cyber security Crossword Puzzles

Unit 11 2024-02-12

Unit 11 crossword puzzle
Across
  1. organized
  2. choosing
  3. making no sense
  4. sharp tone
  5. law
Down
  1. telling where to go
  2. safety
  3. real
  4. falling of rocks
  5. make sure
  6. hold lovingly
  7. request

12 Clues: lawrealsafetyrequestchoosingorganizedmake suresharp tonehold lovinglymaking no sensefalling of rockstelling where to go

unit 11 2025-02-14

unit 11 crossword puzzle
Across
  1. order, arrange
  2. choosy, particular
  3. silly, ridiculous
  4. tangy, acid
  5. a stander
Down
  1. guide, pilot
  2. protection, safekeeping
  3. achievable, reasonable
  4. landslide
  5. confirm, insure
  6. cuddle
  7. appeal, cry

12 Clues: cuddlelandslidea standertangy, acidappeal, cryguide, pilotorder, arrangeconfirm, insuresilly, ridiculouschoosy, particularachievable, reasonableprotection, safekeeping

Information Technology and Digital Transformation 2025-11-14

Information Technology and Digital Transformation crossword puzzle
Across
  1. Software
  2. Data
  3. Security
Down
  1. Scientist
  2. AI
  3. Robot

6 Clues: AIDataRobotSoftwareSecurityScientist

Environmental Services 2017-08-18

Environmental Services crossword puzzle
Across
  1. What tupe of rags do we use to clean? (blue and yellow)
  2. What company takes care of pest control?
  3. Evening discharge cleaners are called?
  4. What company takes care of RED trash and sharps for the hospital?
  5. Who is the head of safety and security?
  6. What is the brand of electronic paper towels we use?
  7. What is the name of the security company?
  8. What program is used to look up chemicals?
Down
  1. These are used to keep your hands clean.
  2. What is the name of the fragrance spray we use?
  3. What floor is ICU on?
  4. Used to collect trash from multiple areas.
  5. What is the Color of ES Scrubs?
  6. How far out should you schedule PTO?
  7. What brand of bleach do we use to clean with?
  8. Who is the manager of ES?
  9. This is used to swipe you into the building or certain areas.

17 Clues: What floor is ICU on?Who is the manager of ES?What is the Color of ES Scrubs?How far out should you schedule PTO?Evening discharge cleaners are called?Who is the head of safety and security?These are used to keep your hands clean.What company takes care of pest control?What is the name of the security company?...

Week 1 - Crossword 2024-11-01

Week 1 - Crossword crossword puzzle
Across
  1. Address Unique identifier assigned to each device on a network.
  2. Point Device that allows wireless devices to connect to a network without cables.
  3. Measurement of data transmission capacity in a network.
  4. Security device that controls incoming and outgoing traffic.
  5. Authentication system used to manage network access.
  6. Unit of data transmitted over a network.
  7. Process of encoding data to protect it during transmission.
  8. Network monitoring tool used to analyze and troubleshoot network traffic.
Down
  1. monitoring tool for tracking performance and availability.
  2. Device that connects multiple devices within a single network.
  3. Virtual Local Area Network; divides network traffic for security and performance.
  4. Command used to test network connectivity and latency.
  5. Delay in data transmission over a network.
  6. Part of an IP address configuration that helps segment networks.
  7. Device that directs data traffic between networks.
  8. Virtual Private Network; provides secure remote access to a network.
  9. The layout or structure of a network.

17 Clues: The layout or structure of a network.Unit of data transmitted over a network.Delay in data transmission over a network.Device that directs data traffic between networks.Authentication system used to manage network access.Command used to test network connectivity and latency.Measurement of data transmission capacity in a network....

Information Security Quiz #15 2015-05-26

Information Security Quiz #15 crossword puzzle
Across
  1. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
  2. Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
  3. Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
  4. In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
  5. Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
  6. Tapping confidential information from trash
  7. A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
  8. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
  9. This can slow down your computer AND watch everywhere you go on the internet.
Down
  1. You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
  2. Use this tool to dispose of documents that contain personal or financial information.
  3. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  4. Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
  5. The front line of defence in information security!
  6. Records of IS activities
  7. Destruction of computer equipment or records

16 Clues: Records of IS activitiesTapping confidential information from trashDestruction of computer equipment or recordsThe front line of defence in information security!This can slow down your computer AND watch everywhere you go on the internet.Use this tool to dispose of documents that contain personal or financial information....

Enterprise Information Security Policy 2017-09-06

Enterprise Information Security Policy crossword puzzle
Across
  1. ____ is compromised of 60 standards
  2. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  3. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  4. A Credential established by a sequence of characters used as a secret key
  5. The physical elements of a computer system
  6. Verifying the identity of a user, machine, software component, device, or other entity.
  7. The set of characteristics by which a Person is definitively recognizable or known.
Down
  1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. _____ implements standards to protect Protected Health Information (PHI).
  3. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
  4. Any type of storage device that can be removed from a computer while the system is running.
  5. A piece of Software intended to update an electronic Information Resource.
  6. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. A person or persons responsible for supervising people or work.
  8. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  9. Protected Health Information acronym

16 Clues: ____ is compromised of 60 standardsProtected Health Information acronymThe physical elements of a computer systemA person or persons responsible for supervising people or work._____ implements standards to protect Protected Health Information (PHI).A Credential established by a sequence of characters used as a secret key...

Information security -Unit 4 2022-11-18

Information security -Unit 4 crossword puzzle
Across
  1. attack using birth dates
  2. translating key into code
  3. barrier between trusted networks
  4. recognising somebody
  5. sepcial form of information
  6. certainty to remain safe
  7. Symmetric block cipher
  8. tool to practice encryption
  9. process of determining something or someone
Down
  1. cipher in which one character is replaced by another
  2. security structure to decide user privileges
  3. inspection
  4. cipher in which we use polyalphabetic substitution
  5. scrambling position of characters
  6. act of invading illegally
  7. method to transform a message

16 Clues: inspectionrecognising somebodySymmetric block cipherattack using birth datescertainty to remain safetranslating key into codeact of invading illegallysepcial form of informationtool to practice encryptionmethod to transform a messagebarrier between trusted networksscrambling position of charactersprocess of determining something or someone...

Bank and Branch Security 2024-11-21

Bank and Branch Security crossword puzzle
Across
  1. You must do this any time you are not within arms reach of your computer
  2. This is activated by going up or down with a pin number
  3. These are located at every public entrance/exit doorways
  4. You place customer information that you no longer need into what?
  5. _____________ assume a weapon is involved
  6. You call and ask if this person is available if things are not the way they should be when you arrive in the morning
  7. Keeping the _____________ of our customers is HIGH priority
  8. Someone that "phishes" for secure information
  9. Night Drop, ATM, and moving debit cards MUST be done how?
Down
  1. Signal that shows someone is clearing the branch
  2. Signal that shows the branch is safe to enter
  3. You NEVER give these to anyone
  4. You trigger this by holding down two buttons for 3 seconds
  5. This must be locked up at night but made readily accessible during the day
  6. Meeting place that you go to if there is an emergency
  7. ___________ ________ and do what the robber asks

16 Clues: You NEVER give these to anyone_____________ assume a weapon is involvedSignal that shows the branch is safe to enterSomeone that "phishes" for secure informationSignal that shows someone is clearing the branch___________ ________ and do what the robber asksMeeting place that you go to if there is an emergency...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Budget Vocabulary 2022-10-24

Budget Vocabulary crossword puzzle
Across
  1. amount borrowed in a single year
  2. control, by the Federal Reserve Board, of the money supply
  3. taxing and spending by the Congress and the President
  4. economic support provided by government to aid an individual, industry, or business
  5. spending revisited yearly by Congress/President ex. defense spending
  6. Social Security is an example
  7. healthcare for people 65+
Down
  1. total amount of money the government owes over years
  2. provides nonpartisan advise to Congress about budgetary decisions
  3. #1 source of revenue for the federal government
  4. social security, medicare, medicaid, interest on the debt that must be paid
  5. the charge for borrowing money
  6. term for when government brings in more money than it spends
  7. part of EOP that advises the President about the budget
  8. healthcare for needy people

15 Clues: healthcare for people 65+healthcare for needy peopleSocial Security is an examplethe charge for borrowing moneyamount borrowed in a single year#1 source of revenue for the federal governmenttotal amount of money the government owes over yearstaxing and spending by the Congress and the Presidentpart of EOP that advises the President about the budget...

Teen years 2024-09-30

Teen years crossword puzzle
Across
  1. unter Druck
  2. Vorbild
  3. sich durch setzen
  4. Lebensabschnitt
  5. Gruppendruck
  6. an die eigenen Grenzen gehen
Down
  1. selbständig werden
  2. sich nach Sicherheit/Geborgenheit sehnen
  3. Risiken eingehen
  4. selbstbewusst
  5. Beliebtheit
  6. gehemmt, befangen
  7. provozierend
  8. die Erwartungen erfüllen
  9. sich gegen etwas auflehnen

15 Clues: Vorbildunter DruckBeliebtheitprovozierendGruppendruckselbstbewusstLebensabschnittRisiken eingehensich durch setzengehemmt, befangenselbständig werdendie Erwartungen erfüllensich gegen etwas auflehnenan die eigenen Grenzen gehensich nach Sicherheit/Geborgenheit sehnen

Cyber safety- Fleur De Gans 2016-05-24

Cyber safety- Fleur De Gans crossword puzzle
Across
  1. it pops up on your computer and if you say yes it can reck your computer.
  2. a peace of information about your visit to a website that some websites do automatically.
  3. tag the nickname a user chooses to be known on in Internet games.
  4. a app where you can see and hear your friends even when their not even near you
  5. it projects you from hackers
  6. you keep it safe and yo don't share it on websites.
  7. you search up things on it
  8. someone who can get into your device from the other side of the world.
  9. list a list of friends on the internet.
  10. the people who say it say that it's true but it's a lie.
Down
  1. to send information to another computer.
  2. a location online that allows multiple users to communicate.
  3. where people can reply to you on a video that you posted.
  4. numbers or letters that let you in
  5. it is messages sent over the internet for the purpose of advertising.
  6. a internet website where you can post photos and videos
  7. sharing this software enables multiple users to access the same file.
  8. a app that you can download and search up videos.
  9. bullies someone who is being mean to you on the internet
  10. something that goes around and you don't know if it's the truth or a lie.

