cyber security Crossword Puzzles
Panda Search 2018-04-12
15 Clues: taken • title • trade • author • to find • famous zoo • standing out • stolen panda • find an answer • law enforcement • owner of the zoo • zoo owner's rival • security guard at zoo • daughter of the zoo's owner • Main character, crime solver
46 2022-01-24
15 Clues: hate • Hexer • Bumped into • Vegan staple • Marvel villain • Yucatan native • Comedian Daniel • Music Genre (3) • Best of the bet • Kitchen Utensils • About Elton John • Ballerina's gear • "Rocks" at a bar • Waves overhead, maybe • U.N. Security Council permanent member
Levant 2024-11-19
15 Clues: Rent app • I fix it • Minimum age • Case Manager • Property name • I keep it fun • Building owner • Onsite Manager • Beautiful view • type of housing • Security System • I keep it clean • Medical Provider • style of housing • Management Company
After 9/11 what happened next 2021-05-25
Across
- How many phases did Operation Enduring Freedom have?
- Outlines the powers of the President and commander and chief.
- What was grounded after the attacks?
- Why was Iraq and Suddam Hussein a treat?
- What began on October 7th against Taliban and al Qaeda training camps in Afghanistan?
- What country offered bin Laden sanctuary?
- Who was the National Security Advisor?
- What Doctrine declared the War on Terror?
Down
- What terrorist organization was identified?
- What was Bush's first decision as wartime commander?
- Who was the leader of Al Qaeda?
- Where were war criminals held?interrogation Methods such as sleep deprivation, slapping, water boarding, and subjecting prisoners' to cold.
- Who was Security of Defense?
13 Clues: Who was Security of Defense? • Who was the leader of Al Qaeda? • What was grounded after the attacks? • Who was the National Security Advisor? • Why was Iraq and Suddam Hussein a treat? • What country offered bin Laden sanctuary? • What Doctrine declared the War on Terror? • What terrorist organization was identified? • How many phases did Operation Enduring Freedom have? • ...
US-China relations 2025-11-14
Across
- Popular video platform facing U.S. scrutiny over data security and ownership.
- a symbol of agricultural trade tensions between 2 countries
- to reduce risks in China-related supply chains
- A high-level meeting between leaders to manage tensions
- an action that is intended to cause anger
- Taxes on imports, used heavily during the U.S.–China trade war
- Chinese tech giant central in debates over 5G security and U.S. sanctions.
Down
- A major flashpoint in U.S.–China relations
- A strategy used to limit another nation’s power, influence, or expansion.
- Region that is the main focus of U.S. strategy to counter China
- A global project expanding China’s influence
- When relations worsen, they____ (verb)
- relations between 2 countries
13 Clues: relations between 2 countries • When relations worsen, they____ (verb) • A major flashpoint in U.S.–China relations • an action that is intended to cause anger • A global project expanding China’s influence • to reduce risks in China-related supply chains • A high-level meeting between leaders to manage tensions • ...
SPHE Crossword 2021-11-03
Across
- How you might feel if you were being bullied
- when you spread fake news about someone
- what you might get if you hold in things for to long
- what you tell the bully when they are bullying you
- to leave someone out
- practices to maintaining health
- what you are if you post on social media for your job
- to say you are going to do something dangerous to someone
- False or untrue
- who you tell if you are being bullied in school
Down
- what could happen if bullying escalates
- To constantly annoy or hurt someone
- talking behind somebody’s back
- treat people with .....
- best place to find fake news
- how you make people feel when you point out their flaws
- where bullying often happens the most
- What you are if you are being bullied
- the type of bullying when you use your words to hurt someone
- the type of bullying that happens online
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • what could happen if bullying escalates • when you spread fake news about someone • ...
DM literacy crossword 2021-11-03
Across
- DM’s
- people who invade devises
- black app icon
- bird
- apps and platforms where we can play games and socialise
- you send people messages using photos
- when people swap their belongings for someone else’s
- Dilemma we watched it on Netflix
- the amount of time you spend on a certain device
- all of your apps are on here
Down
- mainly older people use it
- the online server usually through google where we gather a lot of information daily
- our own information that contains our recent searches and things we’ve looked at
- the word that tells us to be careful on the internet
- how people often communicate using words
- you can watch music video, tutorials etc on this
- folders displayed on our home screens that contain different social media’and games.
- an app that we use to message people that comes from the phrase “what’s up”
- bullying when people get bullied online
- short recording often used to capture a moment
20 Clues: DM’s • bird • black app icon • people who invade devises • mainly older people use it • all of your apps are on here • Dilemma we watched it on Netflix • you send people messages using photos • bullying when people get bullied online • how people often communicate using words • short recording often used to capture a moment • you can watch music video, tutorials etc on this • ...
Doctor Who Crossword 2014-12-27
Across
- War
- Captain
- Police Box
- Vegetable
- The Tenth Planet
- Baker Sixth
- Weeping
- Billie
- Lost Home
- Loves Amy
- Peg
- Teselecta
- Twelfth
- Ten's Shoes
- Season Specials
- Doctor Number
- 11's hat
- ...Sphere
- Fifth
- Droids
- Fat
- Ten
- Third
- Eighth
- Gogh Artist
- Pond Red head
- Skaro
- Fans
- Cyber
- Lambert
- Dog
- Dalek
- Mister
- Flood
Down
- Seventh
- First
- Ten says it
- You Will Be...
- 1 & 2
- Lords Doctor's People
- Tree Of...
- Girl Clara
- Sixth's first
- You are the weakest link.
- 11's Attire
- 50th
- Baker Fourth
- Where it all began
- Ninth
- He who takes the________, takes the universe!
- Time And ____ Dimension In Space.
- Don't...
- Second
- Sto
- The Doctor's...
- Screwdriver Doctor's Toy
- Three Beginning Year
- Arch Enemy
- Come Along...
- The Celestial
- Religious Order
- Eleven
- Daughter
- Granddaughter
64 Clues: War • Peg • Sto • Fat • Ten • Dog • 50th • Fans • First • 1 & 2 • Ninth • Fifth • Third • Skaro • Cyber • Dalek • Flood • Billie • Second • Droids • Eighth • Eleven • Mister • Seventh • Captain • Weeping • Twelfth • Lambert • Don't... • 11's hat • Daughter • Vegetable • Lost Home • Loves Amy • Teselecta • ...Sphere • Police Box • Tree Of... • Girl Clara • Arch Enemy • Ten says it • Baker Sixth • 11's Attire • Ten's Shoes • Gogh Artist • Baker Fourth • Sixth's first • Doctor Number • ...
People and Property Crimes 2016-02-01
Across
- Tricking someone to in order to gain something
- Essentially blackmail
- Another word for theft
- Someone breaks in and steals stuff committed a
- Physically assaulting someone
- Trying to keep people from committing crimes is_______
- A process to better criminals
- Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
- Setting things on fire on purpose
Down
- Lying while under oath
- Threatening someone with an attack
- Secluding a criminal to a small space (form of imprisonment.
- The lady who stole money from the booster club
- Lisa shot Ron. Ron is the victim of_______
- A crime committed with the use of technology
- I have a gun and want your money
- Criminal being forced to either serve the community or pay people they have harmed
- When somebody dies by the actions of another. Has varying degrees.
- Destruction of property
- Seeking revenge on a criminal often very cruel
20 Clues: Essentially blackmail • Lying while under oath • Another word for theft • Destruction of property • Physically assaulting someone • A process to better criminals • I have a gun and want your money • Setting things on fire on purpose • Threatening someone with an attack • Lisa shot Ron. Ron is the victim of_______ • A crime committed with the use of technology • ...
Doug's Great, No Doug's Amazing Crossword 2023-09-02
Across
- Bass booster
- Super without the S
- Friend who enjoys the action-packed MMO RPG
- Buddy with a Hellenic surname
- You only live once
- Surname of a naval officer who led underwater vessels
- Canine companion of a close buddy
- Dave’s upcoming addition to his household
- Surname of a common Michael
- What Doug does to video games
- Legendary dwarf who is saluted by his comrades
- His favorite playthings have wheels and engines
Down
- Pressing this letter triggers a slogan in a mining game
- Furry animal that Jane keeps as companions
- Cyber buddy who likes to dress as an anthropomorphic animal
- Spit rhymes
- Gem-stuffed grub that is slain by spelunkers in a sci-fi game
- Popular chinese video sharing app
- ROFL’s cousin
- Online communication platform
- Video conferencing platform
- Slim Shady's alter ego
- Viral internet joke
- A dwarf class that can grapple and light up caves
- Childhood pal with an edible moniker
25 Clues: Spit rhymes • Bass booster • ROFL’s cousin • You only live once • Super without the S • Viral internet joke • Slim Shady's alter ego • Video conferencing platform • Surname of a common Michael • Buddy with a Hellenic surname • Online communication platform • What Doug does to video games • Popular chinese video sharing app • Canine companion of a close buddy • ...
Working with children and adolescents 2024-08-20
Across
- type of bullying done through the internet
- type of play counselling which is structured
- level of 2 in moral development
- Zone of ______ development
- type of abuse that could include ridiculing
- Freud's psychosexual stage
- child not wanting to open up or be in counselling
- type of trauma from hearing about others trauma
Down
- balanced parenting style
- guidance on cases from someone with more experience/training
- the ethical principle of keeping information safe
- factor that minimises someones risk
- integrative model for play therapy
- ability to overcome/bounce back
- Bronfenbrenner's systemic theory
- what do we teach children about
- liked by many but also disliked by many
- metaphor to explain anger
- ending of counselling
- ____ vs guilt
- causing physical harm to oneself
- respecting everyones right to make their own decisions
- type of sibling relationship
- when a case is out of scope
- skills we teach children to handle their feelings and problems
- factor that puts someone at risk
26 Clues: ____ vs guilt • ending of counselling • balanced parenting style • metaphor to explain anger • Zone of ______ development • Freud's psychosexual stage • when a case is out of scope • type of sibling relationship • ability to overcome/bounce back • what do we teach children about • level of 2 in moral development • Bronfenbrenner's systemic theory • causing physical harm to oneself • ...
crack the code 2024-04-30
Across
- The process of verifying the identity of a user or device (10 letters)
- - A type of attack where an attacker intercepts communication between two parties (6 letters)
- - The practice of disguising malicious files to make them appear harmless (7 letters)
- -A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- - A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
Down
- - Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- - A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
- -A set of rules or guidelines designed to enhance computer security (9 letters)
- -A program designed to prevent, detect, and remove malware (10 letters)
- - The exploitation of security vulnerabilities in a computer system or network (9 letters)
- - Protects a computer system from unauthorized access (9 letters)
- - The unauthorized copying of data from a computer system (6 letters)
12 Clues: - Protects a computer system from unauthorized access (9 letters) • - The unauthorized copying of data from a computer system (6 letters) • The process of verifying the identity of a user or device (10 letters) • -A program designed to prevent, detect, and remove malware (10 letters) • ...
