options that appears when you click a button
  4. A symbol or image representing a company or a brand
  5. A list of options or links for navigation
Down
  1. The practice of making websites usable for people with disabilities
  2. A cyber attack focused on stealing sensitive information
  3. An area on a webpage for users to enter information
  4. A feature that enlarges or reduces the view of content
  5. An indication that content is loading

10 Clues: An indication that content is loadingA test to differentiate humans from botsA list of options or links for navigationAn area on a webpage for users to enter informationA symbol or image representing a company or a brandA feature that enlarges or reduces the view of contentA list of options that appears when you click a button...

wije 2025-02-24

wije crossword puzzle
Across
  1. Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
  2. Untuk menampilkan bagian grafik yang ingin ditampilkan
  3. Fitur untuk menyederhanakan dan menganalisa data
  4. Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
  5. Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
  1. Aturan pelindungan privasi
  2. Salah satu web/aplikasi chatbot populer
  3. Proses pemberian izin atau kewenangan untuk mengakses data tertentu
  4. Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
  5. Media sosial untuk berkomunikasi

10 Clues: Aturan pelindungan privasiMedia sosial untuk berkomunikasiSalah satu web/aplikasi chatbot populerFitur untuk menyederhanakan dan menganalisa dataUntuk menampilkan bagian grafik yang ingin ditampilkanSirkuit elektronik yang diukir pada lapisan bahan semikonduktorProses pemberian izin atau kewenangan untuk mengakses data tertentu...

Bullying 2025-05-02

Bullying crossword puzzle
Across
  1. This modern form of bullying hides behind screens
  2. One who intimidates or harms others to gain power
  3. One who witnesses bullying but doesn’t intervene
  4. This form of bullying leaves bruises, not just feelings hurt
Down
  1. Pattern of power abuse, often masked as “just teasing”
  2. Like all bullying — it happens again and again
  3. Relentless and unwanted behavior that targets a person
  4. This kind of abuse cuts with words, not weapons
  5. This silent form of bullying manipulates the mind, not the body
  6. One who suffers from bullying or abuse

10 Clues: One who suffers from bullying or abuseLike all bullying — it happens again and againThis kind of abuse cuts with words, not weaponsOne who witnesses bullying but doesn’t interveneThis modern form of bullying hides behind screensOne who intimidates or harms others to gain powerPattern of power abuse, often masked as “just teasing”...

Find the words 2025-05-05

Find the words crossword puzzle
Across
  1. worldwide network for multiple users
  2. The process of writing code to create software or applications
  3. Technology that creates simulated environments that can be interacted with through special devices
Down
  1. group of applications for socializing and other uses
  2. Practices and tools to protect data and systems from cyber threats
  3. A mobile device that combines phone and computer functions
  4. An electronic device used to process data
  5. A device that creates three-dimensional objects from digital models
  6. An automated machine designed to perform tasks independently
  7. Technology that allows wireless communication between devices

10 Clues: worldwide network for multiple usersAn electronic device used to process datagroup of applications for socializing and other usesA mobile device that combines phone and computer functionsAn automated machine designed to perform tasks independentlyTechnology that allows wireless communication between devices...

Bullying 2019-09-07

Bullying crossword puzzle
Across
  1. stubborn and complete intolerance of any belief or opinion that differs from one's own
  2. abusing, insulting, or otherwise harming someone on a regular basis
  3. hitting, pushing, kicking, or damaging other's property
  4. to dislike intensely or passionately
  5. name-calling, teasing, insults, homophobic or racist remarks
  6. prejudice or discrimination against someone of a different race
Down
  1. commonly held ideas about specific groups of people, often negative
  2. Harassment unwelcome sexual advances, verbal or physical
  3. an unfavorable opinion formed beforehand without knowledge, thought, or reason
  4. lying, spreading rumors, excluding others on purpose
  5. Hurtful comments, posts, images, videos online or messages

11 Clues: to dislike intensely or passionatelylying, spreading rumors, excluding others on purposehitting, pushing, kicking, or damaging other's propertyHarassment unwelcome sexual advances, verbal or physicalHurtful comments, posts, images, videos online or messagesname-calling, teasing, insults, homophobic or racist remarks...

Bullying 2019-09-07

Bullying crossword puzzle
Across
  1. to dislike intensely or passionately
  2. hitting, pushing, kicking, or damaging other's property
  3. commonly held ideas about specific groups of people, often negative
  4. unwelcome sexual advances, verbal or physical
  5. Hurtful comments, posts, images, videos online or messages
  6. lying, spreading rumors, excluding others on purpose
Down
  1. abusing, insulting, or otherwise harming someone on a regular basis
  2. an unfavorable opinion formed beforehand without knowledge, thought, or reason
  3. stubborn and complete intolerance of any belief or opinion that differs from one's own
  4. name-calling, teasing, insults, homophobic or racist remarks
  5. prejudice or discrimination against someone of a different race

11 Clues: to dislike intensely or passionatelyunwelcome sexual advances, verbal or physicallying, spreading rumors, excluding others on purposehitting, pushing, kicking, or damaging other's propertyHurtful comments, posts, images, videos online or messagesname-calling, teasing, insults, homophobic or racist remarks...

Week 7 2020-09-27

Week 7 crossword puzzle
Across
  1. theory of groups through social relationships
  2. early social disorganization studies assumed that social ties and social control shaped this type of crime
  3. a victimization theory of crime
  4. as neighborhood structure influences crime, there is mounting evidence that crime and violence shape neighborhood conditions
  5. theorist of Routine Activity Theory
  6. the fundamental human ecological character of illegal acts as events which occur at a specific location in ------- and ------
  7. one of the most important findings changing spatial distribution of delinquency in a city is the product of “larger economic
  8. Value, Inertia, Visibility, Access
  9. which embodies quality as well as other desirable characteristics such as good security should be the default option
  10. Characteristics of quality security
  11. rates were taken in consideration between 1991-1993 & 1996-1998
  12. illegal acts in which someone definitely and intentionally take or damages the person or property of another
Down
  1. anyone with an inclination to commit a crime
  2. criminologists that came to view the concept of social disorganization during the 1950’s and 1960’s
  3. some examples of this are poverty, residential instability, ethnic heterogeneity.
  4. Prevents the convergence in time and space of offender and target
  5. _____ is higher in communities of poverty, racially segregated communities and single parent households
  6. those that have a close relationship with their neighbors have lower _____ rates in their community
  7. majority of homicides in _____ between ‘96 and ‘98 occurred in only 32% of neighborhood clusters
  8. theorist of Routine Activity Theory
  9. where individuals have a higher risk of being a victim if they are close to the geographic location of offenders
  10. a perspective where residents of high-crime neighborhoods are portrayed as sharing conventional values
  11. which suggests that increases in the quantity and quality of security led to dramatic declines in crime
  12. _____ and crime rates have a relationship with one another

24 Clues: a victimization theory of crimeValue, Inertia, Visibility, Accesstheorist of Routine Activity Theorytheorist of Routine Activity TheoryCharacteristics of quality securityanyone with an inclination to commit a crimetheory of groups through social relationships_____ and crime rates have a relationship with one another...