20 Clues: you search up things on itit projects you from hackersnumbers or letters that let you inlist a list of friends on the internet.to send information to another computer.a app that you can download and search up videos.you keep it safe and yo don't share it on websites.a internet website where you can post photos and videos...

Cyber protection, threats, and risks 2023-09-09

Cyber protection, threats, and risks crossword puzzle
Across
  1. internet
  2. backing up important or all files.
  3. Server lacks security and can be exploited easily in a area
  4. monitoring your device to find threats.
  5. Scam emails
  6. A type of protection for your Wi-Fi
  7. demanding money to keep data intact.
  8. Someone who steals your files
  9. After an attack has happened, what to do next.
  10. filters traffic going to router to find threats.
  11. OS
Down
  1. Storage
  2. You can install apps to protect you from getting this like McAfee.
  3. Someone trying to break into your device to gain information
  4. authentication
  5. WiFi
  6. Stock market and basically digital currency
  7. Secures
  8. destroying sensitive documents for protection.
  9. Who to report an attack has occurred on your device too.

20 Clues: OSWiFiStorageSecuresinternetScam emailsauthenticationSomeone who steals your filesbacking up important or all files.A type of protection for your Wi-Fidemanding money to keep data intact.monitoring your device to find threats.Stock market and basically digital currencydestroying sensitive documents for protection....

Final Exam Cyber 24-25 2025-05-08

Final Exam Cyber 24-25 crossword puzzle
Across
  1. Writing instructions for the computer
  2. Stands for Cascading Style Sheets
  3. to select all the information on the screen
  4. Horizontal division of a spreadsheet
  5. to save all changes for later use
  6. change the appearance of the text thicker and stand out
  7. What the Green flag do in Scratch?
  8. Vertical division of a spreadsheet
  9. Finding and fixing errors in a program
  10. the shortcut to copy selected information
  11. What should you ALWAYS do before sending an email?
  12. used to create an unordered list
  13. Symbolic name that stores changeable data
  14. when page orientation; height is greater than width
  15. Stands for Hypertext Markup Language
  16. it full-screen mode
  17. used to define the body of an HTML document
Down
  1. lines- Horizontal and Vertical lines on the spreadsheet
  2. the file produced in a word processing program
  3. the appearance and shape of characters
  4. tag used to represent ordered list
  5. scripts- Coding scripts that run at the same time
  6. Is used to change the appearance of a website
  7. <p> tag in HTML represents
  8. to find certain text on a page
  9. individual box on a Google sheet (Spreadsheet)
  10. text horizontally or vertically in the middle of a page
  11. Controllable graphic character
  12. reference- Letter and number that represents the cell
  13. to print the current page
  14. when page orientation; width is greater than height

31 Clues: it full-screen modeto print the current page<p> tag in HTML representsto find certain text on a pageControllable graphic characterused to create an unordered listStands for Cascading Style Sheetsto save all changes for later usetag used to represent ordered listWhat the Green flag do in Scratch?Vertical division of a spreadsheet...

Networking Concepts and Cyber Ethics 2025-06-05

Networking Concepts and Cyber Ethics crossword puzzle
Across
  1. It is one of the most common network setups that consists of a group of star figured workstations .
  2. It is a malicious technique of tricking a web user into clicking on something what user perceives.
  3. It is a device that connects two different types of networks with each other.
  4. It is a topology uses a single communication line to which all the nodes are directly connected.
  5. Each computer in a network.
  6. It refers to being aware of the ethical practices and behaving responsibly while using the internet.
  7. It refers to a computer network restricted to an organisation .
  8. It is an act of sending email to an user misleading him to believe that is a trusted person .
  9. It refers to an illegal intrusion into a computer system.
  10. It is a set of programs that disrupts the normal functioning of a computer.
  11. It is a topology that is connected to a central computer using a point to point connection.
  12. It is a type of security system .
Down
  1. It is the process of transforming data into unreadable code.
  2. It is a wireless technology used to interconnect mobile phones,etc.
  3. It refers to criminal activity that involve the use of computer,networks.
  4. It enables you to connect your computer to the available internet connection over the existing telephone lines.
  5. It is a larger network than LAN .
  6. It stands for Wireless Fidelity.
  7. It refers to the act of using the language and thoughts of another person as ones original work.
  8. It is a network device that is used to connect all the computers.
  9. Purchasing a single licensed copy of a software and load on to several computers.

21 Clues: Each computer in a network.It stands for Wireless Fidelity.It is a larger network than LAN .It is a type of security system .It refers to an illegal intrusion into a computer system.It is the process of transforming data into unreadable code.It refers to a computer network restricted to an organisation ....

Advance Cyber Chapter 4(2) 2025-10-14

Advance Cyber Chapter 4(2) crossword puzzle
Across
  1. A property of hashing algorithms meaning a small change in the input creates a significant change in the output. (2 Words)
  2. The length of a key, measured in bits. (2 Words)
  3. A digital document that binds a public key to an identity. (2 Words)
  4. An older symmetric block cipher with a 64-bit block size that is now considered insecure. (abbreviation)
  5. An asymmetric algorithm commonly used for generating and sharing keys. (2 Words)
  6. The unreadable, encrypted data.
  7. A type of encryption that uses the same key for both encryption and decryption.
  8. The framework of policies, standards, and software that manages digital certificates and public-key encryption. (abbreviation)
  9. A one-way function that converts an input of any size into a fixed-size string of text.
  10. The concept that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. (2 Words)
  11. A block cipher standard used by the U.S. government. (abbreviation)
  12. An outdated hashing algorithm that produces a 128-bit hash value. (abbreviation)
  13. The strength of this depends on the secrecy of the key, not the algorithm.
  14. The practice and study of techniques for secure communication in the presence of adversaries.
Down
  1. An entity that issues digital certificates. (2 Words)
  2. A symmetric algorithm that encrypts data one bit or byte at a time. (2 Words)
  3. A mathematical formula or process used for encryption and decryption.
  4. list of digital certificates that have been revoked and are no longer valid. (abbreviation)
  5. A cryptographic key that is known by all parties involved in the secured communication. (2 Words)
  6. The process of converting ciphertext back into plaintext.
  7. A symmetric key algorithm that encrypts data in fixed-size chunks. (2 Words)
  8. A property of hashing algorithms ensures that two different inputs will not produce the same output. (2 Words)
  9. A cryptographic method that uses two separate but related keys: one public and one private.
  10. A secure hashing algorithm that produces a 256-bit hash value. (abbreviation)
  11. The original, readable data before it is encrypted.

25 Clues: The unreadable, encrypted data.The length of a key, measured in bits. (2 Words)The original, readable data before it is encrypted.An entity that issues digital certificates. (2 Words)The process of converting ciphertext back into plaintext.A block cipher standard used by the U.S. government. (abbreviation)...

Cyber Safety and Respectful Choices 2021-05-17

Cyber Safety and Respectful Choices crossword puzzle
Across
  1. media, Snapchat or Instagram.
  2. Online bullying.
  3. relating to or characteristic of the culture of computers, information technology, and virtual reality.
  4. Healthy.
Down
  1. The condition of being protected from or unlikely to cause danger, risk, or injury.
  2. Due regard for the feelings, wishes, or rights of others.

6 Clues: Healthy.Online bullying.media, Snapchat or Instagram.Due regard for the feelings, wishes, or rights of others.The condition of being protected from or unlikely to cause danger, risk, or injury.relating to or characteristic of the culture of computers, information technology, and virtual reality.

Cyber Safety and Respectful Choices 2021-05-17

Cyber Safety and Respectful Choices crossword puzzle
Across
  1. media, Snapchat or Instagram.
  2. Online bullying.
  3. relating to or characteristic of the culture of computers, information technology, and virtual reality.
  4. Healthy.
Down
  1. The condition of being protected from or unlikely to cause danger, risk, or injury.
  2. Due regard for the feelings, wishes, or rights of others.

6 Clues: Healthy.Online bullying.media, Snapchat or Instagram.Due regard for the feelings, wishes, or rights of others.The condition of being protected from or unlikely to cause danger, risk, or injury.relating to or characteristic of the culture of computers, information technology, and virtual reality.

Lecture 3 2024-10-21

Lecture 3 crossword puzzle
Across
  1. Statements
  2. SQL Injection
  3. Request Forgery
  4. Misconfiguration
  5. SQL Injection
  6. Deserialization
Down
  1. Logging and Monitoring
  2. Sanitization
  3. Queries
  4. Scripting (XSS)
  5. Injection
  6. Data Exposure
  7. Authentication
  8. SQL Injection

14 Clues: QueriesInjectionStatementsSanitizationSQL InjectionData ExposureSQL InjectionSQL InjectionAuthenticationScripting (XSS)Request ForgeryDeserializationMisconfigurationLogging and Monitoring

Georgia Milestones Testing Training 2016-03-29

Georgia Milestones Testing Training crossword puzzle
Across
  1. are used for each student for each section of the online assessment
  2. of test security occurs when examiners fail to follow administration directions for the test
  3. electronic devices should be used during testing sessions (by teachers or students)
  4. must be kept secure at all times
  5. is permitted during breaks
  6. can write in the test books
Down
  1. should be covered in testing rooms
  2. must monitor the integrity of the assessment, through circulation and checking in
  3. during the entire testing period
  4. responsible for test security
  5. begins on April 12
  6. o'clock is the time proctors should arrive in rooms they are proctoring

12 Clues: begins on April 12is permitted during breakscan write in the test booksresponsible for test securityduring the entire testing periodmust be kept secure at all timesshould be covered in testing roomsare used for each student for each section of the online assessmento'clock is the time proctors should arrive in rooms they are proctoring...

9/11 2024-05-10

9/11 crossword puzzle
Across
  1. where the first attacks happened on 9/11
  2. the kind of tree that survived the twin tower attack
  3. what happened to the towers after they were hit
  4. month of the terrorist attacks in 2011
  5. president during 9/11
  6. new legislation passed to fight terrorism
  7. president that made Patriot Act become Freedom Act
  8. target for another terrorist plane after NYC
Down
  1. leader of 9/11 attacking terrorist organization
  2. where Americans crashed plane headed to White House
  3. new airport security after 9/11, Transportation Security Administration
  4. musical artist who wrote a song to inspire patriotism after 9/11

12 Clues: president during 9/11month of the terrorist attacks in 2011where the first attacks happened on 9/11new legislation passed to fight terrorismtarget for another terrorist plane after NYCleader of 9/11 attacking terrorist organizationwhat happened to the towers after they were hitpresident that made Patriot Act become Freedom Act...