Ipo rossword puzzle 2021-09-13
Across
- , Capital stock is the amount of common and preferred shares that a company is authorized to issue
- a service charge assessed by a broker or investment advisor.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- Mark Zuckerberg
Down
- Electronic Data Gathering, Analysis, and Retrieval system
- a sales pitch or promotion made by the underwriting firm, usually on the road
- a security that represents the ownership of a fraction of a corporation.
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- , A derivative is a complex type of financial security that is set between two or more parties.
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Ipo rossword puzzle 2021-09-13
Across
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
- a service charge assessed by a broker or investment advisor.
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- Mark Zuckerberg
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- A derivative is a complex type of financial security that is set between two or more parties.
Down
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a security that represents the ownership of a fraction of a corporation.
- Electronic Data Gathering, Analysis, and Retrieval system
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
border security 2020-12-10
Across
- people and dogs that make sure nothing bad gets in to new Zealand!
- the illegal movement of good in to or out of our country!
Down
- alive things that we don't want in our bushes but some are ok!
- animals that have an amazing nose to find bad and good things!
- animas that are bad for the environment and eat other animals.
- living things that grow that are not bugs or humans or animals!
- creepy things that crawl into our bags!
7 Clues: creepy things that crawl into our bags! • the illegal movement of good in to or out of our country! • alive things that we don't want in our bushes but some are ok! • animals that have an amazing nose to find bad and good things! • animas that are bad for the environment and eat other animals. • living things that grow that are not bugs or humans or animals! • ...
Security protocols 2022-01-10
Across
- What does the second S in SSL stand for?
- Security ... - a sequence of operations that ensures protection of data
- The negotiation between two parties on a network before they begin a secured connection. Starts with TLS ...
Down
- Security ... - a digital document that authenticates certain websites
- ... attack - one of the attacks against SSL
- A type of encryption
- It can be public or private
7 Clues: A type of encryption • It can be public or private • What does the second S in SSL stand for? • ... attack - one of the attacks against SSL • Security ... - a digital document that authenticates certain websites • Security ... - a sequence of operations that ensures protection of data • ...
Social Security 2024-04-23
Across
- you recieve this from Social Security
- having a physical or mental condition that limits movements, senses, or activities.
- a severe global economic downturn that affected many countries across the world.
- a situation where a person actively searches for employment but is unable to find work.
Down
- a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
- a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
- the action or fact of leaving one's job and ceasing to work.
7 Clues: you recieve this from Social Security • the action or fact of leaving one's job and ceasing to work. • a severe global economic downturn that affected many countries across the world. • having a physical or mental condition that limits movements, senses, or activities. • a situation where a person actively searches for employment but is unable to find work. • ...
Security issues 2025-01-25
Across
- A barrier protecting a network from unauthorized access (
- A duplicate copy of data for recovery purposes
- The process of converting data into a secure, unreadable format
- Software designed to detect and block harmful programs
- someone who gains unauthorized access to systems
Down
- Measures taken to protect data and systems
- Harmful software like viruses or ransomware
7 Clues: Measures taken to protect data and systems • Harmful software like viruses or ransomware • A duplicate copy of data for recovery purposes • someone who gains unauthorized access to systems • Software designed to detect and block harmful programs • A barrier protecting a network from unauthorized access ( • ...
Food Security 2025-01-14
Across
- Singapore relies heavily on _______, with 90% of its food resource coming from more than 170 countries.
- Lack of proper nutrition.
Down
- Beyond farming, food processing, storage, and distribution sectors also generate __________.
- Region that has the most hungry people.
- The community grows a wide variety of edible plant species to promote food __________.
- Country that is facing food insecurity mentioned in the slides.
- _______ farming is embraced by Singapore as a solution to limited land availability.
7 Clues: Lack of proper nutrition. • Region that has the most hungry people. • Country that is facing food insecurity mentioned in the slides. • _______ farming is embraced by Singapore as a solution to limited land availability. • The community grows a wide variety of edible plant species to promote food __________. • ...
Crossword - Voltedge 2019-09-05
Across
- TCT Application access provisioning is done by?
- Which Predix service is used to store documents in CDA product?
- Security model used by most of the ERP applications
- Re-tag in TCT can be done by?
- Source data ($) for deriving $ Thresholds?
Down
- Regression technique used in Improper Payments model
- Tool currently used for onboarding
- System that makes automated calls from security
- Deep learning architecture used in CDA application
- Greek letter that denotes mean of a statistical distribution
10 Clues: Re-tag in TCT can be done by? • Tool currently used for onboarding • Source data ($) for deriving $ Thresholds? • System that makes automated calls from security • TCT Application access provisioning is done by? • Deep learning architecture used in CDA application • Security model used by most of the ERP applications • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
RU ITEC411 Crime and Security 2021-12-01
Across
- A verbal form of defamation
- One of the three principles of the CIA triad
- One of the three principles of the CIA triad
- A group of computers infected with malware controlled by a host
- One of the three principles of the CIA triad
- Software that can replicate itself and does not need to be activated
- Hacking for political motivation
- A way of protecting data through scrambling text
- A written form of defamation
Down
- directing people to fake websites to collect personal data
- Software that can replicate itself but needs to be activated
- Physical characteristics used to secure data
- The act of protecting computer systems
- Malicious code that looks to be harmless
- Gaining access to a computer or system without permission
- Act of sending emails in order to gain someone's personal information
- A type a malware that records activities on a computer
- Recording devices that are installed in card readers
- A method used to get around normal security measures
- A type of malware that locks a computer until money is paid
20 Clues: A verbal form of defamation • A written form of defamation • Hacking for political motivation • The act of protecting computer systems • Malicious code that looks to be harmless • Physical characteristics used to secure data • One of the three principles of the CIA triad • One of the three principles of the CIA triad • One of the three principles of the CIA triad • ...
A+ 2025-02-11
Across
- A type of software designed to steal personal data.
- A Microsoft cloud storage service.
- A protocol used for remote desktop access.
- A method used to prevent unauthorized access by requiring two credentials.
- Background processes.
- A Windows recovery option for rolling back changes.
- A type of social engineering where an attacker impersonates someone trusted.
- A feature that allows users to run older programs on new Windows versions.
Down
- A Windows security tool that helps prevent malware infections.
- A virtualization platform for running multiple OS.
- A type of virus that hides within legitimate software.
- A type of cyberattack that floods a system with traffic.
- A type of attack that intercepts and alters communication.
- A method of verifying system integrity using cryptography.
- A Windows feature that encrypts individual files and folders.
- A security policy that enforces password changes.
- A type of malware that locks users out of their system.
- A command used to trace network routes.
18 Clues: Background processes. • A Microsoft cloud storage service. • A command used to trace network routes. • A protocol used for remote desktop access. • A security policy that enforces password changes. • A virtualization platform for running multiple OS. • A type of software designed to steal personal data. • A Windows recovery option for rolling back changes. • ...
Internet 2024-12-04
Across
- a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
- Everything having to do with the Internet
- To transfer files or data stored on the internet
- Electronic mail
Down
- a device that directs data traffic between your local network and the Internet.
- The computer software or app you use to access the internet
- a wireless networking technology
- A number that is used to identify networks within the routing system
8 Clues: Electronic mail • a wireless networking technology • Everything having to do with the Internet • To transfer files or data stored on the internet • The computer software or app you use to access the internet • A number that is used to identify networks within the routing system • a device that directs data traffic between your local network and the Internet. • ...
KUKODI NYUMBA 2022-09-26
CMSC 125: Operating Systems LE04 pt 1 2017-05-17
Across
- Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
- Pretending to be an authorized user to escalate privileges.
- Bypasses CPU to transfer data directly between I/O device and memory.
- The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- Same key used to encrypt and decrypt.
- A destructive program that masquerades as a benign application.
- Results from disk head making contact with the disk surface.
- the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
- Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- Provides an object oriented way of implementing file systems.
- Storage structure consisting of information about a file.
- Program that initates a security incident under certain circumstances.
- The art of hiding messages by converting them into hidden texts.
- A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- The study of codes, or the art of writing and solving them.
- Intercepting an already established session to bypass authentication.
- Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- Is a storage made available over a network rather than over a local connection.
19 Clues: Same key used to encrypt and decrypt. • Storage structure consisting of information about a file. • Pretending to be an authorized user to escalate privileges. • The study of codes, or the art of writing and solving them. • Results from disk head making contact with the disk surface. • Provides an object oriented way of implementing file systems. • ...
fanf 2022-02-09
FCC 2025-03-24
RDC Shows 2020-03-27
Across
- Shakespeare play which includes 3 witches
- RDC Musical Theatre Workshops 2020 production
- RDC's theatre festival in 2014
- Tale of a woman who loses her glass slipper
- Cyber Bully in rock musical Out Of My Comfort Zone
- The West End Tenors who performed at RDC in 2019
- Poem written by Lewis Carroll (Hunting of The ---)
- one-man comedy show mixing martial arts & cards(Card--)
- RDC Young Theatre Workshop's 2019 production
- regular comedy show for parents (Bring Your Own ---)
- Magical nanny in a book written by P.L. Travers(Mary--)
Down
- Regular night which showcases new work and new writing
- Kai's best friend in The Snow Queen
- Story of The Nutbrown Hares (Guess How Much I --- You)
- Complete the title - Boyface and the ---- ponies
- RYTW's 2016 Show, Performed at the National Theatre
- RDC and RMS collaboration performed at Hawkey Hall
- RDC's 2018 Christmas production (--- Christmas Dream)
- Julia Donaldson book - The Scarecrow's ---
- Crazy Chef who visited RDC last year (Signor ---)
20 Clues: RDC's theatre festival in 2014 • Kai's best friend in The Snow Queen • Shakespeare play which includes 3 witches • Julia Donaldson book - The Scarecrow's --- • Tale of a woman who loses her glass slipper • RDC Young Theatre Workshop's 2019 production • RDC Musical Theatre Workshops 2020 production • Complete the title - Boyface and the ---- ponies • ...