Crossword 1 2015-06-01

Crossword 1 crossword puzzle
Across
  1. Ensures the existence of multiple pathways of communication
  2. A form of networking where each computer is a peer
  3. Refers to the newness of an exploit which may be known in the hacker community for days or weeks
  4. Filtering concept where the network denies all activities except for those specified here
  5. When in use, the client workstation converts to thin client status
  6. A utility or device that captures network communications for investigation and analysis
  7. A weakness or flaw in a host, node, or any other infrastructure that a hacker can exploit
  8. Any potential harm to a resource or node on a network
  9. The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol
  10. Acts as a middle man between client and server. Can hide the identity of the client, filter content, perform NAT, and cache content.
  11. The confidence that other users will act in accordance with the organization’s security rules.
Down
  1. Virtual Private Network
  2. Network security service that allows a user to authenticate to an entire domain through a single client log on process
  3. Communication link that enables access to network resources using a WAN link to connect to a distant network
  4. Small home, home office network
  5. The process of purging a storage device by writing zeroes to all addressable locations on the device
  6. Written document prescribing security goals, mission, objectives, standards, procedures, and implementations for a given organization
  7. A computer system that hosts resources accessed by users from clients
  8. Network device responsible for directing traffic towards its stated destination
  9. The likelihood or potential for a threat to take advantage of a vulnerability

20 Clues: Virtual Private NetworkSmall home, home office networkA form of networking where each computer is a peerAny potential harm to a resource or node on a networkEnsures the existence of multiple pathways of communicationWhen in use, the client workstation converts to thin client status...

Crossword 3 2015-06-01

Crossword 3 crossword puzzle
Across
  1. Post Office Protocol
  2. An attack that seeks to obtain information from a victim by presenting false credentials or by luring the victim to an attack site
  3. NetBIOS Extended User Interface
  4. A collection of multiple honeypots in a network for the purpose of luring and trapping hackers
  5. Simple Mail Transfer Protocol
  6. The process of making copies of data onto other storage media
  7. Malware that records all keyboard input and transmits a log file to a hacker
  8. Security Technical Implementation Guides
  9. A protocol and a service used to remotely control or administer a host through a plaintext command line interface
Down
  1. A leetspeak word derived from a common typo. Used to mean hacking and taking over control of a computer or network
  2. Malware that needs a host object to infect
  3. Using a new service, device, configuration, software, etc. to a limited number of test hosts before deploying over the entire network
  4. Bring Your Own Device
  5. A closely monitored system that usually contains a large number of files that appears to be valuable or sensitive and serves as a trap for hackers
  6. A network mapping tool that performs network scanning, port scanning, OS identification, and other types of probing
  7. Basic security training that focuses on common or basic security elements that all employees must know and abide by
  8. Malware that acts like an electronic land mine
  9. An advancement of keystroke logging to monitor and record many other user activities.
  10. A form of Malware that hackers can upload and deploy on a target system, replacing multiple, components of the host’s operating system with altered code
  11. Trusted Platform Module

20 Clues: Post Office ProtocolBring Your Own DeviceTrusted Platform ModuleSimple Mail Transfer ProtocolNetBIOS Extended User InterfaceSecurity Technical Implementation GuidesMalware that needs a host object to infectMalware that acts like an electronic land mineThe process of making copies of data onto other storage media...

Compliance Champions League 2023 - Crossword 2023-11-30

Compliance Champions League 2023 - Crossword crossword puzzle
Across
  1. If any Confidential or Internal information is lost or disclosed to unauthorized parties. Incidents must be reported via the ______________ tool.
  2. We can find the latest SAP logo and word/ppt templates at www.______.com.
  3. _______ notes must be entered to put the case to status Resolved.
  4. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
  5. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portal using the quicklink /go/ _______________ :
  6. What should be the status of a product security incident if you get a CVSS score of 0.0.:
  7. Subscribe using the _ to receive email notifications on external updates for cases.
  8. What determines the priority of a security note?
  9. Attachments are made visible externally by setting the _ flag.
  10. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP.
  11. What should be the final status of a Security Incident:
  12. Name the Process which contains set of rules and processes for reducing the risks of using third-party software for internal business purposes at SAP.
Down
  1. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance.
  2. _______ field ensures that the action plan step documented will be visible to the customer.
  3. Which Board area does AIS belong to?
  4. _______ tool targets at providing missing functionality and enhancements to Agent Workspace.
  5. The _____ feature enables SAP to secure the usage of any application specific function:
  6. Software with rating ___________ at SAP should not be installed.
  7. What is the condensed copy of a case with all personal data being anonymized called.
  8. Patch Day notes are released on 2nd _________ of every Month:

20 Clues: Which Board area does AIS belong to?What determines the priority of a security note?What should be the final status of a Security Incident:Patch Day notes are released on 2nd _________ of every Month:Attachments are made visible externally by setting the _ flag.Software with rating ___________ at SAP should not be installed....

