cyber security Crossword Puzzles
Unit 11 2024-02-12
unit 11 2025-02-14
12 Clues: cuddle • landslide • a stander • tangy, acid • appeal, cry • guide, pilot • order, arrange • confirm, insure • silly, ridiculous • choosy, particular • achievable, reasonable • protection, safekeeping
Environmental Services 2017-08-18
Across
- What tupe of rags do we use to clean? (blue and yellow)
- What company takes care of pest control?
- Evening discharge cleaners are called?
- What company takes care of RED trash and sharps for the hospital?
- Who is the head of safety and security?
- What is the brand of electronic paper towels we use?
- What is the name of the security company?
- What program is used to look up chemicals?
Down
- These are used to keep your hands clean.
- What is the name of the fragrance spray we use?
- What floor is ICU on?
- Used to collect trash from multiple areas.
- What is the Color of ES Scrubs?
- How far out should you schedule PTO?
- What brand of bleach do we use to clean with?
- Who is the manager of ES?
- This is used to swipe you into the building or certain areas.
17 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • How far out should you schedule PTO? • Evening discharge cleaners are called? • Who is the head of safety and security? • These are used to keep your hands clean. • What company takes care of pest control? • What is the name of the security company? • ...
Week 1 - Crossword 2024-11-01
Across
- Address Unique identifier assigned to each device on a network.
- Point Device that allows wireless devices to connect to a network without cables.
- Measurement of data transmission capacity in a network.
- Security device that controls incoming and outgoing traffic.
- Authentication system used to manage network access.
- Unit of data transmitted over a network.
- Process of encoding data to protect it during transmission.
- Network monitoring tool used to analyze and troubleshoot network traffic.
Down
- monitoring tool for tracking performance and availability.
- Device that connects multiple devices within a single network.
- Virtual Local Area Network; divides network traffic for security and performance.
- Command used to test network connectivity and latency.
- Delay in data transmission over a network.
- Part of an IP address configuration that helps segment networks.
- Device that directs data traffic between networks.
- Virtual Private Network; provides secure remote access to a network.
- The layout or structure of a network.
17 Clues: The layout or structure of a network. • Unit of data transmitted over a network. • Delay in data transmission over a network. • Device that directs data traffic between networks. • Authentication system used to manage network access. • Command used to test network connectivity and latency. • Measurement of data transmission capacity in a network. • ...
Information Security Quiz #15 2015-05-26
Across
- The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- Tapping confidential information from trash
- A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- This can slow down your computer AND watch everywhere you go on the internet.
Down
- You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- Use this tool to dispose of documents that contain personal or financial information.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- The front line of defence in information security!
- Records of IS activities
- Destruction of computer equipment or records
16 Clues: Records of IS activities • Tapping confidential information from trash • Destruction of computer equipment or records • The front line of defence in information security! • This can slow down your computer AND watch everywhere you go on the internet. • Use this tool to dispose of documents that contain personal or financial information. • ...
Enterprise Information Security Policy 2017-09-06
Across
- ____ is compromised of 60 standards
- A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
- Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
- A Credential established by a sequence of characters used as a secret key
- The physical elements of a computer system
- Verifying the identity of a user, machine, software component, device, or other entity.
- The set of characteristics by which a Person is definitively recognizable or known.
Down
- All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
- _____ implements standards to protect Protected Health Information (PHI).
- Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
- Any type of storage device that can be removed from a computer while the system is running.
- A piece of Software intended to update an electronic Information Resource.
- A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
- A person or persons responsible for supervising people or work.
- Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
- Protected Health Information acronym
16 Clues: ____ is compromised of 60 standards • Protected Health Information acronym • The physical elements of a computer system • A person or persons responsible for supervising people or work. • _____ implements standards to protect Protected Health Information (PHI). • A Credential established by a sequence of characters used as a secret key • ...
Information security -Unit 4 2022-11-18
Across
- attack using birth dates
- translating key into code
- barrier between trusted networks
- recognising somebody
- sepcial form of information
- certainty to remain safe
- Symmetric block cipher
- tool to practice encryption
- process of determining something or someone
Down
- cipher in which one character is replaced by another
- security structure to decide user privileges
- inspection
- cipher in which we use polyalphabetic substitution
- scrambling position of characters
- act of invading illegally
- method to transform a message
16 Clues: inspection • recognising somebody • Symmetric block cipher • attack using birth dates • certainty to remain safe • translating key into code • act of invading illegally • sepcial form of information • tool to practice encryption • method to transform a message • barrier between trusted networks • scrambling position of characters • process of determining something or someone • ...
Bank and Branch Security 2024-11-21
Across
- You must do this any time you are not within arms reach of your computer
- This is activated by going up or down with a pin number
- These are located at every public entrance/exit doorways
- You place customer information that you no longer need into what?
- _____________ assume a weapon is involved
- You call and ask if this person is available if things are not the way they should be when you arrive in the morning
- Keeping the _____________ of our customers is HIGH priority
- Someone that "phishes" for secure information
- Night Drop, ATM, and moving debit cards MUST be done how?
Down
- Signal that shows someone is clearing the branch
- Signal that shows the branch is safe to enter
- You NEVER give these to anyone
- You trigger this by holding down two buttons for 3 seconds
- This must be locked up at night but made readily accessible during the day
- Meeting place that you go to if there is an emergency
- ___________ ________ and do what the robber asks
16 Clues: You NEVER give these to anyone • _____________ assume a weapon is involved • Signal that shows the branch is safe to enter • Someone that "phishes" for secure information • Signal that shows someone is clearing the branch • ___________ ________ and do what the robber asks • Meeting place that you go to if there is an emergency • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Budget Vocabulary 2022-10-24
Across
- amount borrowed in a single year
- control, by the Federal Reserve Board, of the money supply
- taxing and spending by the Congress and the President
- economic support provided by government to aid an individual, industry, or business
- spending revisited yearly by Congress/President ex. defense spending
- Social Security is an example
- healthcare for people 65+
Down
- total amount of money the government owes over years
- provides nonpartisan advise to Congress about budgetary decisions
- #1 source of revenue for the federal government
- social security, medicare, medicaid, interest on the debt that must be paid
- the charge for borrowing money
- term for when government brings in more money than it spends
- part of EOP that advises the President about the budget
- healthcare for needy people
15 Clues: healthcare for people 65+ • healthcare for needy people • Social Security is an example • the charge for borrowing money • amount borrowed in a single year • #1 source of revenue for the federal government • total amount of money the government owes over years • taxing and spending by the Congress and the President • part of EOP that advises the President about the budget • ...
Teen years 2024-09-30
15 Clues: Vorbild • unter Druck • Beliebtheit • provozierend • Gruppendruck • selbstbewusst • Lebensabschnitt • Risiken eingehen • sich durch setzen • gehemmt, befangen • selbständig werden • die Erwartungen erfüllen • sich gegen etwas auflehnen • an die eigenen Grenzen gehen • sich nach Sicherheit/Geborgenheit sehnen
Cyber safety- Fleur De Gans 2016-05-24
Across
- it pops up on your computer and if you say yes it can reck your computer.
- a peace of information about your visit to a website that some websites do automatically.
- tag the nickname a user chooses to be known on in Internet games.
- a app where you can see and hear your friends even when their not even near you
- it projects you from hackers
- you keep it safe and yo don't share it on websites.
- you search up things on it
- someone who can get into your device from the other side of the world.
- list a list of friends on the internet.
- the people who say it say that it's true but it's a lie.
Down
- to send information to another computer.
- a location online that allows multiple users to communicate.
- where people can reply to you on a video that you posted.
- numbers or letters that let you in
- it is messages sent over the internet for the purpose of advertising.
- a internet website where you can post photos and videos
- sharing this software enables multiple users to access the same file.
- a app that you can download and search up videos.
- bullies someone who is being mean to you on the internet
- something that goes around and you don't know if it's the truth or a lie.
20 Clues: you search up things on it • it projects you from hackers • numbers or letters that let you in • list a list of friends on the internet. • to send information to another computer. • a app that you can download and search up videos. • you keep it safe and yo don't share it on websites. • a internet website where you can post photos and videos • ...
Cyber protection, threats, and risks 2023-09-09
Across
- internet
- backing up important or all files.
- Server lacks security and can be exploited easily in a area
- monitoring your device to find threats.
- Scam emails
- A type of protection for your Wi-Fi
- demanding money to keep data intact.
- Someone who steals your files
- After an attack has happened, what to do next.
- filters traffic going to router to find threats.
- OS
Down
- Storage
- You can install apps to protect you from getting this like McAfee.
- Someone trying to break into your device to gain information
- authentication
- WiFi
- Stock market and basically digital currency
- Secures
- destroying sensitive documents for protection.