Vy´s second crossword 2020-05-11
Across
- to see someone in real life
- to write on paper and send it to your friends
- if someone is hurt or is missing
- if you are really bad
- if someone is bullying you on the internet
- if you are a drama queen
- a very beautiful place that you will never forget
- if you are like a mom
- 13-18 years old
- to do a phone number away if you hate them
Down
- to write a message to someone
- to send a teacher a message if you don´t have their phone number
- to answer on a text message
- the opposite of not understanding
- to look after your siblings or if someone is important to you
- the opposite of receive
- if you meet someone new you want to be friends with them then you have to ask them something
- the opposite of write
- If you want everyone to look at you all the time
- to have a job
20 Clues: to have a job • 13-18 years old • if you are really bad • the opposite of write • if you are like a mom • the opposite of receive • if you are a drama queen • to see someone in real life • to answer on a text message • to write a message to someone • if someone is hurt or is missing • the opposite of not understanding • if someone is bullying you on the internet • ...
Mortal Kombat 2021-08-31
Across
- Not Goro
- Servant of Chi
- Riots
- Moroi
- Bow
- Blind
- Wind
- Cleric
- Bodyguard
- Chill
- Come here!
- Alliance
- Monk
- Skinned
- Demon slaying demon
- No loyalty
- Scales
- Shokan Prince
- Villain
- Kai
- Fire
- Chop chop
- Red Dragon
- Speed
- Ketchup
- Ruler
- Brotherhood
- Mustard
- Hero
- Princess
- Sun
- Black Dragoness
- Drunken Master
- Queen
- Duo
- Cyber
- Champion
- Rainbow
Down
- Kiss
- Shake
- Deceived
- Fusion
- Brutality
- Grin
- Pretty
- Stripes
- Blood
- Grey Cloud
- Special Forces
- Elder Goddess
- Incect
- Oni
- Cold
- Motion
- Titan
- Cowboy
- Order
- Kenshi Jr.
- Club
- Sand
- Vanity
- Souls
- King
- Not Kano
- Clip clop
- Arms
- Hated
- Guide
- Fame
- Shadow
- Six
- Jade Enemy
- Not Liu Kang
- Rainbow
- Dreamer
- Mercenary
- Water
- Armageddon
78 Clues: Bow • Oni • Kai • Six • Sun • Duo • Kiss • Grin • Wind • Cold • Monk • Club • Sand • Fire • King • Arms • Fame • Hero • Shake • Riots • Moroi • Blind • Blood • Chill • Titan • Order • Souls • Speed • Ruler • Hated • Guide • Queen • Water • Cyber • Fusion • Pretty • Cleric • Incect • Motion • Cowboy • Scales • Vanity • Shadow • Stripes • Skinned • Villain • Ketchup • Mustard • Rainbow • Dreamer • Rainbow • Not Goro • Deceived • Alliance • Not Kano • Princess • Champion • Brutality • Bodyguard • Chop chop • Clip clop • Mercenary • ...
SPHE Crossword 2021-11-03
Across
- How you might feel if you were being bullied
- when you spread fake news about someone
- what you might get if you hold in things for to long
- what you tell the bully when they are bullying you
- to leave someone out
- practices to maintaining health
- what you are if you post on social media for your job
- to say you are going to do something dangerous to someone
- False or untrue
- who you tell if you are being bullied in school
Down
- what could happen if bullying escalates
- To constantly annoy or hurt someone
- talking behind somebody’s back
- treat people with .....
- best place to find fake news
- how you make people feel when you point out their flaws
- where bullying often happens the most
- What you are if you are being bullied
- the type of bullying when you use your words to hurt someone
- the type of bullying that happens online
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • what could happen if bullying escalates • when you spread fake news about someone • ...
SPHE Crossword 2021-11-03
Across
- to say you are going to do something dangerous to someone
- What you are if you are being bullied
- what could happen if bullying escalates
- what you tell the bully when they are bullying you
- what you might get if you hold in things for to long
- best place to find fake news
- what you are if you post on social media for your job
- treat people with .....
- who you tell if you are being bullied in school
Down
- to leave someone out
- when you spread fake news about someone
- To constantly annoy or hurt someone
- How you might feel if you were being bullied
- the type of bullying when you use your words to hurt someone
- talking behind somebody’s back
- practices to maintaining health
- where bullying often happens the most
- the type of bullying that happens online
- how you make people feel when you point out their flaws
- False or untrue
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • What you are if you are being bullied • where bullying often happens the most • when you spread fake news about someone • what could happen if bullying escalates • ...
Halloween 2017-11-04
Across
- / The Last...
- / He's been stuck in the matrix
- / versus Predator
- / Nocturnal creatures
- / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
- Intelligence / Many believe this will take over the world
- / a common Sci-fi name for the Reanimated
- Edward Hyde / The good side of Dr Jekyll and Mr Hyde
- / The Famous and 'Shocking' Experiment
- / to do with Rebirth in Norse mythology
- / Where the Count lives
Down
- / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
- / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
- / Asimov of science fiction
- / The man who could eat anything
- / The Large Hadron Collider is situated in...
- / Famous Prison Experiment
- / When an aptitude test goes awry, Beatrice discovers she has a special quality.
- / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
- Ray / Nikola Tesla's famous...
20 Clues: / The Last... • / versus Predator • / Nocturnal creatures • / Where the Count lives • / Famous Prison Experiment • / Asimov of science fiction • / He's been stuck in the matrix • Ray / Nikola Tesla's famous... • / The man who could eat anything • / The Famous and 'Shocking' Experiment • / to do with Rebirth in Norse mythology • ...
The Ultimate EMC Crossword 2013-07-02
Across
- VCE partner
- scale-out storage
- Harddrive storing
- Chairman Tucci's Nickname
- NOVA, NOVAii, AViiON ...
- Your own cloud infrastructure
- analyzes big data
- VMware has 91% less Operational cost than this vendor
- EMC Headquarter State
- EMC's competition to Puredisk
- Avamars Encryption
- Management console
- Recommended storage for individual departments
- the remote control for storage
- The "P" in Paas
- The cloud from were cyber criminals act
- Fastest drives
Down
- A visible mass of liquid or frozen water
- Cloud Company owned by EMC and VMware
- remove identical data when merging two databases
- this bio-science project use ISILON IQ
- IHI wants to protect the worlds ... heritage
- Chad's (Chad's World) Twitter account
- VFCashes secret project name
- Isilon's Operating System
- Mass*speed of light ^2 =
- RSA Hacker-prevention
- The baby of Moshe Yanai
- Location of EMC's 15.000sq feet E-lab
- Engineer Mode Password
- Datacenter desktops
- Fully Automated Storage Tiering
32 Clues: VCE partner • Fastest drives • The "P" in Paas • scale-out storage • Harddrive storing • analyzes big data • Avamars Encryption • Management console • Datacenter desktops • EMC Headquarter State • RSA Hacker-prevention • Engineer Mode Password • The baby of Moshe Yanai • NOVA, NOVAii, AViiON ... • Mass*speed of light ^2 = • Chairman Tucci's Nickname • Isilon's Operating System • ...
charlotte's computer apps review 2022-05-02
Across
- Protects your computer from cyber attacks
- Where all of your stuff is stored.
- An app that you use functions in.
- The page at the very end of something to show where you got your information
- What app do you make a poster or card on?
- Teacher.
- What app do you use to communicate with teachers or other students during school time?
- Mean people that try to steal your information online
- An app used to make your works cited page.
- Copying other people's words is known as _____
Down
- This class.
- An app that makes it easy to present your ideas.
- Something that is really bad in Ms. Burghorns class
- You can make videos or podcasts on _____.
- Something supplied by the school so we can do all of this.
- An app used to make a survey.
- What is the default size margin?
- Format for English essays
- Quick access to websites or apps.
- What app can you write essays and papers in.
20 Clues: Teacher. • This class. • Format for English essays • An app used to make a survey. • What is the default size margin? • An app that you use functions in. • Quick access to websites or apps. • Where all of your stuff is stored. • Protects your computer from cyber attacks • You can make videos or podcasts on _____. • What app do you make a poster or card on? • ...
BAB 4 NKRI 2025-04-22
Across
- Contoh agresi dan nonagresi
- Loyalitas ganda
- Mendasari kehidupan berbangsa dan bernegara di Indonesia dilandasi oleh falsafah Pancasila.
- Usaha yang berasal dari luar, yang bersifat atau bertujuan melemahkan dan menghalangi
- Contoh ideologi, politik, ekonomi, dan sosial budaya
- Ancaman yang sering terjadi dan dihadapi setiap saat
- Contoh konvensional, asimetris, teroris, dan cyber warfare
- Mendasarkan diri pada kekuasaan.
- Ancaman terhadap ketahanan nasional yang berasal dari luar negri
Down
- Penggunaan kekuatan bersenjata oleh negara lain terhadap kedaulatan negara
- Sisi penting dari globalisasi
- Bersifat kebangsaan
- Hal atau objek yang perlu ditanggulangi
- Aktivitas pengumpulan informasi dan data yang dilakukan oleh suatu negara terhadap negara lain
- Ancaman terhadap ketahanan nasional yang berasal dari dalam negri
- Menciptakan kesepakatan bersama mengenai norma dan nilai nilai soaial
- Indonesia memiliki jumlah penduduk yang besar, tetapi penyebaran penduduknya tidak merata.