Semester 2 Vocabulary 2024-05-10

Semester 2 Vocabulary crossword puzzle
Across
  1. Referring to investments where taxes on earnings are postponed until a later date.
  2. of Deposit (CD): A savings certificate entitling the bearer to receive interest.
  3. Interest: Interest calculated only on the initial principal amount invested or loaned.
  4. The act of leaving one's job and ceasing to work, usually occurring at an older age.
  5. The initial amount of money invested or loaned, on which interest is calculated.
  6. Occurring twice a year.
  7. Occurring four times a year, or every three months.
  8. Security: A federal program that provides retirement, disability, and survivor benefits.
  9. (Individual Retirement Account): A tax-advantaged retirement account for individuals.
  10. Occurring every day or relating to each day.
  11. Security Credits: Credits earned through paying Social Security taxes that count toward eligibility for Social Security benefits.
  12. Retirement Age: The age at which a person becomes eligible to receive full Social Security retirement benefits.
Down
  1. Exempt: Not subject to taxation.
  2. Investment: An investment made with money that has not been subjected to taxation.
  3. Partially retired, still working part-time or intermittently.
  4. Rate: The percentage of the principal amount charged or paid for the use of money.
  5. A federal health insurance program for people aged 65 and older and certain younger individuals with disabilities.
  6. (Federal Insurance Contributions Act): The law that requires employers to withhold Social Security and Medicare taxes from employees' wages and pay a matching amount.
  7. Occurring once every year.
  8. Investment: An investment made with money that has already been taxed.
  9. (Annual Percentage Yield): The effective annual rate of return taking into account the effect of compounding interest.
  10. Interest: Interest calculated on the initial principal and also on the accumulated interest of previous periods.
  11. The amount of money in an account.
  12. The date on which a financial instrument, such as a bond or CD, becomes due for payment.

24 Clues: Occurring twice a year.Occurring once every year.Exempt: Not subject to taxation.The amount of money in an account.Occurring every day or relating to each day.Occurring four times a year, or every three months.Partially retired, still working part-time or intermittently.Investment: An investment made with money that has already been taxed....

Semester 2 Vocabulary 2024-05-10

Semester 2 Vocabulary crossword puzzle
Across
  1. The initial sum of money invested or loaned, excluding interest or earnings.
  2. Relating to or occurring once a year.
  3. A federal program providing income and benefits to retirees, disabled individuals, and survivors.
  4. Calculated or occurring every day.
  5. Occurring twice a year.
  6. Investments made with income that has already been taxed.
  7. Interest calculated only on the initial principal amount.
  8. Units of measure used to determine eligibility for Social Security benefits.
  9. The act of leaving one's job or ceasing to work, typically due to age.
  10. Investments or income that are not subject to taxation.
  11. Working part-time or having reduced work responsibilities after retirement.
  12. Refers to investments or accounts where taxes on earnings are deferred until a later date, often retirement.
Down
  1. Interest calculated on both the initial principal and the accumulated interest from previous periods.
  2. A savings certificate with a fixed maturity date and a fixed interest rate.
  3. A tax-advantaged investment account designed for retirement savings.
  4. The age at which a person can receive full Social Security retirement benefits.
  5. A federal health insurance program primarily for people aged 65 and older.
  6. Occurring four times a year, typically every three months.
  7. The amount of money in an account.
  8. Contributions made to retirement accounts using income that has not been taxed.
  9. The percentage of principal charged or paid over a specified time period.
  10. The date when a financial instrument, like a CD or bond, becomes due and payable.
  11. The effective annual rate of return, accounting for compounding interest.
  12. The law that mandates the collection of Social Security and Medicare payroll taxes.

24 Clues: Occurring twice a year.Calculated or occurring every day.The amount of money in an account.Relating to or occurring once a year.Investments or income that are not subject to taxation.Investments made with income that has already been taxed.Interest calculated only on the initial principal amount....

Industrial Security Concept Crossword Puzzle 2025-10-25

Industrial Security Concept Crossword Puzzle crossword puzzle
Across
  1. – a chance of being injured or harmed
  2. – it deters man from committing acts of fear being caught, charged in court or get dismissed
  3. – Removing the risk totally from the business
  4. – a person who does detective work for hire, reward or commission
  5. – inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury
  6. – being watchful in spotting violator, a person, a vehicle or an accident
  7. – it is a state or quality of being free from fear or danger, assurance, certainty.
  8. – it includes all the security measures designed to prevent unsuitable individuals from gaining access to classified matters, and it prevents appointment, or retention as employees of such individuals
  9. – it is an act of baseness, vileness, or depravity in the private and social duties which a man owes to his fellowmen or to society in general
  10. – The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard
Down
  1. – moving the financial impact of the potential loss over to an insurance company
  2. - it uses barriers being placed between the potential intruder and the object/matter to be protected
  3. - is the potential that a chosen action or activity will lead to a loss
  4. – sound and good judgement to arrive at wise and timely decision
  5. – spreading the risk through decentralization to limit the impact of the potential loss
  6. – ability to deal with others successfully without offending
  7. – it involves the installation of physical barriers, security lighting, use of vaults, locks and others.
  8. – minimizing the probability of the potential loss
  9. – includes any person who offers or renders personal service to watch or secure
  10. – an indication of impending danger or harm

20 Clues: – a chance of being injured or harmed– an indication of impending danger or harm– Removing the risk totally from the business– minimizing the probability of the potential loss– ability to deal with others successfully without offending– sound and good judgement to arrive at wise and timely decision...

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

Airport Vocab 2013-06-12

Airport Vocab crossword puzzle
Across
  1. suitcase
  2. plane
  3. seatbelt
  4. flight number
  5. to land
  6. terminal
Down
  1. business class
  2. security check
  3. boarding gate
  4. to serve
  5. passport

11 Clues: planeto landsuitcaseseatbeltto servepassportterminalboarding gateflight numberbusiness classsecurity check

Brothers and Sisters 2025-04-17

Brothers and Sisters crossword puzzle
Across
  1. Morning star
  2. New Mom
  3. MVP
  4. Hustler
  5. Big Sis
  6. Security
Down
  1. Baby Girl
  2. Baby Boy
  3. Big Bro
  4. Coach
  5. Hilarious

11 Clues: MVPCoachBig BroNew MomHustlerBig SisBaby BoySecurityBaby GirlHilariousMorning star

SHAGGy 2025-01-08

SHAGGy crossword puzzle
Across
  1. A transaction in which a security (or a line of securities) is sold to buy another security, considered to have a higher potential gain
  2. A natural or legal person who holds shares in a company
  3. Carrying out a lot of short-term financial transactions in the expectation of making quick capital gains
Down
  1. The earnings a company equally shared among the shareholders in proportion to the number of shares they hold
  2. An intermediary in charge of placing buy and sell orders on the market
  3. Selling a security you don't own to buy it back later
  4. A stock that goes up and down quickly
  5. It’s the world’s biggest stock exchange, based in Manhattan
  6. A very sharp rise of a market
  7. The ability to buy or sell assets quickly in large quantities

10 Clues: A very sharp rise of a marketA stock that goes up and down quicklySelling a security you don't own to buy it back laterA natural or legal person who holds shares in a companyIt’s the world’s biggest stock exchange, based in ManhattanThe ability to buy or sell assets quickly in large quantities...