SAFE INTERNET 2025-02-28

SAFE INTERNET crossword puzzle
Across
  1. A secret code used to secure accounts
  2. A type of malware disguised as legitimate software
  3. Any software designed to harm or exploit a system
  4. The right to protect personal information online
  5. A unique identifier for logging into accounts
  6. A tool or app used for two-step verification
Down
  1. A scam where attackers trick users into revealing sensitive information
  2. A security system that blocks unauthorized access
  3. A tool that encrypts your internet connection for security
  4. Software that protects computers from malware
  5. Illegal activities conducted on the internet
  6. Malicious software that secretly gathers user data

12 Clues: A secret code used to secure accountsIllegal activities conducted on the internetA tool or app used for two-step verificationSoftware that protects computers from malwareA unique identifier for logging into accountsThe right to protect personal information onlineA security system that blocks unauthorized access...

3.5 Compare and contrast network access and management method 2025-09-03

3.5 Compare and contrast network access and management method crossword puzzle
Across
  1. Management done on a separate network for security
  2. Sends only some traffic through VPN, rest uses local internet
  3. VPN where a user connects through a web browser
  4. Secure intermediate system used to access another network
  5. VPN that allows a remote user to connect to a network
Down
  1. Sends all traffic through VPN for security
  2. Management done over the same network being monitored
  3. Graphical interface for managing devices
  4. VPN that connects two networks together permanently
  5. Software interface for programmatic management
  6. Direct connection to a device using serial or USB
  7. Secure command line access protocol

12 Clues: Secure command line access protocolGraphical interface for managing devicesSends all traffic through VPN for securitySoftware interface for programmatic managementVPN where a user connects through a web browserDirect connection to a device using serial or USBManagement done on a separate network for security...

TEKA-TEKI SILANG BULLYING 2026-01-29

TEKA-TEKI SILANG BULLYING crossword puzzle
Across
  1. Tindakan menjauh dari pelaku bullying?
  2. Perbuatan yang termasuk ke dalamBullying Verbal?
  3. Mengancam teman agar takut termasuk bullying?
Down
  1. Mengirim pesan kasar atau menghina melalui media sosial disebut....Bullying
  2. Bullying melalui ucapan atau kata-kata yang menyakiti perasaan.
  3. Bullying yang dilakukan dengan kekerasan tubuh

6 Clues: Tindakan menjauh dari pelaku bullying?Mengancam teman agar takut termasuk bullying?Bullying yang dilakukan dengan kekerasan tubuhPerbuatan yang termasuk ke dalamBullying Verbal?Bullying melalui ucapan atau kata-kata yang menyakiti perasaan.Mengirim pesan kasar atau menghina melalui media sosial disebut....Bullying

Rabbit-Proof Fence Vocabulary 2024-08-17

Rabbit-Proof Fence Vocabulary crossword puzzle
Across
  1. squat down
  2. reptile
  3. security
  4. afraid
  5. village, community
  6. a point of reference
Down
  1. refuge
  2. deep sadness
  3. cows
  4. a dry area of land
  5. hurting
  6. footprint

12 Clues: cowsrefugeafraidreptilehurtingsecurityfootprintsquat downdeep sadnessa dry area of landvillage, communitya point of reference

Are health hackers the new cyber security threat? 2019-03-11

Are health hackers the new cyber security threat? crossword puzzle
Across
  1. Request for information from a database
  2. A program under the US Social Security Administration that reimburses hospitals and physicians for medical care provided to qualifying people over 65 years old.
  3. Poor health resulting from disease of body or mind; a disease
Down
  1. Something aimed or fired at
  2. An indication of impending danger or harm
  3. To struggle or contend frantically in order to get something
  4. market A place where such illegal business is carried on.

7 Clues: Something aimed or fired atRequest for information from a databaseAn indication of impending danger or harmmarket A place where such illegal business is carried on.To struggle or contend frantically in order to get somethingPoor health resulting from disease of body or mind; a disease...

TSchmidt - Network Devices 2023-01-04

TSchmidt - Network Devices crossword puzzle
Across
  1. all traffic flows through this for processing
  2. connects networks
  3. wired network
  4. this takes a single input and spreads it out amongst all outputs
  5. bridges reduces traffic between these
  6. refrigerators, dishwashers, smart tvs and thermostats are some of these
  7. A wireless network connects wirelessly to this
  8. patch panels provide a ________ between PCs and switches/routers
  9. an all in one security, with ids, ips, and a firewall
  10. protects data and equipment on a network from an unauthorized access
Down
  1. aps provide network access to...
  2. monitors all devices under or connected to a network
  3. another term for ethernet over power is...
  4. These filter and segment network traffic by sending data back to device which it was sent
  5. legacy systems are inherently ______ to security breaches
  6. passively monitors traffic on networks
  7. extending a signals distance and restoring weak signals
  8. this powers on devices that are not directly connected to power or have a battery
  9. Another wireless network

19 Clues: wired networkconnects networksAnother wireless networkaps provide network access to...bridges reduces traffic between thesepassively monitors traffic on networksanother term for ethernet over power is...all traffic flows through this for processingA wireless network connects wirelessly to thismonitors all devices under or connected to a network...

Cyber Month Crossword Puzzle 2024-08-26

Cyber Month Crossword Puzzle crossword puzzle
Across
  1. The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
  2. Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
  3. An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
  4. Process of determining whether someone or something is who or what they say they are.
  5. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
  6. A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
  1. Characters used to verify identity, usually to gain access to an account, website, or system. For more information
  2. Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
  3. Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
  4. The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  5. An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
  6. An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
  7. Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
  8. A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.

14 Clues: Process of determining whether someone or something is who or what they say they are.A type of malicious software designed to block access to a computer system or data until a sum of money is paid.Characters used to verify identity, usually to gain access to an account, website, or system. For more information...

Jason crossword 2025-09-09

Jason crossword crossword puzzle
Across
  1. is a computer program that simulates human conversation with an end user.
  2. type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
  3. electro-mechanical data storage device that stores and retrieves digital data
  4. a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
  5. is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. the practice of pretending on social media to be someone different
  7. is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
  8. a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
  9. a software program or a system desgined to help users find information
  10. a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
  11. is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  12. is an application for accessing websites.
Down
  1. is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
  2. s a mobile device that combines traditional mobile technology with more advanced computing abilities.
  3. a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
  4. networking technology that uses radio waves to provide wireless high-speed Internet access.
  5. In the digital age, consumers are more connected than ever before through smartphones and apps
  6. is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
  7. a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
  8. device designed to fit on top of a typical office desk.
  9. A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
  10. is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
  11. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
  12. are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
  13. A computer's short term memory , where the data that the processor is currently using is stored
  14. all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
  15. technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.

27 Clues: is an application for accessing websites.device designed to fit on top of a typical office desk.the practice of pretending on social media to be someone differenta software program or a system desgined to help users find informationis a computer program that simulates human conversation with an end user....

Thanksgiving Puzzle 2022-10-17

Thanksgiving Puzzle crossword puzzle
Across
  1. Occurs after eating to much, known as a food ____.
  2. Which state did the pilgrims land?
  3. Thanksgiving is held on what day each year.
  4. A noise typically associated with turkeys
  5. Two people hold opposite ends till it breaks in half, the bigger side is deemed the winner.
  6. The location of the Macy's Day Parade.
  7. Tastes better than turkey.
Down
  1. The day after thanksgiving commonly known for all the deals offered.
  2. A holiday that is celebrated by excessive eating.
  3. What is the current month we are in?
  4. The main dish served for thanksgiving dinner.
  5. The name of the ship the pilgrims came on.
  6. Usually the last float in the Macy's Day Parade.
  7. What day does the cyber version of black fridat occur?

14 Clues: Tastes better than turkey.Which state did the pilgrims land?What is the current month we are in?The location of the Macy's Day Parade.A noise typically associated with turkeysThe name of the ship the pilgrims came on.Thanksgiving is held on what day each year.The main dish served for thanksgiving dinner....

Unit 9: Digital Health 2024-04-22

Unit 9: Digital Health crossword puzzle
Across
  1. a health professional who diagnoses medical conditions
  2. patients can use social media to choose doctors by reading _____ from other patients about their experience
  3. a word that means 'not good enough'
  4. your digital _______ includes all the actions you take online
  5. a person who receives medical treatment
  6. ______-bullying includes targeting and threatening someone online
  7. something that is trustworthy
Down
  1. patients can use social media to find online _____ groups
  2. you must be careful online as some information may be _____ and incorrect
  3. a word that means loneliness
  4. _____ media allows people to interact online, examples include facebook and instagram
  5. a person who steals important information online
  6. the most popular social media platform in the UAE
  7. a mental health problem involving a lot of worry and stress

14 Clues: a word that means lonelinesssomething that is trustworthya word that means 'not good enough'a person who receives medical treatmenta person who steals important information onlinethe most popular social media platform in the UAEa health professional who diagnoses medical conditionspatients can use social media to find online _____ groups...

Bullying 2024-08-20

Bullying crossword puzzle
Across
  1. Kata untuk tindakan mendiamkan seseorang atau menghindari komunikasi.
  2. Tindakan yang melibatkan perundungan secara berkelompok.
  3. Mempermalukan seseorang di depan orang lain
  4. Bentuk bullying yang melibatkan penganiayaan fisik secara langsung. (Contoh: pukulan)
  5. Proses di mana seseorang merasa tertekan dan tidak memiliki kontrol.
  6. Suatu perilaku yang dilakukan oleh sekelompok orang untuk mengintimidasi
  7. Kata yang menggambarkan tindakan intimidasi atau ancaman secara berulang-ulang.
Down
  1. Proses untuk menghentikan bullying dengan melaporkan kepada pihak berwenang.
  2. Tindakan menyebar informasi palsu tentang seseorang.
  3. Perasaan tidak berdaya dan tertekan akibat tindakan bullying
  4. Kata yang digunakan untuk menyebut tindakan menyakiti secara verbal atau emosional
  5. Kata untuk seseorang yang melakukan bullying.
  6. Kata untuk mengidentifikasi individu yang menjadi sasaran bullying
  7. Jenis bullying yang terjadi melalui media sosial atau teknologi digital

14 Clues: Mempermalukan seseorang di depan orang lainKata untuk seseorang yang melakukan bullying.Tindakan menyebar informasi palsu tentang seseorang.Tindakan yang melibatkan perundungan secara berkelompok.Perasaan tidak berdaya dan tertekan akibat tindakan bullyingKata untuk mengidentifikasi individu yang menjadi sasaran bullying...