- Pembaruan hingga menjadi kesatuan yang utuh atau bulat
- (2 kata) Globalisasi berdampak pada kehidupan sosial budaya dari..
- Ancaman, tantangan, hambatan, dan gangguan
20 Clues: Loyalitas ganda • Bersifat kebangsaan • Contoh agresi dan nonagresi • Sisi penting dari globalisasi • Mendasarkan diri pada kekuasaan. • Hal atau objek yang perlu ditanggulangi • Ancaman, tantangan, hambatan, dan gangguan • Contoh ideologi, politik, ekonomi, dan sosial budaya • Ancaman yang sering terjadi dan dihadapi setiap saat • ...
ANALISIS DATA, ALGORITMA DAN PEMOGRAMAN, LITERASI DIGITAL (Maria Rachquel Aziziyah l 13 l VIII H) 2025-06-09
Across
- mendapatkan data tentang sesuatu
- merupakan ciri ciri opini kecuali
- proses memberi instruksi komputer untuk tugas tertentu
- kondisi benar dalam fungsi logika
- ciri ciri opini
- berpikir sebelum bertindak
- scratch dikembangkan oleh
- pesan teks isinya amarah atau frontal
- merupakan ciri ciri fakta kecuali
- alur logika dijalankan secara berurutan
- kesalahan tanpa niat buruk
Down
- fungsi Ms.excel digunakan untuk membaca tabel horizontal
- melakukan operasi matematika nilai atau membandingkan
- membujuk seseorang dengan tipe daya
- cara mengelola dan mengatur tampilan visual
- merupakan contoh pemrograman visual
- perundungan digital
- kata lain percabangan
- kondisi salah dalam logika
- pernyataan yang dapat dibuktikan kebenarannya
- Microsoft Exel disebut dengan nama aplikasi
- memahami perasaan orang lain
- mengontrol pergerakan spite
- hasil dari proses yang dilakukan terhadap data input
- yang bukan tipe data variabel
- alat untuk membuat tabel dan grafik
- informasi yang benar atau akurat
- ciri ciri fakta
- menyaring informasi palsu
- yang tidak merupakan ciri ciri cyber bullying
30 Clues: ciri ciri opini • ciri ciri fakta • perundungan digital • kata lain percabangan • scratch dikembangkan oleh • menyaring informasi palsu • kondisi salah dalam logika • berpikir sebelum bertindak • kesalahan tanpa niat buruk • mengontrol pergerakan spite • memahami perasaan orang lain • yang bukan tipe data variabel • mendapatkan data tentang sesuatu • informasi yang benar atau akurat • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-09
Across
- mendapatkan data tentang sesuatu
- merupakan ciri ciri opini kecuali
- proses memberi instruksi komputer untuk tugas tertentu
- kondisi benar dalam fungsi logika
- ciri ciri opini
- berpikir sebelum bertindak
- scratch dikembangkan oleh
- pesan teks isinya amarah atau frontal
- merupakan ciri ciri fakta kecuali
- alur logika dijalankan secara berurutan
- kesalahan tanpa niat buruk
Down
- fungsi Ms.excel digunakan untuk membaca tabel horizontal
- melakukan operasi matematika nilai atau membandingkan
- membujuk seseorang dengan tipe daya
- cara mengelola dan mengatur tampilan visual
- merupakan contoh pemrograman visual
- perundungan digital
- kata lain percabangan
- kondisi salah dalam logika
- pernyataan yang dapat dibuktikan kebenarannya
- Microsoft Exel disebut dengan nama aplikasi
- memahami perasaan orang lain
- mengontrol pergerakan spite
- hasil dari proses yang dilakukan terhadap data input
- yang bukan tipe data variabel
- alat untuk membuat tabel dan grafik
- informasi yang benar atau akurat
- ciri ciri fakta
- menyaring informasi palsu
- yang tidak merupakan ciri ciri cyber bullying
30 Clues: ciri ciri opini • ciri ciri fakta • perundungan digital • kata lain percabangan • scratch dikembangkan oleh • menyaring informasi palsu • kondisi salah dalam logika • berpikir sebelum bertindak • kesalahan tanpa niat buruk • mengontrol pergerakan spite • memahami perasaan orang lain • yang bukan tipe data variabel • mendapatkan data tentang sesuatu • informasi yang benar atau akurat • ...
Nguyễn Vân Khôi - Trần Thị Ngọc Châu 2023-02-16
5 Clues: like a computer but flat • relating to the Internet • who has an interesting technology • owned by the richest man in the world. • electronic machine that can do everything you want
Technology 2023-02-16
5 Clues: like a computer but flat • relating to the Internet • who has an interesting technology • owned by the richest man in the world. • electronic machine that can do everything you want
agriculture crossword 2024-10-23
Pekarjaan-Chareef 2025-05-16
Airport 2024-04-05
Leadership 2024-12-19
Across
- A sophomore that is on the basketball team.
- A freshman with a great speaking voice.
- A senior that has a lot of family in Faridale.
- A sophomore whose Crew teacher is Ms. Jaggers.
- A junior who has a double letter in their first and last names.
- A sophomore who is on the wrestling team.
- A senior who is also a peer tutor.
- A sophomore that is bilingual.
- A sophomore in the teaching and learning program.
Down
- A senior who could've been a student aide instead of in this class.
- A sophomore in the cyber pathway.
- A sophomore that is also a student ambassador.
- A senior who is also on the yearbook staff.
- A a freshman that uses fun graphics in their presentations.
- A senior that is soft-spoken.
- A a freshman with a sister that is a senior.
- A junior that has to have Ms. Adams twice a day.
17 Clues: A senior that is soft-spoken. • A sophomore that is bilingual. • A sophomore in the cyber pathway. • A senior who is also a peer tutor. • A freshman with a great speaking voice. • A sophomore who is on the wrestling team. • A sophomore that is on the basketball team. • A senior who is also on the yearbook staff. • A a freshman with a sister that is a senior. • ...
MONDAY 7th OCTOBER 2019-10-04
12 Clues: GÉRER • AVOCAT • SECURITY • CORRIGER • COMPTABLE • S'INSCIRE • NOT MARRIED • NOT LONG AGO • NOUVEAUX ARRIVÉS • ORDINATEUR PORTABLE • MONEY YOU MUST PAY BACK • WOMAN WHOSE HUSBAND IS DEAD
The Financial Vault Quiz - based on emails send on Financial Terms 2018-02-26
Across
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- A minimum of ___ persons are required to create an omnibus account
- The _____ the volatility, the riskier the security.
Down
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- One measure of the relative volatility of a particular stock to the market is its
- The sale of a security that is not owned by the seller or that the seller has borrowed
- Employee’s Provident Fund is maintained and overseen by the ___
- An omnibus account is normally overseen by a ____ manager
- Account Is an account between two futures merchants (brokers)
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
Issue #007 2022-09-16
11 Clues: envious • traitor • sharp blades • deadly drink • secrets, hiding • tuilg (anagram) • royalty, leader • criminal, wrong • athed (anagram) • safe, protection • incorrect, untrue
CLOUD DEPLOYMENT 2025-03-07
11 Clues: Storage • Strategy • Analysis • Technology • Management • Engagement • and Security • and Management Tools • and Disaster Recovery • of Current Infrastructure • Redundancy and Replication
The Making of a Provisional 2015-02-17
Across
- - capital of Northern Ireland
- - Irish Republican Army
- - men who parades through streets of Belfast
- - what the security force did to the shoes of the son
Down
- - to live separately
- - what the security force did to Frankie and Patricia's family
- - column in the paper when someone has died
- - Frankie Ryan's accent
8 Clues: - to live separately • - Irish Republican Army • - Frankie Ryan's accent • - capital of Northern Ireland • - column in the paper when someone has died • - men who parades through streets of Belfast • - what the security force did to the shoes of the son • - what the security force did to Frankie and Patricia's family
Bonds 2024-02-08
Across
- exersising before the maturity date
- Pooling assets to make a financial security
- Security bound by morgages or other assets
- matures in less than 1 year
- State bonds
Down
- Risk is higher,so yeild is greater from a company
- federal governments ability to back money
- group of loans with similar charecteristics
8 Clues: State bonds • matures in less than 1 year • exersising before the maturity date • federal governments ability to back money • Security bound by morgages or other assets • Pooling assets to make a financial security • group of loans with similar charecteristics • Risk is higher,so yeild is greater from a company
NATIONAL SECURITY 2023-03-05
Across
- refers to the set of standards or conditions that must be met for a country to be considered economically secure.
- refers to the measures taken by a country to protect its economy and ensure its stability.
- refers to the interdependent network of living and non-living elements in a particular environment.
- refers to the systematic observation and analysis of the social and economic factors that affect a country's security.INTERNATIONAL refers to the measures taken by countries to ensure their economic stability and protect themselves from external economic threats.
- INDICATOR THRESHOLD refers to the minimum level of a security indicator that must be met to ensure the security of a country or its citizens.
Down
- refers to the ability of a country to maintain its economic stability and protect its citizens from economic risks.
- THREAT refers to any potential danger or risk to the security of a country or its citizens.
- refers to the protection of a nation's citizens, borders, and infrastructure from internal and external threats.
- INDICATOR refers to a measurable factor that is used to assess the level of security in a particular area.
9 Clues: refers to the measures taken by a country to protect its economy and ensure its stability. • THREAT refers to any potential danger or risk to the security of a country or its citizens. • refers to the interdependent network of living and non-living elements in a particular environment. • ...
Digital security 2023-04-01
Across
- A live, online seminar or presentation conducted over the internet
- A written or printed communication that is sent or received electronically via a phone or computer.
- A social networking website that allows users to connect with friends and family and share information.
Down
- A software application that allows users to make voice and video calls and chat over the internet.
- A digital audio file made available on the internet for downloading or streaming.
- An online conversation between two or more people in real-time.
- A message distributed by electronic means from one computer user to one or more recipients via a network.
