cyber security Crossword Puzzles

infosec terms 2024-07-23

infosec terms crossword puzzle
Across
  1. the method of authentication that requires 2 methods of verification
  2. which policy requires you to secure your workstation
  3. the B1 team responsible for overall network security
  4. an email that attempts to solicit information
Down
  1. the process of verifying a users identity
  2. a computer infection
  3. the process of email security requiring verification before access
  4. which button in outlook that allows you to report an email as phishing
  5. unwanted email
  6. an unauthorized person attempting to access the network

10 Clues: unwanted emaila computer infectionthe process of verifying a users identityan email that attempts to solicit informationwhich policy requires you to secure your workstationthe B1 team responsible for overall network securityan unauthorized person attempting to access the networkthe process of email security requiring verification before access...

Chapter 9. Conner & Aaron 2025-05-29

Chapter 9. Conner & Aaron crossword puzzle
Across
  1. Form to report income and taxes owed.
  2. Tax on property passed on after someone dies.
  3. People with more income should pay more taxes.
  4. on goods and services bought.
Down
  1. Profit from selling assets like stocks.
  2. Tax that takes more from low incomes.
  3. Payroll tax for Social Security and Medicare.
  4. Tax taken from wages for Social Security and Medicare.
  5. Tax on value added at each stage of production.
  6. Tax on specific goods like gas or alcohol.

10 Clues: on goods and services bought.Tax that takes more from low incomes.Form to report income and taxes owed.Profit from selling assets like stocks.Tax on specific goods like gas or alcohol.Payroll tax for Social Security and Medicare.Tax on property passed on after someone dies.People with more income should pay more taxes....

Puzzle #49 – “SSI vs SSDI (Deep Dive)” 2025-06-30

Puzzle #49 – “SSI vs SSDI (Deep Dive)” crossword puzzle
Across
  1. - Supplemental Security Income for people with low income and resources
  2. - These are counted for SSDI but limited for SSI
  3. - SSI is this type of program
  4. - SSI recipients often receive this state program
Down
  1. - Required to qualify for SSDI
  2. - SSI has strict limits on these
  3. - Social Security Disability Insurance for workers with enough credits
  4. - SSDI recipients qualify for this after 24 months
  5. - You must do this through SSA for either program
  6. - Taxes that fund SSDI, not SSI

10 Clues: - SSI is this type of program- Required to qualify for SSDI- Taxes that fund SSDI, not SSI- SSI has strict limits on these- These are counted for SSDI but limited for SSI- You must do this through SSA for either program- SSI recipients often receive this state program- SSDI recipients qualify for this after 24 months...

Explanation and Development of the Teachings of Rerum Novarum 2022-11-14

Explanation and Development of the Teachings of Rerum Novarum crossword puzzle
Across
  1. valuable work in adapting the economic and social order everywhere to the norm of justice and humanity is shown by the __ __ __.
  2. ________ ____________ is rooted in the right of private property.
  3. Pope John XXII wants there to be a correlation between the ___ in the growth of the economy and an ____ in social development.
Down
  1. encyclical letter that explores the role of the church in efforts to achieve social progress and social justice.
  2. private property is a valid right according to the private property is a valid right according to _______.
  3. known as mother and teacher of nations.
  4. private ownership should _________.
  5. more modern ___ has lead to an increase in demand in education of workers.
  6. financial security and status is now rooted in programs like __________ and social security instead of ownership of private property.
  7. public property is necessary for state to exercise security greater power for the ____________ ______.

10 Clues: private ownership should _________.known as mother and teacher of nations.________ ____________ is rooted in the right of private property.more modern ___ has lead to an increase in demand in education of workers.public property is necessary for state to exercise security greater power for the ____________ ______....

AI in Cyberspace: Beyond the Hype 2025-03-07

AI in Cyberspace: Beyond the Hype crossword puzzle
Across
  1. A term often paired with "learning" in AI advancements.
  2. The practice of protecting computer systems from threats.
  3. A type of network modeled after the human brain.
  4. AI systems designed to operate without human intervention.
Down
  1. Related to intelligence that mimics human decision-making.
  2. The use of AI to protect cyberspace from cyber threats.
  3. A step-by-step procedure used in AI for decision-making.
  4. The process AI systems undergo to improve performance.

8 Clues: A type of network modeled after the human brain.The process AI systems undergo to improve performance.The use of AI to protect cyberspace from cyber threats.A term often paired with "learning" in AI advancements.A step-by-step procedure used in AI for decision-making.The practice of protecting computer systems from threats....

5-3a Rev 2023-04-21

5-3a Rev crossword puzzle
Across
  1. Will forgo testing when directed by the 616 OC to implement an emergency remediation tasking.
  2. 616 OC will task _____ with Priority and Emergency vulnerability remediation actions.
  3. Organization that verifies compliance percentages via vulnerability scans provided by the organization responsible for the applicable assets.
  4. Are responsible for populating the AFIN 3% test group.
  5. Which RMF step is associated with formally authorizing the systems for operations.
  6. One of two types of VRO deployments.
  7. A process that is automated by the use of an application called eMASS.
  8. Which RMF step involves identifying org’s essential activities, mission, and security levels?
  9. Three overall IA areas or Contributing Factors (with Culture and Conduct).
  10. Is responsible for adding the ARAD and MECM Current Branch agents as permanent elements of all SDC/SSC baselines.
  11. PMOs may utilize _______ groups to isolate systems from AFIN-wide patches and updates.
Down
  1. responsible for remediating the remaining 5% of systems that are considered non-compliant.
  2. Implements a goal of 95% compliance of vulnerability remediation actions using enterprise remediation tools.
  3. A flaw or weakness in system security procedures, design, implementation, or internal controls that could be utilized by an adversary to breach the AFIN.
  4. Which RMF step is associated with verifying sec controls are implemented/operating correctly and producing desired outcome.
  5. The goal of the vulnerability remediation/mitigation process is to mitigate the risks associated with vulnerabilities through the implementation of ____.
  6. A DISA-led formal inspection designed to increase accountability and the security posture of DoD Information Networks according to DoD standards.
  7. Which RMF step is associated with maintaining ongoing S/A.
  8. One of two types of VRO deployments.
  9. Will alert the NOS when non-cliented systems rises to 10% or higher.

20 Clues: One of two types of VRO deployments.One of two types of VRO deployments.Are responsible for populating the AFIN 3% test group.Which RMF step is associated with maintaining ongoing S/A.Will alert the NOS when non-cliented systems rises to 10% or higher.A process that is automated by the use of an application called eMASS....

Module 1.1 2016-09-12

Module 1.1 crossword puzzle
Across
  1. предок
  2. коріння
  3. збити куш
  4. втікати
  5. крадій
  6. бути засудженим до в'язниці
  7. історія сім'ї
  8. вітчим
  9. бути родичем до (бути пов'язаним з)
  10. покидати
Down
  1. сторона сім'ї
  2. бути схожим
  3. охорона
  4. атлет
  5. розширенна сім'я
  6. падчерка
  7. колишній чоловік

17 Clues: атлетпредоккрадійвітчимкорінняохоронавтікатипадчеркапокидатизбити кушбути схожимсторона сім'їісторія сім'їрозширенна сім'яколишній чоловікбути засудженим до в'язницібути родичем до (бути пов'язаним з)

Cellular Shenanigans 2025-10-15

Cellular Shenanigans crossword puzzle
Across
  1. amount per area
  2. stabilizer
  3. no energy
  4. handicapped entrypoint
  5. any water substance
  6. antenna
  7. watergate
  8. equal substance between area
  9. no help needed
Down
  1. difference between areas
  2. water entry
  3. energy needed
  4. almost always water
  5. entry with security
  6. glucose entry
  7. NA+ K and ions
  8. a+b=c

17 Clues: a+b=cantennano energywatergatestabilizerwater entryenergy neededglucose entryNA+ K and ionsno help neededamount per areaalmost always waterentry with securityany water substancehandicapped entrypointdifference between areasequal substance between area

NCSC LIII 2025-03-23

NCSC LIII crossword puzzle
Across
  1. Metro line color that takes you to DuPont
  2. DC river flowing into the Potomac
  3. ______, Realistic, and Security-Focused
  4. Iconic DC hotel hosting NCSC LIII
Down
  1. Institution operating DC's 17 free museums and zoo
  2. Cherry _______ Trees
  3. National Collegiate ________ Conference
  4. Last name of the USG of Councils (check ncsc.modelun.org)

8 Clues: Cherry _______ TreesDC river flowing into the PotomacIconic DC hotel hosting NCSC LIIINational Collegiate ________ Conference______, Realistic, and Security-FocusedMetro line color that takes you to DuPontInstitution operating DC's 17 free museums and zooLast name of the USG of Councils (check ncsc.modelun.org)

Stop Bullying 2021-11-19

Stop Bullying crossword puzzle
Across
  1. a person who sees bullying and does the right thing
  2. a person who sees bullying and does nothing or helps the bully
  3. the kind of bullying involving words
  4. the kind of bullying when a person is left out
Down
  1. the kind of bullying when someone's body is hurt
  2. words that hurt feelings, but may not be bullying
  3. unkind behavior that may not be bullying
  4. when two people or groups are mean to each other
  5. the kind of bullying that happens on line

9 Clues: the kind of bullying involving wordsunkind behavior that may not be bullyingthe kind of bullying that happens on linethe kind of bullying when a person is left outthe kind of bullying when someone's body is hurtwhen two people or groups are mean to each otherwords that hurt feelings, but may not be bullying...

Bullying 2013-11-07

Bullying crossword puzzle
Across
  1. to make verbal or physical attacks on someone
  2. bullying that is spoken
  3. bullying it is a type of bullying that happens over the internet
  4. bullying it is a type of bullying that hurts someones feelings
Down
  1. someone who is harming or harassing another person
  2. bullying it is a type of bullying that harms another person.
  3. is a person who is being tormented or harassed by a bully or group of bullies
  4. to cause suffering to someone else
  5. a person who is a viewer of someone else's bullying.

9 Clues: bullying that is spokento cause suffering to someone elseto make verbal or physical attacks on someonesomeone who is harming or harassing another persona person who is a viewer of someone else's bullying.bullying it is a type of bullying that harms another person.bullying it is a type of bullying that hurts someones feelings...