Cyber Safety Review 2022-02-17

Cyber Safety Review crossword puzzle
Across
  1. To Pretend to be someone you are not
  2. Having good manners online
  3. ___ a term used in Megan's Story that involves lying about your identity
  4. Self_____ is how you feel about yourself
Down
  1. Bullying someone over and over with varying degrees of intensity
  2. Facts or proof you should show to an adult if you are being cyber bullied.
  3. Fake phrases meant to hurt someone
  4. Feeling very sad and upset, a feeling you can possibly have when being bullied.
  5. Another name for a cyberbully

9 Clues: Having good manners onlineAnother name for a cyberbullyFake phrases meant to hurt someoneTo Pretend to be someone you are notSelf_____ is how you feel about yourselfBullying someone over and over with varying degrees of intensity___ a term used in Megan's Story that involves lying about your identity...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : Bullying someone online through messages or social media
  2. : A harmful program that can damage files and software
  3. : People who use the internet or computers to commit crimes
  4. : Software that protects your computer from viruses
Down
  1. : The practice of protecting devices and data from cyber threats
  2. : Fake messages that try to steal passwords or bank info
  3. : Criminal activities done using computers or the internet
  4. : A system that blocks unauthorized access to or from a private network
  5. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Bullying someone online through messages or social media: Criminal activities done using computers or the internet: People who use the internet or computers to commit crimes...

Power Apps 2024-04-29

Power Apps crossword puzzle
Across
  1. Foster
  2. Aces$
  3. Clinicals
  4. Access & Review
  5. Shapiro
  6. Daycare Center
Down
  1. Nursing
  2. Concealed Carry
  3. Firearm Owners Identification
  4. Security
  5. Illinois State Police
  6. Needed to own a gaming machine not in a casino
  7. Land of Lincoln
  8. Federal Bureau of Investigation
  9. YMCA
  10. Healthcare Worker

16 Clues: YMCAAces$FosterNursingShapiroSecurityClinicalsDaycare CenterConcealed CarryAccess & ReviewLand of LincolnHealthcare WorkerIllinois State PoliceFirearm Owners IdentificationFederal Bureau of InvestigationNeeded to own a gaming machine not in a casino

Crossword - Voltedge 2019-09-06

Crossword - Voltedge crossword puzzle
Across
  1. Tool replacing Oracle HR
  2. Portal to view security emergency contact and other security info
  3. One of the focus areas of EHS
  4. What protocal is used to authenticate OnGuard end user's SSO
  5. TCT supports export control for which country?
  6. Measure based on the deviations of individual scores from the mean
Down
  1. Tool used for Rewards and Recognitions
  2. What is the SOX Compliant application under EHS
  3. Python library for machine learning
  4. CDA application is hosted here

10 Clues: Tool replacing Oracle HROne of the focus areas of EHSCDA application is hosted herePython library for machine learningTool used for Rewards and RecognitionsTCT supports export control for which country?What is the SOX Compliant application under EHSWhat protocal is used to authenticate OnGuard end user's SSO...

Let us see who was focusing! 2023-04-15

Let us see who was focusing! crossword puzzle
Across
  1. a network security system that monitors and controls incoming and outgoing network traffic based on a set of rules.
  2. the business's main goal
  3. the relational database they use
  4. future goal of the e-commerce
  5. Increases when using a relational database
Down
  1. suggestion for sportszone
  2. Where the content was saved
  3. an organized collection of data that is stored and accessed electronically
  4. Single table structure
  5. a situation that sports zone considered as an opportunity

10 Clues: Single table structurethe business's main goalsuggestion for sportszoneWhere the content was savedfuture goal of the e-commercethe relational database they useIncreases when using a relational databasea situation that sports zone considered as an opportunityan organized collection of data that is stored and accessed electronically...

Active Directory 2015-01-14

Active Directory crossword puzzle
Across
  1. what can active directory do (6 Letters Beginning with B)
  2. What is AD? [15 Letters]
  3. What active directory is [8 Letters]
Down
  1. What is the main reason active directory is used? [8 Letters]
  2. Beginning with B - Who uses it? [10 Letters]
  3. Active directory service [10 Letters]
  4. Protocol AD uses (4 letters - Acronym)
  5. Another word for Single user name and password [5 Letters]
  6. Improves ? Security[11 Letters]
  7. Active Directory improves through _ _ _ _ _ _ _ _ _ _ _ management capabilities [11 Letters]

10 Clues: What is AD? [15 Letters]Improves ? Security[11 Letters]What active directory is [8 Letters]Active directory service [10 Letters]Protocol AD uses (4 letters - Acronym)Beginning with B - Who uses it? [10 Letters]what can active directory do (6 Letters Beginning with B)Another word for Single user name and password [5 Letters]...

Robbery 2017-07-10

Robbery crossword puzzle
Across
  1. First name of the second security officer
  2. first thing you do after a robbery
  3. what do you hand out to customers that witnessed the robbery
  4. Who is the 1st security officer
  5. distinctive physical characteristic
Down
  1. full name of the 1st contact for media
  2. Keep the customer ______!
  3. common description of suspect involving how long they have been alive
  4. who should you call after you lock the doors
  5. common description of suspect involving their size

10 Clues: Keep the customer ______!Who is the 1st security officerfirst thing you do after a robberydistinctive physical characteristicfull name of the 1st contact for mediaFirst name of the second security officerwho should you call after you lock the doorscommon description of suspect involving their size...

Important Concepts 2017-11-17

Important Concepts crossword puzzle
Across
  1. Is the increasing interaction of people through the growth of the international flow
  2. Income advised to infaltion
  3. % of economy growth
  4. Ability to influence others based on specific characteristics
  5. People who share democratic and cultural similarities
  6. State actions taken to ensure its security that threatened the security of other states
  7. studies interactions between countries
Down
  1. Right of a nation to become an independent state
  2. Type of conflict in which religion could be involved
  3. Income

10 Clues: Income% of economy growthIncome advised to infaltionstudies interactions between countriesRight of a nation to become an independent stateType of conflict in which religion could be involvedPeople who share democratic and cultural similaritiesAbility to influence others based on specific characteristics...

ESLA COME 2024-10-03

ESLA COME crossword puzzle
Across
  1. OS permit to creat server
  2. Security rules in windows server
  3. Security protocol use private and public key
  4. a machine capable of reproducing human behaviour
  5. Other model of OSI model more simply make by american army
Down
  1. Network devices in level 2 of OSI model
  2. Protcol to use ip @ in a other place or nation
  3. Model of interconnection network devices
  4. Protocol use in ping
  5. Association protocol permit to associate ip @ and MAC @

10 Clues: Protocol use in pingOS permit to creat serverSecurity rules in windows serverNetwork devices in level 2 of OSI modelModel of interconnection network devicesSecurity protocol use private and public keyProtcol to use ip @ in a other place or nationa machine capable of reproducing human behaviourAssociation protocol permit to associate ip @ and MAC @...

SCA Crossword Puzzle 2025-11-20

SCA Crossword Puzzle crossword puzzle
Across
  1. The area where bags and passengers are screened
  2. The person who flies the plane
  3. Where planes take off and land
  4. Where the pilot sits to fly the plane
  5. When a plane touches back down
Down
  1. What you do with your ticket and bags before security
  2. The building where passengers wait for flights
  3. When a plane leaves the ground
  4. Where you board your plane
  5. The path planes use to get to the runway

10 Clues: Where you board your planeThe person who flies the planeWhen a plane leaves the groundWhere planes take off and landWhen a plane touches back downWhere the pilot sits to fly the planeThe path planes use to get to the runwayThe building where passengers wait for flightsThe area where bags and passengers are screened...

Daily Vocabulary 2024-11-12

Daily Vocabulary crossword puzzle
Across
  1. Kepala Sekolah
  2. Teman Sekelas
  3. Kantor
  4. Murid
  5. Perpustakaan
Down
  1. Guru
  2. Kelas
  3. Lapangan
  4. Kantin
  5. Satpam

10 Clues: GuruKelasMuridKantinSatpamKantorLapanganPerpustakaanTeman SekelasKepala Sekolah

week 6 2025-10-03

week 6 crossword puzzle
Across
  1. collide
  2. killed
  3. bomb
  4. phones cocaine
  5. war
  6. Nelson
Down
  1. Security delayed
  2. Texas
  3. president
  4. four

10 Clues: warbombfourTexaskilledNelsoncollidepresidentphones cocaineSecurity delayed

cyber threats and security 2026-01-19

cyber threats and security crossword puzzle
Across
  1. STEALINGINFORMATION WITHOUT USER PERMISSION
Down
  1. THESE ATTACK CAUSE DATA TO DAMAGE
  2. IN PHISHINGTHE RECIEVER IS TRICKED BY MAKING HIM/HER VBELIEVE THAT THE MESSAGE IS RECIEVED FROM A TRUSTED SOURCE

3 Clues: THESE ATTACK CAUSE DATA TO DAMAGESTEALINGINFORMATION WITHOUT USER PERMISSIONIN PHISHINGTHE RECIEVER IS TRICKED BY MAKING HIM/HER VBELIEVE THAT THE MESSAGE IS RECIEVED FROM A TRUSTED SOURCE

Ch 17 Intro to Business 2025-09-15

Ch 17 Intro to Business crossword puzzle
Across
  1. A form specifying the number of allowances in the Employee’s Withholding Allowance Certificate
  2. Tax on the net income of an individual
  3. A federal tax used to fund the public service programs Social Security and Medicare
  4. Tax deducted from an individual’s paycheck, such as for Social Security and Medicare
  5. The amount of money you earn before any payroll deductions
  6. Tax on income used to pay for the Medicare (health) program provided to individuals over the age of 65 or individuals with a disability
  7. An employer‐sponsored retirement plan, sometimes with matching funds
  8. All of the income received in a year
Down
  1. The amount of money that tax calculations are based on
  2. The amount that will be withheld from each paycheck
  3. An attachment to an employee’s paycheck that shows the amount earned and details the payroll deductions
  4. Tax on income paid by both the employee and the employer to fund the Social Security system
  5. An employment eligibility verification form filled out by both an employer and an employee
  6. A simple income tax form that can be used by anyone who has an income of less than $100,000 and is not claiming dependents
  7. An employee’s take‐home pay; net pay is calculated by gross pay with deductions subtracted
  8. A reduction of taxes paid on gross income
  9. A form prepared by an employer reporting an employee’s annual wages and the amount of taxes withheld from paychecks