- Who to report an attack has occurred on your device too.
20 Clues: OS • WiFi • Storage • Secures • internet • Scam emails • authentication • Someone who steals your files • backing up important or all files. • A type of protection for your Wi-Fi • demanding money to keep data intact. • monitoring your device to find threats. • Stock market and basically digital currency • destroying sensitive documents for protection. • ...
Final Exam Cyber 24-25 2025-05-08
Across
- Writing instructions for the computer
- Stands for Cascading Style Sheets
- to select all the information on the screen
- Horizontal division of a spreadsheet
- to save all changes for later use
- change the appearance of the text thicker and stand out
- What the Green flag do in Scratch?
- Vertical division of a spreadsheet
- Finding and fixing errors in a program
- the shortcut to copy selected information
- What should you ALWAYS do before sending an email?
- used to create an unordered list
- Symbolic name that stores changeable data
- when page orientation; height is greater than width
- Stands for Hypertext Markup Language
- it full-screen mode
- used to define the body of an HTML document
Down
- lines- Horizontal and Vertical lines on the spreadsheet
- the file produced in a word processing program
- the appearance and shape of characters
- tag used to represent ordered list
- scripts- Coding scripts that run at the same time
- Is used to change the appearance of a website
- <p> tag in HTML represents
- to find certain text on a page
- individual box on a Google sheet (Spreadsheet)
- text horizontally or vertically in the middle of a page
- Controllable graphic character
- reference- Letter and number that represents the cell
- to print the current page
- when page orientation; width is greater than height
31 Clues: it full-screen mode • to print the current page • <p> tag in HTML represents • to find certain text on a page • Controllable graphic character • used to create an unordered list • Stands for Cascading Style Sheets • to save all changes for later use • tag used to represent ordered list • What the Green flag do in Scratch? • Vertical division of a spreadsheet • ...
Networking Concepts and Cyber Ethics 2025-06-05
Across
- It is one of the most common network setups that consists of a group of star figured workstations .
- It is a malicious technique of tricking a web user into clicking on something what user perceives.
- It is a device that connects two different types of networks with each other.
- It is a topology uses a single communication line to which all the nodes are directly connected.
- Each computer in a network.
- It refers to being aware of the ethical practices and behaving responsibly while using the internet.
- It refers to a computer network restricted to an organisation .
- It is an act of sending email to an user misleading him to believe that is a trusted person .
- It refers to an illegal intrusion into a computer system.
- It is a set of programs that disrupts the normal functioning of a computer.
- It is a topology that is connected to a central computer using a point to point connection.
- It is a type of security system .
Down
- It is the process of transforming data into unreadable code.
- It is a wireless technology used to interconnect mobile phones,etc.
- It refers to criminal activity that involve the use of computer,networks.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
- It is a larger network than LAN .
- It stands for Wireless Fidelity.
- It refers to the act of using the language and thoughts of another person as ones original work.
- It is a network device that is used to connect all the computers.
- Purchasing a single licensed copy of a software and load on to several computers.
21 Clues: Each computer in a network. • It stands for Wireless Fidelity. • It is a larger network than LAN . • It is a type of security system . • It refers to an illegal intrusion into a computer system. • It is the process of transforming data into unreadable code. • It refers to a computer network restricted to an organisation . • ...
Advance Cyber Chapter 4(2) 2025-10-14
Across
- A property of hashing algorithms meaning a small change in the input creates a significant change in the output. (2 Words)
- The length of a key, measured in bits. (2 Words)
- A digital document that binds a public key to an identity. (2 Words)
- An older symmetric block cipher with a 64-bit block size that is now considered insecure. (abbreviation)
- An asymmetric algorithm commonly used for generating and sharing keys. (2 Words)
- The unreadable, encrypted data.
- A type of encryption that uses the same key for both encryption and decryption.
- The framework of policies, standards, and software that manages digital certificates and public-key encryption. (abbreviation)
- A one-way function that converts an input of any size into a fixed-size string of text.
- The concept that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. (2 Words)
- A block cipher standard used by the U.S. government. (abbreviation)
- An outdated hashing algorithm that produces a 128-bit hash value. (abbreviation)
- The strength of this depends on the secrecy of the key, not the algorithm.
- The practice and study of techniques for secure communication in the presence of adversaries.
Down
- An entity that issues digital certificates. (2 Words)
- A symmetric algorithm that encrypts data one bit or byte at a time. (2 Words)
- A mathematical formula or process used for encryption and decryption.
- list of digital certificates that have been revoked and are no longer valid. (abbreviation)
- A cryptographic key that is known by all parties involved in the secured communication. (2 Words)
- The process of converting ciphertext back into plaintext.
- A symmetric key algorithm that encrypts data in fixed-size chunks. (2 Words)
- A property of hashing algorithms ensures that two different inputs will not produce the same output. (2 Words)
- A cryptographic method that uses two separate but related keys: one public and one private.
- A secure hashing algorithm that produces a 256-bit hash value. (abbreviation)
- The original, readable data before it is encrypted.
25 Clues: The unreadable, encrypted data. • The length of a key, measured in bits. (2 Words) • The original, readable data before it is encrypted. • An entity that issues digital certificates. (2 Words) • The process of converting ciphertext back into plaintext. • A block cipher standard used by the U.S. government. (abbreviation) • ...
Cyber Safety and Respectful Choices 2021-05-17
Across
- media, Snapchat or Instagram.
- Online bullying.
- relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Healthy.
Down
- The condition of being protected from or unlikely to cause danger, risk, or injury.
- Due regard for the feelings, wishes, or rights of others.
6 Clues: Healthy. • Online bullying. • media, Snapchat or Instagram. • Due regard for the feelings, wishes, or rights of others. • The condition of being protected from or unlikely to cause danger, risk, or injury. • relating to or characteristic of the culture of computers, information technology, and virtual reality.
Cyber Safety and Respectful Choices 2021-05-17
Across
- media, Snapchat or Instagram.
- Online bullying.
- relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Healthy.
Down
- The condition of being protected from or unlikely to cause danger, risk, or injury.
- Due regard for the feelings, wishes, or rights of others.
6 Clues: Healthy. • Online bullying. • media, Snapchat or Instagram. • Due regard for the feelings, wishes, or rights of others. • The condition of being protected from or unlikely to cause danger, risk, or injury. • relating to or characteristic of the culture of computers, information technology, and virtual reality.
Lecture 3 2024-10-21
14 Clues: Queries • Injection • Statements • Sanitization • SQL Injection • Data Exposure • SQL Injection • SQL Injection • Authentication • Scripting (XSS) • Request Forgery • Deserialization • Misconfiguration • Logging and Monitoring
Georgia Milestones Testing Training 2016-03-29
Across
- are used for each student for each section of the online assessment
- of test security occurs when examiners fail to follow administration directions for the test
- electronic devices should be used during testing sessions (by teachers or students)
- must be kept secure at all times
- is permitted during breaks
- can write in the test books
Down
- should be covered in testing rooms
- must monitor the integrity of the assessment, through circulation and checking in
- during the entire testing period
- responsible for test security
- begins on April 12
- o'clock is the time proctors should arrive in rooms they are proctoring
12 Clues: begins on April 12 • is permitted during breaks • can write in the test books • responsible for test security • during the entire testing period • must be kept secure at all times • should be covered in testing rooms • are used for each student for each section of the online assessment • o'clock is the time proctors should arrive in rooms they are proctoring • ...
9/11 2024-05-10
Across
- where the first attacks happened on 9/11
- the kind of tree that survived the twin tower attack
- what happened to the towers after they were hit
- month of the terrorist attacks in 2011
- president during 9/11
- new legislation passed to fight terrorism
- president that made Patriot Act become Freedom Act
- target for another terrorist plane after NYC
Down
- leader of 9/11 attacking terrorist organization
- where Americans crashed plane headed to White House
- new airport security after 9/11, Transportation Security Administration
- musical artist who wrote a song to inspire patriotism after 9/11
12 Clues: president during 9/11 • month of the terrorist attacks in 2011 • where the first attacks happened on 9/11 • new legislation passed to fight terrorism • target for another terrorist plane after NYC • leader of 9/11 attacking terrorist organization • what happened to the towers after they were hit • president that made Patriot Act become Freedom Act • ...
SAFE INTERNET 2025-02-28
Across
- A secret code used to secure accounts
- A type of malware disguised as legitimate software
- Any software designed to harm or exploit a system
- The right to protect personal information online
- A unique identifier for logging into accounts
- A tool or app used for two-step verification
Down
- A scam where attackers trick users into revealing sensitive information
- A security system that blocks unauthorized access
- A tool that encrypts your internet connection for security
- Software that protects computers from malware
- Illegal activities conducted on the internet
- Malicious software that secretly gathers user data
12 Clues: A secret code used to secure accounts • Illegal activities conducted on the internet • A tool or app used for two-step verification • Software that protects computers from malware • A unique identifier for logging into accounts • The right to protect personal information online • A security system that blocks unauthorized access • ...