CDWA Acronym 2022-09-01

CDWA Acronym crossword puzzle
Across
  1. Service Delivery that assists with the Client's activities of daily living.
  2. Fob that adds an extra layer of security to computers.
  3. Legal employer for Washington's Individual Providers.
  4. Total number of hours the IP can work in a week.
  5. Protects individuals' personal medical data.
  6. Federal payroll contribution directed that funds Social Security and Medicare programs.
Down
  1. Caregiver
  2. DSHS granted this company as WA state's Consumer Directed Employer.
  3. A group of agencies that supports WA state's social & health needs.
  4. Client
  5. Law protects the health status of any individual.
  6. The person who generates authorizations for Clients.

12 Clues: ClientCaregiverProtects individuals' personal medical data.Total number of hours the IP can work in a week.Law protects the health status of any individual.The person who generates authorizations for Clients.Legal employer for Washington's Individual Providers.Fob that adds an extra layer of security to computers....

EFDO Crossword 2026-02-03

EFDO Crossword crossword puzzle
Across
  1. Delivers specialised cleaning and environmental services across airport facilities.
  2. Provides ground transport and shuttle services
  3. Joint venture between SATS & AirAsia Berhad
  4. Provides ground handling and inflight catering services, specifically for LCCs
  5. Maintains law, order, and aviation security
  6. Offers premium terminal services providing private check‑in and immigration, etc
Down
  1. Provides aviation security services, such as screening and access control
  2. Operates food and retail concepts
  3. From Dubai and provides ground, passenger and cargo handling services
  4. Secures Singapore‘s borders
  5. Operates duty‑free retail stores focused on cosmetics and perfume
  6. Operates medical clinics delivering healthcare and emergency medical support

12 Clues: Secures Singapore‘s bordersOperates food and retail conceptsJoint venture between SATS & AirAsia BerhadMaintains law, order, and aviation securityProvides ground transport and shuttle servicesOperates duty‑free retail stores focused on cosmetics and perfumeFrom Dubai and provides ground, passenger and cargo handling services...

Environmental Services 2017-08-18

Environmental Services crossword puzzle
Across
  1. What company takes care of pest control?
  2. What tupe of rags do we use to clean? (blue and yellow)
  3. Used to collect trash from multiple areas.
  4. Evening discharge cleaners are called?
  5. What company takes care of RED trash and sharps for the hospital?
  6. Who is the head of safety and security?
  7. What is the brand of electronic paper towels we use?
  8. What is the Color of ES Scrubs?
  9. What program is used to look up chemicals?
Down
  1. This is used to swipe you into the building or certain areas.
  2. What is the name of the security company?
  3. Who is the manager of ES?
  4. What brand of bleach do we use to clean with?
  5. What is the name of the fragrance spray we use?
  6. Weeks How far out should you schedule PTO?
  7. What floor is ICU on?
  8. These are used to keep your hands clean.

17 Clues: What floor is ICU on?Who is the manager of ES?What is the Color of ES Scrubs?Evening discharge cleaners are called?Who is the head of safety and security?What company takes care of pest control?These are used to keep your hands clean.What is the name of the security company?Used to collect trash from multiple areas....

Crossword 1 - Technical terms 2024-11-04

Crossword 1 - Technical terms crossword puzzle
Across
  1. Network monitoring tool used to analyze and troubleshoot network traffic.
  2. Network monitoring tool for tracking performance and availability.
  3. Authentication system used to manage network access.
  4. The layout or structure of a network.
  5. Virtual Private Network; provides secure remote access to a network.
  6. Command used to test network connectivity and latency.
  7. Process of encoding data to protect it during transmission.
  8. Delay in data transmission over a network.
  9. Unit of data transmitted over a network.
Down
  1. Device that connects multiple devices within a single network.
  2. Security device that controls incoming and outgoing traffic.
  3. Device that allows wireless devices to connect to a network without cables.
  4. Measurement of data transmission capacity in a network.
  5. Part of an IP address configuration that helps segment networks.
  6. Unique identifier assigned to each device on a network.
  7. Device that directs data traffic between networks.
  8. Virtual Local Area Network; divides network traffic for security and performance.

17 Clues: The layout or structure of a network.Unit of data transmitted over a network.Delay in data transmission over a network.Device that directs data traffic between networks.Authentication system used to manage network access.Command used to test network connectivity and latency.Measurement of data transmission capacity in a network....

Important concepts 2017-11-17

Important concepts crossword puzzle
Across
  1. studies interactions between countries
  2. Type of conflict in which religion could be involved
  3. Income
  4. Ability to influence others based on specific characteristics
  5. Is the increasing interaction of people through the growth of the international flow
  6. State actions taken to ensure its security that threatened the security of other states
Down
  1. Income advised to infaltion
  2. Right of a nation to become an independent state
  3. People who share democratic and cultural similarities
  4. % of economy growth

10 Clues: Income% of economy growthIncome advised to infaltionstudies interactions between countriesRight of a nation to become an independent stateType of conflict in which religion could be involvedPeople who share democratic and cultural similaritiesAbility to influence others based on specific characteristics...

National Security and Modern Conflict Threat Evaluation 2024-02-08

National Security and Modern Conflict Threat Evaluation crossword puzzle
Across
  1. Example of strategic battle game used in class.
  2. A nation's location and terrain provide _______ defense.
  3. Military ______ is the primary means for national security.
  4. ________ policy is the greatest determining factor in national strategy.
  5. Weakness
Down
  1. Create an uncomplicated plan (acronym).
  2. Risks taken while efficiently utilizing resources.
  3. The ability of a nation to satisfy peacetime and wartime security is _____ capability.
  4. A reliable supply of ____ is important to national strategy.
  5. What is an adversary attempting to do?