17 Clues: All of the income received in a yearTax on the net income of an individualA reduction of taxes paid on gross incomeThe amount that will be withheld from each paycheckThe amount of money that tax calculations are based onThe amount of money you earn before any payroll deductionsAn employer‐sponsored retirement plan, sometimes with matching funds...

puzzle 5 2024-07-10

puzzle 5 crossword puzzle
Across
  1. A personal area online
  2. Related to computers and the internet
Down
  1. Ability to use or enter
  2. Program that fights harmful software
  3. A copy of your files for safety

5 Clues: A personal area onlineAbility to use or enterA copy of your files for safetyProgram that fights harmful softwareRelated to computers and the internet

Computers and Technology. 2023-05-17

Computers and Technology. crossword puzzle
Across
  1. - Artificial intelligence is a field of computer science that aims to create machines that can think, learn, and solve problems like humans.
  2. - Mobile devices like smartphones and tablets have transformed the way we access information and communicate with each other, allowing us to be connected anywhere and anytime.
  3. - Social media platforms like Facebook, Twitter, and Instagram have transformed the way we interact with each other online and in real life.
  4. - Robotics involves the use of computer technology to design, build, and operate machines that can perform tasks autonomously.
  5. - The term "digital" refers to anything that is encoded using binary code, and has become a ubiquitous part of modern technology and culture.
  6. - Cloud computing allows users to access data and applications over the internet rather than relying on local hardware, enabling greater flexibility and scalability.
  7. - Apple Inc. is a leading technology company that has been at the forefront of innovation with its Mac computers, iPods, iPhones, and more.
  8. - The global system of interconnected computer networks that has transformed the way we communicate and access information.
Down
  1. - International Business Machines Corporation is a pioneering computer company that played a major role in the development of early computing technology.
  2. - Microsoft Corporation is a software company that revolutionized personal computing with its Windows operating system and Microsoft Office suite.
  3. - Virtual reality and virtual worlds are computer-generated environments that have opened up new possibilities for gaming, education, and entertainment.
  4. - The microchip is the key component of modern electronics and has enabled the development of computers, smartphones, and other devices.
  5. - Google is a search engine that has become synonymous with the internet, as well as a leading developer of software and technology products.
  6. - Silicon is the key material used in the manufacture of computer chips and other electronics.
  7. - The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology.

15 Clues: - Silicon is the key material used in the manufacture of computer chips and other electronics.- The prefix "cyber" is used to describe anything related to computers, the internet, and digital technology.- The global system of interconnected computer networks that has transformed the way we communicate and access information....

Financial Math Vocab 2021-09-20

Financial Math Vocab crossword puzzle
Across
  1. An overtime rate that is two times the hourly rate
  2. payroll or other types of checks that are directly and electronically deposited into a bank account
  3. The set amount of money that a worker recieves for each item the individual produces
  4. paid time off that an employer may offer to employees as an employee benefit
  5. an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
  6. the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
  7. a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
  8. the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
  9. one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
  10. social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
  11. the set number of hours that an employee is expected to work
  12. Money that employees or others recieve based on sales, for example, an author or musician
  13. The total pay, which is the sum of an employees hourly pay and overtime pay
  14. a plan that employees to buy or recieve company stock;offered as an employee benefit
  15. asistance to employees who are injured while working at their job, a program that is governed by state laws.
  16. an employee benefit that allows employees paid time off to care for sick children or newborns
Down
  1. The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
  2. a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
  3. a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
  4. the federal act that established social security insurance
  5. an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
  6. a type of retirement plan where an employee recieves compensation from an employer after retirement
  7. The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
  8. a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
  9. a type of worker who is paid for each item the employee produces
  10. a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
  11. a set amount that an employee is paid for each hour of work
  12. the hourly wage an employee recieves for any overtime hours
  13. a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
  14. A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
  15. The extra hours an employee works beyond their regular hours
  16. the maximum income on which a person must pay social security tax in a given year

32 Clues: An overtime rate that is two times the hourly ratethe federal act that established social security insurancea set amount that an employee is paid for each hour of workthe hourly wage an employee recieves for any overtime hoursthe set number of hours that an employee is expected to workThe extra hours an employee works beyond their regular hours...

Jason crossword 2025-09-09

Jason crossword crossword puzzle
Across
  1. is a computer program that simulates human conversation with an end user.
  2. type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
  3. electro-mechanical data storage device that stores and retrieves digital data
  4. a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
  5. is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. the practice of pretending on social media to be someone different
  7. is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
  8. a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
  9. a software program or a system desgined to help users find information
  10. a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
  11. is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  12. is an application for accessing websites.
Down
  1. is the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
  2. s a mobile device that combines traditional mobile technology with more advanced computing abilities.
  3. a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
  4. networking technology that uses radio waves to provide wireless high-speed Internet access.
  5. In the digital age, consumers are more connected than ever before through smartphones and apps
  6. is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
  7. a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing. Most laptops have a hardware drive inside the lower lid.
  8. device designed to fit on top of a typical office desk.
  9. A firewall is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
  10. is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
  11. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
  12. are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
  13. A computer's short term memory , where the data that the processor is currently using is stored
  14. all of them are a form of digital measurement used to describe the size of information on a system or the capacity of storage available on a disk or other digital storage media.
  15. technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.

27 Clues: is an application for accessing websites.device designed to fit on top of a typical office desk.the practice of pretending on social media to be someone differenta software program or a system desgined to help users find informationis a computer program that simulates human conversation with an end user....

Bullying 2012-10-18

Bullying crossword puzzle
Across
  1. ______ are most likely to be bullied online.
  2. It is important to raise _________ of bullying in your community.
  3. It is important to tell a teacher or trusted ______ if bullying is occuring.
  4. bullying is a form of _______.
  5. To treat another kindly, with patience and care.
  6. A person who observes the bullying behavior.
  7. Physical or emotional injury to someone.
  8. Help prevent bullying by taking _______.
Down
  1. Mental bullying occurs when bullies spread _____ about someone.
  2. A way of bullying by using email or a cell phone.
  3. If extra help is needed there are ______ groups.
  4. Making a statement or taking action that shows harm to another.
  5. Rumor or talk of a personal, sensational, or intimate nature.
  6. Racist remarks and name calling are forms of ______ bullying.
  7. Most bullies try to get a _____ from their targets.

15 Clues: bullying is a form of _______.Physical or emotional injury to someone.Help prevent bullying by taking _______.______ are most likely to be bullied online.A person who observes the bullying behavior.If extra help is needed there are ______ groups.To treat another kindly, with patience and care.A way of bullying by using email or a cell phone....

IT-Security - Datenschutz/Datensicherheit 2016-01-29

IT-Security - Datenschutz/Datensicherheit crossword puzzle
Across
  1. Wenn Daten doppelt vorhanden sind (Sicherheitskopie) ist es ein ?
  2. Sie sind in ein Dokument/Datei eingebettet und nennen sich ...
  3. Was ist der Überbegriff für unerwünschte, schädliche Software?
  4. und Junke E-Mails Wie werden unerwünschte Werbemails genannt?
  5. Durch was wird versucht gefälschte Daten Zugang zu den Passwörtern zu erlangen?
Down
  1. Was versteckt sich in einem scheinbar nützlichen Programm ?
  2. Mithilfe von elektronischen Medien wird ... durchgeführt
  3. Was wird auf dem Rechner gespeichert wenn sie eine Website besuchen ?
  4. Was baut den Schutz zwischen dem Internet und dem Heimcomputer her ?
  5. Bei was werden gefälschte Webseiten umgeleitet ?

10 Clues: Bei was werden gefälschte Webseiten umgeleitet ?Mithilfe von elektronischen Medien wird ... durchgeführtWas versteckt sich in einem scheinbar nützlichen Programm ?und Junke E-Mails Wie werden unerwünschte Werbemails genannt?Sie sind in ein Dokument/Datei eingebettet und nennen sich ...Was ist der Überbegriff für unerwünschte, schädliche Software?...

A Stronger Me 2012-07-15

A Stronger Me crossword puzzle
Across
  1. Someone who abuses someone to have power of them
  2. You life is what?
  3. To be uncomfortable in a situation is what type of sign?
  4. To be discluded from the world is to be what?
  5. To be in control is having all the what?
Down
  1. The given name to a type of technological bullying?
  2. A group of people either family or friends or helpline
  3. Hitting someone repeatedly is what kind of abuse?
  4. Attacking someone either physically, emotionally or verbally is called what?
  5. The mourning of someone is called what?

10 Clues: You life is what?The mourning of someone is called what?To be in control is having all the what?To be discluded from the world is to be what?Someone who abuses someone to have power of themHitting someone repeatedly is what kind of abuse?The given name to a type of technological bullying?A group of people either family or friends or helpline...

Cyber Wellness Crossword Puzzle 2014-06-05

Cyber Wellness Crossword Puzzle crossword puzzle
Across
  1. Do not set __________ password for your account.
  2. Cyber bullying is using the social–network to _________ others online.
  3. Be ________ for your words and actions online.
  4. Be ________ of what you post online, they can hurt others.
  5. If you do not want to _________ the song, you should buy the CD.
Down
  1. What is one very famous website for watching videos?
  2. You can find help from your teacher or _________.
  3. Do not post things that will hurt others on social _________.
  4. Do not use the same ________ for all your accounts.
  5. We should not download games and movies _________.

10 Clues: Be ________ for your words and actions online.Do not set __________ password for your account.You can find help from your teacher or _________.We should not download games and movies _________.Do not use the same ________ for all your accounts.What is one very famous website for watching videos?...

Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class 2021-10-08

Plagiarism Crossword - Submission dated 8.10.21 by Ritika and Ritu for Reeta Mam's class crossword puzzle
Across
  1. Most type form of Plagiarism
  2. name of the software that can perform multiple language checks for plagiarism
  3. Unintentional Plagiarism
  4. The Indian act that covers Plagiarism is Indian ……….. Act , 1957
  5. A Type of irresponsible authorship that leads to plagiarism
  6. one study multiple articles refers to what type of Plagarism
Down
  1. Copying content from the internet is which type of plagiarism
  2. Failure to appropriately credit others' prior discoveries
  3. Marks If there is a need to reproduce a ‘short’ exact text from elsewhere, following should be used in the paper
  4. One of the consequences of plagiarism

10 Clues: Unintentional PlagiarismMost type form of PlagiarismOne of the consequences of plagiarismFailure to appropriately credit others' prior discoveriesA Type of irresponsible authorship that leads to plagiarismone study multiple articles refers to what type of PlagarismCopying content from the internet is which type of plagiarism...