3.5 Compare and contrast network access and management method 2025-09-03
Across
- Management done on a separate network for security
- Sends only some traffic through VPN, rest uses local internet
- VPN where a user connects through a web browser
- Secure intermediate system used to access another network
- VPN that allows a remote user to connect to a network
Down
- Sends all traffic through VPN for security
- Management done over the same network being monitored
- Graphical interface for managing devices
- VPN that connects two networks together permanently
- Software interface for programmatic management
- Direct connection to a device using serial or USB
- Secure command line access protocol
12 Clues: Secure command line access protocol • Graphical interface for managing devices • Sends all traffic through VPN for security • Software interface for programmatic management • VPN where a user connects through a web browser • Direct connection to a device using serial or USB • Management done on a separate network for security • ...
TEKA-TEKI SILANG BULLYING 2026-01-29
Across
- Tindakan menjauh dari pelaku bullying?
- Perbuatan yang termasuk ke dalamBullying Verbal?
- Mengancam teman agar takut termasuk bullying?
Down
- Mengirim pesan kasar atau menghina melalui media sosial disebut....Bullying
- Bullying melalui ucapan atau kata-kata yang menyakiti perasaan.
- Bullying yang dilakukan dengan kekerasan tubuh
6 Clues: Tindakan menjauh dari pelaku bullying? • Mengancam teman agar takut termasuk bullying? • Bullying yang dilakukan dengan kekerasan tubuh • Perbuatan yang termasuk ke dalamBullying Verbal? • Bullying melalui ucapan atau kata-kata yang menyakiti perasaan. • Mengirim pesan kasar atau menghina melalui media sosial disebut....Bullying
Rabbit-Proof Fence Vocabulary 2024-08-17
12 Clues: cows • refuge • afraid • reptile • hurting • security • footprint • squat down • deep sadness • a dry area of land • village, community • a point of reference
Are health hackers the new cyber security threat? 2019-03-11
Across
- Request for information from a database
- A program under the US Social Security Administration that reimburses hospitals and physicians for medical care provided to qualifying people over 65 years old.
- Poor health resulting from disease of body or mind; a disease
Down
- Something aimed or fired at
- An indication of impending danger or harm
- To struggle or contend frantically in order to get something
- market A place where such illegal business is carried on.
7 Clues: Something aimed or fired at • Request for information from a database • An indication of impending danger or harm • market A place where such illegal business is carried on. • To struggle or contend frantically in order to get something • Poor health resulting from disease of body or mind; a disease • ...
TSchmidt - Network Devices 2023-01-04
Across
- all traffic flows through this for processing
- connects networks
- wired network
- this takes a single input and spreads it out amongst all outputs
- bridges reduces traffic between these
- refrigerators, dishwashers, smart tvs and thermostats are some of these
- A wireless network connects wirelessly to this
- patch panels provide a ________ between PCs and switches/routers
- an all in one security, with ids, ips, and a firewall
- protects data and equipment on a network from an unauthorized access
Down
- aps provide network access to...
- monitors all devices under or connected to a network
- another term for ethernet over power is...
- These filter and segment network traffic by sending data back to device which it was sent
- legacy systems are inherently ______ to security breaches
- passively monitors traffic on networks
- extending a signals distance and restoring weak signals
- this powers on devices that are not directly connected to power or have a battery
- Another wireless network
19 Clues: wired network • connects networks • Another wireless network • aps provide network access to... • bridges reduces traffic between these • passively monitors traffic on networks • another term for ethernet over power is... • all traffic flows through this for processing • A wireless network connects wirelessly to this • monitors all devices under or connected to a network • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
Jason crossword 2025-09-09
Across
- is a computer program that simulates human conversation with an end user.
- type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- electro-mechanical data storage device that stores and retrieves digital data
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
- is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- the practice of pretending on social media to be someone different
- is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- a software program or a system desgined to help users find information
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
- is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- is an application for accessing websites.
Down
- is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- s a mobile device that combines traditional mobile technology with more advanced computing abilities.
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- networking technology that uses radio waves to provide wireless high-speed Internet access.
- In the digital age, consumers are more connected than ever before through smartphones and apps
- is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
- device designed to fit on top of a typical office desk.
- A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- A computer's short term memory , where the data that the processor is currently using is stored
- all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
27 Clues: is an application for accessing websites. • device designed to fit on top of a typical office desk. • the practice of pretending on social media to be someone different • a software program or a system desgined to help users find information • is a computer program that simulates human conversation with an end user. • ...
Thanksgiving Puzzle 2022-10-17
Across
- Occurs after eating to much, known as a food ____.
- Which state did the pilgrims land?
- Thanksgiving is held on what day each year.
- A noise typically associated with turkeys
- Two people hold opposite ends till it breaks in half, the bigger side is deemed the winner.
- The location of the Macy's Day Parade.
- Tastes better than turkey.
Down
- The day after thanksgiving commonly known for all the deals offered.
- A holiday that is celebrated by excessive eating.
- What is the current month we are in?
- The main dish served for thanksgiving dinner.
- The name of the ship the pilgrims came on.
- Usually the last float in the Macy's Day Parade.
- What day does the cyber version of black fridat occur?
14 Clues: Tastes better than turkey. • Which state did the pilgrims land? • What is the current month we are in? • The location of the Macy's Day Parade. • A noise typically associated with turkeys • The name of the ship the pilgrims came on. • Thanksgiving is held on what day each year. • The main dish served for thanksgiving dinner. • ...
Unit 9: Digital Health 2024-04-22
Across
- a health professional who diagnoses medical conditions
- patients can use social media to choose doctors by reading _____ from other patients about their experience
- a word that means 'not good enough'
- your digital _______ includes all the actions you take online
- a person who receives medical treatment
- ______-bullying includes targeting and threatening someone online
- something that is trustworthy
Down
- patients can use social media to find online _____ groups
- you must be careful online as some information may be _____ and incorrect
- a word that means loneliness
- _____ media allows people to interact online, examples include facebook and instagram
- a person who steals important information online
- the most popular social media platform in the UAE
- a mental health problem involving a lot of worry and stress
14 Clues: a word that means loneliness • something that is trustworthy • a word that means 'not good enough' • a person who receives medical treatment • a person who steals important information online • the most popular social media platform in the UAE • a health professional who diagnoses medical conditions • patients can use social media to find online _____ groups • ...
Bullying 2024-08-20
Across
- Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
- Tindakan yang melibatkan perundungan secara berkelompok.
- Mempermalukan seseorang di depan orang lain
- Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
- Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
- Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
- Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
- Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
- Tindakan menyebar informasi palsu tentang seseorang.
- Perasaan tidak berdaya dan tertekan akibat tindakan bullying
- Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
- Kata untuk seseorang yang melakukan bullying.
- Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
- Jenis bullying yang terjadi melalui media sosial atau teknologi digital
14 Clues: Mempermalukan seseorang di depan orang lain • Kata untuk seseorang yang melakukan bullying. • Tindakan menyebar informasi palsu tentang seseorang. • Tindakan yang melibatkan perundungan secara berkelompok. • Perasaan tidak berdaya dan tertekan akibat tindakan bullying • Kata untuk mengidentifikasi individu yang menjadi sasaran bullying • ...
Cyber Safety Review 2022-02-17
Across
- To Pretend to be someone you are not
- Having good manners online
- ___ a term used in Megan's Story that involves lying about your identity
- Self_____ is how you feel about yourself
Down
- Bullying someone over and over with varying degrees of intensity
- Facts or proof you should show to an adult if you are being cyber bullied.
- Fake phrases meant to hurt someone
- Feeling very sad and upset, a feeling you can possibly have when being bullied.
- Another name for a cyberbully
9 Clues: Having good manners online • Another name for a cyberbully • Fake phrases meant to hurt someone • To Pretend to be someone you are not • Self_____ is how you feel about yourself • Bullying someone over and over with varying degrees of intensity • ___ a term used in Megan's Story that involves lying about your identity • ...
Computer Project 2025-06-15
Across
- : Bullying someone online through messages or social media
- : A harmful program that can damage files and software
- : People who use the internet or computers to commit crimes
- : Software that protects your computer from viruses
Down
- : The practice of protecting devices and data from cyber threats
- : Fake messages that try to steal passwords or bank info
- : Criminal activities done using computers or the internet
- : A system that blocks unauthorized access to or from a private network
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Bullying someone online through messages or social media • : Criminal activities done using computers or the internet • : People who use the internet or computers to commit crimes • ...