10 Clues: WeaknessWhat is an adversary attempting to do?Create an uncomplicated plan (acronym).Example of strategic battle game used in class.Risks taken while efficiently utilizing resources.A nation's location and terrain provide _______ defense.Military ______ is the primary means for national security....

United Nations 2022-05-03

United Nations crossword puzzle
Across
  1. created before UN to talk through problems (3 words)
  2. decides if new countries can join (2 words)
  3. _______ council most powerful organ of the UN
  4. the first meeting was held in 194_
Down
  1. 19_ member states
  2. UN general Assembly adopts this
  3. headquarters of the United Nations
  4. one of the official languages of the UN
  5. last name of the current secretary general
  6. The five permanent members of the security council have this power
  7. the United Nations has this many "organs"

11 Clues: 19_ member statesUN general Assembly adopts thisheadquarters of the United Nationsthe first meeting was held in 194_one of the official languages of the UNthe United Nations has this many "organs"last name of the current secretary generaldecides if new countries can join (2 words)_______ council most powerful organ of the UN...

Die Einwanderung 2023-11-28

Die Einwanderung crossword puzzle
Across
  1. political reasons (10,6)
  2. war
  3. origin country
  4. chances in the future
  5. refugee
  6. persecution
Down
  1. poverty
  2. a better life (3,8,5)
  3. economy
  4. security
  5. flight
  6. to flee

12 Clues: warflightpovertyeconomyrefugeeto fleesecuritypersecutionorigin countrya better life (3,8,5)chances in the futurepolitical reasons (10,6)

Smart Home Crossword Puzzle 2025-03-22

Smart Home Crossword Puzzle crossword puzzle
Across
  1. – A key benefit of smart home technology, reducing waste.
  2. – Control smart home features from anywhere using an app.
  3. – Used to describe eco-friendly smart homes.
  4. – Smart cameras, locks, and alarms improve home safety.
  5. – The goal of smart technology: eco-friendly solutions.
  6. assistants - Alexa, Siri, and Google Assistant.
  7. – Products with LEED, Energy Star, or WELL certification.
  8. – Motion, temperature, and leak sensors make homes smarter.
  9. – Smart thermostats adjust heating & cooling for efficiency.
Down
  1. – Smart systems track energy, water, and security data.
  2. – Smart devices communicate via Wi-Fi, Bluetooth, or Zigbee.
  3. – Smart bulbs use LEDs and can be controlled remotely.
  4. – Solar-powered devices or panels reduce reliance on the grid.
  5. – A central controller for multiple smart devices (like Amazon Echo or Google Nest).
  6. – Smart fridges, ovens, washers, and dishwashers save energy.
  7. – Smart tech helps reduce power consumption.
  8. – Controlling devices automatically to improve convenience.
  9. – Many smart devices connect without hardwiring.
  10. HOME – The overall concept of an automated, connected home.

19 Clues: – Used to describe eco-friendly smart homes.– Smart tech helps reduce power consumption.assistants - Alexa, Siri, and Google Assistant.– Many smart devices connect without hardwiring.– Smart bulbs use LEDs and can be controlled remotely.– Smart systems track energy, water, and security data.– Smart cameras, locks, and alarms improve home safety....

CROSSWORD 2023-02-23

CROSSWORD crossword puzzle
Across
  1. 3
  2. nation
  3. violence
  4. area
Down
  1. mass
  2. security
  3. change behavior
  4. supreme power
  5. impose
  6. status

10 Clues: 3massareanationimposestatussecurityviolencesupreme powerchange behavior

504 2023-03-24

504 crossword puzzle
Across
  1. average
  2. overstate
  3. large
  4. live longer than
Down
  1. unwilling
  2. plain
  3. important
  4. care
  5. mysterious
  6. true

10 Clues: caretrueplainlargeaverageunwillingimportantoverstatemysteriouslive longer than

DD Resources HIPAA Crossword 2015-12-03

DD Resources HIPAA Crossword crossword puzzle
Across
  1. HIPAA is not just a good idea. It is the ___.
  2. Necessary The minimum PHI needed to accomplish an intended purpose.
  3. What must be completed and signed before any PHI can be released?
  4. The Health Insurance Portability and Accountability Act of 1996.
  5. Any health information received or maintained by DD Resources is ________.
  6. What Does The second "A" in HIPAA stand for?
  7. What does the "P" in HIPAA stand for?
  8. What does the "I" in HIPAA stand for?
  9. Who is responsible for keeping Consumer information confidential?
  10. What does the "H" in HIPAA stand for?
Down
  1. Consumers have the right to make ___________ about the privacy and security of their PHI/EPHI without fear of retaliation.
  2. How does confidential documentation need to be disposed of?
  3. What does the first "A" in HIPAA stand for?
  4. This person is DD Resources’ Security Official.
  5. Coversheet All faxes sent with PHI must have a ___ ______.
  6. The third largest mammal on Earth.
  7. of Privacy Practices What document is given to Consumers that outlines the use and disclosure of their PHI?
  8. The impermissible use or disclosure of PHI/EPHI released verbally, in writing or transmitted electronically is a ____________________.
  9. out Files must be ______ ___, whenever removed from their designated location.
  10. Computer ___ should never be shared or posted.
  11. The __________ Rule establishes and protects the Confidentiality, Integrity and Availability of EPHI.
  12. The _____________ Rule protects an individual’s rights, limits the uses and disclosures of PHI and sets administrative rules.
  13. Communications Protected Health Information (PHI) can include paper records, _____________ __________________, and information that is transmitted and maintained in any electronic format.
  14. Any PHI that maintained or transmitted electronically is __________.

24 Clues: The third largest mammal on Earth.What does the "P" in HIPAA stand for?What does the "I" in HIPAA stand for?What does the "H" in HIPAA stand for?What does the first "A" in HIPAA stand for?What Does The second "A" in HIPAA stand for?HIPAA is not just a good idea. It is the ___.Computer ___ should never be shared or posted....