Le projet de Mariam et Leila 2023-04-29

Le projet de Mariam et Leila crossword puzzle
Across
  1. Le harcèlement en utilisant les différentes formes de communication électronique.
  2. Le harcèlement qui se trouve au travail, les magasins...
  3. Violence qui se répète constamment
  4. Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
  1. Façon pour lutter contre le harcèlement
  2. Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
  3. Le harcèlement qui se trouve à l'école, l'université...
  4. Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
  5. Façon pour sensibiliser à un sujet

9 Clues: Violence qui se répète constammentFaçon pour sensibiliser à un sujetFaçon pour lutter contre le harcèlementLe harcèlement qui se trouve à l'école, l'université...Le harcèlement qui se trouve au travail, les magasins...Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : The practice of protecting devices and data from cyber threats
  2. : Bullying someone online through messages or social media
  3. : A system that blocks unauthorized access to or from a private network
  4. : Fake messages that try to steal passwords or bank info
Down
  1. : People who use the internet or computers to commit crimes
  2. : A harmful program that can damage files and software
  3. : Breaking into someone’s computer or account without permission
  4. : Criminal activities done using computers or the internet
  5. : Software that protects your computer from viruses

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Unit 11 2023-05-10

Unit 11 crossword puzzle
Across
  1. Petition
  2. Endanger
  3. Impractical
  4. Catalog
  5. Discriminating
  6. Tell from right to wrong
Down
  1. Peril
  2. large mass of snow
  3. Settle down
  4. Sharp in manner or tone
  5. Wise
  6. Operate

12 Clues: WisePerilCatalogOperatePetitionEndangerSettle downImpracticalDiscriminatinglarge mass of snowSharp in manner or toneTell from right to wrong

Global Issues 2024-11-12

Global Issues crossword puzzle
Across
  1. Photo 1
  2. Photo 7
  3. Photo 3
  4. Photo 12
  5. Photo 11
  6. Photo 10
Down
  1. Photo 8
  2. Photo 6
  3. Photo 4
  4. Photo 2
  5. Photo 9
  6. Photo 5

12 Clues: Photo 8Photo 6Photo 1Photo 7Photo 4Photo 2Photo 3Photo 9Photo 5Photo 12Photo 11Photo 10

Loan Crossword 2024-11-01

Loan Crossword crossword puzzle
Across
  1. Collateral Backed
  2. Security assets
  3. Unchanging cost
  4. Financial score
  5. Financial ratio
  6. Loan provider
  7. Gradual Payment
Down
  1. No collateral
  2. Non-payment
  3. Loan charge
  4. Initial sum
  5. Loan recipient

12 Clues: Non-paymentLoan chargeInitial sumNo collateralLoan providerLoan recipientSecurity assetsUnchanging costFinancial scoreFinancial ratioGradual PaymentCollateral Backed

Alencar 20221103 2022-11-03

Alencar 20221103 crossword puzzle
Across
  1. common
  2. improve
  3. exclude
  4. responsible for
  5. specially (adv)
  6. include
  7. 3 weeks ago
  8. power (n, fs)
  9. government (n, fs)
Down
  1. sprout, to mushroom
  2. non-disclosure obligation
  3. security
  4. project leader (n,ms)
  5. one "must"
  6. exaggerate
  7. NGO
  8. exaggerated (part, adj)
  9. sense (n, ms)
  10. disappear (part)
  11. replace
  12. money laundry
  13. to exploit
  14. to finish, to end something

23 Clues: NGOcommonimproveexcludereplaceincludesecurityone "must"exaggerateto exploit3 weeks agosense (n, ms)money laundrypower (n, fs)responsible forspecially (adv)disappear (part)government (n, fs)sprout, to mushroomproject leader (n,ms)exaggerated (part, adj)non-disclosure obligationto finish, to end something

Ristikko lukujen 3 ja 3.3. sanoista 2020-03-03

Ristikko lukujen 3 ja 3.3. sanoista crossword puzzle
Across
  1. näky
  2. äärimmäinen
  3. saapuminen
  4. lähtevät lennot
  5. mahdollisuus,tilaisuus
  6. tiede
  7. käsimatkatavarat
  8. todella paljon
  9. varata
  10. laskeutuminen
  11. liftata
  12. luotettava
  13. suvaitsevaisuus
  14. turvatarkastus
  15. myöhässä
  16. tulli
Down
  1. verottaa
  2. kuljetus
  3. vaikutus
  4. viisumi
  5. majoitus
  6. matkalipun hinta
  7. varaus
  8. matkavakuutus
  9. kokoontuminen
  10. ottaa,aurinkoa
  11. ainutlaatuinen
  12. sinnikkyys, sitkeys
  13. etukäteen
  14. nousu

30 Clues: näkytiedenousutullivarausvarataviisumiliftataverottaakuljetusvaikutusmajoitusmyöhässäetukäteensaapuminenluotettavaäärimmäinenmatkavakuutuskokoontuminenlaskeutuminenottaa,aurinkoaainutlaatuinentodella paljonturvatarkastuslähtevät lennotsuvaitsevaisuusmatkalipun hintakäsimatkatavaratsinnikkyys, sitkeysmahdollisuus,tilaisuus

Lesson 3 spelling word activity (easy mode) 2020-04-28

Lesson 3 spelling word activity  (easy mode) crossword puzzle
Across
  1. safe and secure
  2. going to happen
  3. not guilty
  4. Pay back
  5. LOOK OUT
  6. another word for beat
  7. a safe place
  8. about to happen
  9. overwhelmed
  10. Not convinced
  11. down shut down
Down
  1. writing creation
  2. scary, horrifying
  3. already happened
  4. crazy person
  5. tired and not mentally up to it
  6. imaginative story
  7. Appreciated
  8. cant take it very bad
  9. Yummy

20 Clues: YummyPay backLOOK OUTnot guiltyAppreciatedoverwhelmedcrazy persona safe placeNot convinceddown shut downsafe and securegoing to happenabout to happenwriting creationalready happenedscary, horrifyingimaginative storyanother word for beatcant take it very badtired and not mentally up to it

Dog Breeds 2023-03-25

Dog Breeds crossword puzzle
Across
  1. Sled Propeller
  2. The Crime Dog
  3. Snoopy is One
  4. He’s a Fighter
  5. Peek-a-boo Hairdo
  6. A Footlong Hot Dog
  7. Firehouse Favorite
  8. Little Rascal Petey
  9. Deutschland Herder
Down
  1. Ears are longer then legs
  2. PA State Dog
  3. Georgia's Uga
  4. Lassie Lineage
  5. Yellow Go Getter
  6. Pampered Pooch
  7. Speed King
  8. Security Guard
  9. Ravishing Redhead
  10. Has an ugly Mug
  11. Gives Directions

20 Clues: Speed KingPA State DogGeorgia's UgaThe Crime DogSnoopy is OneSled PropellerLassie LineagePampered PoochSecurity GuardHe’s a FighterHas an ugly MugYellow Go GetterGives DirectionsRavishing RedheadPeek-a-boo HairdoA Footlong Hot DogFirehouse FavoriteDeutschland HerderLittle Rascal PeteyEars are longer then legs

Tobacco Tax Section 2017-06-09

Tobacco Tax Section crossword puzzle
Across
  1. cross-street
  2. administrative
  3. not tax, but
  4. put it in your blank and smoke it
  5. code to live by
  6. cross-border shopping
  7. exempt tobacco
  8. government project methodology
  9. EFR due date
  10. Gentax maker
Down
  1. V3
  2. common understanding
  3. you do this,too?
  4. inspectors
  5. special retailer
  6. overarching service value
  7. stamp colour
  8. market supported
  9. newest member
  10. AKA authorization

20 Clues: V3inspectorscross-streetnot tax, butstamp colourEFR due dateGentax makernewest memberadministrativeexempt tobaccocode to live byyou do this,too?special retailermarket supportedAKA authorizationcommon understandingcross-border shoppingoverarching service valuegovernment project methodologyput it in your blank and smoke it

2nd Dec 2023- Puzzle number 336 2023-11-19

2nd Dec 2023- Puzzle number 336 crossword puzzle
Across
  1. bird or toy
  2. roman cat
  3. earth apple
  4. wet burglar
  5. vowelless tomb
  6. number I had for dinner
  7. total
  8. rouge underwater distraction
  9. measures moments
  10. more than slow
Down
  1. christmas circle
  2. continuous wool cutting
  3. spicy green pepper
  4. archaic Saturday
  5. polar solvent used to hydrate
  6. makes milk sweet
  7. smith, jack, bill, head
  8. absence of particles
  9. hydrated currants
  10. metallic security device

20 Clues: totalroman catbird or toyearth applewet burglarvowelless tombmore than slowchristmas circlearchaic Saturdaymakes milk sweetmeasures momentshydrated currantsspicy green pepperabsence of particlescontinuous wool cuttingsmith, jack, bill, headnumber I had for dinnermetallic security devicerouge underwater distractionpolar solvent used to hydrate

¿Cómo afecta la tecnología la calidad de vida? 2024-01-30

¿Cómo afecta la tecnología la calidad de vida? crossword puzzle
Across
  1. Social isolation
  2. Privacy
  3. To improve
  4. Inequalities
  5. productivity
  6. Employment
  7. Sedentary lifestyle
  8. Emotional well-being
  9. Medical devices
  10. Electronic devices
  11. Available
  12. Entertainment
  13. Efficiency
  14. Data
  15. Recreational
  16. -Task completion
Down
  1. Mental health
  2. Quality of life
  3. Concerns, worries
  4. Medical advances
  5. Social media
  6. Connections
  7. Security
  8. Digital divide
  9. Balanced
  10. Anxiety
  11. The workplace
  12. learning
  13. Tools

29 Clues: DataToolsPrivacyAnxietySecurityBalancedlearningAvailableTo improveEmploymentEfficiencyConnectionsSocial mediaInequalitiesproductivityRecreationalMental healthThe workplaceEntertainmentDigital divideQuality of lifeMedical devicesSocial isolationMedical advances-Task completionConcerns, worriesElectronic devicesSedentary lifestyleEmotional well-being

TT Episode 4 2024-01-30

TT Episode 4 crossword puzzle
Across
  1. disease
  2. get
  3. silly, stupid
  4. absolutely
  5. nature part
  6. drink a little
  7. fire
  8. security cameras
  9. a person who did a crime
  10. open
  11. body part you can breath through
Down
  1. feel nervous
  2. destroy
  3. proud
  4. show
  5. nice
  6. contest who shows the best person
  7. awful
  8. a person looks after a school
  9. to debate, give reeasons to support an idea

20 Clues: getshownicefireopenproudawfuldestroydiseaseabsolutelynature partfeel nervoussilly, stupiddrink a littlesecurity camerasa person who did a crimea person looks after a schoolbody part you can breath throughcontest who shows the best personto debate, give reeasons to support an idea

Accept Your Own and Be Yourself 2024-06-30

Accept Your Own and Be Yourself crossword puzzle
Across
  1. capacity, dominance
  2. ordinariness
  3. The reggae Island
  4. depict, show
  5. sense of security in friendship
  6. not enough
  7. religious
  8. Plan
  9. The best
  10. to give yourself grace
  11. aid, help
Down
  1. give-and-take
  2. rapper and singer
  3. aim
  4. impassioned feeling
  5. slip, stagger
  6. formed
  7. young people
  8. above, greater
  9. companionship
  10. the spreading out of a group of people