Power Apps 2024-04-29
16 Clues: YMCA • Aces$ • Foster • Nursing • Shapiro • Security • Clinicals • Daycare Center • Concealed Carry • Access & Review • Land of Lincoln • Healthcare Worker • Illinois State Police • Firearm Owners Identification • Federal Bureau of Investigation • Needed to own a gaming machine not in a casino
Crossword - Voltedge 2019-09-06
Across
- Tool replacing Oracle HR
- Portal to view security emergency contact and other security info
- One of the focus areas of EHS
- What protocal is used to authenticate OnGuard end user's SSO
- TCT supports export control for which country?
- Measure based on the deviations of individual scores from the mean
Down
- Tool used for Rewards and Recognitions
- What is the SOX Compliant application under EHS
- Python library for machine learning
- CDA application is hosted here
10 Clues: Tool replacing Oracle HR • One of the focus areas of EHS • CDA application is hosted here • Python library for machine learning • Tool used for Rewards and Recognitions • TCT supports export control for which country? • What is the SOX Compliant application under EHS • What protocal is used to authenticate OnGuard end user's SSO • ...
Let us see who was focusing! 2023-04-15
Across
- a network security system that monitors and controls incoming and outgoing network traffic based on a set of rules.
- the business's main goal
- the relational database they use
- future goal of the e-commerce
- Increases when using a relational database
Down
- suggestion for sportszone
- Where the content was saved
- an organized collection of data that is stored and accessed electronically
- Single table structure
- a situation that sports zone considered as an opportunity
10 Clues: Single table structure • the business's main goal • suggestion for sportszone • Where the content was saved • future goal of the e-commerce • the relational database they use • Increases when using a relational database • a situation that sports zone considered as an opportunity • an organized collection of data that is stored and accessed electronically • ...
Active Directory 2015-01-14
Across
- what can active directory do (6 Letters Beginning with B)
- What is AD? [15 Letters]
- What active directory is [8 Letters]
Down
- What is the main reason active directory is used? [8 Letters]
- Beginning with B - Who uses it? [10 Letters]
- Active directory service [10 Letters]
- Protocol AD uses (4 letters - Acronym)
- Another word for Single user name and password [5 Letters]
- Improves ? Security[11 Letters]
- Active Directory improves through _ _ _ _ _ _ _ _ _ _ _ management capabilities [11 Letters]
10 Clues: What is AD? [15 Letters] • Improves ? Security[11 Letters] • What active directory is [8 Letters] • Active directory service [10 Letters] • Protocol AD uses (4 letters - Acronym) • Beginning with B - Who uses it? [10 Letters] • what can active directory do (6 Letters Beginning with B) • Another word for Single user name and password [5 Letters] • ...
Robbery 2017-07-10
Across
- First name of the second security officer
- first thing you do after a robbery
- what do you hand out to customers that witnessed the robbery
- Who is the 1st security officer
- distinctive physical characteristic
Down
- full name of the 1st contact for media
- Keep the customer ______!
- common description of suspect involving how long they have been alive
- who should you call after you lock the doors
- common description of suspect involving their size
10 Clues: Keep the customer ______! • Who is the 1st security officer • first thing you do after a robbery • distinctive physical characteristic • full name of the 1st contact for media • First name of the second security officer • who should you call after you lock the doors • common description of suspect involving their size • ...
Important Concepts 2017-11-17
Across
- Is the increasing interaction of people through the growth of the international flow
- Income advised to infaltion
- % of economy growth
- Ability to influence others based on specific characteristics
- People who share democratic and cultural similarities
- State actions taken to ensure its security that threatened the security of other states
- studies interactions between countries
Down
- Right of a nation to become an independent state
- Type of conflict in which religion could be involved
- Income
10 Clues: Income • % of economy growth • Income advised to infaltion • studies interactions between countries • Right of a nation to become an independent state • Type of conflict in which religion could be involved • People who share democratic and cultural similarities • Ability to influence others based on specific characteristics • ...
ESLA COME 2024-10-03
Across
- OS permit to creat server
- Security rules in windows server
- Security protocol use private and public key
- a machine capable of reproducing human behaviour
- Other model of OSI model more simply make by american army
Down
- Network devices in level 2 of OSI model
- Protcol to use ip @ in a other place or nation
- Model of interconnection network devices
- Protocol use in ping
- Association protocol permit to associate ip @ and MAC @
10 Clues: Protocol use in ping • OS permit to creat server • Security rules in windows server • Network devices in level 2 of OSI model • Model of interconnection network devices • Security protocol use private and public key • Protcol to use ip @ in a other place or nation • a machine capable of reproducing human behaviour • Association protocol permit to associate ip @ and MAC @ • ...
SCA Crossword Puzzle 2025-11-20
Across
- The area where bags and passengers are screened
- The person who flies the plane
- Where planes take off and land
- Where the pilot sits to fly the plane
- When a plane touches back down
Down
- What you do with your ticket and bags before security
- The building where passengers wait for flights
- When a plane leaves the ground
- Where you board your plane
- The path planes use to get to the runway
10 Clues: Where you board your plane • The person who flies the plane • When a plane leaves the ground • Where planes take off and land • When a plane touches back down • Where the pilot sits to fly the plane • The path planes use to get to the runway • The building where passengers wait for flights • The area where bags and passengers are screened • ...
Daily Vocabulary 2024-11-12
week 6 2025-10-03
cyber threats and security 2026-01-19
3 Clues: THESE ATTACK CAUSE DATA TO DAMAGE • STEALINGINFORMATION WITHOUT USER PERMISSION • IN PHISHINGTHE RECIEVER IS TRICKED BY MAKING HIM/HER VBELIEVE THAT THE MESSAGE IS RECIEVED FROM A TRUSTED SOURCE
Ch 17 Intro to Business 2025-09-15
Across
- A form specifying the number of allowances in the Employee’s Withholding Allowance Certificate
- Tax on the net income of an individual
- A federal tax used to fund the public service programs Social Security and Medicare
- Tax deducted from an individual’s paycheck, such as for Social Security and Medicare
- The amount of money you earn before any payroll deductions
- Tax on income used to pay for the Medicare (health) program provided to individuals over the age of 65 or individuals with a disability
- An employer‐sponsored retirement plan, sometimes with matching funds
- All of the income received in a year
Down
- The amount of money that tax calculations are based on
- The amount that will be withheld from each paycheck
- An attachment to an employee’s paycheck that shows the amount earned and details the payroll deductions
- Tax on income paid by both the employee and the employer to fund the Social Security system
- An employment eligibility verification form filled out by both an employer and an employee
- A simple income tax form that can be used by anyone who has an income of less than $100,000 and is not claiming dependents
- An employee’s take‐home pay; net pay is calculated by gross pay with deductions subtracted
- A reduction of taxes paid on gross income
- A form prepared by an employer reporting an employee’s annual wages and the amount of taxes withheld from paychecks
17 Clues: All of the income received in a year • Tax on the net income of an individual • A reduction of taxes paid on gross income • The amount that will be withheld from each paycheck • The amount of money that tax calculations are based on • The amount of money you earn before any payroll deductions • An employer‐sponsored retirement plan, sometimes with matching funds • ...
puzzle 5 2024-07-10
5 Clues: A personal area online • Ability to use or enter • A copy of your files for safety • Program that fights harmful software • Related to computers and the internet
Computers and Technology. 2023-05-17
Across
- - Artificial intelligence is a field of computer science that aims to create machines that can think, learn, and solve problems like humans.
- - Mobile devices like smartphones and tablets have transformed the way we access information and communicate with each other, allowing us to be connected anywhere and anytime.
- - Social media platforms like Facebook, Twitter, and Instagram have transformed the way we interact with each other online and in real life.
- - Robotics involves the use of computer technology to design, build, and operate machines that can perform tasks autonomously.
- - The term "digital" refers to anything that is encoded using binary code, and has become a ubiquitous part of modern technology and culture.
- - Cloud computing allows users to access data and applications over the internet rather than relying on local hardware, enabling greater flexibility and scalability.
- - Apple Inc. is a leading technology company that has been at the forefront of innovation with its Mac computers, iPods, iPhones, and more.
- - The global system of interconnected computer networks that has transformed the way we communicate and access information.
Down
- - International Business Machines Corporation is a pioneering computer company that played a major role in the development of early computing technology.
- - Microsoft Corporation is a software company that revolutionized personal computing with its Windows operating system and Microsoft Office suite.
- - Virtual reality and virtual worlds are computer-generated environments that have opened up new possibilities for gaming, education, and entertainment.