Investing in Stocks 2012-12-16

Investing in Stocks crossword puzzle
Across
  1. independent agency of the federal government that insures accounts up to $250,000 per depositor at almost all US depository institutions.
  2. a nontransferable bond issued by the U.S. government.
  3. The total accumulatated value of the assets a person possesses.
  4. A list of financial assets held by an individual,bank,or other financial institution.
  5. property or other possessions acquired for future financial return or benefit.
  6. A long term interest-bearing security issued by the U.S. government. Interest is paid semiannually.
  7. the cost of passing up the next best alternative when making a decision.
  8. a form of time deposit at a bank or other savings institution.
  9. Considered the safest securities available to the U.S. investor.
Down
  1. a variety of investments in a investment portfolio,the goal is to reduce the risk in a portfolio.
  2. calculated on initial principal and the accumulated interest of prior periods.
  3. The capital raised by a corporation by issuing shares of ownership.
  4. Protects investors' cash and securities when a brokerage firm goes out of business,up to $500,000.
  5. Funds from many investors pooled together to establish a diversified portfolio of investments.
  6. Government debt security issued with maturities of two to ten years and traded in the capital markets. A fixed interest.
  7. A percentage amount of the return on an investment or loan.
  8. A savings account that pays variable interest rates based on current conditions in the market for short term securities.
  9. A long term interest bearing security issued by county,city,or state governments,having a maturity of at least ten years.
  10. a rule used to calculate the doubling of money.
  11. a certificate of debt issued by a government or corporation that offers payment of the original principal plus interest by a specified future date.

20 Clues: a rule used to calculate the doubling of money.a nontransferable bond issued by the U.S. government.A percentage amount of the return on an investment or loan.a form of time deposit at a bank or other savings institution.The total accumulatated value of the assets a person possesses.Considered the safest securities available to the U.S. investor....

Lesson 1 A Vocabulary Crossword 2023-10-03

Lesson 1 A Vocabulary Crossword crossword puzzle
Across
  1. An individual who installs, modifies and repairs personal computer (PC) hardware components.
  2. An individual who is responsible for the maintenance and security of an organization's database resources and data.
  3. The management and processing of information using computers and computer networks.
  4. An individual who manages the security measures used to protect electronic data.
  5. An individual who manages a Web development team.
  6. An individual who is responsible for the organization and appearance of a Web site.
  7. An individual who develops primarily server-side Web applications.
  8. An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
Down
  1. An individual who diagnoses and resolves users' technical hardware and software problems.
  2. An individual who analyzes Web site statistics to determine the site's effectiveness.
  3. An individual who troubleshoots and repairs mobile device hardware components.
  4. An individual who manages and maintains a network infrastructure.
  5. An individual who manages and maintains network servers.
  6. An individual who determines the visibility of Web sites across multiple clients and search engines.
  7. Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations over the Internet.
  8. An individual who creates the overview plan of a Web site's development.
  9. The process of improving the volume and quality of traffic to a Web site by structuring content to improve search engine ranking. A specific activity of Internet marketing.
  10. An individual who examines an organization's security requirements and determines the necessary infrastructure.
  11. A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.
  12. An individual who develops Web sites and/or applications for mobile devices.

20 Clues: An individual who manages a Web development team.An individual who manages and maintains network servers.An individual who manages and maintains a network infrastructure.An individual who develops primarily server-side Web applications.An individual who creates the overview plan of a Web site's development....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Cloud-based vulnerability management platform with scanning and reporting.
  2. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  3. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  4. Security documentation that details system resource usage by users and processes for auditing.
  5. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Policy-based accept or deny of network traffic.
  8. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Injecting malicious scripts into webpages viewed by other users
  3. Matching known patterns of threats against security event data to find potential matches.
  4. Code examination performed without running the malicious program.
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Criminal use of the internet or other electronic means to persistently harass an individual.
  8. Gaining unauthorized access to a secured area by following an authorized person.
  9. Attack that uses a list of commonly used words or phrases to guess a password.
  10. Process of transforming information into a scrambled format to secure it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Gaining unauthorized access to a secured area by following an authorized person.
  3. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Security documentation that details system resource usage by users and processes for auditing.
Down
  1. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. The correlation that matches the known patterns of threats against security event data to find potential matches.
  3. Process of transforming information into a scrambled format to secure it.
  4. Criminal use of the internet or other electronic means to persistently harass an individual.
  5. Attack that uses a list of commonly used words or phrases to guess a password.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Cloud-based vulnerability management platform with scanning and reporting.
  8. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  9. Code examination performed without running the malicious program.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  11. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  12. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  13. Policy-based accept or deny of network traffic.
  14. Graphic object used in reports to visualize the correlation between an object and its performance.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

Food Security and Beyond 2017-09-13

Food Security and Beyond crossword puzzle
Across
  1. A crop commonly grown in the Asia region
  2. The type of air pressure system that is associated with clouds and rain
  3. A natural disaster currently affecting parts of the USA
  4. When all people at all times have physical and economic access to sufficient, safe, nutritious food to maintain healthy and active lives
  5. Part of the United Nations, an organisation working towards food security
  6. Farming methods that preserve resources
  7. Exchange of food and money between countries
  8. The type of air pressure system that is associated with fine weather
  9. The lines on a weather map that show us air pressure systems
Down
  1. A process involving increasing temperatures and more extreme weather events that threatens food production
  2. When people do not have access to a sufficient quality of nutritious food
  3. The process that converts raw materials into food products
  4. A situation where a person's basic needs are not being met
  5. A shortage of food for the population
  6. Plants that are grown on a large scale and sold
  7. All of the people who live in a particular place

16 Clues: A shortage of food for the populationFarming methods that preserve resourcesA crop commonly grown in the Asia regionExchange of food and money between countriesPlants that are grown on a large scale and soldAll of the people who live in a particular placeA natural disaster currently affecting parts of the USA...

Screaming Halt 2023-05-04

Screaming Halt crossword puzzle
Across
  1. name of black trans person killed in San Francisco
  2. "I _____ a lot of people on this board"
  3. Brown was killed because he was trying to _______.
  4. Protestors called on Walgreen's to get rid of ______.
  5. "But I have to pretend that you have some form of _____ left."
  6. speaker who screamed at the board
  7. "So I don't have any ______ prepared for you today"
  8. Nothing in the store was worth Brown's ______.
Down
  1. "This is what the trans _______ in this country has brought me to."
  2. McGeever called the board _______ before walking away.
  3. Walgreen's and other retail stores have seen a spike in ______ in recent years
  4. name of store Brown took things from
  5. "We demand an end to armed ________"
  6. Last name of security guard responsible for man's death
  7. nonverbal expression of "______"
  8. "The suspect believed he was in ______ danger"

16 Clues: nonverbal expression of "______"speaker who screamed at the boardname of store Brown took things from"We demand an end to armed ________""I _____ a lot of people on this board""The suspect believed he was in ______ danger"Nothing in the store was worth Brown's ______.name of black trans person killed in San Francisco...