21 Clues: aimPlanformedThe bestreligiousaid, helpnot enoughordinarinessdepict, showyoung peoplegive-and-takeslip, staggercompanionshipabove, greaterrapper and singerThe reggae Islandcapacity, dominanceimpassioned feelingto give yourself gracesense of security in friendshipthe spreading out of a group of people

PLACES AT SCHOOL 2025-03-18

PLACES AT SCHOOL crossword puzzle
Across
  1. Lab Laboratorium IPA
  2. Room Ruang seni
  3. Post Pos keamanan
  4. Ruang kelas
  5. Field Lapangan olahraga
  6. Office Ruang kepala sekolah
  7. Taman
  8. Gedung olahraga
  9. Room Ruang musik
  10. Perpustakaan
  11. Hall Aula sekolah
  12. Room Mushola
  13. Auditorium
Down
  1. Kantin
  2. Room Ruang guru
  3. Kantin
  4. Taman bermain
  5. Kamar mandi
  6. Lab Laboratorium komputer
  7. Tempat parkir
  8. Room Ruang staf
  9. Laboratorium
  10. Room Ruang bimbingan konseling

23 Clues: TamanKantinKantinAuditoriumKamar mandiRuang kelasLaboratoriumPerpustakaanRoom MusholaTaman bermainTempat parkirRoom Ruang guruRoom Ruang seniRoom Ruang stafGedung olahragaRoom Ruang musikPost Pos keamananHall Aula sekolahLab Laboratorium IPAField Lapangan olahragaLab Laboratorium komputerOffice Ruang kepala sekolahRoom Ruang bimbingan konseling

Home Sweet Home 2025-12-04

Home Sweet Home crossword puzzle
Across
  1. Shelter Garage
  2. Skating Location Hoot Owl Pond
  3. Liquid Storage Oil Tank
  4. 1.4 Acres
  5. burning Fireplace
  6. Hall Foyer
  7. complication Mold
  8. Gates Security
  9. scat chamber Septic Tank
  10. mound Sugar Hill
  11. System Sprinklers
Down
  1. Chambers Bedrooms
  2. well parameters Uranium
  3. lake club Smoke Rise
  4. snake Slytherin
  5. Element Baseboard
  6. results Unsatisfactory
  7. enclosure Screened Porch
  8. Individuals Family
  9. Getaway Office
  10. disapperance zone Laundry

21 Clues: 1.4 AcresHall FoyerShelter GarageGates Securitysnake SlytherinGetaway Officemound Sugar HillChambers BedroomsElement Baseboardburning Fireplacecomplication MoldSystem SprinklersIndividuals Familylake club Smoke Riseresults Unsatisfactorywell parameters UraniumLiquid Storage Oil Tankenclosure Screened Porchscat chamber Septic Tank...

Animals 2025-06-24

Animals crossword puzzle
Across
  1. colorful
  2. largest water animal
  3. black and white
  4. snake enemy
  5. funny
  6. jumping
  7. water's queen
  8. water and land
  9. fly high
  10. talking bird
  11. danger in water
Down
  1. big animal
  2. king
  3. fastest
  4. danger sting
  5. smallest one
  6. security
  7. human like
  8. bird on land
  9. poisonous
  10. racing
  11. bad voice
  12. reptile on wall
  13. a pet
  14. mindful bird
  15. haram

26 Clues: kingfunnya petharamracingfastestjumpingcolorfulsecurityfly highpoisonousbad voicebig animalhuman likesnake enemydanger stingsmallest onebird on landmindful birdtalking birdwater's queenwater and landblack and whitereptile on walldanger in waterlargest water animal

Online trust 2021-09-07

Online trust crossword puzzle
Across
  1. the real deal, not fake
  2. a person who you can trust
  3. Your private information that only you know
  4. password,key and lock, pin number
  5. people who share space online or in real life.
  6. protecting personal information
Down
  1. the permenant way you present yourself online
  2. saying who originaly created somthing
  3. knowing how to find information online that isn't fake
  4. information like your social security number that can put you at risk if the wrong people know it.
  5. a dihonest way to get strangers money or personal information

11 Clues: the real deal, not fakea person who you can trustprotecting personal informationpassword,key and lock, pin numbersaying who originaly created somthingYour private information that only you knowthe permenant way you present yourself onlinepeople who share space online or in real life.knowing how to find information online that isn't fake...

CPI New Hire 2020-10-20

CPI New Hire crossword puzzle
Across
  1. Enables homeowners to answer the door and speak to visitors via two-way audio. (2 Words)
  2. Core Value - We will always deliver high-grade, superior products, services and communication with team members and internal and external customers. (2 Words)
  3. Our touchscreen all-in-one security system manufactured by2Gig.
  4. Provides security coverage for large windows in the home. (2 Words)
  5. Methods and procedures recommended by law enforcement and alarm industry professionals to reduce false alarms.
  6. Loud noise to alert occupants, intruders, and other nearby people that the alarm has been activated.
  7. The standard form of interior protection.
  8. Level of Protection - Window Decals and Yard Signs give an automatic warning that a potentially armed system is in the home.
  9. Core Value - We are truthful, sincere and forthright.
  10. Core Value - We agree to help others develop personally and professionally. (2 Words)
  11. Level of Protection - Video cameras in the home can help identify the intruder and give the police visual evidence to catch the intruder. (2 Words)
  12. Can tie in with other devices like the Fire Communicator and shut off the HVAC system in the event of fire to stop the spread of smoke throughout the home.
  13. This unit powers the app as well real-time communication during an alarm without the need for a telephone.
  14. Core Value - We will enjoy our work and will find ways to make everyone’s workday pleasant. (2 Words)
  15. The year CPI Security was founded.
Down
  1. Can be used throughout the home to activate a police, medical, or auxiliary alarm. (2 Words)
  2. Core Value - We are generous corporately and individually with our resources, time and money.
  3. Controls all of the components of the alarm system and communicates signals to a signal receiver such as one a central monitoring station.
  4. Our traditional hard-wired security system manufactured by Interlogix. This system is no longer actively installed.
  5. Core Value - We are free from bias, dishonesty and injustice.
  6. Core Value - We cooperate and coordinate efforts acting together in the interest of a common cause.
  7. Built in delay after the siren is activated before a signal is transmitted from the control panel. (2 Words)
  8. Electronic transmission of information from a control panel to a Central Monitoring Station.
  9. The location of our regional office in Tennessee.
  10. A professional emergency response center where emergency alarm signals are processed. (2 Words)
  11. Detects smoke and offers integrated fixed temperature monitoring and rate-of-rise heat sensor (2 Words)
  12. Level of Protection - door and window contacts, as well as glass breaks
  13. Core Value - We will hold ourselves to high ethical standards and will hold others accountable with respect to the rightness and wrongness of certain actions.
  14. The location of our corporate headquarters.
  15. User interface for alarm systems, used for end user operation, installation and repair.
  16. The location of our regional office in Georgia.
  17. Our hybrid security system manufactured by DSC. This system is designed for high-end and larger installations.

32 Clues: The year CPI Security was founded.The standard form of interior protection.The location of our corporate headquarters.The location of our regional office in Georgia.The location of our regional office in Tennessee.Core Value - We are truthful, sincere and forthright.Core Value - We are free from bias, dishonesty and injustice....

FPEC Crossword July 2024 - I&C Abbreviations! 2023-06-14

FPEC Crossword July 2024 - I&C Abbreviations! crossword puzzle
Across
  1. PRM Refugee Coordinator
  2. Fraud Detection and National Security Directorate
  3. Reception and Placement
Down
  1. Follow-to-Join Refugees
  2. Resettlement Agencies
  3. Department of Homeland Security
  4. Fraud Prevention and Integrity

7 Clues: Resettlement AgenciesFollow-to-Join RefugeesPRM Refugee CoordinatorReception and PlacementFraud Prevention and IntegrityDepartment of Homeland SecurityFraud Detection and National Security Directorate

Cyber safety- Alyssa Di-campli 2016-05-24

Cyber safety- Alyssa Di-campli crossword puzzle
Across
  1. connected to a computer
  2. when an adult tries to start a relationship with young children by pretending to be a child
  3. stores information you need
  4. a electronic device used to keep a record of something
  5. make the screen smaller and save it for later
  6. an anonymous person who makes you upset or angry by what they say
  7. a secret word that gains admission to a place
  8. a program used to monitor what you do
  9. small file that gets stored on your computer
  10. a fraud scheme
  11. rooms network that lets you communicate with others
Down
  1. searching for information
  2. lets you see things you searched up before
  3. a thing that pops up on your screen
  4. computer network providing information
  5. message from one electronic to another
  6. software something that helps prevent getting viruses
  7. not connected to Internet
  8. a person who uses computers to gain important data
  9. explore Internet by going from link to line
  10. trying to find a particular thing
  11. can mess up your computer
  12. how you get in to your computer
  13. to publish something on to a electronic
  14. instructions for a app that make it work

25 Clues: a fraud schemeconnected to a computersearching for informationnot connected to Internetcan mess up your computerstores information you needhow you get in to your computertrying to find a particular thinga thing that pops up on your screena program used to monitor what you docomputer network providing information...

Cyber Ethics Puzzle by Arush 2025-05-20

Cyber Ethics Puzzle by Arush crossword puzzle
Across
  1. Footprint: The trail of data you leave behind online
  2. The right to keep your personal information secure
  3. Unwanted or junk messages, often email
  4. A malicious program that spreads from device to device
  5. Converting data into a secret code
  6. Moral principles governing behavior
  7. Permission to use or access something
  8. Legal protection for original creative works
  9. Breach: Unauthorized access to private or confidential data
  10. A barrier that protects a network from threats
  11. A mutual understanding or contract between parties
Down
  1. Theft: Using someone else’s personal data without permission
  2. Software designed to harm or damage a device
  3. A secret word or phrase used to access accounts
  4. Trick to steal personal data through fake websites or emails
  5. Unauthorized access to computer systems or networks
  6. Media: Websites and apps for sharing and interacting online
  7. A person who posts offensive or annoying messages online
  8. A dishonest scheme to trick someone for personal gain
  9. Online harassment or bullying using digital platforms

20 Clues: Converting data into a secret codeMoral principles governing behaviorPermission to use or access somethingUnwanted or junk messages, often emailSoftware designed to harm or damage a deviceLegal protection for original creative worksA barrier that protects a network from threatsA secret word or phrase used to access accounts...