- - The microchip is the key component of modern electronics and has enabled the development of computers, smartphones, and other devices.
- - Google is a search engine that has become synonymous with the internet, as well as a leading developer of software and technology products.
- - Silicon is the key material used in the manufacture of computer chips and other electronics.
- - The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology.
15 Clues: - Silicon is the key material used in the manufacture of computer chips and other electronics. • - The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology. • - The global system of interconnected computer networks that has transformed the way we communicate and access information. • ...
Financial Math Vocab 2021-09-20
Across
- An overtime rate that is two times the hourly rate
- payroll or other types of checks that are directly and electronically deposited into a bank account
- The set amount of money that a worker recieves for each item the individual produces
- paid time off that an employer may offer to employees as an employee benefit
- an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
- the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
- a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
- the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
- one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
- social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
- the set number of hours that an employee is expected to work
- Money that employees or others recieve based on sales, for example, an author or musician
- The total pay, which is the sum of an employees hourly pay and overtime pay
- a plan that employees to buy or recieve company stock;offered as an employee benefit
- asistance to employees who are injured while working at their job, a program that is governed by state laws.
- an employee benefit that allows employees paid time off to care for sick children or newborns
Down
- The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
- a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
- a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
- the federal act that established social security insurance
- an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
- a type of retirement plan where an employee recieves compensation from an employer after retirement
- The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
- a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
- a type of worker who is paid for each item the employee produces
- a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
- a set amount that an employee is paid for each hour of work
- the hourly wage an employee recieves for any overtime hours
- a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
- A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
- The extra hours an employee works beyond their regular hours
- the maximum income on which a person must pay social security tax in a given year
32 Clues: An overtime rate that is two times the hourly rate • the federal act that established social security insurance • a set amount that an employee is paid for each hour of work • the hourly wage an employee recieves for any overtime hours • the set number of hours that an employee is expected to work • The extra hours an employee works beyond their regular hours • ...
Jason crossword 2025-09-09
Across
- is a computer program that simulates human conversation with an end user.
- type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- electro-mechanical data storage device that stores and retrieves digital data
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
- is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- the practice of pretending on social media to be someone different
- is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- a software program or a system desgined to help users find information
- a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
- is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- is an application for accessing websites.
Down
- is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- s a mobile device that combines traditional mobile technology with more advanced computing abilities.
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- networking technology that uses radio waves to provide wireless high-speed Internet access.
- In the digital age, consumers are more connected than ever before through smartphones and apps
- is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
- a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
- device designed to fit on top of a typical office desk.
- A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- A computer's short term memory , where the data that the processor is currently using is stored
- all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
- technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
27 Clues: is an application for accessing websites. • device designed to fit on top of a typical office desk. • the practice of pretending on social media to be someone different • a software program or a system desgined to help users find information • is a computer program that simulates human conversation with an end user. • ...
Bullying 2012-10-18
Across
- ______ are most likely to be bullied online.
- It is important to raise _________ of bullying in your community.
- It is important to tell a teacher or trusted ______ if bullying is occuring.
- bullying is a form of _______.
- To treat another kindly, with patience and care.
- A person who observes the bullying behavior.
- Physical or emotional injury to someone.
- Help prevent bullying by taking _______.
Down
- Mental bullying occurs when bullies spread _____ about someone.
- A way of bullying by using email or a cell phone.
- If extra help is needed there are ______ groups.
- Making a statement or taking action that shows harm to another.
- Rumor or talk of a personal, sensational, or intimate nature.
- Racist remarks and name calling are forms of ______ bullying.
- Most bullies try to get a _____ from their targets.
15 Clues: bullying is a form of _______. • Physical or emotional injury to someone. • Help prevent bullying by taking _______. • ______ are most likely to be bullied online. • A person who observes the bullying behavior. • If extra help is needed there are ______ groups. • To treat another kindly, with patience and care. • A way of bullying by using email or a cell phone. • ...
IT-Security - Datenschutz/Datensicherheit 2016-01-29
Across
- Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
- Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
- Was ist der Überbegriff für unerwünschte, schädliche Software?
- und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
- Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
Down
- Was versteckt sich in einem scheinbar nützlichen Programm ?
- Mithilfe von elektronischen Medien wird ... durchgeführt
- Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
- Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
- Bei was werden gefälschte Webseiten umgeleitet ?
10 Clues: Bei was werden gefälschte Webseiten umgeleitet ? • Mithilfe von elektronischen Medien wird ... durchgeführt • Was versteckt sich in einem scheinbar nützlichen Programm ? • und Junke E-Mails Wie werden unerwünschte Werbemails genannt? • Sie sind in ein Dokument/Datei eingebettet und nennen sich ... • Was ist der Überbegriff für unerwünschte, schädliche Software? • ...
A Stronger Me 2012-07-15
Across
- Someone who abuses someone to have power of them
- You life is what?
- To be uncomfortable in a situation is what type of sign?
- To be discluded from the world is to be what?
- To be in control is having all the what?
Down
- The given name to a type of technological bullying?
- A group of people either family or friends or helpline
- Hitting someone repeatedly is what kind of abuse?
- Attacking someone either physically, emotionally or verbally is called what?
- The mourning of someone is called what?
10 Clues: You life is what? • The mourning of someone is called what? • To be in control is having all the what? • To be discluded from the world is to be what? • Someone who abuses someone to have power of them • Hitting someone repeatedly is what kind of abuse? • The given name to a type of technological bullying? • A group of people either family or friends or helpline • ...
Cyber Wellness Crossword Puzzle 2014-06-05
Across
- Do not set __________ password for your account.
- Cyber bullying is using the social–network to _________ others online.
- Be ________ for your words and actions online.
- Be ________ of what you post online, they can hurt others.
- If you do not want to _________ the song, you should buy the CD.
Down
- What is one very famous website for watching videos?
- You can find help from your teacher or _________.
- Do not post things that will hurt others on social _________.
- Do not use the same ________ for all your accounts.
- We should not download games and movies _________.
10 Clues: Be ________ for your words and actions online. • Do not set __________ password for your account. • You can find help from your teacher or _________. • We should not download games and movies _________. • Do not use the same ________ for all your accounts. • What is one very famous website for watching videos? • ...
Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class 2021-10-08
Across
- Most type form of Plagiarism
- name of the software that can perform multiple language checks for plagiarism
- Unintentional Plagiarism
- The Indian act that covers Plagiarism is Indian ……….. Act , 1957
- A Type of irresponsible authorship that leads to plagiarism
- one study multiple articles refers to what type of Plagarism
Down
- Copying content from the internet is which type of plagiarism
- Failure to appropriately credit others' prior discoveries
- Marks If there is a need to reproduce a ‘short’ exact text from elsewhere, following should be used in the paper
- One of the consequences of plagiarism
10 Clues: Unintentional Plagiarism • Most type form of Plagiarism • One of the consequences of plagiarism • Failure to appropriately credit others' prior discoveries • A Type of irresponsible authorship that leads to plagiarism • one study multiple articles refers to what type of Plagarism • Copying content from the internet is which type of plagiarism • ...
Cybersecurity and Healthcare 2021-05-31
Across
- Limiting the risks or impacts of a cyber threat.
- Generic term for computer viruses, trojans, etc. designed for malicious purposes.
- A type of cyberattack that holds your systems or information hostage until a ransom is paid.
- You should never share this.
- The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
- When should you report an IT breach or potential breach?
- A cyberattack attempting to discover your personal information.
- Federal law protecting patient privacy.
- The US Food and Drug Administration.
- Whose responsibility is cybersecurity?
10 Clues: You should never share this. • The US Food and Drug Administration. • Whose responsibility is cybersecurity? • Federal law protecting patient privacy. • Limiting the risks or impacts of a cyber threat. • When should you report an IT breach or potential breach? • A cyberattack attempting to discover your personal information. • ...
Ty Violet-bullying 2022-03-04
Across
- you are the victim of a bully
- what type of person is hurting the bullied
- you are getting bullied by someone in front of your friends
- this is a type of bullying that removes people from groups
- what type of bullying is a person who watches and does nothing
Down
- you are hurting people by words
- you are hurting the person next to you
- of power what is the b in the ABC's of bullying
- Michel pushed Brandon what type of bullying is this.
- this type of bullying is done online
10 Clues: you are the victim of a bully • you are hurting people by words • this type of bullying is done online • you are hurting the person next to you • what type of person is hurting the bullied • of power what is the b in the ABC's of bullying • Michel pushed Brandon what type of bullying is this. • this is a type of bullying that removes people from groups • ...
Friday fun 2023-12-14
Across
- If 13=m and 20=t, how much is 8+1+3+11+5+4
- 1010011010
- This cyber-related term can come from anywhere!