Cyber Safety 2023-11-01

Cyber Safety crossword puzzle
Across
  1. when someone is helping you in a bullied situation
  2. What You search up with
  3. How can we access the world wide web
Down
  1. When Someone is being Bullied Online
  2. To secure your account
  3. A app that generates a web page for us

6 Clues: To secure your accountWhat You search up withWhen Someone is being Bullied OnlineHow can we access the world wide webA app that generates a web page for uswhen someone is helping you in a bullied situation

COMPUTER PUZZLE 2025-06-16

COMPUTER PUZZLE crossword puzzle
Across
  1. hacking - hacking done for good cause
  2. to point - two nodes are directly connected with each other
  3. card - attached to computer to connect network
  4. - using the language or thoughts of another person as one's original work
  5. topology - each node is connected to every other node in the network
  6. - Illegal intrusion into a computer system or network
Down
  1. - prevents unauthorised use people from accessing your system and network
  2. - transforming data into a unreadable code
  3. practices - accessing the internet in an illegal manner
  4. crime- criminal activities that involve the use of computer
  5. - each computer in a network
  6. m topology - all the nodes are in circular manner
  7. - two or more computers located at distance places
  8. -bulk emails that come from unknown sources

14 Clues: - each computer in a networkhacking - hacking done for good cause- transforming data into a unreadable code-bulk emails that come from unknown sourcescard - attached to computer to connect networkm topology - all the nodes are in circular manner- two or more computers located at distance places- Illegal intrusion into a computer system or network...

COMPUTER PUZZLE 2025-06-16

COMPUTER PUZZLE crossword puzzle
Across
  1. hacking - hacking done for good cause
  2. to point - two nodes are directly connected with each other
  3. card - attached to computer to connect network
  4. - using the language or thoughts of another person as one's original work
  5. topology - each node is connected to every other node in the network
  6. - Illegal intrusion into a computer system or network
Down
  1. - prevents unauthorised use people from accessing your system and network
  2. - transforming data into a unreadable code
  3. practices - accessing the internet in an illegal manner
  4. crime- criminal activities that involve the use of computer
  5. - each computer in a network
  6. m topology - all the nodes are in circular manner
  7. - two or more computers located at distance places
  8. -bulk emails that come from unknown sources

14 Clues: - each computer in a networkhacking - hacking done for good cause- transforming data into a unreadable code-bulk emails that come from unknown sourcescard - attached to computer to connect networkm topology - all the nodes are in circular manner- two or more computers located at distance places- Illegal intrusion into a computer system or network...

Cyber Law CIA I 2021-09-01

Cyber Law CIA I crossword puzzle
Across
  1. An environment in which communication occurs through a computer network.
  2. A collection of web pages and other created content having a common domain.
  3. A network is usually private or restricted, specially created for an enterprise or an organization.
  4. A situation where a person gets verbally or physically threaten on the internet,
  5. A way to protect data for the concerned user to access it.
  6. the other person a mental imbalance.
  7. the right/powers to make rules and authority to interpret and apply them.
Down
  1. The conversion of text, pictures, or sound in the digital form.
  2. People who are frequent users of the internet.
  3. A structured set of files just like a stack held in a computer, which is accessible in various ways.
  4. A security system present in the computer which supervises the operation and network traffic as per precoded rules.
  5. The process of exploiting the computer system or any private network.
  6. It is a stated obligation and everyone has to abide by it.
  7. A right especially to protect the rights and expression of the original work done by the creator.

14 Clues: the other person a mental imbalance.People who are frequent users of the internet.It is a stated obligation and everyone has to abide by it.A way to protect data for the concerned user to access it.The conversion of text, pictures, or sound in the digital form.The process of exploiting the computer system or any private network....

Basic of Cyber Sercurity 2019-07-10

Basic of Cyber Sercurity crossword puzzle
Across
  1. items or people of value online
  2. making sure every individual working with an information system has specific responsibilities for information assurance
  3. preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
  4. the virtual, online world
  5. provides a way for denial to be impossible
  6. a weakness or gap in our effort to protect ourselves
  7. assures online information is trustworthy and accurate
Down
  1. infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
  2. guarantee of reliable access to information
  3. three-pronged system of cybersecurity
  4. the practice of protecting digital and non-digital information
  5. a set of rules limiting access to certain information, much like privacy
  6. the state of being protected against criminal or unauthorized online activity
  7. guarantee that the message, transaction, or other exchange of information has shown its proof of identity

14 Clues: the virtual, online worlditems or people of value onlinethree-pronged system of cybersecurityprovides a way for denial to be impossibleguarantee of reliable access to informationa weakness or gap in our effort to protect ourselvesassures online information is trustworthy and accuratethe practice of protecting digital and non-digital information...

Cyber Snowball Admission Test 2023-11-20

Cyber Snowball Admission Test crossword puzzle
Across
  1. The best movie in the world
  2. The best sport in the world
  3. The country that should have won
  4. The best yellow character ever
  5. A city we were once in
  6. An animal that we once were
  7. Hotel motel holiday inn
Down
  1. This is for you Rhea
  2. The anonymous gift Hunayn received
  3. Lactose intolerant people hate this...
  4. The app everyone should have on their phones
  5. This is what Rida suffered with (Starts with an A)
  6. Second half of the best joke
  7. First half of the best joke

14 Clues: This is for you RheaA city we were once inHotel motel holiday innThe best movie in the worldThe best sport in the worldFirst half of the best jokeAn animal that we once wereSecond half of the best jokeThe best yellow character everThe country that should have wonThe anonymous gift Hunayn receivedLactose intolerant people hate this......