AMONG US 2021-03-05

AMONG US crossword puzzle
Across
  1. Hallway To Reactor and Laboratory
  2. Room, To Decontamination
  3. Fix Lights
  4. Contact Other ships
  5. Water Plants
  6. Organize Specimen
  7. Scan
Down
  1. Spawnpoint
  2. Chart Course
  3. Check Door Log
  4. Shoot Asteroids
  5. Fix Impurities
  6. Grab Watering Can
  7. Fix Meltdown
  8. Check Vitals
  9. Engine, Refuel
  10. Use weather Balloons To scan Weather
  11. Clear Air Valve
  12. Check Cams
  13. Engine, Convert Power
  14. Grab a drink

21 Clues: ScanSpawnpointFix LightsCheck CamsChart CourseFix MeltdownCheck VitalsWater PlantsGrab a drinkCheck Door LogFix ImpuritiesEngine, RefuelShoot AsteroidsClear Air ValveGrab Watering CanOrganize SpecimenContact Other shipsEngine, Convert PowerRoom, To DecontaminationHallway To Reactor and LaboratoryUse weather Balloons To scan Weather

Voyager 2021-04-12

Voyager crossword puzzle
Across
  1. to download
  2. movie
  3. train station
  4. rain
  5. to travel
  6. airport
  7. security
  8. customs
  9. driver
  10. keys
  11. church with lots of stained glass that was on fire
  12. plane
  13. flight
  14. line
Down
  1. ticket
  2. city map
  3. customes agent
  4. form
  5. to eat
  6. passport
  7. flight attendant
  8. big white church in Montmartre
  9. price
  10. pilot
  11. bus
  12. suitcase

26 Clues: busformrainkeyslinemoviepricepilotplaneticketto eatdriverflightairportcustomscity mappassportsecuritysuitcaseto travelto downloadtrain stationcustomes agentflight attendantbig white church in Montmartrechurch with lots of stained glass that was on fire

Dilimizdeki Yabancı Kelimeler-1 2021-11-07

Dilimizdeki Yabancı Kelimeler-1 crossword puzzle
Across
  1. aidat
  2. maç
  3. skor
  4. alternatif
  5. spontane
  6. objektif
  7. cv
  8. puzzle
  9. okeylemek
  10. aktüel
  11. link
  12. part-time
  13. oryantasyon
  14. full
Down
  1. online
  2. selfie
  3. spiker
  4. center
  5. ice tea
  6. exit
  7. jüri
  8. security
  9. nick name
  10. asistan
  11. final
  12. start vermek
  13. finish
  14. full time
  15. ekstra
  16. demo
  17. star
  18. e-mail
  19. orijinal

33 Clues: cvmaçskorexitjürilinkdemostarfullaidatfinalonlineselfiespikercenterpuzzleaktüelfinishekstrae-mailice teaasistanspontaneobjektifsecurityorijinalnick nameokeylemekfull timepart-timealternatiforyantasyonstart vermek

VIAJAR: VOCABULARIO 2021-11-18

VIAJAR: VOCABULARIO crossword puzzle
Across
  1. I.D
  2. roundtrip
  3. bus
  4. tourism
  5. the bags you use to carry your clothes and items
  6. stop
  7. ticket
  8. passport
  9. Door or gate
  10. TSA or Customs
Down
  1. the schedule you make when you plan a trip
  2. station
  3. a trip
  4. claiming (your baggage)
  5. security
  6. flight
  7. the place where planes take off from
  8. taking a vacation
  9. Train
  10. plane

20 Clues: I.DbusstopTrainplanea tripflightticketstationtourismsecuritypassportroundtripDoor or gateTSA or Customstaking a vacationclaiming (your baggage)the place where planes take off fromthe schedule you make when you plan a tripthe bags you use to carry your clothes and items

Jobs 2022-04-21

Jobs crossword puzzle
Across
  1. study at school
  2. set the road
  3. singing song on stage
  4. put out the fire
  5. correcting electricity
  6. dancing on stage
  7. heal sick people
  8. making bread
  9. flies plane
  10. guarding the library
  11. lead a school
  12. helping doctor
Down
  1. seller selling vegetables
  2. guard the country
  3. catch fish
  4. guard place
  5. design music
  6. shaving hair
  7. teaching students
  8. selling flowers
  9. heals teeth

21 Clues: catch fishguard placeflies planeheals teethset the roaddesign musicshaving hairmaking breadlead a schoolhelping doctorstudy at schoolselling flowersput out the firedancing on stageheal sick peopleguard the countryteaching studentsguarding the librarysinging song on stagecorrecting electricityseller selling vegetables

values 2015-07-28

values crossword puzzle
Across
  1. trust
  2. heal
  3. accomplish-on-your-own
  4. appreciation
  5. surveillance
  6. command
  7. Truth
  8. create
  9. pretty
  10. abundance
  11. judgment
  12. self-choices
  13. true
  14. understanding
  15. esteem
Down
  1. friend
  2. good-sportsmanship
  3. capability
  4. skills,qualities
  5. serving-another-person
  6. accept
  7. fair
  8. group
  9. win
  10. relatives
  11. like
  12. honest
  13. allegiance
  14. reconciliation
  15. area
  16. popular
  17. enjoy

32 Clues: winhealfairlikeareatruetrustgroupTruthenjoyfriendaccepthonestcreateprettyesteemcommandpopularjudgmentrelativesabundancecapabilityallegianceappreciationsurveillanceself-choicesunderstandingreconciliationskills,qualitiesgood-sportsmanshipaccomplish-on-your-ownserving-another-person

Fixed Income Basics 2024-10-07

Fixed Income Basics crossword puzzle
Across
  1. Inquiry
  2. Insurance
  3. Loan recipient
  4. Fix a trade
  5. Annualized percent of interest
  6. Not in inventory
  7. Compounding Interest
  8. Get Security
  9. Worst Yield
  10. Percentage of Face Value
Down
  1. Repay principal
  2. EDJ credit the client
  3. Inventory
  4. Par Discount
  5. Back at maturity
  6. Financial trouble
  7. All things equal
  8. Date Accrued interest starts
  9. CD day count
  10. Before maturity
  11. Get Account

21 Clues: InquiryInventoryInsuranceFix a tradeGet AccountWorst YieldCD day countGet SecurityPar DiscountLoan recipientRepay principalBefore maturityBack at maturityAll things equalNot in inventoryFinancial troubleCompounding InterestEDJ credit the clientPercentage of Face ValueDate Accrued interest startsAnnualized percent of interest

Contexto 2: Las redes sociales 2025-10-08

Contexto 2: Las redes sociales crossword puzzle
Across
  1. profile
  2. comment
  3. restricted
  4. to track
  5. keyword
  6. protected
  7. joke
  8. gossip
  9. to post
  10. network
  11. extremely
  12. to guard
  13. ally
  14. security
Down
  1. link
  2. internet user
  3. tweet
  4. to collect
  5. to upload
  6. to highlight (as in to feature)
  7. tool
  8. bullying
  9. to block
  10. controversial
  11. to download
  12. the post
  13. follower
  14. message
  15. vigilance

29 Clues: linktooljokeallytweetgossipprofilecommentkeywordto postnetworkmessageto trackbullyingto blockthe postfollowerto guardsecurityto uploadprotectedextremelyvigilanceto collectrestrictedto downloadinternet usercontroversialto highlight (as in to feature)

17 Security 2022-08-22

17 Security crossword puzzle
Across
  1. Digital ........ – an electronic document used to prove the identity of a website or individual.
  2. When opening a TLS session, it requires considerable computer time (due mainly to complex cryptographic processes taking place). The use of session ........ can avoid the need to utilise as much computer time for each connection.
  3. This type of encryption uses a secret key; the same key is used to encrypt and decrypt the encoded message.
Down
  1. It is the need to identify who sent the data and verify that the source is legitimate.
  2. This type of cryptography utilises the physics of photons (light energy according to the formula E = hf)
  3. Another name for a hacker
  4. a fixed-size numeric representation of the contents of a message produced from a hashing algorithm.

7 Clues: Another name for a hackerIt is the need to identify who sent the data and verify that the source is legitimate.Digital ........ – an electronic document used to prove the identity of a website or individual.a fixed-size numeric representation of the contents of a message produced from a hashing algorithm....

Network Security 2021-04-18

Network Security crossword puzzle
Across
  1. A document most organisations have to minimise security risks.
  2. Way of checking to see how secure a network is by employing legitimate hackers.
  3. A way of turning data into an unreadable form, requiring a key before it can be read.
  4. A method used to restrict access based upon the person using the computer system.
Down
  1. Describes the process of investigating a hack to find the culprit.
  2. A simple way of restricting access to a network or files.
  3. Type of software used to guard against malware attacks.

7 Clues: Type of software used to guard against malware attacks.A simple way of restricting access to a network or files.A document most organisations have to minimise security risks.Describes the process of investigating a hack to find the culprit.Way of checking to see how secure a network is by employing legitimate hackers....

network security 2022-09-27

network security crossword puzzle
Across
  1. permission to access facilities
  2. collections characters, authentication
  3. networks resistance
  4. prevents unauthorized connections
Down
  1. protection of personal data, physical
  2. removes malware from system
  3. encrypted files, secret code

7 Clues: networks resistanceremoves malware from systemencrypted files, secret codepermission to access facilitiesprevents unauthorized connectionsprotection of personal data, physicalcollections characters, authentication

Ciber security 2020-08-20

Ciber security crossword puzzle
Across
  1. es un software que copia información del ordenador y después transmite esa información sin que el dueño del dispositivo se entere.
  2. es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema.
  3. es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo.
Down
  1. son archivos que algunos sitios web guardan en tu dispositivo con información tuya como por ejemplo nombre del usuario, pero no te espían.
  2. es un sistema para que usuarios de Internet no autorizados accedan a redes privadas.
  3. es una estafa que tiene como objetivo obtener datos privados de los usuarios, a través de Internet. Normalmente es para acceder a tu cuanta bancaria.
  4. son unos programas que lo que hacen es alterar el funcionamiento del ordenador. Por lo general infectan otros archivos para destruirlos.

7 Clues: es un sistema para que usuarios de Internet no autorizados accedan a redes privadas.es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema.es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo....

Food security 2024-10-01

Food security crossword puzzle
Across
  1. Change – A key challenge impacting global food security through extreme weather conditions.
  2. – The main sector that contributes to food production.
  3. Aid – Emergency relief programs that provide food to those in need.
  4. – A condition caused by an imbalanced diet, either lacking nutrients or excessive intake.
Down
  1. – Farming in a way that meets current needs without compromising future generations.
  2. – Ensuring adequate intake of essential vitamins and minerals.
  3. Chain – The system involved in getting food from farm to table.
  4. Waste – Edible food discarded or not consumed, which could help feed people.

8 Clues: – The main sector that contributes to food production.– Ensuring adequate intake of essential vitamins and minerals.Chain – The system involved in getting food from farm to table.Aid – Emergency relief programs that provide food to those in need.Waste – Edible food discarded or not consumed, which could help feed people....

Network Security 2023-06-05

Network Security crossword puzzle
Across
  1. A method used to encode data during storage or transmission (10)
  2. It refers to the right of individuals to determine what information is stored about them and how that information will be used.
  3. The unauthorised accessing of a computer system.
Down
  1. A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
  2. A small piece of software that uses computer networks and security holes to replicate itself. (5)
  3. A type of software used to protect computer systems from viruses.
  4. Another name for electronic junk mail.