7 Clues: An online conversation between two or more people in real-time. • A live, online seminar or presentation conducted over the internet • A digital audio file made available on the internet for downloading or streaming. • A software application that allows users to make voice and video calls and chat over the internet. • ...
tss security 2021-10-27
7 Clues: spy club • finds people • laeding officer • print, ink pad and file • wears ppe and carrys boxes • makes decisions, buys stuff • looks for clues and finds awnsers
Information Security 2023-10-23
Across
- A program that appears legitimate but actually contains malicious code
- The process of identifying and fixing security vulnerabilities.
- A malicious software that encrypts data and demands a ransom
- A technique for verifying the identity of users or devices
Down
- The act of browsing the internet without revealing your identity.
- Unauthorized access to computer systems or data
- A unique combination of characters used to access a system
7 Clues: Unauthorized access to computer systems or data • A unique combination of characters used to access a system • A technique for verifying the identity of users or devices • A malicious software that encrypts data and demands a ransom • The process of identifying and fixing security vulnerabilities. • ...
Food Security 2024-11-28
7 Clues: Opposite of hungry. • Growing plants to eat • A place where food is sold. • Sharing food helps stop this. • We need this to live and grow • Food that helps us grow strong • Something we drink to stay healthy
Computer security 2022-09-07
Logistics Crossword 2021-11-18
Across
- -Most used app on the internet
- -Temporary group made to do a specific task
- -The logistics cycle is driven by the ________
- -Where products are temporarily stored while being given out to transportation units or elsewhere
- -Mines, farms, etc that provide base materials from a natural source
- -First major global security initiative
- -Where products are stored for long periods of time
- -Expected volume of goods expected to go through particular workplace
Down
- -Dangerous substance that holds risk to workers or the environment
- -Most secure dock
- -Most common dock
- somewhat permanent group of people who come together to get jobs done
- -Massive amount of money designated to help companies get rid of waste
- -the process and paers of the process of getting a product from a raw material provider to a customer
- -Global connection of computers and other technology
- -Security agreement between USA, Canada, and Mexico
16 Clues: -Most secure dock • -Most common dock • -Most used app on the internet • -First major global security initiative • -Temporary group made to do a specific task • -The logistics cycle is driven by the ________ • -Security agreement between USA, Canada, and Mexico • -Where products are stored for long periods of time • -Global connection of computers and other technology • ...
Cybersecurity Awareness Month - Week 3 2022-10-05
Across
- Cirrus' tool for endpoint security
- A memorized secret consisting of a sequence of random words that is longer than a typical password
- Cirrus' email security platform
- A password attack that uses trial-and-error by attempting every possible combination
- Malware that disables access to data until a fee is paid
- A type of virus that automatically spreads itself
Down
- software designed to detect and destroy viruses
- A network of devices infected and controlled by the same virus
- A physical device that connects to a network
- A social engineering attack delivered by SMS text message
- A phishing attack aimed at senior executives
- The process of encoding data using complex algorithms for confidentiality
- An attack that prompts an MFA approval request over and over
- Malware that is disguised as legitimate software
- A social engineering technique where an attacker creates a fake scenario
- A type of trojan spyware that records your keystrokes
16 Clues: Cirrus' email security platform • Cirrus' tool for endpoint security • A physical device that connects to a network • A phishing attack aimed at senior executives • software designed to detect and destroy viruses • Malware that is disguised as legitimate software • A type of virus that automatically spreads itself • A type of trojan spyware that records your keystrokes • ...
Recap - Day 1 2023-11-28
Across
- WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
- A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOUDO IN THIS CASE?“
- THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING -
- SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
- A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
- A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
- MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
- THIS IS A TYPE OF TRAVEL DOCUMENT
- A...LIKES TO LEARN FROM DEMONSTRATIONS
Down
- A TYPE OF LIGHT TO EXAMINE ADOCUMENT SECURITY FEATURE USING MIDAS
- BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
- A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
- WHAT DOES THE D IN MIDAS STAND FOR?
- AN...HAS ACCESS TO THE WHOLE SYSTEM
- IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
- WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?
16 Clues: THIS IS A TYPE OF TRAVEL DOCUMENT • WHAT DOES THE D IN MIDAS STAND FOR? • AN...HAS ACCESS TO THE WHOLE SYSTEM • A...LIKES TO LEARN FROM DEMONSTRATIONS • MACHINE READABLE TRAVEL DOCUMENTS HAVE A... • WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH • SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS • IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS • ...
American Express Travelers Cheque 2021-11-22
Across
- _____ Express uses the Cheques
- Can you have counterfeit Cheques
- What is one security feature
- How do you verify
Down
- What do you have to do for the signatures
- How many security features do they have
- Where can you find the phone number to call
- What code do you need on the Cheque
- Is the process where you validate both the presenter and the cheque
9 Clues: How do you verify • What is one security feature • _____ Express uses the Cheques • Can you have counterfeit Cheques • What code do you need on the Cheque • How many security features do they have • What do you have to do for the signatures • Where can you find the phone number to call • Is the process where you validate both the presenter and the cheque
Food insecurity 2023-12-06
Across
- what is low food security?
- what causes food insecurity?
- What is another solution for food insecurity?
- can extra help with grades for food insecure kids help?
- food what is high food security?
Down
- what food insecurity solution has tapp middle school tried?
- how many people are helped by food drives every year?
- Why dont people like to do food drives often?
- How can food insecurity affect kids learning?
- If more people helped could food insecurity be reduced?
10 Clues: what is low food security? • what causes food insecurity? • food what is high food security? • Why dont people like to do food drives often? • How can food insecurity affect kids learning? • What is another solution for food insecurity? • how many people are helped by food drives every year? • If more people helped could food insecurity be reduced? • ...
Guest Services 2025-07-10
Across
- Who do you call when people are acting inappropriately
- This person gets notified when we are almost out of stickers
- ______ license gets placed in the scanner
- People on this list need Security approval prior to entering
Down
- ________ Service is our priority.
- Program for people needing food
- _____Briggs
- Government issued book that lets a person travel to other countries.
- May be used when person has no government ID
9 Clues: _____Briggs • Program for people needing food • ________ Service is our priority. • ______ license gets placed in the scanner • May be used when person has no government ID • Who do you call when people are acting inappropriately • This person gets notified when we are almost out of stickers • People on this list need Security approval prior to entering • ...
Nates Crossword 2023-08-22
5 Clues: - uneversial serial bus • - a secret word or phrase • drive- a high capacity storage device • bulling- bulling someone through a computer • person who uses computers to gain access to data
IT Security Week 7 2021-08-16
Across
- the process of deploying an application to the target environment
- is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
- a corporate directive that specifies how employees should leave their working space when they leave the office.
- the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
- the policies of persistent data and records management for meeting legal and business data archival requirements.
- there are no restrictions on viewing the document.
Down
- the software vendor may suspend all licenses if the customer is found to be non-compliant
- unlicensed software exposes an organization to large fines and
- looking for treasure in someone else's trash
- is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
- an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
- memory allocated to application
- the process where fibers are separated and treated to produce pulp.
- the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
- to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness
15 Clues: memory allocated to application • looking for treasure in someone else's trash • there are no restrictions on viewing the document. • unlicensed software exposes an organization to large fines and • the process of deploying an application to the target environment • the process where fibers are separated and treated to produce pulp. • ...
Code 2016-02-08
Across
- bully Bullies that are online
- A place where power or information leaves a system
- The use of parallel in computers
- to identify or remove errors from the computer
- A block to a puzzle for games or programs
- A folder that items
- A logic gate is an elementary building block on a digital circuit
- Get mail from the computer, phone, tablet, and computers
- When you add something onto your computer
Down
- A conditional clause or conjunction
- A virus on the computer
- When something repeats it self
- A part of a puzzle for coding
- citizenship Behaviors online
- A site that you visit or when you install a game on a software
- A programming language is formal constructed language that is programmed in the computer
- A system
- When you are working on a website and it needs to be ___
- block A block that repeats how many times in coding
- When something bad gets into your computer
20 Clues: A system • A folder that items • A virus on the computer • citizenship Behaviors online • bully Bullies that are online • A part of a puzzle for coding • When something repeats it self • The use of parallel in computers • A conditional clause or conjunction • A block to a puzzle for games or programs • When you add something onto your computer • ...
People and Property Crimes 2016-02-01
Across
- Lying while under oath
- Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
- Trying to keep people from committing crimes is_______
- Another word for theft
- Setting things on fire on purpose
- Lisa shot Ron. Ron is the victim of_______
- A process to better criminals
- Essentially blackmail
- Criminal being forced to either serve the community or pay people they have harmed
- A crime committed with the use of technology
Down
- Someone breaks in and steals stuff committed a
- When somebody dies by the actions of another. Has varying degrees.
- The lady who stole money from the booster club
- Secluding a criminal to a small space (form of imprisonment.
- Threatening someone with an attack
- Tricking someone to in order to gain something
- Destruction of property
- Seeking revenge on a criminal often very cruel
- Physically assaulting someone
- I have a gun and want your money
20 Clues: Essentially blackmail • Lying while under oath • Another word for theft • Destruction of property • A process to better criminals • Physically assaulting someone • I have a gun and want your money • Setting things on fire on purpose • Threatening someone with an attack • Lisa shot Ron. Ron is the victim of_______ • A crime committed with the use of technology • ...
Halloween 2017-11-04
Across
- / The Famous and 'Shocking' Experiment
- / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
- / Where the Count lives
- / versus Predator
- Edward Hyde / The good side of Dr Jekyll and Mr Hyde
- Intelligence / Many believe this will take over the world
- / He's been stuck in the matrix
- Ray / Nikola Tesla's famous...
- / Nocturnal creatures
- / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
Down
- / a common Sci-fi name for the Reanimated
- / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
- / The Large Hadron Collider is situated in...
- / Asimov of science fiction
- / to do with Rebirth in Norse mythology
- / When an aptitude test goes awry, Beatrice discovers she has a special quality.
- / The Last...
- / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
- / Famous Prison Experiment
- / The man who could eat anything
20 Clues: / The Last... • / versus Predator • / Nocturnal creatures • / Where the Count lives • / Famous Prison Experiment • / Asimov of science fiction • / He's been stuck in the matrix • Ray / Nikola Tesla's famous... • / The man who could eat anything • / The Famous and 'Shocking' Experiment • / to do with Rebirth in Norse mythology • ...
Ready Player One (First 6 Chapters) 2015-04-20
Across
- Wade's aunt
- The username Wade uses
- The clues that Halliday left behind for the easter egg are in this
- Your customizable character in OASIS
- The right for your personal information to remain unknown when using The OASIS
- The group of people who work for IOI that search for Halliday's easter egg
- A large internet service provider, largely used to search for Halliday's easter egg
- Where Wade goes to escape his Aunt and others
- The form of mobile homes that Wade and his Aunt live in
- The main character
- People who search for Halliday's easter egg
Down
- What is used to run OASIS
- The virtual reality program
- Halliday and Morrows game company
- Wade's aunt pawned this to get more money
- Wade's cyber crush
- Halliday left this behind and anyone who finds it gains control of The OASIS
- Wade's best friend
- What is used to see into the virtual reality
- Wade's home planet in OASIS
20 Clues: Wade's aunt • Wade's cyber crush • Wade's best friend • The main character • The username Wade uses • What is used to run OASIS • The virtual reality program • Wade's home planet in OASIS • Halliday and Morrows game company • Your customizable character in OASIS • Wade's aunt pawned this to get more money • People who search for Halliday's easter egg • ...
Villanova 2021-02-20
Across
- The nickname for the dining hall on south
- The building with the famous Arch on Main Campus
- The mansion at the edge of West Campus
- Science Center
- Mascot
- The year Villanova was founded
- Men's basketball coach
- Veritas, Unitas, __________
- The loop that the Oreo lives in
Down
- School of Business building
- The new name of the Pavilion
- A new pedestrian bridge now allows easier passage from this part of campus to Main
- Home of the Villanova Room, a small theater, an art Gallery, and a cyber lounge
- Official trivia every Thursday night
- The name of the new senior housing dorms along Lancaster Ave
- The first year that the Wildcats won March Madness
- Home of the Campus Ministry and student dorms
- Scored the game winning 2016 March Madness Championship Game buzzer beater
- This building on West Campus has dorms, a dining hall, a gymnasium, and class rooms inside of it
- The on campus "police"
- The current president of the University
21 Clues: Mascot • Science Center • Men's basketball coach • The on campus "police" • School of Business building • Veritas, Unitas, __________ • The new name of the Pavilion • The year Villanova was founded • The loop that the Oreo lives in • Official trivia every Thursday night • The mansion at the edge of West Campus • The current president of the University • ...
Working with children and adolescents 2024-08-20
Across
- type of bullying done through the internet
- type of play counselling which is structured
- level of 2 in moral development
- Zone of ______ development
- type of abuse that could include ridiculing
- Freud's psychosexual stage
- child not wanting to open up or be in counselling
- type of trauma from hearing about others trauma
Down
- balanced parenting style
- guidance on cases from someone with more experience/training
- the ethical principle of keeping information safe
- factor that minimises someones risk
- integrative model for play therapy
- ability to overcome/bounce back
- Bronfenbrenner's systemic theory
- what do we teach children about
- liked by many but also disliked by many
- metaphor to explain anger
- ending of counselling
- ____ vs guilt
- causing physical harm to oneself
- respecting everyones right to make their own decisions
- type of sibling relationship
- when a case is out of scope
- skills we teach children to handle their feelings and problems
- factor that puts someone at risk
26 Clues: ____ vs guilt • ending of counselling • balanced parenting style • metaphor to explain anger • Zone of ______ development • Freud's psychosexual stage • when a case is out of scope • type of sibling relationship • ability to overcome/bounce back • what do we teach children about • level of 2 in moral development • Bronfenbrenner's systemic theory • causing physical harm to oneself • ...
Internet vocabulary 2025-02-27
Across
- pretending to be companies to get someone's persona information
- editing a photo online to get desired results
- software used to block use of computer soft ware for a sum of monry
- place to communicate online
- being protected against online cyber attacks
- proper way to communicate on the internet
- using the internet to exploit people usually minors
- data left behind on the internet
- Speaking in All Caps to convey shouting
Down
- someone post or comment to purposely invoke anger
- a frequently updated webpage for business purposes
- recording and posting videos of assault
- a packet of data used to track their user anytime they use a site
- criminal activities committed using electrics
- using the internet to illegally copy software and give it to others
- bullying that occurs over the internet
- website setting allowing to control who see the information of the user
- someone who exploits others
- using someone else's identity for financial gain
- using electronics to harass someone
20 Clues: someone who exploits others • place to communicate online • data left behind on the internet • using electronics to harass someone • bullying that occurs over the internet • recording and posting videos of assault • Speaking in All Caps to convey shouting • proper way to communicate on the internet • being protected against online cyber attacks • ...
22 2024-11-04
Across
- Athletic brand associated with Black culture
- Modern prefix for internet terms
- Type of instrument used in blues
- West African drum
- Boxing icon's original last name
- Black Panther Party co-founder Bobby
- Legendary jazz singer Lena
- Hip-hop artist Goldblum, remixer
- Strong Black role model
- Instrument played by Miles Davis
- Jazz style popular in the 1930s
- Vibrant African print fabric
- Civil rights icon Parks' first name
- Filled with deep feeling
- Jazz singer Holiday's first name
Down
- Selfless acts for others
- "Thriller" singer Michael
- Supremes singer Diana Ross’s daughter
- Rhythmic feel in music
- New Orleans music style
- Day Martin Luther King Jr. envisioned
- Clear mental image or goal
- Will Smith's son
- African storyteller
- City with Drake and The Weeknd
- Dance popularized by Chubby Checker
- Jazz great Fitzgerald's nickname
- Fashionable necklace, symbol of elegance
- Opposite of strong female role
- A principle of Kwanzaa
30 Clues: Will Smith's son • West African drum • African storyteller • Rhythmic feel in music • A principle of Kwanzaa • New Orleans music style • Strong Black role model • Selfless acts for others • Filled with deep feeling • "Thriller" singer Michael • Clear mental image or goal • Legendary jazz singer Lena • Vibrant African print fabric • City with Drake and The Weeknd • ...
Classroom Hunt 2025-10-31
Across
- Ways to stop _________ bullying.
- Respect by raising your hand to speak and no interrupting others.
- Speed up your workflow with these essential ________ shortcuts.
- If you don't believe in _________ no one will do it for you.
- Made with 100% _______ cheese.
- Keep your ________area neat.
- Water mineral enhanced for taste.
- Any bad attitudes or negative thinking.
- The computer lab prepared and ready to work.
- Everyone is ________ here.
- _________ only when necessary.
- Save the _________ or message and share with an adult.
- Be patient....I'm thinking.
- Do not use a computer to harm, bully or ______ others.
Down
- 10 Rules for ___________ computer use.
- Your uniqueness is your __________.
- ______ 06 unlocked.
- Click to select this object.
- _________ in place.
- Be prepared and ready to ______.
- Do not _________ with another person's computer work or activity.
- _________belongs.
- Don't change _________.
- The moment you give up is the _________ you let someone else win.
- Because they think they can they ___________.
- Do not _________ someone else's work as your own.
26 Clues: _________belongs. • ______ 06 unlocked. • _________ in place. • Don't change _________. • Everyone is ________ here. • Be patient....I'm thinking. • Click to select this object. • Keep your ________area neat. • Made with 100% _______ cheese. • _________ only when necessary. • Ways to stop _________ bullying. • Be prepared and ready to ______. • Water mineral enhanced for taste. • ...
CTF-CW-11 2025-11-14
Across
- Document on every website about rules for handling details
- When the cloud gets graded for playing by the compliance rulebook.
- At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
- The elevator hack from novice to boss
- Tech world’s fire brigade—second shout
- Safety scissors for your network
- Tekion’s legendary vault no hacker can touch.
- Buzzing threat hunter hangout
- Pop-up or email outlining changes in how data gets used
Down
- Any data, direct or indirect, that reveals a person’s identity
- Processes to ensure robots don’t go rogue
- When a hacker sneaks past your digital guard
- The organization behind the ATT&CK plots
- DNA test for who’s calling the shots
- When your browser “remembers” you, for a while
- At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
- Slamming the panic room door on hackers
- Every journey’s pit stops
- Red ink on the corporate report card
- Info swap: turn gold into poker chips
20 Clues: Every journey’s pit stops • Buzzing threat hunter hangout • Safety scissors for your network • DNA test for who’s calling the shots • Red ink on the corporate report card • The elevator hack from novice to boss • Info swap: turn gold into poker chips • Tech world’s fire brigade—second shout • Slamming the panic room door on hackers • The organization behind the ATT&CK plots • ...
Rolando Grade 6th -ity 2021-03-16
14 Clues: money • skill • famous • a chance • most part • all people • that is wet • to be mature • all together • pain and hurt • that is forever • people that protect • careful you can fall • the country where you born
Mortgage Terminology 2020-08-01
Across
- lenders will check this report to assess your character
- required for loans above 80% lending
- government tax payable when a property is purchased
- when a property has a clear title with no mortgage
- the most common interest rate choice
- to move a loan from one lender to another
- written agreement outlining the terms of a purchase
- value of an asset minus the debt owing
- additional loan repayments that can be drawn on
- the percentage value of debt against asset
- an independent assessment of a property
- increase in property value over time
Down
- asset offered by the borrower to the lender
- a third party who provides additional security
- any outstanding financial debt
- the process of building a house
- approval from a bank that is not yet confirmed
- lowest loan repayments without paying the principle
- to lock in your repayments for a set time
- loss tax benefit for investment property
- will be lodged if you don't pay a bill for 90+ days
- completion of the sale or purchase of a property
22 Clues: any outstanding financial debt • the process of building a house • required for loans above 80% lending • the most common interest rate choice • increase in property value over time • value of an asset minus the debt owing • an independent assessment of a property • loss tax benefit for investment property • to lock in your repayments for a set time • ...