- If the weather is between #03a2ff and 104, 3, 255, how is it?
- Go forward go back, nothing has changed..
Down
- The publisher of 9th best-selling game in the USA in 2020
- The last name of the person on the list of people on the world's first www-page.
- German word in the middle, coming soon
- A coding snake
- 01100011 01100101 01110010 01101110
10 Clues: 1010011010 • A coding snake • 01100011 01100101 01110010 01101110 • German word in the middle, coming soon • Go forward go back, nothing has changed.. • If 13=m and 20=t, how much is 8+1+3+11+5+4 • This cyber-related term can come from anywhere! • The publisher of 9th best-selling game in the USA in 2020 • If the weather is between #03a2ff and 104, 3, 255, how is it? • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Suicide Awareness and Prevention 2023-09-21
Across
- Talking about suicide can help spread ________ of mental health
- Condition associated with cyber and other bullying
- CDC says 20% of youth experience social __________
- Early diagnosis and treatment of mental disorders can lead to a ____________ life
- Targets of _____________ are at a greater risk of self-harm and suicidal behaviors
Down
- A potential warning sign of impending suicide is giving away _________
- Mean age of onset of adolescent depression
- Suicide _____________ is a critical goal of the NJROTC program
- A potential warning sign of impending suicide is long-term ____________
- Mental health is often overlooked and called the "silent ________"
10 Clues: Mean age of onset of adolescent depression • Condition associated with cyber and other bullying • CDC says 20% of youth experience social __________ • Suicide _____________ is a critical goal of the NJROTC program • Talking about suicide can help spread ________ of mental health • Mental health is often overlooked and called the "silent ________" • ...
wije 2025-02-24
Across
- Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
- Untuk menampilkan bagian grafik yang ingin ditampilkan
- Fitur untuk menyederhanakan dan menganalisa data
- Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
- Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
- Aturan pelindungan privasi
- Salah satu web/aplikasi chatbot populer
- Proses pemberian izin atau kewenangan untuk mengakses data tertentu
- Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
- Media sosial untuk berkomunikasi
10 Clues: Aturan pelindungan privasi • Media sosial untuk berkomunikasi • Salah satu web/aplikasi chatbot populer • Fitur untuk menyederhanakan dan menganalisa data • Untuk menampilkan bagian grafik yang ingin ditampilkan • Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor • Proses pemberian izin atau kewenangan untuk mengakses data tertentu • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
Digital identity 2023-10-26
Across
- Protecting yourself on the internet (12 letters).
- Customize your online visibility (15 letters).
- What others think of you based on your actions (10 letters).
- Enhanced login security (12 letters).
Down
- Who you are on the internet (14 letters).
- Courtesy and consideration for others (7 letters).
- Key to your online security (8 letters).
- Harassment on the internet (12 letters).
- Confirm the truth of something (6 letters).
- Notify authorities of misconduct (6 letters).
10 Clues: Enhanced login security (12 letters). • Key to your online security (8 letters). • Harassment on the internet (12 letters). • Who you are on the internet (14 letters). • Confirm the truth of something (6 letters). • Customize your online visibility (15 letters). • Notify authorities of misconduct (6 letters). • Protecting yourself on the internet (12 letters). • ...
Computer Virus 2024-07-06
Across
- "Software that spies on computer activities."
- "Self-replicating malware."
- Horse: "Malware disguised as legitimate software."
- "Software designed to disrupt, damage, or gain unauthorized access."
- "A type of malicious software."
Down
- "A hidden means of bypassing security."
- "Malware that encrypts data for ransom."
- "A security system that monitors and controls incoming and outgoing network traffic."
- "Software designed to detect and remove malware."
- "Software used to gain unauthorized access and hide its presence."
10 Clues: "Self-replicating malware." • "A type of malicious software." • "A hidden means of bypassing security." • "Malware that encrypts data for ransom." • "Software that spies on computer activities." • "Software designed to detect and remove malware." • Horse: "Malware disguised as legitimate software." • "Software used to gain unauthorized access and hide its presence." • ...
FO Training Newsletter Issue 03/2023 Quiz 2023-06-19
Across
- The most common cause of hard landing
- Manager Flight Crew Training
- All loss of control inflight is caused by human error
- Nose-high high-bank and nose-low high-bank are types of ______
- Knowledge, ______ and Attitude contributes to overall ______
- Safety and Security in the organization is the responsibility of the employer and employees
Down
- ______ pilot at the seat may cause a loss of control inflight
- Who is FO Training Senior Executive Flight Crew Training
- Poor ______ of the pilots attributed to the crash of AF447
- Proficiency in ______ helps prevent loss of control inflight
- Safety and Security is our ______
- Accretion of ______ may cause engine loss of power
- Always ______ first in any work environment
- How many editions of FO Training newsletter are published per year?
- Short form for loss of control inflight
15 Clues: Manager Flight Crew Training • Safety and Security is our ______ • The most common cause of hard landing • Short form for loss of control inflight • Always ______ first in any work environment • Accretion of ______ may cause engine loss of power • All loss of control inflight is caused by human error • Who is FO Training Senior Executive Flight Crew Training • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assignment - Billy Summers Crossword 2024-03-06
Across
- just behavior or treatment
- someone who writes a book
- a type of phone used by criminals
- a person accompanying another for security purposes
- a secret plan to do something unlawful
- an outfit used in order to not get recognised
- the act of getting away quickly, usually from a crime scene
Down
- a long range rifle usually equipped with a scope
- a building where criminal trials take place
- protection against and from any potential harm
- the practice of a person doing business or shoring assets overseas to avoid taxes
- an account of a person's life written as such by that person
- a killer for hire
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Vocabulary Assingment 2024-03-07
Across
- a person accompanying another for security purposes
- an account of a person's life written as such by that person
- a person who arranges deals and work between two people or groups
- just behavior or treatment
- the practice of a person doing business or shoring assets overseas to avoid taxes
- the act of getting away quickly, usually from a crime scene
- a killer for hire
Down
- a building where criminal trials take place
- the act of willful killing for any reason
- a secret plan to do something unlawful
- a type of phone used by criminals
- an outfit used in order to not get recognised
- someone who writes a book
- protection against and from any potential harm
- a long range rifle usually equipped with a scope
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Shields and Scrubs 2025-08-12
Across
- – Workplace ______ Prevention Site Committee focus.
- – The culture reinforced through consistent reporting and early intervention.
- – What staff monitor for early signs of escalation.
- – Risk assessment tool for recognizing escalating behaviors (acronym).
- – Detection systems flagged 235,000+ alerts for these in 2025.
- – Early coordinated ______ helps manage patient threats effectively.
- – Street name of the office location for Security Services.
- – Emotion expressed to acknowledge frustration and build trust.
Down
- – Response for situations involving aggressive or threatening behavior (no space).
- – A key value to uphold in all patient interactions.
- – Something to set clearly with patients showing inappropriate behaviors.
- – Issued when unsafe patient behaviors require immediate attention.
- – Department responsible for protecting staff and patients.
- – Reporting system for documenting incidents of verbal abuse or threats.
- – Built by listening and acknowledging patient concerns.
15 Clues: – Workplace ______ Prevention Site Committee focus. • – What staff monitor for early signs of escalation. • – A key value to uphold in all patient interactions. • – Built by listening and acknowledging patient concerns. • – Department responsible for protecting staff and patients. • – Street name of the office location for Security Services. • ...
Ernest Cybersecurity Crossword 2026-04-02
Across
- Malicious code that spreads by attaching itself to files
- Fake messages that try to trick you into giving personal information
- Software that secretly collects user information
- Extra login security requiring two forms of verification
- Software designed to harm or exploit a computer or network
- The process of verifying a user's identity
- Software that detects and removes malware
- Malware that locks files and demands payment to unlock them
- A security system that blocks unauthorized access to a network
- Scrambling data so only authorized users can read it
- Someone who gains unauthorized access to systems
Down
- The trail of information you leave online
- Malware that spreads automatically without user action
- A secret word used to access an account
- When private information is exposed or stolen
15 Clues: A secret word used to access an account • The trail of information you leave online • Software that detects and removes malware • The process of verifying a user's identity • When private information is exposed or stolen • Software that secretly collects user information • Someone who gains unauthorized access to systems • ...
Safety Week#4_9 2014-10-27
10 Clues: / ดึง • / ผลัก • / เดือน • / ลูกกลิ้ง • / คอมพิวเตอร์ • / การลาพักร้อน • / ซุปเปอร์ไวเซอร์ • / การรักษาความปลอดภัย • / การดูแลความสะอาดเรียบร้อย • / คุ้มกัน หรือ อุปกรณ์ป้องกัน
Spanish airport 2026-03-25
pazdan olaolczak03@gmail.com 2018-01-29
5 Clues: Nękanie w cyber przestrzeni • Osoba,która próbuje włamać się na komputer • Najpopularniejsza wyszukiwarka internetowa • Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu • Złośliwy program, który można pobrać z internetu nieświadomie
Cyber ethics 11 2025-05-23
5 Clues: log out from public ____. • details should be kept ____. • not open emails from ____ senders. • rule: If it’s not yours, give ____. • cyber citizens think before they ____.