7 Clues: Another name for electronic junk mail.The unauthorised accessing of a computer system.A method used to encode data during storage or transmission (10)A type of software used to protect computer systems from viruses.A small piece of software that uses computer networks and security holes to replicate itself. (5)...

Physical Security 2023-04-24

Physical Security crossword puzzle
Across
  1. Never leave important documents behind an unlocked ____.
  2. Takes pictures and videos to ensure compliance and safety.
  3. Physical and electronic ________ should be stored in a locked cabinet or room
Down
  1. What do you scan to get into the building?
  2. _____ protectors help keep prying eyes from seeing what is on your computer display.
  3. Always ____ your computer when you leave it unattended.
  4. This type of sensor detects physical movement.

7 Clues: What do you scan to get into the building?This type of sensor detects physical movement.Always ____ your computer when you leave it unattended.Never leave important documents behind an unlocked ____.Takes pictures and videos to ensure compliance and safety.Physical and electronic ________ should be stored in a locked cabinet or room...

InfoSec Awareness Crossword Puzzle 2019-10-05

InfoSec Awareness Crossword Puzzle crossword puzzle
Across
  1. A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
  2. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
  3. A computer program that keeps a log of your keystrokes on your keyboard.
  4. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
  5. A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
  6. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
  7. Protocol that is meant for uploading and downloading files.
  8. A bundle of programs that is designed to bombard users with advertisements.
  9. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
  1. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  2. The process by which two information systems establish a communication channel.
  3. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  4. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  5. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  6. A bridge between two networks that connects using different protocols.
  7. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
  8. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
  9. A firewall setting that separates LAN of an organization from the external network.

18 Clues: Protocol that is meant for uploading and downloading files.A bridge between two networks that connects using different protocols.A computer program that keeps a log of your keystrokes on your keyboard.A bundle of programs that is designed to bombard users with advertisements....

Ethics & Compliance 2019-05-28

Ethics & Compliance crossword puzzle
Across
  1. Attention, concern
  2. Care and security
  3. Beliefs, Integrity
  4. Battles, struggles
  5. Observance
  6. Nimbleness
  7. Honesty, honour
  8. Safeguard, shield
Down
  1. Who we are and how we strive to be everyday
  2. Wellbeing
  3. and hospitality Presents and generosity
  4. Behaviour
  5. Bravery
  6. Teamwork, cooperation
  7. Up Confidential reporting tool
  8. Provision, supply

16 Clues: BraveryWellbeingBehaviourObservanceNimblenessHonesty, honourCare and securityProvision, supplySafeguard, shieldAttention, concernBeliefs, IntegrityBattles, strugglesTeamwork, cooperationUp Confidential reporting tooland hospitality Presents and generosityWho we are and how we strive to be everyday

Bullying 2013-11-07

Bullying crossword puzzle
Across
  1. to make verbal or physical attacks on someone
  2. bullying that is spoken
  3. bullying it is a type of bullying that happens over the internet
  4. bullying it is a type of bullying that hurts someones feelings
Down
  1. someone who is harming or harassing another person
  2. bullying it is a type of bullying that harms another person.
  3. is a person who is being tormented or harassed by a bully or group of bullies
  4. to cause suffering to someone else
  5. a person who is a viewer of someone else's bullying.

9 Clues: bullying that is spokento cause suffering to someone elseto make verbal or physical attacks on someonesomeone who is harming or harassing another persona person who is a viewer of someone else's bullying.bullying it is a type of bullying that harms another person.bullying it is a type of bullying that hurts someones feelings...

Le projet de Mariam et Leila 2023-04-29

Le projet de Mariam et Leila crossword puzzle
Across
  1. Le harcèlement en utilisant les différentes formes de communication électronique.
  2. Le harcèlement qui se trouve au travail, les magasins...
  3. Violence qui se répète constamment
  4. Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
  1. Façon pour lutter contre le harcèlement
  2. Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
  3. Le harcèlement qui se trouve à l'école, l'université...
  4. Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
  5. Façon pour sensibiliser à un sujet

9 Clues: Violence qui se répète constammentFaçon pour sensibiliser à un sujetFaçon pour lutter contre le harcèlementLe harcèlement qui se trouve à l'école, l'université...Le harcèlement qui se trouve au travail, les magasins...Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : Criminal activities done using computers or the internet
  2. : Bullying someone online through messages or social media
  3. : People who use the internet or computers to commit crimes
  4. : Fake messages that try to steal passwords or bank info
Down
  1. : Breaking into someone’s computer or account without permission
  2. : A harmful program that can damage files and software
  3. : The practice of protecting devices and data from cyber threats
  4. : A system that blocks unauthorized access to or from a private network
  5. : Software that protects your computer from viruses

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

xmas 2023-12-15

xmas crossword puzzle
Across
  1. security
  2. Charity
  3. Has a trunk
  4. Flying mammal
  5. Large marsupial
  6. format
Down
  1. x
  2. Likes to chase mice
  3. leader
  4. y
  5. Man's best friend

11 Clues: xyleaderformatCharitysecurityHas a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

BAC 2025-09-09

BAC crossword puzzle
Across
  1. HR directed LOA
  2. closed timesheet
  3. recognition
  4. end of employment
  5. starts October
  6. your ___ account
  7. Virtual Assistant
  8. Security
Down
  1. OFS transfer
  2. Rule of 60
  3. mid-year
  4. ticket

12 Clues: ticketmid-yearSecurityRule of 60recognitionOFS transferstarts OctoberHR directed LOAclosed timesheetyour ___ accountend of employmentVirtual Assistant

Social Security Act: Retirement Benefits 2017-01-22

Social Security Act: Retirement Benefits crossword puzzle
Across
  1. When do you get a social security number?
  2. What is the abbreviation of this New Deal?
  3. Up to how many years can the disposal of a financial resource prevent a person from receiving SSI benefits?
  4. What are your retirement benefits based of off?
  5. Who is eligible to apply? (except undocumented)
Down
  1. What month did it become a law?
  2. Depression Enacted during the ____________.
  3. Who created the social security act?
  4. Who is the vice president of the time?
  5. The program was funded by taxes on ___________.
  6. York Where is Roosevelt from?

11 Clues: York Where is Roosevelt from?What month did it become a law?Who created the social security act?Who is the vice president of the time?When do you get a social security number?What is the abbreviation of this New Deal?Depression Enacted during the ____________.What are your retirement benefits based of off?...

Service Desk Puzzle 2021-01-21

Service Desk Puzzle crossword puzzle
Across
  1. Application used for e-prescribing
  2. System used for online learning/compliance videos
  3. Used by Pharmacy for workflow management and drug/dose documentation
  4. Image management system for OB/GYN ultrasound
  5. Software used by Food Services for patient diet orders
Down
  1. System used by Physical Security for badging, door access control, and intrusion alerts
  2. Cisco System that allows phone calls and work to be routed to individuals
  3. System used to manage schedules, call recordings, and QA processes
  4. Abbreviation for the Stanley Healthcare infant protection system
  5. Security camera monitoring software
  6. Medication dispensing system

11 Clues: Medication dispensing systemApplication used for e-prescribingSecurity camera monitoring softwareImage management system for OB/GYN ultrasoundSystem used for online learning/compliance videosSoftware used by Food Services for patient diet ordersAbbreviation for the Stanley Healthcare infant protection system...

Gated communities by LUDOVIC, ELIE and VADIM 2023-10-10

Gated communities by LUDOVIC, ELIE and VADIM crossword puzzle
Across
  1. a rock face next to the sea
  2. an intermediate social class
  3. a people who go in the Gated community without autorisation
  4. do the same things everyday
Down
  1. a place where you can play golf
  2. a person who lives close to your house
  3. a person who assure the security in the gated commuity
  4. place with poor persons who lives under tin shacks
  5. something which divide two places, things, sides
  6. the verb which defined the fact to cut the grass
  7. it is a place for do sport

11 Clues: it is a place for do sporta rock face next to the seado the same things everydayan intermediate social classa place where you can play golfa person who lives close to your housesomething which divide two places, things, sidesthe verb which defined the fact to cut the grassplace with poor persons who lives under tin shacks...

Vocabulary words 2020-04-12

Vocabulary words crossword puzzle
Across
  1. - angering people on videos games by cheating or being destructive
  2. interaction - Talking to texting people to develop friendship
  3. bullying - using digital devices to upset someone
  4. video games - a video game played through the internet
Down
  1. -All the ways that large groups of people share information
  2. A duty you have to do
  3. - A group of people who share the same interest

7 Clues: A duty you have to do- A group of people who share the same interestbullying - using digital devices to upset someonevideo games - a video game played through the internet-All the ways that large groups of people share informationinteraction - Talking to texting people to develop friendship...

Employment Acronynms 2024-03-21

Employment Acronynms crossword puzzle
Across
  1. Be Determined TBD
  2. Technology IT
  3. HQ
  4. Control QC
  5. Relations PR
  6. Operating Procedure SOP
Down
  1. Executive Officer CEO
  2. Education Unit CEU
  3. Q
  4. Your Information FYI
  5. Revenue Service IRS
  6. Security Number SSN
  7. Employment Opportunity EEO
  8. Resources HR
  9. To Date YTD

15 Clues: QHQControl QCTo Date YTDResources HRRelations PRTechnology ITBe Determined TBDEducation Unit CEURevenue Service IRSSecurity Number SSNYour Information FYIExecutive Officer CEOOperating Procedure SOPEmployment Opportunity EEO

JAXIE #4 3-6-25 2025-03-06

JAXIE              #4                     3-6-25 crossword puzzle
Across
  1. two parts
  2. a mountain that explodes
  3. a place
  4. an instrument
  5. a security guard
  6. a vegetable
  7. a big ledge
  8. place to put books
Down
  1. a fruit
  2. a savior
  3. a repeated sound
  4. old music
  5. clothing around neck
  6. an animal
  7. by yourselves

15 Clues: a fruita placea saviorold musictwo partsan animala vegetablea big ledgean instrumentby yourselvesa repeated sounda security guardplace to put booksclothing around necka mountain that explodes

TEACHERS OIS 03/05/2024 2024-05-03

TEACHERS OIS 03/05/2024 crossword puzzle
Across
  1. sciencia
  2. dratutse
  3. left alone
  4. buddy GET LOST!!!
  5. magical spanio
  6. little commander
Down
  1. Moroko
  2. Mukhidino
  3. bombaclap
  4. can work in security
  5. modelister
  6. admin in the server
  7. guy with a lot of guys

13 Clues: MorokoscienciadratutseMukhidinobombaclapmodelisterleft alonemagical spaniolittle commanderbuddy GET LOST!!!admin in the servercan work in securityguy with a lot of guys

Internet Safety 2023-10-02

Internet Safety crossword puzzle
Across
  1. There is an internet underscore every 39 seconds!!!
  2. somebody who steals your personal information
  3. Virtual _______ network
Down
  1. it's the name of game literally
  2. 80% of what don't feel safe internet

5 Clues: Virtual _______ networkit's the name of game literally80% of what don't feel safe internetsomebody who steals your personal informationThere is an internet underscore every 39 seconds!!!