Mr Müller`s last week`s vocabulary 2020-05-04

Mr Müller`s last week`s vocabulary crossword puzzle
Across
  1. to Chat, meet,for a Long time
  2. someone who is not nice to you over the Internet
  3. time between a child and a adult
  4. when you like a Person and the Person like`s you too
  5. when i look in your eyes and you look in my eyes
  6. when we talk but i don`t think the same About a theme like you do
Down
  1. to don`t like yourself
  2. i look silent at you and nod
  3. write something on paper and send it by post
  4. electrial device

10 Clues: electrial deviceto don`t like yourselfi look silent at you and nodto Chat, meet,for a Long timetime between a child and a adultwrite something on paper and send it by postsomeone who is not nice to you over the Internetwhen i look in your eyes and you look in my eyeswhen you like a Person and the Person like`s you too...

Digital Footprint Crossword Puzzle 2020-09-30

Digital Footprint Crossword Puzzle crossword puzzle
Across
  1. Talking and socializing with other people
  2. A composition of letters, numbers, and/or symbols to get onto an electronic or website
  3. Inventions that solve problems or make life easier
  4. A big network that connects people all over the world on their electronics
Down
  1. Things that are online
  2. Someone who bullies people online
  3. A person or program that tries to trick people into giving away their money or information
  4. The victim of cyber bullying
  5. The searches, websites, and social media that you leave behind
  6. A program or error that causes an electronic to malfunction

10 Clues: Things that are onlineThe victim of cyber bullyingSomeone who bullies people onlineTalking and socializing with other peopleInventions that solve problems or make life easierA program or error that causes an electronic to malfunctionThe searches, websites, and social media that you leave behind...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Cybertrafficking Crossword Puzzle 2024-04-23

Cybertrafficking Crossword Puzzle crossword puzzle
Across
  1. Human trafficking is a form of_______ slavery.
  2. The emoji cherries means ___.
  3. Gender most likely to be trafficked for sexual exploitation.
  4. Element of human trafficking.
  5. I am a person who has been trafficked by another person. Who am I?
Down
  1. Aspect of trafficking that does not need to be present in order for a situation to be considered child trafficking.
  2. Children can be vulnerable to ___ grooming.
  3. Gender most likely to be trafficking for labour exploitation.
  4. ___ settings helps to protect sensitive information from strangers.
  5. _____ scams are messages that try to trick you into providing sensitive information.

10 Clues: The emoji cherries means ___.Element of human trafficking.Children can be vulnerable to ___ grooming.Human trafficking is a form of_______ slavery.Gender most likely to be trafficked for sexual exploitation.Gender most likely to be trafficking for labour exploitation.___ settings helps to protect sensitive information from strangers....

unit 1 2024-12-16

unit 1 crossword puzzle
Across
  1. use in an improper way,improper treatment,
  2. of time between childhood and adulthood.
  3. Dating-going out in a group rather than just as a couple
  4. Dating-casual dating that involves no commitment to help the relationship.
  5. Dating-dating only one person on a regular basis.
  6. of love and emotional attachment to another person.
Down
  1. who obsessively follows,observes,or contacts another person without their consent.
  2. continuous change.
  3. stalker-a person who uses the internet as a means to stalk or harass someone.
  4. Violence-abuse in a family or household.
  5. further the development of a relationship.

11 Clues: continuous change.of time between childhood and adulthood.Violence-abuse in a family or household.use in an improper way,improper treatment,further the development of a relationship.Dating-dating only one person on a regular basis.of love and emotional attachment to another person.Dating-going out in a group rather than just as a couple...

Nicrossword 2 2024-12-23

Nicrossword 2 crossword puzzle
Across
  1. State Wide Area Network to connect state administration offices.
  2. Software with source code that anyone can inspect, modify, and enhance.
  3. National Knowledge Network for connecting educational and research institutions.
  4. Protection against cyber threats and securing digital infrastructure.
  5. Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
  1. A unique identification project by the Government of India.
  2. Unified Mobile Application for New-age Governance.
  3. An ICT solution for the management of hospital services.
  4. A paperless office solution by NIC for government departments.
  5. A nationwide communication network by NIC.

10 Clues: A nationwide communication network by NIC.Unified Mobile Application for New-age Governance.An ICT solution for the management of hospital services.A unique identification project by the Government of India.A paperless office solution by NIC for government departments.State Wide Area Network to connect state administration offices....

Infomatika 9-2 Bab 1 2025-01-06

Infomatika 9-2 Bab 1 crossword puzzle
Across
  1. Kejahatan cyber dengan mengecoh orang lain agar memberikan data pribadi.
  2. Perdagangan yang menggunakan jasa jaringan telekomunikasi.
  3. Diskusi dan kelas online merupakan TIK dalam bidang?
  4. Tindakan melawan hukum seseorang menggunakan sarana komputer.
  5. Dapat digunakan untuk melakukan jual-beli jarak jauh adalah peran TIK dalam bidang?
Down
  1. Ilmu yang mempelajari tentang komputer untuk mengatur dan menganalisis data.
  2. Kegiatan dalam internet untuk mencari informasi dengan mesin pencari.
  3. Layanan perbankan dari bank yang dilakukan menggunakan SMS merupakan TIK dalam bidang?
  4. Kumpulan komputer di seluruh dunia yang saling terhubung membentuk suatu jaringan disebut?
  5. Kejahatan dengan menggunakan kartu kredit.

10 Clues: Kejahatan dengan menggunakan kartu kredit.Diskusi dan kelas online merupakan TIK dalam bidang?Perdagangan yang menggunakan jasa jaringan telekomunikasi.Tindakan melawan hukum seseorang menggunakan sarana komputer.Kegiatan dalam internet untuk mencari informasi dengan mesin pencari....

Financial Procedures 2016-01-05

Financial Procedures crossword puzzle
Across
  1. Preferred way by business of refunding Solar Credits
  2. Interest from Security Deposit applied every this many months
  3. Can we transfer solar credits
  4. Previously called backdating
  5. Used to complete a Transfer of Credit
  6. Raised to notify user to manually refund Security Deposit
  7. Account status where the Financial Adjustment can only be cancelled
Down
  1. Which SA is the Solar Credit held on
  2. Where to find all business processes
  3. The min amount of premises or NMIs acct can have for Consolidated Accounts
  4. The maximum amount of SAs a Child account can have
  5. The document which contains Authority Levels

12 Clues: Previously called backdatingCan we transfer solar creditsWhich SA is the Solar Credit held onWhere to find all business processesUsed to complete a Transfer of CreditThe document which contains Authority LevelsThe maximum amount of SAs a Child account can havePreferred way by business of refunding Solar Credits...