Cold War by Jaimi Taylor 2014-02-17
Across
- European economic recovery made by the USA
- The theroy that if one country falls then the rest will soon follow
- Line that separates North Korea from South Korea
- countries controlled by USSR
- working class women and men
- Cuban communist leader
- Chinese nationalist who took over China
- the man who wanted to contain communism so he made the Marshall Plan
- investigates disloyaity on the eve of war
- Vietnam city
Down
- Divided North Vietnam from South Vietnam
- Two people accused of passing atomic secrets to the soviets during the war
- freed people from resisting communism
- moved supplys to West Berlin
- An organization made for peace, security, and economic developement
- Republican Senator who accused Government Officials of communism
- High ranking state department leader investigated for spying
- when the central government rules by terrorizing citizens
- Security council doccument that suggested trippling defence budget
- conflict between USA and USSR
- 10 nations pleged mutual assistance in the event of a attck
- the act of preventing spread of communism
- Leader of Indochina communist party
23 Clues: Vietnam city • Cuban communist leader • working class women and men • moved supplys to West Berlin • countries controlled by USSR • conflict between USA and USSR • Leader of Indochina communist party • freed people from resisting communism • Chinese nationalist who took over China • Divided North Vietnam from South Vietnam • the act of preventing spread of communism • ...
Income Tax Vocabulary 2015-07-03
Across
- When you overpay the government, you receive a refund
- Expenses the government has
- gross income Total income
- withholding Money an employer holds from your paycheck
- status Married/single/head of household
- Income from stocks and bonds
- Income the government receives from taxpayers, etc.
- Dependents you are claiming
- Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
- Set $ amount not taxed for each dependent
- Money you earn from employment
- income Money earned before deductions
- Husband/Wife
Down
- care expenses Money you pay for someone else to care for a child or elder dependent
- tax Taxes on income
- deduction $ amount non itemizers may subtract from income based upon filing status
- security Your personal identification number
- income Income received from interest, dividends, social security & pentions
- Money received from saving account
- A person who relies on someone for living expenses
- Your banks identification number
- of household Single person who has dependents
- No withholding
- pay Money you earn to take home
24 Clues: Husband/Wife • No withholding • tax Taxes on income • gross income Total income • Expenses the government has • Dependents you are claiming • Income from stocks and bonds • Money you earn from employment • pay Money you earn to take home • Your banks identification number • Money received from saving account • income Money earned before deductions • ...
Crossword Puzzle unit 6 2023-02-23
Across
- Term used in the oil industry to indicate the searching for the product
- Political person with great knowledge ando experience in state affairs
- last name of the one who took Office as presidente on October 6 of 1911
- A groupof people who opposed reelection
- Who wrote the novel Balun Canan?
- Plan thatvwas develope bye Emiliano Zapata
- Form of gorvernment in which power was obtained through authoritarian or violent methods
- Where did Porfirio Díaz exile ando died?
- The security institute that was founded in 1943
- Oficial rate or tax which determines the feeds yo be paid
- The mexican miracle start during the presidency of-
- Social security Ford state workers
Down
- Who kill madero in 1913
- What was the crisis in the countryside
- Group that was formed bye Carranza
- Workers that temporarily migrates
- Economy that si applied un times of armed conflicto or violent convulsions
- What does the articule 27 about
- What battle began in colonial times when haciendas where form
- Independient of any religioso organización or denomination
20 Clues: Who kill madero in 1913 • What does the articule 27 about • Who wrote the novel Balun Canan? • Workers that temporarily migrates • Group that was formed bye Carranza • Social security Ford state workers • What was the crisis in the countryside • A groupof people who opposed reelection • Where did Porfirio Díaz exile ando died? • Plan thatvwas develope bye Emiliano Zapata • ...
CROSSWORD PUZZLE U6 2023-02-27
Across
- Drastically reduced in numbers
- Made a constitutional reform
- Group led by Emiliano Zapata
- Was part of a social sector called “the anti-re-electionists”
- The increasing pace of the Mexican economy came to be known as
- Was considered the father of education in Mexico
- Paid on a regular basis
- The essential nature or the main part of something
- A group led by Francisco Villa
- An act or strategy intended to resolve a problem or improve a situation
Down
- Group led by Venustiano Carranza
- Economy that is applied in times of armed conflict or violent convulsions
- A group of people who opposed reelection
- To create a system that depends on a central power
- Piece of land that is worked by a community and whose earnings are distributed among all
- Mexican political period from 1928-1934
- Committed fraud in the elections of 1910
- Institute of Social Security and Services for State Workers
- The Secretary of Public Education
- The Mexican Social Security Institute
20 Clues: Paid on a regular basis • Made a constitutional reform • Group led by Emiliano Zapata • Drastically reduced in numbers • A group led by Francisco Villa • Group led by Venustiano Carranza • The Secretary of Public Education • The Mexican Social Security Institute • Mexican political period from 1928-1934 • A group of people who opposed reelection • ...
Environmental Services 2017-08-18
Across
- These are used to keep your hands clean.
- What is the name of the disinfectant we use to clean?
- Who is the head of safety and security?
- What is used to clean the toilets?
- What company takes care of RED trash and sharps for the hospital?
- Who is the manager of ES?
- Evening discharge cleaners are called?
- What brand of bleach do we use to clean with?
- This is used to clean the carpet.
- What floor is ICU on?
Down
- What is the name of the security company?
- Used to collect trash from multiple areas.
- What is the name of the fragrance spray we use?
- What tupe of rags do we use to clean? (blue and yellow)
- Weeks How far out should you schedule PTO?
- What is the brand of electronic paper towels we use?
- This is used to swipe you into the building or certain areas.
- What is the Color of ES Scrubs?
- What program is used to look up chemicals?
- What company takes care of pest control?
20 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • This is used to clean the carpet. • What is used to clean the toilets? • Evening discharge cleaners are called? • Who is the head of safety and security? • These are used to keep your hands clean. • What company takes care of pest control? • What is the name of the security company? • ...
Great Depression Crossword Puzzle 2024-10-15
Across
- Projects that are used for public uses
- Closing of banks during the Great Depression to avoid bank runs
- A homeless, penniless wanderer
- Program that presented the struggles of middle-class people
- Eleanor Roosevelt's mother
- General who would ignore Herbert Hoover
- Method of boycotting work by sitting down at work and refusing to leave
- A very controversial president at the time
- To attempt to resolve conflict between hostile people or groups
- Act that Americans were unsure of because it excluded African Americans
Down
- The incident that resulted in 10 deaths and 90 injuries
- A person who risks money in hopes of a financial profit
- First Roman Catholic to win a major party presidential nomination
- Spending borrowed money rather than raising taxes to boost money
- First African American to win an Academy Award
- Something that provides security against misfortune
- A long period of rising stock prices
- The acronym for Federal Deposit Insurance Corporation
- Role of government to work out conflicts among competing interest groups
- This didn't end the depression, but gave Americans a stronger sense of security
20 Clues: Eleanor Roosevelt's mother • A homeless, penniless wanderer • A long period of rising stock prices • Projects that are used for public uses • General who would ignore Herbert Hoover • A very controversial president at the time • First African American to win an Academy Award • Something that provides security against misfortune • ...
Chapter 11 2025-04-09
Across
- In ____ 1935, Congress passed the Social Security Act
- President ____ believed that the economy would improve soon
- The Security Act placed a tax on workers and _____
- In ____ 1929, Investors started selling their stocks
- During the Depression, a disaster hit the ________
- The United States slid into an economic crisis called the ____
- On October 24, 1929, investors sold almost ____ shares
- By ____, 75 percent of Americans lived in poverty
Down
- Small banks suffered losses when farmers ____
- Migrant workers moved here
- Many ____ moved to California and became migrant workers
- Stock market crashed on black _____
- Hoover believed that the government could not fix the ______
- Some people who lost their homes lived in shelters made of old ____
- By the late 1920s,____ prices were very high
- In ____ Congress created the Works Progress Administration (WPA)
- Many investors did not have the money to buy stocks so they bought on ___ instead
- ____ borrowed their money from banks
- Many ___ were forced to look for work
- In ____ Roosevelt created a new set of programs, often called the Second New Deal.
20 Clues: Migrant workers moved here • Stock market crashed on black _____ • ____ borrowed their money from banks • Many ___ were forced to look for work • Small banks suffered losses when farmers ____ • By the late 1920s,____ prices were very high • By ____, 75 percent of Americans lived in poverty • The Security Act placed a tax on workers and _____ • ...
Christian Hulet crossword 2025-03-25
Across
- this celebrity lost 30 million with FTX
- a digital system of transactions that is distributed across a network
- Warren Buffet is the ceo of this company
- how old to invest in crypto
- the age for RMD in IRA account you need to draw from
- contribute a max of 23,500 (spell how it sounds)
- for low risk people and is automotion
- what risk tolerance is for aggressive people
- Warren Buffet’s rule #1
Down
- is backed by the government
- combined with medicare and social security
- made in 1935 by FDR
- buy low ___
- move to another plan
- one problem if you put all your money into one company and it goes
- what also sometimes contributes to your pension
- traditional IRA contributions are made
- age of retirement
- roth IRA contributions are made
- social security is funded by this
- part of the fica tax
- what is backing crypto
- is managed by, in pension plans
- the biggest financial fraud in the U.S.
- offered to people with jobs in trades, manufacturing, and educators
25 Clues: buy low ___ • age of retirement • made in 1935 by FDR • move to another plan • part of the fica tax • what is backing crypto • Warren Buffet’s rule #1 • is backed by the government • how old to invest in crypto • roth IRA contributions are made • is managed by, in pension plans • social security is funded by this • for low risk people and is automotion • ...
Cybersecurity Awareness Puzzle 2025-10-14
Across
- An event or occurrence, often unexpected or problematic.
- Hidden programs providing remote access.
- Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
- More than one kind of proof.
- Special access or rights given to certain users.
- Self-replicating malware spreading across systems.
- Encrypts data and demands payment for decryption.
- You should do this to all of your software.