Safer Internet Day 2023-02-06

Safer Internet Day crossword puzzle
Across
  1. (who will help you )
  2. bullying (What is the word for Online bullying)
Down
  1. ( What you should never tell anyone )
  2. ( Never talk to any Strangers ) on Omegle
  3. ( People might take your private file )

5 Clues: (who will help you )( What you should never tell anyone )( People might take your private file )( Never talk to any Strangers ) on Omeglebullying (What is the word for Online bullying)

Cybersecurity 2025-08-22

Cybersecurity crossword puzzle
Across
  1. collecting a user's private information.
  2. A collection of organized data.
  3. uses information illegally to harm and gain personal info
  4. Protecting computer systems.
  5. A weakness in a system that can be made use of by a threat actor.
  6. Someone who uses advanced computer skills to gain access to computer systems.
  7. uses information with permission for good reasons such as improving security.
Down
  1. a collection of connected computers that can share resources
  2. Any data that can identify a person directly or by collecting other data.
  3. The process to manage, maintain and secure computer.
  4. A security event where sensitive info is being stolen.
  5. discover vulnerabilities in systems without the person's permission.
  6. information processed by a computer.

13 Clues: Protecting computer systems.A collection of organized data.information processed by a computer.collecting a user's private information.The process to manage, maintain and secure computer.A security event where sensitive info is being stolen.uses information illegally to harm and gain personal info...

CMSC 125: Operating Systems LE04 pt 1 2017-05-17

CMSC 125: Operating Systems LE04 pt 1 crossword puzzle
Across
  1. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  2. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  3. Bypasses CPU to transfer data directly between I/O device and memory.
  4. Storage structure consisting of information about a file.
  5. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  6. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
  8. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
Down
  1. Provides an object oriented way of implementing file systems.
  2. Is a storage made available over a network rather than over a local connection.
  3. Results from disk head making contact with the disk surface.
  4. Same key used to encrypt and decrypt.
  5. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  6. A destructive program that masquerades as a benign application.
  7. Pretending to be an authorized user to escalate privileges.
  8. The study of codes, or the art of writing and solving them.
  9. Program that initates a security incident under certain circumstances.
  10. Intercepting an already established session to bypass authentication.
  11. The art of hiding messages by converting them into hidden texts.

19 Clues: Same key used to encrypt and decrypt.Storage structure consisting of information about a file.Pretending to be an authorized user to escalate privileges.The study of codes, or the art of writing and solving them.Results from disk head making contact with the disk surface.Provides an object oriented way of implementing file systems....

THE GETAWAY 2018-06-13

THE GETAWAY crossword puzzle
Across
  1. TRAVEL GEAR
  2. MAKE MILLIONS
  3. DISABLED
  4. WHAT THE PLANE IS LISTED AS
  5. WORK STATION
  6. NOT FULLY DRY
  7. WHERE TO CATCH YOUR FLIGHT
  8. HEAD OF
  9. COST EFFECTIVE
  10. TV SHOW DEATH IN ______
  11. WHEN YOU STAY OVER FRIENDS HOUSE
Down
  1. TRANSPORT
  2. STREAM OF MANY VEHICLES
  3. BAD DREAM
  4. SECRETARY
  5. WHAT TO WEAR
  6. NOT ON TIME
  7. RELATIVES
  8. OPPOSITE OF DOWNGRADED
  9. SUMMER GETAWAY

20 Clues: HEAD OFDISABLEDTRANSPORTBAD DREAMSECRETARYRELATIVESTRAVEL GEARNOT ON TIMEWHAT TO WEARWORK STATIONMAKE MILLIONSNOT FULLY DRYCOST EFFECTIVESUMMER GETAWAYOPPOSITE OF DOWNGRADEDSTREAM OF MANY VEHICLESTV SHOW DEATH IN ______WHERE TO CATCH YOUR FLIGHTWHAT THE PLANE IS LISTED ASWHEN YOU STAY OVER FRIENDS HOUSE

Aeropuerto Vocabulario 2013-05-01

Aeropuerto Vocabulario crossword puzzle
Across
  1. baggage claim
  2. to take a trip
  3. departure
  4. arrival
  5. to begin a trip
  6. suitcases
  7. to sit down
  8. to check luggage
  9. to wait
  10. bag
  11. to change money
  12. passport
Down
  1. boarding pass
  2. passenger
  3. door
  4. wallet
  5. agent
  6. plane
  7. ID
  8. security control
  9. to meet up with
  10. ticket
  11. restrooms
  12. to leave
  13. counter
  14. costoms

26 Clues: IDbagdooragentplanewalletticketarrivalto waitcountercostomsto leavepassportpassengerdeparturesuitcasesrestroomsto sit downboarding passbaggage claimto take a tripto begin a tripto meet up withto change moneyto check luggagesecurity control

Gryffindor 2022-08-07

Gryffindor crossword puzzle
Across
  1. House founder
  2. friend to the twins
  3. Huge family
  4. strict animagus
  5. famous singer
  6. How many HOH
  7. Annoying knight
  8. tricksters
  9. main communication to family
  10. Security to commonroom
Down
  1. Primary house color
  2. brother of Colin
  3. grandpa of Harry
  4. house ghost
  5. scared but brave person
  6. element the house aligns
  7. animal
  8. Secondary house color
  9. wizard chess painting
  10. first female HOH

20 Clues: animaltrickstershouse ghostHuge familyHow many HOHHouse founderfamous singerstrict animagusAnnoying knightbrother of Colingrandpa of Harryfirst female HOHPrimary house colorfriend to the twinsSecondary house colorwizard chess paintingSecurity to commonroomscared but brave personelement the house alignsmain communication to family

Dog Breeds 2024-07-16

Dog Breeds crossword puzzle
Across
  1. He’s a Fighter
  2. Ears are longer then legs
  3. Georgia's Uga
  4. Firehouse Favorite
  5. Gives Directions
  6. Lassie Lineage
  7. Little Rascal Petey
  8. PA State Dog
  9. Sled Propeller
  10. Ravishing Redhead
Down
  1. Peek-a-boo Hairdo
  2. Deutschland Herder
  3. Yellow Go Getter
  4. Snoopy is One
  5. The Crime Dog
  6. Security Guard
  7. Has an ugly Mug
  8. Speed King
  9. A Footlong Hot Dog
  10. Pampered Pooch

20 Clues: Speed KingPA State DogSnoopy is OneGeorgia's UgaThe Crime DogHe’s a FighterSecurity GuardLassie LineagePampered PoochSled PropellerHas an ugly MugYellow Go GetterGives DirectionsPeek-a-boo HairdoRavishing RedheadDeutschland HerderFirehouse FavoriteA Footlong Hot DogLittle Rascal PeteyEars are longer then legs

10.1 vocabulary 2023-03-14

10.1 vocabulary crossword puzzle
Across
  1. to stand in line
  2. gate
  3. pass by/go by
  4. arrival
  5. to change money
  6. security checkpoint
  7. to take a trip
  8. flight
  9. to leave behind
  10. around the corner
  11. counter
Down
  1. ATM
  2. customs
  3. boarding pass
  4. to lose
  5. to pack your bags
  6. baggage claim
  7. suitcase
  8. to wait for
  9. to pick up
  10. plane
  11. waiting room
  12. don't worry

23 Clues: ATMgateplaneflightcustomsarrivalto losecountersuitcaseto pick upto wait fordon't worrywaiting roomboarding passpass by/go bybaggage claimto take a tripto change moneyto leave behindto stand in lineto pack your bagsaround the cornersecurity checkpoint

Supreme: 17강 2024-10-31

Supreme: 17강 crossword puzzle
Across
  1. ~으로부터 고통을 겪다
  2. 기관
  3. 전문가
  4. 유래하다
  5. 저주
  6. 들다
  7. 실업
  8. 궤도, (궤도를) 돌다
  9. 확인하다
  10. 선언하다
  11. 지역
  12. 보안
  13. 재검토하다
  14. 기준에 부합하는
  15. 작업하다
  16. 고약한 냄새가 나다
Down
  1. 공식적인
  2. 다가오는
  3. 물리치다, 이기다
  4. 현지의, 지역의
  5. 관습, 연습/훈련하다
  6. 제출하다
  7. 평등
  8. 사라지다
  9. 참가하다
  10. 굴욕감을 느끼는
  11. 인기
  12. 참석하다

28 Clues: 기관저주평등들다실업인기지역보안전문가공식적인다가오는제출하다유래하다사라지다참가하다확인하다선언하다참석하다작업하다재검토하다현지의, 지역의굴욕감을 느끼는기준에 부합하는물리치다, 이기다고약한 냄새가 나다관습, 연습/훈련하다~으로부터 고통을 겪다궤도, (궤도를) 돌다

Propelling Smart Growth 2021-04-08

Propelling Smart Growth crossword puzzle
Across
  1. Nest
  2. Siri
  3. Tesla
  4. Alexa
Down
  1. Predictive Text
  2. Tankless Water Heater
  3. Monitor
  4. Security
  5. TV
  6. Door Locks

10 Clues: TVNestSiriTeslaAlexaMonitorSecurityDoor LocksPredictive TextTankless Water Heater

Digital Literacy - zara 2024-06-17

Digital Literacy - zara crossword puzzle
Across
  1. A group of computers all being controlled by a remote hacker to perform illegal activity. Get it by hackers exploiting security holes especially if you don’t do windows updates and antivirus software.
  2. Usually in an email. Tries to trick you into telling your passwords or credit card info. Can link you to fake sites that look like real sites and ask you to log in, but steals your info. Comes by email or phone. Just don’t trust people.
  3. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it. Almost anyone can be targeted.
  4. If you think any of these are suspicious, delete them and do not open them
  5. It is forever
  6. Make sure these are strong and different for every site
  7. Keeps track of every key you type and sends it to the hacker. You’re vulnerable to it any time you use a public computer. Also same way as getting other malware, it could be installed on your own computer.
  8. Displays ads on your computer. May slow down your computer, use internet bandwidth, make you exceed data caps. Usually get it by clicking on ads online. May come bundled with other software.
Down
  1. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files.
  2. Be careful when installing this when you have this downloaded. Pre-scan it. If it is a hacked version, remember that if they could hack the security of that software, they can probably also add code to hack the security of your computer.
  3. Make sure your computer has the latest one of these
  4. When someone gets your personal info (like username/pwd/bank info etc) and then does things pretending to be you. (ex. access your files/friends/bank, steal your stuff, do illegal activities as you).
  5. Blocks you from accessing your files until you pay a ransom. Get it by hackers exploiting weaknesses in your security, especially if you don’t have windows updates and antivirus software.
  6. Is the use of technology to harass, threaten, embarrass, or target another person
  7. Reads everyone’s data that is passing through a network. Usually on public WiFi. Can steal your passwords. You’re mostly vulnerable when using public wifi.
  8. Like the Trojan Horse. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer. Get it from downloading things you think are good.
  9. Spreads through networks and emails infecting as many computers as possible. Can carry a virus, trojan or other malware. Get it through email.
  10. Spies on you, stealing information like passwords and credit card numbers. It sometimes comes bundled with other software or freeware. Or get it from opening links and email attachments from questionable sources. Can also infect computers without the latest updates.