Cybersecurity and Healthcare 2021-05-31

Cybersecurity and Healthcare crossword puzzle
Across
  1. Limiting the risks or impacts of a cyber threat.
  2. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
  3. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
  4. You should never share this.
  5. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
  1. When should you report an IT breach or potential breach?
  2. A cyberattack attempting to discover your personal information.
  3. Federal law protecting patient privacy.
  4. The US Food and Drug Administration.
  5. Whose responsibility is cybersecurity?

10 Clues: You should never share this.The US Food and Drug Administration.Whose responsibility is cybersecurity?Federal law protecting patient privacy.Limiting the risks or impacts of a cyber threat.When should you report an IT breach or potential breach?A cyberattack attempting to discover your personal information....

Ty Violet-bullying 2022-03-04

Ty Violet-bullying crossword puzzle
Across
  1. you are the victim of a bully
  2. what type of person is hurting the bullied
  3. you are getting bullied by someone in front of your friends
  4. this is a type of bullying that removes people from groups
  5. what type of bullying is a person who watches and does nothing
Down
  1. you are hurting people by words
  2. you are hurting the person next to you
  3. of power what is the b in the ABC's of bullying
  4. Michel pushed Brandon what type of bullying is this.
  5. this type of bullying is done online

10 Clues: you are the victim of a bullyyou are hurting people by wordsthis type of bullying is done onlineyou are hurting the person next to youwhat type of person is hurting the bulliedof power what is the b in the ABC's of bullyingMichel pushed Brandon what type of bullying is this.this is a type of bullying that removes people from groups...

Friday fun 2023-12-14

Friday fun crossword puzzle
Across
  1. If 13=m and 20=t, how much is 8+1+3+11+5+4
  2. 1010011010
  3. This cyber-related term can come from anywhere!
  4. If the weather is between #03a2ff and 104, 3, 255, how is it?
  5. Go forward go back, nothing has changed..
Down
  1. The publisher of 9th best-selling game in the USA in 2020
  2. The last name of the person on the list of people on the world's first www-page.
  3. German word in the middle, coming soon
  4. A coding snake
  5. 01100011 01100101 01110010 01101110

10 Clues: 1010011010A coding snake01100011 01100101 01110010 01101110German word in the middle, coming soonGo forward go back, nothing has changed..If 13=m and 20=t, how much is 8+1+3+11+5+4This cyber-related term can come from anywhere!The publisher of 9th best-selling game in the USA in 2020If the weather is between #03a2ff and 104, 3, 255, how is it?...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Suicide Awareness and Prevention 2023-09-21

Suicide Awareness and Prevention crossword puzzle
Across
  1. Talking about suicide can help spread ________ of mental health
  2. Condition associated with cyber and other bullying
  3. CDC says 20% of youth experience social __________
  4. Early diagnosis and treatment of mental disorders can lead to a ____________ life
  5. Targets of _____________ are at a greater risk of self-harm and suicidal behaviors
Down
  1. A potential warning sign of impending suicide is giving away _________
  2. Mean age of onset of adolescent depression
  3. Suicide _____________ is a critical goal of the NJROTC program
  4. A potential warning sign of impending suicide is long-term ____________
  5. Mental health is often overlooked and called the "silent ________"

10 Clues: Mean age of onset of adolescent depressionCondition associated with cyber and other bullyingCDC says 20% of youth experience social __________Suicide _____________ is a critical goal of the NJROTC programTalking about suicide can help spread ________ of mental healthMental health is often overlooked and called the "silent ________"...

wije 2025-02-24

wije crossword puzzle
Across
  1. Sirkuit elektronik yang diukir pada lapisan bahan semikonduktor
  2. Untuk menampilkan bagian grafik yang ingin ditampilkan
  3. Fitur untuk menyederhanakan dan menganalisa data
  4. Kejahatan cyber tentang membobol informasi kartu kredit dengan alat yang dipasang di mesin ATM atau EDC
  5. Teknologi identifikasi tanpa kabel yang menggunakan gelombang radio
Down
  1. Aturan pelindungan privasi
  2. Salah satu web/aplikasi chatbot populer
  3. Proses pemberian izin atau kewenangan untuk mengakses data tertentu
  4. Knsep dimana suatu objek yang memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi manusia ke manusia atau manusia ke komputer
  5. Media sosial untuk berkomunikasi

10 Clues: Aturan pelindungan privasiMedia sosial untuk berkomunikasiSalah satu web/aplikasi chatbot populerFitur untuk menyederhanakan dan menganalisa dataUntuk menampilkan bagian grafik yang ingin ditampilkanSirkuit elektronik yang diukir pada lapisan bahan semikonduktorProses pemberian izin atau kewenangan untuk mengakses data tertentu...

Syniverse Crossword 2025-12-03

Syniverse Crossword crossword puzzle
Across
  1. Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
  2. Using mobile service outside your home network
  3. Protecting networks and data from cyber threats
  4. Application to person messaging for OTPs, alerts, and notifications
  5. Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
  1. Delivery of texts and rich communications
  2. Final money movement between carriers after clearing
  3. Continuous advancement that keeps networks and businesses competitive
  4. Illicit or abusive use of telecom services
  5. Reconciling usage records between operators for billing

10 Clues: Delivery of texts and rich communicationsIllicit or abusive use of telecom servicesUsing mobile service outside your home networkProtecting networks and data from cyber threatsFinal money movement between carriers after clearingReconciling usage records between operators for billingApplication to person messaging for OTPs, alerts, and notifications...

Digital identity 2023-10-26

Digital identity crossword puzzle
Across
  1. Protecting yourself on the internet (12 letters).
  2. Customize your online visibility (15 letters).
  3. What others think of you based on your actions (10 letters).
  4. Enhanced login security (12 letters).
Down
  1. Who you are on the internet (14 letters).
  2. Courtesy and consideration for others (7 letters).
  3. Key to your online security (8 letters).
  4. Harassment on the internet (12 letters).
  5. Confirm the truth of something (6 letters).
  6. Notify authorities of misconduct (6 letters).

10 Clues: Enhanced login security (12 letters).Key to your online security (8 letters).Harassment on the internet (12 letters).Who you are on the internet (14 letters).Confirm the truth of something (6 letters).Customize your online visibility (15 letters).Notify authorities of misconduct (6 letters).Protecting yourself on the internet (12 letters)....

Computer Virus 2024-07-06

Computer Virus crossword puzzle
Across
  1. "Software that spies on computer activities."
  2. "Self-replicating malware."
  3. Horse: "Malware disguised as legitimate software."
  4. "Software designed to disrupt, damage, or gain unauthorized access."
  5. "A type of malicious software."
Down
  1. "A hidden means of bypassing security."
  2. "Malware that encrypts data for ransom."
  3. "A security system that monitors and controls incoming and outgoing network traffic."
  4. "Software designed to detect and remove malware."
  5. "Software used to gain unauthorized access and hide its presence."

10 Clues: "Self-replicating malware.""A type of malicious software.""A hidden means of bypassing security.""Malware that encrypts data for ransom.""Software that spies on computer activities.""Software designed to detect and remove malware."Horse: "Malware disguised as legitimate software.""Software used to gain unauthorized access and hide its presence."...

FO Training Newsletter Issue 03/2023 Quiz 2023-06-19

FO Training Newsletter Issue 03/2023 Quiz crossword puzzle
Across
  1. The most common cause of hard landing
  2. Manager Flight Crew Training
  3. All loss of control inflight is caused by human error
  4. Nose-high high-bank and nose-low high-bank are types of ______
  5. Knowledge, ______ and Attitude contributes to overall ______
  6. Safety and Security in the organization is the responsibility of the employer and employees
Down
  1. ______ pilot at the seat may cause a loss of control inflight
  2. Who is FO Training Senior Executive Flight Crew Training
  3. Poor ______ of the pilots attributed to the crash of AF447
  4. Proficiency in ______ helps prevent loss of control inflight
  5. Safety and Security is our ______
  6. Accretion of ______ may cause engine loss of power
  7. Always ______ first in any work environment
  8. How many editions of FO Training newsletter are published per year?
  9. Short form for loss of control inflight

15 Clues: Manager Flight Crew TrainingSafety and Security is our ______The most common cause of hard landingShort form for loss of control inflightAlways ______ first in any work environmentAccretion of ______ may cause engine loss of powerAll loss of control inflight is caused by human errorWho is FO Training Senior Executive Flight Crew Training...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assignment - Billy Summers Crossword 2024-03-06

Vocabulary Assignment - Billy Summers Crossword crossword puzzle
Across
  1. just behavior or treatment
  2. someone who writes a book
  3. a type of phone used by criminals
  4. a person accompanying another for security purposes
  5. a secret plan to do something unlawful
  6. an outfit used in order to not get recognised
  7. the act of getting away quickly, usually from a crime scene
Down
  1. a long range rifle usually equipped with a scope
  2. a building where criminal trials take place
  3. protection against and from any potential harm
  4. the practice of a person doing business or shoring assets overseas to avoid taxes
  5. an account of a person's life written as such by that person
  6. a killer for hire
  7. the act of willful killing for any reason
  8. a person who arranges deals and work between two people or groups

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. a person accompanying another for security purposes
  2. an account of a person's life written as such by that person
  3. a person who arranges deals and work between two people or groups
  4. just behavior or treatment
  5. the practice of a person doing business or shoring assets overseas to avoid taxes
  6. the act of getting away quickly, usually from a crime scene
  7. a killer for hire
Down
  1. a building where criminal trials take place
  2. the act of willful killing for any reason
  3. a secret plan to do something unlawful
  4. a type of phone used by criminals
  5. an outfit used in order to not get recognised
  6. someone who writes a book
  7. protection against and from any potential harm
  8. a long range rifle usually equipped with a scope

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Shields and Scrubs 2025-08-12

Shields and Scrubs crossword puzzle
Across
  1. – Workplace ______ Prevention Site Committee focus.
  2. – The culture reinforced through consistent reporting and early intervention.
  3. – What staff monitor for early signs of escalation.
  4. – Risk assessment tool for recognizing escalating behaviors (acronym).
  5. – Detection systems flagged 235,000+ alerts for these in 2025.
  6. – Early coordinated ______ helps manage patient threats effectively.
  7. – Street name of the office location for Security Services.
  8. – Emotion expressed to acknowledge frustration and build trust.
Down
  1. – Response for situations involving aggressive or threatening behavior (no space).
  2. – A key value to uphold in all patient interactions.
  3. – Something to set clearly with patients showing inappropriate behaviors.
  4. – Issued when unsafe patient behaviors require immediate attention.
  5. – Department responsible for protecting staff and patients.
  6. – Reporting system for documenting incidents of verbal abuse or threats.
  7. – Built by listening and acknowledging patient concerns.