Tech 2023-10-09
15 Clues: Typing tool • Input device • Output device • Display screen • Network security • Memory component • Computer programs • Solid-state drive • Main circuit board • Malicious software • Central processing unit • Wired network connection • Electronic communication • Internet exploration tool • Physical computer components
week 5 spelling words 2025-02-27
14 Clues: test • party • secret • timing • weddins • security • possibly • must have • incomplete • positioned in • a qualification • for people to live in • existing or occurring at the beginning • having great influence on someone or something.
The UK - A Divided Country Level 1 2026-02-20
14 Clues: Lønn • Forbli • Utvide • Misnøye • Å skille • Anstendig • Forskning • Sikkerhet • Tidsepoke • Minke/gå nedover • Et skille/avstand • Economic and political union • The UK leaving the European Union • Being sceptic to the European Union
Cyber safety-by Bridget Graham 2016-05-24
Across
- to decline or not accept a request on a game
- private information that you don't share with with other people
- when you post something on the internet so everyone can see it
- to copy a file from one computer system to another via the Internet
- something that is important not to tell people on the internet or they can track you down
- a saved link to a website
- allows people to share things online
- when you close a screen to save it for later
- when an unknown number or email address appears on your emails
- a search engine
- to upload information to the web
Down
- when someone pretends to be your friend on games but their really not
- a little chip that is is in your computer that you can turn off and on
- when someone is being mean to you on line
- a web address
- never tell anyone about it because you don't know what's going to happen
- information stored on your computer or device
- your personal address on your computer
- a location on the internet
- little pictures to express your feeling
- ups when browsing a new window appears that you don't want
21 Clues: a web address • a search engine • a saved link to a website • a location on the internet • to upload information to the web • allows people to share things online • your personal address on your computer • little pictures to express your feeling • when someone is being mean to you on line • to decline or not accept a request on a game • ...
Cyber safety words-Lance Zafico 2016-05-21
Across
- instant messaging online
- guidance
- popups
- get info from
- when bullies do bad things
- info you don't want to share
- someone you don't know
- someone following you without you knowing
- when you're using the internet
- another name for the internet
Down
- id for logging in
- says mean things
- computer guide
- bad people
- personal info
- secret word or phrase
- people getting your info
- a place where everyone chats to each other
- messages sent to your email address
- safe
20 Clues: safe • popups • guidance • bad people • personal info • get info from • computer guide • says mean things • id for logging in • secret word or phrase • someone you don't know • instant messaging online • people getting your info • when bullies do bad things • info you don't want to share • another name for the internet • when you're using the internet • messages sent to your email address • ...
SBLI Cyber Month Crossword Puzzle! 2024-10-06
Across
- A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
- A service that creates a secure connection over the internet, often used for privacy. (acronym)
- Device used to secure doors or containers, often requiring a key or combination. (1 word)
- Software that detects and removes malicious software from a computer. (1 word)
- Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
- Device used to watch and record activity in a specific area for safety purposes.(2 words)
- The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
- A type of malware that locks users out of their data, demanding payment for access. (1 word)
- Unique pattern of ridges and valleys on the skin of a finger, used for identification.
- The process of converting information into a code to prevent unauthorized access. (1 word)
- A list of trusted entities or applications that are granted access. (1 word)
Down
- An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
- A method of bypassing normal authentication, often used for malicious purposes. (1 word)
- Ethan and Brian make up this team (2 words)
- A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
- Software that secretly monitors user activity and collects personal information. (1 word)
- Team that handles SBLI's tech (acronym)
- Manipulating individuals into divulging confidential information. (2 words)
- A software update designed to fix vulnerabilities or bugs. (1 word)
- Malware disguised as legitimate software to trick users into installing it. (1 word)
- Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
- A weakness in a system that can be exploited by threats. (1 word)
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
- A network security system that monitors and controls incoming and outgoing traffic. (1 word)
- An incident where unauthorized access to data occurs. (1 word)
25 Clues: Team that handles SBLI's tech (acronym) • Ethan and Brian make up this team (2 words) • An incident where unauthorized access to data occurs. (1 word) • A weakness in a system that can be exploited by threats. (1 word) • A software update designed to fix vulnerabilities or bugs. (1 word) • ...
Cyber Ethics Puzzle, Chapter 7 2024-11-22
Across
- Commerce that takes place over the internet instead of at physical stores.
- A prominent writer espousing Neo-luddism and associated ideologies.
- Being responsible for something, such as the results of an action.
- Forms of remote communication made possible through the use of technology.
- A group of farmers concerned that technology would render them obsolete.
- Textual data that is received over the internet and formatted via HTML and CSS.
- The (often non-consentual) removal of data from a consumer device by the producer of that device.
- This company is, among other things, the primary maintainer of the android operating system, and got into controversy after removing applications from the mobile phones of users.
- A compendium of information, either in general or on a specific topic.
- An online encyclopedia who's easily editable nature has been abused by many organizations over the years.
- This company is known for maintaining strict controls over their software ecosystem.
- This company is known for its extremely popular computer operating system.
Down
- A group similar to Luddites, but with a view that most forms of technology are evil, and do more harm than good.
- A computer program designed to search the internet for websites matching a user's query.
- A worldwide network of connected devices that facilitate the sharing of information.
- A way of simulating a process through software so that one may predict the results of a course of action.
- A type of medicine that is performed at long distance using technological assistance.
- A term used to refer to field of producing and using computers.
- Sensors and other devices that are networked together and communicate via wirelessly.
- This company stirred up controversy by removing books from the digital reading devices of customers.
20 Clues: A term used to refer to field of producing and using computers. • Being responsible for something, such as the results of an action. • A prominent writer espousing Neo-luddism and associated ideologies. • A compendium of information, either in general or on a specific topic. • A group of farmers concerned that technology would render them obsolete. • ...
Cyber Fund Final Exam Vocab 2025-05-12
Across
- a computer system on the internet that is expressly set up to attract and trap intruders
- the state of being complete or uncorrupted
- data can be accessed when needed
- spoofed emails and fraudulent websites designed to fool recipients into divulging PII
- small text files that are saved on the computer for use with web browsers and websites
- another word for "technical" skills
- Governs the type of traffic that is and isn't allowed through a firewall
- a governmental organization for standardizing measurement, technology, and industrial standards
- the physical part of a computer that you can touch
- a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
- the condition of being private or secret
Down
- using a lie or scam to obtain private info
- the #1 cause of information security breaches for organizations
- This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
- deploys when conditions exist that malware is seeking
- the internet protocol that has 128 bits
- the Act that ensures that financial businesses are protecting your private data
- a tool that intercepts raw data traveling on a network
- a malicious website using a URL similar to a real one (ex.: www.aple.com)
- malware hidden inside other software that seems harmless
- acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
- a flaw or potential for harm
- a program or code that replicates by being copied or initiating its copying to another program
- the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam
24 Clues: a flaw or potential for harm • data can be accessed when needed • another word for "technical" skills • the internet protocol that has 128 bits • the condition of being private or secret • using a lie or scam to obtain private info • the state of being complete or uncorrupted • the physical part of a computer that you can touch • ...
Financial Math Vocab 2021-09-20
Across
- An overtime rate that is two times the hourly rate
- payroll or other types of checks that are directly and electronically deposited into a bank account
- The set amount of money that a worker recieves for each item the individual produces
- paid time off that an employer may offer to employees as an employee benefit
- an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
- the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
- a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
- the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
- one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
- social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
- the set number of hours that an employee is expected to work
- Money that employees or others recieve based on sales, for example, an author or musician
- The total pay, which is the sum of an employees hourly pay and overtime pay
- a plan that employees to buy or recieve company stock;offered as an employee benefit
- asistance to employees who are injured while working at their job, a program that is governed by state laws.
- an employee benefit that allows employees paid time off to care for sick children or newborns
Down
- The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
- a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
- a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
- the federal act that established social security insurance
- an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
- a type of retirement plan where an employee recieves compensation from an employer after retirement
- The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
- a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
- a type of worker who is paid for each item the employee produces
- a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
- a set amount that an employee is paid for each hour of work
- the hourly wage an employee recieves for any overtime hours
- a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
- A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
- The extra hours an employee works beyond their regular hours
- the maximum income on which a person must pay social security tax in a given year
32 Clues: An overtime rate that is two times the hourly rate • the federal act that established social security insurance • a set amount that an employee is paid for each hour of work • the hourly wage an employee recieves for any overtime hours • the set number of hours that an employee is expected to work • The extra hours an employee works beyond their regular hours • ...