18 Clues: It is foreverMake sure your computer has the latest one of theseMake sure these are strong and different for every siteIf you think any of these are suspicious, delete them and do not open themIs the use of technology to harass, threaten, embarrass, or target another person...

The Financial Vault Quiz 2018-02-26

The Financial Vault Quiz crossword puzzle
Across
  1. An omnibus account is normally overseen by a ____ manager
  2. When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
  3. It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
  4. The _____ the volatility, the riskier the security.
  5. A minimum of ___ persons are required to create an omnibus account
  6. The sale of a security that is not owned by the seller or that the seller has borrowed
  7. It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
  1. Short selling is motivated by the belief that a security's price will ____
  2. The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
  3. Portfolios that lie below the efficient frontier are
  4. Account Is an account between two futures merchants (brokers)
  5. Employee’s Provident Fund is maintained and overseen by the ___
  6. One measure of the relative volatility of a particular stock to the market is its

13 Clues: The _____ the volatility, the riskier the security.Portfolios that lie below the efficient frontier areAn omnibus account is normally overseen by a ____ managerAccount Is an account between two futures merchants (brokers)Employee’s Provident Fund is maintained and overseen by the ___A minimum of ___ persons are required to create an omnibus account...

Bullying 2020-06-07

Bullying crossword puzzle
Across
  1. This bullying makes people lonely and sad and depressed.
  2. its bad otherwise the person you hurt will become
  3. you.
Down
  1. This bullying is very bad because it makes people sad,scared.
  2. This bullying makes people sad and depressed
  3. can not only mentally hurt someone but get people physically hurt.
  4. they bully you with a screen.

7 Clues: you.they bully you with a screen.This bullying makes people sad and depressedits bad otherwise the person you hurt will becomeThis bullying makes people lonely and sad and depressed.This bullying is very bad because it makes people sad,scared.can not only mentally hurt someone but get people physically hurt.

Airport 2025-02-20

Airport crossword puzzle
Across
  1. Essential skill for handling crises effectively
  2. What teams must solve quickly in high-pressure situations
  3. Essential document for international travel
  4. Ensures safety by screening passengers and luggage
  5. Process of checking baggage for security threats
Down
  1. Home to the world's tallest indoor waterfall at Changi
  2. The region where planes take off, fly, and land
  3. Making sure rules and safety measures are followed
  4. The study of crime and how to prevent it
  5. Enforce airport laws and maintain public order

10 Clues: The study of crime and how to prevent itEssential document for international travelEnforce airport laws and maintain public orderEssential skill for handling crises effectivelyThe region where planes take off, fly, and landProcess of checking baggage for security threatsMaking sure rules and safety measures are followed...

SAPM 2025-08-07

SAPM crossword puzzle
Across
  1. The systematic risk of a security relative to the market
  2. Collection of assets held by an investor
  3. The risk that can be eliminated through diversification
  4. The measure of variability or dispersion of returns
Down
  1. Risk affecting all securities in the market
  2. The market where previously issued securities are traded
  3. A fixed income security
  4. Profit from investment
  5. Financial asset representing part ownership in a company
  6. Approach to estimate the required return using risk-free rate and beta

10 Clues: Profit from investmentA fixed income securityCollection of assets held by an investorRisk affecting all securities in the marketThe measure of variability or dispersion of returnsThe risk that can be eliminated through diversificationThe market where previously issued securities are tradedThe systematic risk of a security relative to the market...

Financial Math Extra credit 2021-09-17

Financial Math Extra credit crossword puzzle
Across
  1. taxes- Social security and medicare taxes are paid for by FCIA taxes
  2. Taxable income- a percentage of each worker's salary is taken out of each paycheck,up to a maximun amount per year
  3. They are paid by production rather then the length of time it takes them to do the job
  4. Security- insurance program available through U.S. government that provides retired, disabled, or who needs survivors benifits. Covers 90 percent of all american jobs
  5. Nations largest health insurance program for people 65 years or older and some disabled people under 65
Down
  1. rate- Pieceworkers are paid a certian amount of money called a.
  2. earns more money as more sales are made
  3. security number- a unique 9 digit number that belongs only to you
  4. A fee-based advisor charges a flat rate for managing a client's money.
  5. contribution insurance act- FCIA

10 Clues: contribution insurance act- FCIAearns more money as more sales are maderate- Pieceworkers are paid a certian amount of money called a.security number- a unique 9 digit number that belongs only to youtaxes- Social security and medicare taxes are paid for by FCIA taxesA fee-based advisor charges a flat rate for managing a client's money....

the best goated awesome cross word 2023-01-25

the best goated awesome cross word crossword puzzle
Across
  1. occurs when there are insufficient authorization checks for sensitive request handlers.
  2. The act of contaminating with dust particles solar_activity The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity.
  3. Any malware that misleads users of its true intent.
  4. A message warning the recipients of a non-existent computer virus threat.
  5. 2 words, is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown.
  6. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
  1. when an organization unknowingly exposes sensitive data or when a security incident leads to the accidental or unlawful destruction
  2. a type of access control vulnerability in digital security.
  3. A security misconfiguration arises when essential security settings are either not implemented or implemented with errors.
  4. Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal phishing The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  5. a type of security vulnerability that can be found in some web applications.
  6. The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity. advanced-fee_fraud Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal
  7. Software with malicious behavior that’s goal is to gather information about a person and send it to another entity in a way that harms the user.
  8. A type of malware that is programmed to repeatedly mutate its appearance or signature files through new decryption routines.
  9. A computer program that can copy itself and infect a computer without permission or knowledge of the user.

15 Clues: Any malware that misleads users of its true intent.a type of access control vulnerability in digital security.A message warning the recipients of a non-existent computer virus threat.a type of security vulnerability that can be found in some web applications.occurs when there are insufficient authorization checks for sensitive request handlers....

ICS133: Computer Security Crossword Puzzle 2017-04-23

ICS133: Computer Security Crossword Puzzle crossword puzzle
Across
  1. A Public-Key Cryptography that encrypt data readable only by the recipient and verify that particular sender encrypted a particular message.
  2. It is a running program.
  3. A type of error that fails to detect a match between a credential and the database.
  4. An Industry Security Standards from a family of international standards for security system quality improvement.
  5. A ____________ attack uses a list of likely passwords as the password space.
  6. A stronger secret key building blocks that use wrapping technique to protect keys carried in network messages.
  7. A level of motivation that applies effort, but avoids social stigma.
  8. A stronger secret key building blocks where the center distributes wrapped keys and authorized users to share a secret with it.
  9. A US Government standards for financial and accounting standards for public companies. (Acronym)
  10. It is the amount of lead time required to set up the attack.
  11. A transport layer security that was developed by netscape in 1994 and is a part of commercial client or server Web package. It is the first really successful public-key application.
  12. An Industry Security Standards that uses the banking industry to protect electronic funds transfers.
  13. The most secure type of token that stores a secret that generates a different credential for each login.
  14. An attack on DNS where the resolver receives a bogus response to a DNS request.
  15. A US Government security standards for certain types of personal health data. (Acronym)
  16. The most common type of token that stores an unchanging credential.
  17. A tailored policy where it share some blocked files.
  18. It is a group of instructions.
  19. A type of error that incorrectly detects a match with a credential and the database.
  20. The __________ procedure in the operating system (OS) switches running processes.
  21. "Data in motion", A basic state that is being moved from one place to another.
  22. A Public-Key Cryptography that constructs a shared secret from information shared in public.
  23. A tailored policy where it block some files from sharing.
  24. A US Government standards for protecting personal financial information. (Acronym)
  25. A modern malware where a botnet and spam package that used to produce 7 million messages a day.
Down
  1. A malicious software is called a _______.
  2. It is the number and types of people required for the attack.
  3. It summarizes the attack in the Attack Case Study.
  4. A modern malware that attacks control logic in industrial plants.
  5. A stronger secret key building blocks that generate a new key using a one-way hash.
  6. It is the first major Internet worm in 1988 that disabled about 10% of Internet computers.
  7. A tailored policy where it gives full rights for some users.
  8. A global policy that let users share their files
  9. "Data at rest", A basic state that stores data or information in a computer and is not being processed.
  10. A policy alternative that modify rights for specific sets of files.
  11. _______ ____________ are stored in a control section and executed by the CPU.
  12. It is the brief description of threat agent in the Attack Case Study.
  13. A level of motivation that will exploit minor vulnerabilities.
  14. A policy alternative that applied to all users by default.
  15. A modern malware that creates botnet focused on financial fraud.
  16. A global policy that keep users separate
  17. It uses a PRNG to transform the current key into a new one and separate endpoints that can apply the same PRNG to yield the same key.
  18. A US Government security standards for federal computer systems. (Acronym)
  19. A basic state that is being used by an active process and is usually stored in RAM.
  20. A ____ _______ prevents a sender from sending data transfer than the recipient can handle it.
  21. A modern malware that – spreads through email and creates a botnet that spreads spam and more malware.
  22. acceptance rate The likelihood of incorrectly authenticating someone as an authorized user.
  23. An Industry Security Standards that is used by “Payment Card Industry” to protect credit card transactions.
  24. A modern malware that spreads through the Internet via Windows vulnerabilities and created a botnet used for spam and malware distribution.
  25. _______ contain text interpreted by a programming language interpreter.

50 Clues: It is a running program.It is a group of instructions.A global policy that keep users separateA malicious software is called a _______.A global policy that let users share their filesIt summarizes the attack in the Attack Case Study.A tailored policy where it share some blocked files.A tailored policy where it block some files from sharing....

Puzzle #8 – “COLA (Cost-of-Living Adjustment)” 2025-06-29

Puzzle #8 – “COLA (Cost-of-Living Adjustment)” crossword puzzle
Across
  1. - Agency that announces the COLA each year
  2. - This grows when COLA is applied
  3. - Month when COLA changes typically take effect
  4. - What COLA causes to your Social Security payments
Down
  1. - A statistical measure used to determine COLA
  2. - What COLA is meant to adjust for
  3. - COLA is calculated as this type of number
  4. - COLA helps benefits match this rise in prices
  5. - COLA is based on this type of price index
  6. - Annual Social Security increase to keep up with inflation

10 Clues: - This grows when COLA is applied- What COLA is meant to adjust for- Agency that announces the COLA each year- COLA is calculated as this type of number- COLA is based on this type of price index- A statistical measure used to determine COLA- COLA helps benefits match this rise in prices- Month when COLA changes typically take effect...