- Voice (phone-based) phishing.
- SMS/text-based phishing.
- Security Awareness Training is provided ___.
Down
- Proof of who someone is.
- Permission to access a system, file, or resource.
- A modification or update to a system, process, or configuration.
- Protection against threats or attacks on computer and data.
- Using someone else's access without permission to enter a building.
- Records everything you type on a keyboard.
- A system that blocks unauthorized access to a network or computer.
- Cheating someone out of Money or personal Information
- Deceptive emails that trick users into clicking malicious links or sharing credentials.
- Secret words or codes used to unlock accounts.
- Copying data to keep it safe in case something is lost or damaged.
22 Clues: Proof of who someone is. • SMS/text-based phishing. • More than one kind of proof. • Voice (phone-based) phishing. • Hidden programs providing remote access. • Records everything you type on a keyboard. • You should do this to all of your software. • Security Awareness Training is provided ___. • Secret words or codes used to unlock accounts. • ...
Cybersecurity Crossword 2025-09-25
Across
- Requiring more than one form of verification. ____________ authentication
- A network security system that monitors and controls traffic.
- The process of verifying identity before granting access.
- The process of converting data into a secure code.
- A secret string of characters used for authentication.
- The practice of protecting systems, networks, and programs from attacks.
Down
- Technology simulating human intelligence, used in modern cybersecurity.
- Malicious software disguised as legitimate software.
- Malware that locks files and demands payment.
- A scam using fake emails or messages to trick people into revealing information.
- A clickable reference to another webpage or document.
- Phishing conducted through SMS text messages
- Software designed to harm or exploit systems.
- A type of malware that replicates itself by infecting other programs.
- Software that detects and removes malicious programs.
- A well-known security awareness training platform.
- A secure tunnel for internet traffic, stands for Virtual Private Network.
- An attempt to damage, steal, or disrupt digital systems.
- Manipulating people into revealing confidential information. ________ engineering
- A hidden method of bypassing normal authentication.
20 Clues: Phishing conducted through SMS text messages • Malware that locks files and demands payment. • Software designed to harm or exploit systems. • The process of converting data into a secure code. • A well-known security awareness training platform. • A hidden method of bypassing normal authentication. • Malicious software disguised as legitimate software. • ...
Forensic Disciplines Practice 2024-02-29
Across
- Small or microscopic pieces of evidence at a scene.
- Matching fur, wool, or follicle samples with suspects and victims.
- Studies human biological and physiological manners of death from autopsies.
- Analyzes poisons, drugs, toxins, and their transmission.
- Studies the general processes of the brain and mind.
- Dentistry and teeth analysis for forensic identification.
- Observing and collecting oily prints left at a scene.
- Using cyber or computer evidence in a case.
Down
- Analyzes behaviors of criminals and develops profiles of suspects.
- Observing clothing or fabric textiles from a crime scene.
- Uses information from diseases and illnesses in investigations.
- Studies insects and bugs relationship to decomposing bodies.
- Photographing and casting tracks left like tire tracks, shoe prints, and tool marks.
- Analysis of dead remains and the information derived from them.
- Analyzing the use of firearms.
- Analyzing patterns and presence of blood
- Analyzing and using the genetics in evidence
17 Clues: Analyzing the use of firearms. • Analyzing patterns and presence of blood • Using cyber or computer evidence in a case. • Analyzing and using the genetics in evidence • Small or microscopic pieces of evidence at a scene. • Studies the general processes of the brain and mind. • Observing and collecting oily prints left at a scene. • ...
The Financial Vault Quiz 2018-02-26
Across
- An omnibus account is normally overseen by a ____ manager
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- The _____ the volatility, the riskier the security.
- A minimum of ___ persons are required to create an omnibus account
- The sale of a security that is not owned by the seller or that the seller has borrowed
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- Account Is an account between two futures merchants (brokers)
- Employee’s Provident Fund is maintained and overseen by the ___
- One measure of the relative volatility of a particular stock to the market is its
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
Transformers 2018 2018-07-25
Across
- You shall lock away or take home portable devices and cabinet_____ a the end of each working day.
- During brief_____ (eg lunchtimes), rooms may be securely locked, where appropriate.
- Personal computers and terminals must be switched off and/ or protected against___________ access
- Flip charts, ports, and wall displays containing______ or sensitive information should be removed, and black/white boards wiped clean at the end of work sessions.
- Drawers must be locked when you are away from your_______ and at the end of the workday.
- Laptop and personal bags must be safely stored under your_____.
- Compliance is______.
Down
- After close of business, random _____ are to be conducted of photocopiers, faxes, cabinets and desk spaces to ensure that sensitive material and attractive items have been secured appropriately
- _____ Security Emergency Number is 5777(if you observe a suspicious package)
- It is an individual's ________ to ensure the security of personal items.
- All infringements will be considered as non-compliant behavior and recorded via_____.
- Classified and _______ material, including any items which have not yet been assessed, and proprietary third party documents, must be securely locked away in appropriate containeers.
- Personalized items that are workplace_______ (eg picture frames, certificated, paper weights), must be kept to a minimum.
- _______ Security Emergency Number is 4444 (if you observe a suspicious package)
14 Clues: Compliance is______. • Laptop and personal bags must be safely stored under your_____. • It is an individual's ________ to ensure the security of personal items. • _____ Security Emergency Number is 5777(if you observe a suspicious package) • _______ Security Emergency Number is 4444 (if you observe a suspicious package) • ...
E-Commerce Security and Payments 2025-05-01
Across
- - Scam using fake links (e.g., "Pos Laju" fraud).
- - Harmful software (e.g., viruses, ransomware).
- - Security principle ensuring data confidentiality.
- - Text files tracking user activity on websites.
- - Guarantees timely access to avoid delays.
Down
- - Security tool blocking unauthorized network access.
- - Prevents unauthorized data modification.
- - Malicious actor who illegally accesses computer systems.
8 Clues: - Prevents unauthorized data modification. • - Guarantees timely access to avoid delays. • - Harmful software (e.g., viruses, ransomware). • - Text files tracking user activity on websites. • - Scam using fake links (e.g., "Pos Laju" fraud). • - Security principle ensuring data confidentiality. • - Security tool blocking unauthorized network access. • ...
For People Crossword 2023-10-03
Across
- SCIFs are built according to the ICD 705 ________ Specifications
- The word for the study, investigation and mitigation of compromising emanations
- We have offices in Vista, San Diego, and ______ Heights
- You need to report any _______ travel to the FSO
- The heritage breed of pigs that Land & Feast raises
- The type of agriculture that Land & Feast practices
- If you get a ______ email, you should send it to the security team!
- Lab 7 manufactures waveguides and _________ SCIFs
Down
- The fancy breed of chicken Land & Feast sells
- Land & Feast’s farm has orchards with lemon and _______ trees
- The acronym for a required role for SCIF construction who oversees a construction site
- Our first core value
- FSO Stands for ______ Security Officer
- One thing Adamo's alarm services install is a _________ Detection System
- Adamo does RF shielding and ________ protection testing
- The manual the FSO team uses is called the ______
16 Clues: Our first core value • FSO Stands for ______ Security Officer • The fancy breed of chicken Land & Feast sells • You need to report any _______ travel to the FSO • The manual the FSO team uses is called the ______ • Lab 7 manufactures waveguides and _________ SCIFs • The heritage breed of pigs that Land & Feast raises • ...
2025 Compliance & Ethics 2025-10-31
Across
- A document that provides guidance for how Mindpath or its employees should act
- Federal law that protects the privacy and security of patients' health information
- A recommendation of a patient to another healthcare provider
- The possibility of something bad happening
- Moral principles and values governing healthcare practices
- Maintaining the confidentiality of patient information
- Protecting patient data from unauthorized access or breaches
- An official inspection to ensure compliance
- The federal agency responsible for investigating healthcare fraud and abuse
Down
- A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
- Items or services given to healthcare providers as incentives
- Adherence to legal and ethical standards in healthcare
- Intentional and improper practices that harm patients or defraud the healthcare system
- Informing authorities or superiors about unethical or illegal actions
- An illegal payment or reward for patient referrals
- The unnecessary or excessive use of healthcare resources
16 Clues: The possibility of something bad happening • An official inspection to ensure compliance • An illegal payment or reward for patient referrals • Adherence to legal and ethical standards in healthcare • Maintaining the confidentiality of patient information • The unnecessary or excessive use of healthcare resources • ...
HOW WELL DO YOU KNOW YOUR RHYTHMITES? 2021-07-21
UNIT 1 2023-05-03
Surfers Paradise Safety Action Project 2024-09-01
Across
- Security personnel received this in order to effectively manage venues
- Street where majority of the nightclubs are concentrated
- Crime problem
Down
- This was implemented by all night clubs with the exception of one
- The project sought to implement this between police and security personnel
- Surfers Paradise is famous for this
- Where the project took place
- 22 of these were under observation during the project
- State of intoxication
9 Clues: Crime problem • State of intoxication • Where the project took place • Surfers Paradise is famous for this • 22 of these were under observation during the project • Street where majority of the nightclubs are concentrated • This was implemented by all night clubs with the exception of one • Security personnel received this in order to effectively manage venues • ...
Digital Citizenship Vocabulary 2021-02-25
Across
- belonging to one person
- 2 words. rules and behaviors while using technology
- 2 words. meaning people you did not know looking at your post online
Down
- 2 words. before the internet these were newspapers, magazines, billboards, radio, and broadcast TV and direct mail.
- the act of posting insults online
- 2 words. meaning anything broadcasting through a screen or online
- like cyber-stalking online
- to form a set value
- 2 words. someone pretends to be you online and commits fraud
- scamming companies sending fake emails to get your private information
- a string of characters used to verify the identity of a user during the authentication process.
- another word meaning to fool someone
12 Clues: to form a set value • belonging to one person • like cyber-stalking online • the act of posting insults online • another word meaning to fool someone • 2 words. rules and behaviors while using technology • 2 words. someone pretends to be you online and commits fraud • 2 words. meaning anything broadcasting through a screen or online • ...