15 Clues: – Workplace ______ Prevention Site Committee focus.– What staff monitor for early signs of escalation.– A key value to uphold in all patient interactions.– Built by listening and acknowledging patient concerns.– Department responsible for protecting staff and patients.– Street name of the office location for Security Services....

Ernest Cybersecurity Crossword 2026-04-02

Ernest Cybersecurity Crossword crossword puzzle
Across
  1. Malicious code that spreads by attaching itself to files
  2. Fake messages that try to trick you into giving personal information
  3. Software that secretly collects user information
  4. Extra login security requiring two forms of verification
  5. Software designed to harm or exploit a computer or network
  6. The process of verifying a user's identity
  7. Software that detects and removes malware
  8. Malware that locks files and demands payment to unlock them
  9. A security system that blocks unauthorized access to a network
  10. Scrambling data so only authorized users can read it
  11. Someone who gains unauthorized access to systems
Down
  1. The trail of information you leave online
  2. Malware that spreads automatically without user action
  3. A secret word used to access an account
  4. When private information is exposed or stolen

15 Clues: A secret word used to access an accountThe trail of information you leave onlineSoftware that detects and removes malwareThe process of verifying a user's identityWhen private information is exposed or stolenSoftware that secretly collects user informationSomeone who gains unauthorized access to systems...

Safety Week#4_9 2014-10-27

Safety Week#4_9 crossword puzzle
Across
  1. / เดือน
  2. / การรักษาความปลอดภัย
  3. / คอมพิวเตอร์
  4. / ผลัก
  5. / การลาพักร้อน
  6. / คุ้มกัน หรือ อุปกรณ์ป้องกัน
Down
  1. / ลูกกลิ้ง
  2. / การดูแลความสะอาดเรียบร้อย
  3. / ดึง
  4. / ซุปเปอร์ไวเซอร์

10 Clues: / ดึง/ ผลัก/ เดือน/ ลูกกลิ้ง/ คอมพิวเตอร์/ การลาพักร้อน/ ซุปเปอร์ไวเซอร์/ การรักษาความปลอดภัย/ การดูแลความสะอาดเรียบร้อย/ คุ้มกัน หรือ อุปกรณ์ป้องกัน

Spanish airport 2026-03-25

Spanish airport crossword puzzle
Across
  1. Passport
  2. to do
  3. to put
  4. Identity
  5. Seat
Down
  1. Flight
  2. Suitcase
  3. Security
  4. Trip
  5. taxi

10 Clues: TriptaxiSeatto doFlightto putSuitcasePassportSecurityIdentity

pazdan olaolczak03@gmail.com 2018-01-29

pazdan olaolczak03@gmail.com crossword puzzle
Across
  1. Złośliwy program, który można pobrać z internetu nieświadomie
  2. Osoba,która próbuje włamać się na komputer
  3. Najpopularniejsza wyszukiwarka internetowa
Down
  1. Nękanie w cyber przestrzeni
  2. Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu

5 Clues: Nękanie w cyber przestrzeniOsoba,która próbuje włamać się na komputerNajpopularniejsza wyszukiwarka internetowaMiesiąc,w którym obchodzimy Dzień Bezpiecznego InternetuZłośliwy program, który można pobrać z internetu nieświadomie

Cyber ethics 11 2025-05-23

Cyber ethics 11 crossword puzzle
Across
  1. log out from public ____.
  2. not open emails from ____ senders.
Down
  1. details should be kept ____.
  2. cyber citizens think before they ____.
  3. rule: If it’s not yours, give ____.

5 Clues: log out from public ____.details should be kept ____.not open emails from ____ senders.rule: If it’s not yours, give ____.cyber citizens think before they ____.

Tech 2023-10-09

Tech crossword puzzle
Across
  1. Output device
  2. Network security
  3. Main circuit board
  4. Input device
  5. Computer programs
  6. Display screen
  7. Central processing unit
  8. Memory component
  9. Solid-state drive
Down
  1. Wired network connection
  2. Physical computer components
  3. Internet exploration tool
  4. Typing tool
  5. Malicious software
  6. Electronic communication

15 Clues: Typing toolInput deviceOutput deviceDisplay screenNetwork securityMemory componentComputer programsSolid-state driveMain circuit boardMalicious softwareCentral processing unitWired network connectionElectronic communicationInternet exploration toolPhysical computer components

week 5 spelling words 2025-02-27

week 5 spelling words crossword puzzle
Across
  1. test
  2. having great influence on someone or something.
  3. secret
  4. weddins
  5. security
  6. timing
  7. possibly
  8. must have
  9. existing or occurring at the beginning
Down
  1. a qualification
  2. incomplete
  3. positioned in
  4. for people to live in
  5. party

14 Clues: testpartysecrettimingweddinssecuritypossiblymust haveincompletepositioned ina qualificationfor people to live inexisting or occurring at the beginninghaving great influence on someone or something.

The UK - A Divided Country Level 1 2026-02-20

The UK - A Divided Country Level 1 crossword puzzle
Across
  1. Å skille
  2. Forskning
  3. Economic and political union
  4. Being sceptic to the European Union
  5. Forbli
  6. Utvide
Down
  1. Minke/gå nedover
  2. Lønn
  3. Anstendig
  4. Misnøye
  5. Sikkerhet
  6. The UK leaving the European Union
  7. Et skille/avstand
  8. Tidsepoke

14 Clues: LønnForbliUtvideMisnøyeÅ skilleAnstendigForskningSikkerhetTidsepokeMinke/gå nedoverEt skille/avstandEconomic and political unionThe UK leaving the European UnionBeing sceptic to the European Union

Cyber safety-by Bridget Graham 2016-05-24

Cyber safety-by Bridget Graham crossword puzzle
Across
  1. to decline or not accept a request on a game
  2. private information that you don't share with with other people
  3. when you post something on the internet so everyone can see it
  4. to copy a file from one computer system to another via the Internet
  5. something that is important not to tell people on the internet or they can track you down
  6. a saved link to a website
  7. allows people to share things online
  8. when you close a screen to save it for later
  9. when an unknown number or email address appears on your emails
  10. a search engine
  11. to upload information to the web
Down
  1. when someone pretends to be your friend on games but their really not
  2. a little chip that is is in your computer that you can turn off and on
  3. when someone is being mean to you on line
  4. a web address
  5. never tell anyone about it because you don't know what's going to happen
  6. information stored on your computer or device
  7. your personal address on your computer
  8. a location on the internet
  9. little pictures to express your feeling
  10. ups when browsing a new window appears that you don't want

21 Clues: a web addressa search enginea saved link to a websitea location on the internetto upload information to the weballows people to share things onlineyour personal address on your computerlittle pictures to express your feelingwhen someone is being mean to you on lineto decline or not accept a request on a game...

Cyber safety words-Lance Zafico 2016-05-21

Cyber safety words-Lance Zafico crossword puzzle
Across
  1. instant messaging online
  2. guidance
  3. popups
  4. get info from
  5. when bullies do bad things
  6. info you don't want to share
  7. someone you don't know
  8. someone following you without you knowing
  9. when you're using the internet
  10. another name for the internet
Down
  1. id for logging in
  2. says mean things
  3. computer guide
  4. bad people
  5. personal info
  6. secret word or phrase
  7. people getting your info
  8. a place where everyone chats to each other
  9. messages sent to your email address
  10. safe

20 Clues: safepopupsguidancebad peoplepersonal infoget info fromcomputer guidesays mean thingsid for logging insecret word or phrasesomeone you don't knowinstant messaging onlinepeople getting your infowhen bullies do bad thingsinfo you don't want to shareanother name for the internetwhen you're using the internetmessages sent to your email address...

SBLI Cyber Month Crossword Puzzle! 2024-10-06

SBLI Cyber Month Crossword Puzzle! crossword puzzle
Across
  1. A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
  2. A service that creates a secure connection over the internet, often used for privacy. (acronym)
  3. Device used to secure doors or containers, often requiring a key or combination. (1 word)
  4. Software that detects and removes malicious software from a computer. (1 word)
  5. Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
  6. Device used to watch and record activity in a specific area for safety purposes.(2 words)
  7. The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
  8. A type of malware that locks users out of their data, demanding payment for access. (1 word)
  9. Unique pattern of ridges and valleys on the skin of a finger, used for identification.
  10. The process of converting information into a code to prevent unauthorized access. (1 word)
  11. A list of trusted entities or applications that are granted access. (1 word)
Down
  1. An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
  2. A method of bypassing normal authentication, often used for malicious purposes. (1 word)
  3. Ethan and Brian make up this team (2 words)
  4. A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
  5. Software that secretly monitors user activity and collects personal information. (1 word)
  6. Team that handles SBLI's tech (acronym)
  7. Manipulating individuals into divulging confidential information. (2 words)
  8. A software update designed to fix vulnerabilities or bugs. (1 word)
  9. Malware disguised as legitimate software to trick users into installing it. (1 word)
  10. Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
  11. A weakness in a system that can be exploited by threats. (1 word)
  12. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
  13. A network security system that monitors and controls incoming and outgoing traffic. (1 word)
  14. An incident where unauthorized access to data occurs. (1 word)

25 Clues: Team that handles SBLI's tech (acronym)Ethan and Brian make up this team (2 words)An incident where unauthorized access to data occurs. (1 word)A weakness in a system that can be exploited by threats. (1 word)A software update designed to fix vulnerabilities or bugs. (1 word)...