Chapter 5 2013-10-18
Across
- A contractual term where goods that are sold are paid for upon receipt.
- Person owing funds under a construction contract must retain a specified percentage to be paid at a later time.
- A chattel used to indicate to a purchaser the nature of similar goods usually to be delivered in the future; those goods must match the sample.
- Creditors who have taken steps to ensure that they will be paid, usually by acquiring first claim to some property that ensures payment over other creditors.
- Offences under provincial statutory or regulations that impose penalties but do not qualify as criminal law.
- A legislated requirement for incorporating a company in some jurisdictions in Canada; also the process of filing a form to perfect a security under the Personal Property Security Act.
- This involves the practice of placing two prices on an item and the merchant charging the higher of the two.
- Where goods are purchased on the basis of a description set out in an advertisement or on packaged materials, including all manufactured goods.
- Proceeding in which a receiver is appointed for a corporation that has defaulted on its obligations to a creditor to protect its assets for the creditors.
- A receipt for goods in the care of the shipper.
- The seller provides credit to the purchaser, holding title until the goods are paid for.
- Goods must be usable by the purchaser in the way normally intended.
- Creditors that are secured so that they have a priority with respect to their claims again the debtor.
- Designed to ensure that consumers are treated fairly in the marketplace.
- A requirement of the Sale of Goods Act imposing an obligation on the seller to ensure a certain standard of fitness and quality on the goods they sell.
- A contract term placing the responsibility for arranging and paying for the insurance and freight for goods being transported from seller to purchaser.
- Licensed professionals who, for a fee, assist the debtor and creditors in the bankruptcy process, holding and otherwise dealing with that bankrupt's property for the benefit of the creditors.
- An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving individual debtor's involving lesser indebtness the right to make a proposal to creditors, which if accepted and performed will avoid bankruptcy.
- Where a product is advertised at a low price and the purchaser is persuaded to purchase a higher priced product when the lower price one is not available.
- Where competitors biding on a product coordinate to determine the winning bid.
- Process by which an insolvent person voluntarily or involuntarily transfers assets to a trustee for distribution to creditors.
- General creditors; there is only a contract requiring a debt to be repaid, but no collateral contract giving that creditor priority with respect to some property in the event of default.
- Offences under provincial legislation or federal regulatory statutes that impose penalties but do not qualify as criminal law.
- Where two or more individuals act together to accomplish an illegal purpose.
- Under the Personal Property Security Act where value has been given pursuant to contract and the creditor now has a claim against assets used as security.
- Seller retains the right to stop the shipment in event of default.
- When an agreement has been made; but before there has been any performance.
Down
- An individual purchasing goods or services not for resale or to be used in a business.
- Where title to a chattel is transferred to a creditor as security for debt.
- Where competitors agree on a fixed price for selling their services or merchandise thus keeping prices high and defeating competition.
- Collateral right to debt giving the creditor the right to take back the goods or intercept the debt owing used as security in the event of a default.
- An obligation on the seller under the sale of Goods Act to convey ownership in the goods being sold.
- An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving corporations and debtors with significant debt the right to make a proposal to creditors, which if accepted and performed, will avoid bankruptcy.
- Court ordering the transfer of debtor's assets to a trustee as part of the bankruptcy process.
- An interest in property giving a creditor a prior claim to that property, often called a lien.
- Punishable wrongdoing associated with bankruptcy such as withholding information or wrongfully transferring assets.
- A fraudulant investment scheme where funds invested by later investors are used to pay off earlier investors, creating a false sense of success.
- A voluntary transfer of assets to a trustee in bankruptcy.
- A bankrupt is discharge but still required to pay a specified amount to creditors, as opposed to an absolute discharge where no such conditions are imposed.
- Merchants temporarily transfer to a creditor the right to collect money owed to the merchant by customers as security for a loan.
- Where the bankrupt is relieved of his debts, and his assets are no longer under the control of the trustee.
- When a person is unable to pay his or her debts as they become due.
- Registering a security or taking a possession of the collateral used to secure a debt under the Personal Property Security Act.
- Free on board: a term designating the point that title and responsibility for goods sold transfers to the purchaser.
44 Clues: A receipt for goods in the care of the shipper. • A voluntary transfer of assets to a trustee in bankruptcy. • Seller retains the right to stop the shipment in event of default. • Goods must be usable by the purchaser in the way normally intended. • When a person is unable to pay his or her debts as they become due. • ...
Types of markets 2022-01-25
Across
- securities with maturities of less than one year
- location where buyers and sellers of financial products meet to conduct business
- investment instruments representing equity or debt
- another name for equity
- A security representing a loan issued by a business or government is known
- A security representing ownership in a corporation is known as
- maturity less than one year
- is another name for debt
Down
- investors are risk ____ meaning given a choice of two investments of equal return, the investor will choose the investment with the lower risk.
- Expected __. amount of future cash flows
- maturity more than 10 years
- Ability to convert an investment to cash at its full value
- securities with maturities of greater than one year
- maturity 2-10 years
- return/ purchase price
15 Clues: maturity 2-10 years • return/ purchase price • another name for equity • is another name for debt • maturity more than 10 years • maturity less than one year • Expected __. amount of future cash flows • securities with maturities of less than one year • investment instruments representing equity or debt • securities with maturities of greater than one year • ...
Roaring Twenties Hour 5 2017-04-25
Across
- A machine with four wheels that can hold a small number of people
- Hoover Republican elected president in 1928.
- Lindbergh Who flew alone in his plane from New York to Paris in 33 ½ hours.
- Conservation Corps Put jobs in the forest and woods for young men.
- Coolidge Vice President of Massachusetts
- Ford Stands high among automobile makers.
Down
- Introduced to wireless telegraph
- A person exploring a new area
- Works Administration Sums were spent to build schools, highways, bridges, hospitals, and dams.
- Got people to be able buy new machines.
- brothers Kept in the air for one minute of a powered-machine they made
- The flying of an aircraft
- De Forest Invented a radio tube
- Security Act Been Expanded and extended after Social Security.
- Harding Was elected president in 1920.
15 Clues: The flying of an aircraft • A person exploring a new area • De Forest Invented a radio tube • Introduced to wireless telegraph • Harding Was elected president in 1920. • Got people to be able buy new machines. • Coolidge Vice President of Massachusetts • Ford Stands high among automobile makers. • Hoover Republican elected president in 1928. • ...
Ryan McGirr 2017-09-08
Across
- The electronic responsibilities and rules of being online.
- The use of electronic communication to bully
- Any message passed through digital devices.
- plagiarism When someone steals or takes information without permission.
- Effective passwords will help you keep your security.
- Someone you don’t know might be dangerous or bad.
- Keeping your information about yourself away from internet predators.
- When someone copies your image without permission.
- The security of your online information.
- Being online and active.
Down
- Using electronics to interact in social activities online and being responsible.
- A way to talk to friends and share stuff online.
- Digital search will help you find when you're looking for in the internet.
- The access you have to your stuff online.
- Using things on the internet fairly.
15 Clues: Being online and active. • Using things on the internet fairly. • The security of your online information. • The access you have to your stuff online. • Any message passed through digital devices. • The use of electronic communication to bully • A way to talk to friends and share stuff online. • Someone you don’t know might be dangerous or bad. • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assingment 2024-03-07
Across
- just behavior or treatment
- someone who writes a book
- a type of phone used by criminals
- a person accompanying another for security purposes
- a secret plan to do something unlawful
- an outfit used in order to not get recognised
- the act of getting away quickly, usually from a crime scene
Down
- a long range rifle usually equipped with a scope
- a building where criminal trials take place
- protection against and from any potential harm
- the practice of a person doing business or shoring assets overseas to avoid taxes
- an account of a person's life written as such by that person
- a killer for hire
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Comp B 2023-12-06
Across
- Main screen and user interface of a computer
- Process of encoding data for security purposes
- Input device for controlling on-screen movement
- Security measure to protect a computer from unauthorized access
Down
- Device for converting physical images into digital format
- Wireless technology for connecting devices
- Activity of playing video or computer games
- Central unit that performs calculations in a computer
- Temporary storage area for frequently accessed data
- Collection of songs organized for playback
10 Clues: Wireless technology for connecting devices • Collection of songs organized for playback • Activity of playing video or computer games • Main screen and user interface of a computer • Process of encoding data for security purposes • Input device for controlling on-screen movement • Temporary storage area for frequently accessed data • ...