Expert 2024-12-27

Expert crossword puzzle
Across
  1. A software fix that addresses a security vulnerability.
  2. Malware that encrypts your files and demands payment.
  3. An authentication method requiring two or more factors.
  4. A secure, isolated environment for testing code.
  5. A device that connects to a network.
  6. A security protocol that eliminates passwords.
Down
  1. A method where malicious code is inserted into a query.
  2. The person or group responsible for an attack.
  3. Measures taken to prevent or respond to threats.
  4. Unauthorized access into a system.

10 Clues: Unauthorized access into a system.A device that connects to a network.The person or group responsible for an attack.A security protocol that eliminates passwords.Measures taken to prevent or respond to threats.A secure, isolated environment for testing code.Malware that encrypts your files and demands payment....

Week 7 PASS AF208 Crossword 2024-03-28

Week 7 PASS AF208 Crossword crossword puzzle
Across
  1. value is used to determine the dollar value per share.
  2. is a price a trader is willing to accept to sell a security.
  3. shares that are hybrid securities that have features of both debt and equity
  4. is the price a trader is willing to pay for a security.
  5. value of a security is the PV of expected future cash flows discounted at the investor’s required rate of return.
  6. is the worth of an asset to an individual.
Down
  1. are tradable instruments that represent an ownership interest or the right to receive payment on a debt.
  2. is the stated rate of interest paid on the bond.
  3. is the amount of money needed to acquire an asset.
  4. normally pays a regular income stream (the coupon) and has a face value that is repaid to the holder at maturity.

10 Clues: is the worth of an asset to an individual.is the stated rate of interest paid on the bond.is the amount of money needed to acquire an asset.value is used to determine the dollar value per share.is the price a trader is willing to pay for a security.is a price a trader is willing to accept to sell a security....

UW Social 2025-09-10

UW Social crossword puzzle
Across
  1. we're adversaries but we can work on this together
  2. amount between "ouch" and "thank goodness for coverage"
  3. proof you wave around to prove you're covered
  4. the "I survived insurance school" badge
  5. most likely to Irish goodbye
  6. the "winter is coming" magnitude loss
  7. online oopsie insurance
  8. coverage that only works if it's on the guest list
Down
  1. extra protection not only in the rain
  2. when an UW says "thanks but no thanks"
  3. you may check out at any time you like (with CL) but you may never leave (me)
  4. no crystal ball but we try to predict with Excel
  5. pays the bills when your shop is closed but rent is still due
  6. loves wood houses more than concrete blocks
  7. your friendly neighbourhood task distributor
  8. promise to make you whole again but not richer

16 Clues: online oopsie insurancemost likely to Irish goodbyeextra protection not only in the rainthe "winter is coming" magnitude losswhen an UW says "thanks but no thanks"the "I survived insurance school" badgeloves wood houses more than concrete blocksyour friendly neighbourhood task distributorproof you wave around to prove you're covered...

Safety 2024-12-10

Safety crossword puzzle
Across
  1. atlas
  2. construction tool a with claws
  3. H2O
  4. computer security
  5. sharp edged tool
  6. Olympic flame lighter
  7. power outage light
Down
  1. sheltered
  2. sulfurous light
  3. neither X-ray nor Gamma
  4. cotton wrap
  5. warm wrap
  6. tissues
  7. hot chocolate container

14 Clues: H2Oatlastissuesshelteredwarm wrapcotton wrapsulfurous lightsharp edged toolcomputer securitypower outage lightOlympic flame lighterneither X-ray nor Gammahot chocolate containerconstruction tool a with claws

Five night's at freddy's 2023-12-14

Five night's at freddy's crossword puzzle
Across
  1. yellow bear
  2. i am one of the security breach villains
  3. arghhhh!
  4. Yellow rabbit
  5. music box
  6. Gutiar
  7. williams friend
Down
  1. Balloons!
  2. Whats on chicas hand?
  3. brown bear
  4. Burned bunny
  5. pizza
  6. creater
  7. i am in fnaf 4

14 Clues: pizzaGutiarcreaterarghhhh!Balloons!music boxbrown bearyellow bearBurned bunnyYellow rabbiti am in fnaf 4williams friendWhats on chicas hand?i am one of the security breach villains

phoenix 2 2022-10-31

phoenix 2 crossword puzzle
Across
  1. outdoor ceiling outside of Crawfords
  2. security guard
  3. free period
  4. when you cut class
  5. chested hours
Down
  1. solomen terzi
  2. overpriced grapes
  3. test week month
  4. seminar
  5. newspaper
  6. google classroom
  7. coffee and bagels
  8. scan in
  9. rabbi besser's specialty

14 Clues: seminarscan innewspaperfree periodsolomen terzichested hourssecurity guardtest week monthgoogle classroomoverpriced grapescoffee and bagelswhen you cut classrabbi besser's specialtyoutdoor ceiling outside of Crawfords

Cyber Law (Component 1 Crossword) 2021-09-07

Cyber Law (Component 1 Crossword) crossword puzzle
Across
  1. Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
  2. The process where companies, industries, countries increase the use of digital or computer technology.
  3. The approach of these set of people is the the cyber space is a distinct space and it cannot be regulated.(no space in the answer)
Down
  1. _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  2. The act of sending unsolicited email which are especially commercial messages.
  3. _____ was the first type of media to be digitized and has been around for more than 5000 years.
  4. ________V_______is the case in which the Supreme Court of America unanimously held that the provisions of Communications decency act (CDA), 1996 as unconstitutional as it restricted free speech with respect to the First Amendment.(Answer is a short for and it contains V (versus))
  5. ________ is a proven technology that lets anyone place phone calls over an internet connection. Eg: Skype and Facebook.
  6. Lawrence Lessig claims that the Internet behaviour can be regulated by four constraints namely the law, architecture, social norms and __________.
  7. ___________ ____ theory put forward by Lawrence Lessig in regards with constraints as a means of regulation.(no space in the answer)

10 Clues: The act of sending unsolicited email which are especially commercial messages._____ was the first type of media to be digitized and has been around for more than 5000 years._______ is one such constraint in cyber space which allows us to regulate the principle of anonymity....

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. A derivative is a complex type of financial security that is set between two or more parties.
  2. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  3. a service charge assessed by a broker or investment advisor.
  4. a security that represents the ownership of a fraction of a corporation.
  5. Electronic Data Gathering, Analysis, and Retrieval system
  6. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
Down
  1. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  2. Mark Zuckerberg
  3. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
  4. a sales pitch or promotion made by the underwriting firm, usually on the road
  5. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  6. Capital stock is the amount of common and preferred shares that a company is authorized to issue

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

Anti-Bullying 2013-11-07

Anti-Bullying crossword puzzle
Across
  1. Someone who you should talk to when getting bullied
  2. Someone that continuously is mean to someone else
  3. A type of bullying when the victim is punched by the bully
  4. someone who see bullying but does nothing about it
  5. Is the target of a bully
Down
  1. the conscience of being bullied
  2. A type of bullying when the bully is saying mean things to the victim
  3. The type of bullying that is over the internet
  4. someone who can help the bullying stop

9 Clues: Is the target of a bullythe conscience of being bulliedsomeone who can help the bullying stopThe type of bullying that is over the internetSomeone that continuously is mean to someone elsesomeone who see bullying but does nothing about itSomeone who you should talk to when getting bulliedA type of bullying when the victim is punched by the bully...

Network 2015-05-11

Network crossword puzzle
Across
  1. is a computer circuit board or card that is installed in a computer so that it can be connected to a network
  2. What passes on all the data to all the computers?
  3. what can you use to protect yourself from cyber crime?
  4. What is topology cheap to install and doesn't require terminators?
Down
  1. What does LAN stand for?
  2. What is another word for Network interface card?
  3. What does WAN stand for?
  4. What topology is cheap to install and require terminators?
  5. what topology that requires the most cables?

9 Clues: What does LAN stand for?What does WAN stand for?what topology that requires the most cables?What is another word for Network interface card?What passes on all the data to all the computers?what can you use to protect yourself from cyber crime?What topology is cheap to install and require terminators?...

Le projet de Mariam et Leila 2023-04-29

Le projet de Mariam et Leila crossword puzzle
Across
  1. Le harcèlement en utilisant les différentes formes de communication électronique.
  2. Le harcèlement qui se trouve au travail, les magasins...
  3. Violence qui se répète constamment
  4. Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
  1. Façon pour lutter contre le harcèlement
  2. Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
  3. Le harcèlement qui se trouve à l'école, l'université...
  4. Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
  5. Façon pour sensibiliser à un sujet

9 Clues: Violence qui se répète constammentFaçon pour sensibiliser à un sujetFaçon pour lutter contre le harcèlementLe harcèlement qui se trouve à l'école, l'université...Le harcèlement qui se trouve au travail, les magasins...Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement...

Digital Footprint 2019-11-06

Digital Footprint crossword puzzle
Across
  1. Someone who has the power to report and stop bad behavior, but does not.
  2. to create an unpleasant or hostile situation
  3. The process of adding geographical identification to various media.
Down
  1. Of the culture of computers, information technology, and VR.
  2. People who intervene and stop inappropriate behavior
  3. Mass e-mail messages you are forced to read (ads)
  4. Rule/ One way to tell if a post is appropriate to post.
  5. To prevent someone from accessing your profile
  6. Footprint/ Everything on the internet that is about you.

9 Clues: to create an unpleasant or hostile situationTo prevent someone from accessing your profileMass e-mail messages you are forced to read (ads)People who intervene and stop inappropriate behaviorRule/ One way to tell if a post is appropriate to post.Footprint/ Everything on the internet that is about you....

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

cyber 2024-08-29

cyber crossword puzzle
Across
  1. cyber manners
  2. secured website
  3. audio and video scam
Down
  1. strong and long

4 Clues: cyber mannersstrong and longsecured websiteaudio and video scam

Panda Search 2018-04-12

Panda Search crossword puzzle
Across
  1. Main character, crime solver
  2. title
  3. to find
  4. owner of the zoo
  5. author
  6. law enforcement
  7. security guard at zoo
Down
  1. taken
  2. standing out
  3. zoo owner's rival
  4. famous zoo
  5. find an answer
  6. trade
  7. stolen panda
  8. daughter of the zoo's owner

15 Clues: takentitletradeauthorto findfamous zoostanding outstolen pandafind an answerlaw enforcementowner of the zoozoo owner's rivalsecurity guard at zoodaughter of the zoo's ownerMain character, crime solver