Cyber Ethics Puzzle, Chapter 7 2024-11-22

Cyber Ethics Puzzle, Chapter 7 crossword puzzle
Across
  1. Commerce that takes place over the internet instead of at physical stores.
  2. A prominent writer espousing Neo-luddism and associated ideologies.
  3. Being responsible for something, such as the results of an action.
  4. Forms of remote communication made possible through the use of technology.
  5. A group of farmers concerned that technology would render them obsolete.
  6. Textual data that is received over the internet and formatted via HTML and CSS.
  7. The (often non-consentual) removal of data from a consumer device by the producer of that device.
  8. This company is, among other things, the primary maintainer of the android operating system, and got into controversy after removing applications from the mobile phones of users.
  9. A compendium of information, either in general or on a specific topic.
  10. An online encyclopedia who's easily editable nature has been abused by many organizations over the years.
  11. This company is known for maintaining strict controls over their software ecosystem.
  12. This company is known for its extremely popular computer operating system.
Down
  1. A group similar to Luddites, but with a view that most forms of technology are evil, and do more harm than good.
  2. A computer program designed to search the internet for websites matching a user's query.
  3. A worldwide network of connected devices that facilitate the sharing of information.
  4. A way of simulating a process through software so that one may predict the results of a course of action.
  5. A type of medicine that is performed at long distance using technological assistance.
  6. A term used to refer to field of producing and using computers.
  7. Sensors and other devices that are networked together and communicate via wirelessly.
  8. This company stirred up controversy by removing books from the digital reading devices of customers.

20 Clues: A term used to refer to field of producing and using computers.Being responsible for something, such as the results of an action.A prominent writer espousing Neo-luddism and associated ideologies.A compendium of information, either in general or on a specific topic.A group of farmers concerned that technology would render them obsolete....

Cyber Fund Final Exam Vocab 2025-05-12

Cyber Fund Final Exam Vocab crossword puzzle
Across
  1. a computer system on the internet that is expressly set up to attract and trap intruders
  2. the state of being complete or uncorrupted
  3. data can be accessed when needed
  4. spoofed emails and fraudulent websites designed to fool recipients into divulging PII
  5. small text files that are saved on the computer for use with web browsers and websites
  6. another word for "technical" skills
  7. Governs the type of traffic that is and isn't allowed through a firewall
  8. a governmental organization for standardizing measurement, technology, and industrial standards
  9. the physical part of a computer that you can touch
  10. a common type of DoS attack that involves sending more traffic to a network than the temp data storage can hold
  11. the condition of being private or secret
Down
  1. using a lie or scam to obtain private info
  2. the #1 cause of information security breaches for organizations
  3. This software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
  4. deploys when conditions exist that malware is seeking
  5. the internet protocol that has 128 bits
  6. the Act that ensures that financial businesses are protecting your private data
  7. a tool that intercepts raw data traveling on a network
  8. a malicious website using a URL similar to a real one (ex.: www.aple.com)
  9. malware hidden inside other software that seems harmless
  10. acronym for "Open Source Intelligence" - involves obtaining info that is freely available online using passive, semipassive, or active info gathering methods
  11. a flaw or potential for harm
  12. a program or code that replicates by being copied or initiating its copying to another program
  13. the type of harvest attack that tries to determine the valid email addresses associated with a server so they can be added to spam

24 Clues: a flaw or potential for harmdata can be accessed when neededanother word for "technical" skillsthe internet protocol that has 128 bitsthe condition of being private or secretusing a lie or scam to obtain private infothe state of being complete or uncorruptedthe physical part of a computer that you can touch...

Financial Math Vocab 2021-09-20

Financial Math Vocab crossword puzzle
Across
  1. An overtime rate that is two times the hourly rate
  2. payroll or other types of checks that are directly and electronically deposited into a bank account
  3. The set amount of money that a worker recieves for each item the individual produces
  4. paid time off that an employer may offer to employees as an employee benefit
  5. an insurance program avaliable through the US government that provides income to people who retire, become disabled, or need survivors benefits
  6. the amount of social security a worker pays depends on the socail security percentage and the maximum taxable income for that year; the amount is split between the employee and the employer
  7. a government program that offers benefits to eligible employees who,through no fault of their own, have become unemployed
  8. the amount of medicare tax an employee pays is a set percentage of the entire income with no maximum amounts; the amount paid is split between the employee and the employer
  9. one of the benefits that employers often offer to their employees in which they dont report to work and still recieved their salary
  10. social and medicare taxes both fall in this category; the money that employee and employer contribute to social security and medicare is used to pay current benefits to others
  11. the set number of hours that an employee is expected to work
  12. Money that employees or others recieve based on sales, for example, an author or musician
  13. The total pay, which is the sum of an employees hourly pay and overtime pay
  14. a plan that employees to buy or recieve company stock;offered as an employee benefit
  15. asistance to employees who are injured while working at their job, a program that is governed by state laws.
  16. an employee benefit that allows employees paid time off to care for sick children or newborns
Down
  1. The hourly rate an employee gets paid for overtime hours calculated as 1.5 times the regular hourly pay
  2. a fixed period of time that most states use in an unemployment insurance formula to determine weekly benefits
  3. a type of health insurance that covers all members of immediate family for health care bills to the extent outlined in the health care coverage
  4. the federal act that established social security insurance
  5. an agreement between an individual and a company where the individual agrees to make regular payments to the company so that if a negative event occurs, the policyholder recieves compensation
  6. a type of retirement plan where an employee recieves compensation from an employer after retirement
  7. The hourly rate that federal law allows as the least hourly rate to be paid to an employee in the United States
  8. a type of health insurance that covers only the individual to the extent outlined in the health care coverage plan
  9. a type of worker who is paid for each item the employee produces
  10. a means that employees may offer as to save for retirement;these types of plans may include pensions or 401(k)
  11. a set amount that an employee is paid for each hour of work
  12. the hourly wage an employee recieves for any overtime hours
  13. a unique, nine digit number that identifies a resident a resident of the united states; this number is used to keep track of social security taxes that are paid
  14. A method of payment where an employee recieves a percentage of the amount of sales produced by that employee
  15. The extra hours an employee works beyond their regular hours
  16. the maximum income on which a person must pay social security tax in a given year

32 Clues: An overtime rate that is two times the hourly ratethe federal act that established social security insurancea set amount that an employee is paid for each hour of workthe hourly wage an employee recieves for any overtime hoursthe set number of hours that an employee is expected to workThe extra hours an employee works beyond their regular hours...

Chapter 5 2013-10-18

Chapter 5 crossword puzzle
Across
  1. A contractual term where goods that are sold are paid for upon receipt.
  2. Person owing funds under a construction contract must retain a specified percentage to be paid at a later time.
  3. A chattel used to indicate to a purchaser the nature of similar goods usually to be delivered in the future; those goods must match the sample.
  4. Creditors who have taken steps to ensure that they will be paid, usually by acquiring first claim to some property that ensures payment over other creditors.
  5. Offences under provincial statutory or regulations that impose penalties but do not qualify as criminal law.
  6. A legislated requirement for incorporating a company in some jurisdictions in Canada; also the process of filing a form to perfect a security under the Personal Property Security Act.
  7. This involves the practice of placing two prices on an item and the merchant charging the higher of the two.
  8. Where goods are purchased on the basis of a description set out in an advertisement or on packaged materials, including all manufactured goods.
  9. Proceeding in which a receiver is appointed for a corporation that has defaulted on its obligations to a creditor to protect its assets for the creditors.
  10. A receipt for goods in the care of the shipper.
  11. The seller provides credit to the purchaser, holding title until the goods are paid for.
  12. Goods must be usable by the purchaser in the way normally intended.
  13. Creditors that are secured so that they have a priority with respect to their claims again the debtor.
  14. Designed to ensure that consumers are treated fairly in the marketplace.
  15. A requirement of the Sale of Goods Act imposing an obligation on the seller to ensure a certain standard of fitness and quality on the goods they sell.
  16. A contract term placing the responsibility for arranging and paying for the insurance and freight for goods being transported from seller to purchaser.
  17. Licensed professionals who, for a fee, assist the debtor and creditors in the bankruptcy process, holding and otherwise dealing with that bankrupt's property for the benefit of the creditors.
  18. An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving individual debtor's involving lesser indebtness the right to make a proposal to creditors, which if accepted and performed will avoid bankruptcy.
  19. Where a product is advertised at a low price and the purchaser is persuaded to purchase a higher priced product when the lower price one is not available.
  20. Where competitors biding on a product coordinate to determine the winning bid.
  21. Process by which an insolvent person voluntarily or involuntarily transfers assets to a trustee for distribution to creditors.
  22. General creditors; there is only a contract requiring a debt to be repaid, but no collateral contract giving that creditor priority with respect to some property in the event of default.
  23. Offences under provincial legislation or federal regulatory statutes that impose penalties but do not qualify as criminal law.
  24. Where two or more individuals act together to accomplish an illegal purpose.
  25. Under the Personal Property Security Act where value has been given pursuant to contract and the creditor now has a claim against assets used as security.
  26. Seller retains the right to stop the shipment in event of default.
  27. When an agreement has been made; but before there has been any performance.
Down
  1. An individual purchasing goods or services not for resale or to be used in a business.
  2. Where title to a chattel is transferred to a creditor as security for debt.
  3. Where competitors agree on a fixed price for selling their services or merchandise thus keeping prices high and defeating competition.
  4. Collateral right to debt giving the creditor the right to take back the goods or intercept the debt owing used as security in the event of a default.
  5. An obligation on the seller under the sale of Goods Act to convey ownership in the goods being sold.
  6. An alternative to bankruptcy under the Bankruptcy and Insolvency Act giving corporations and debtors with significant debt the right to make a proposal to creditors, which if accepted and performed, will avoid bankruptcy.
  7. Court ordering the transfer of debtor's assets to a trustee as part of the bankruptcy process.
  8. An interest in property giving a creditor a prior claim to that property, often called a lien.
  9. Punishable wrongdoing associated with bankruptcy such as withholding information or wrongfully transferring assets.
  10. A fraudulant investment scheme where funds invested by later investors are used to pay off earlier investors, creating a false sense of success.
  11. A voluntary transfer of assets to a trustee in bankruptcy.
  12. A bankrupt is discharge but still required to pay a specified amount to creditors, as opposed to an absolute discharge where no such conditions are imposed.
  13. Merchants temporarily transfer to a creditor the right to collect money owed to the merchant by customers as security for a loan.
  14. Where the bankrupt is relieved of his debts, and his assets are no longer under the control of the trustee.
  15. When a person is unable to pay his or her debts as they become due.
  16. Registering a security or taking a possession of the collateral used to secure a debt under the Personal Property Security Act.
  17. Free on board: a term designating the point that title and responsibility for goods sold transfers to the purchaser.

44 Clues: A receipt for goods in the care of the shipper.A voluntary transfer of assets to a trustee in bankruptcy.Seller retains the right to stop the shipment in event of default.Goods must be usable by the purchaser in the way normally intended.When a person is unable to pay his or her debts as they become due....

Types of markets 2022-01-25

Types of markets crossword puzzle
Across
  1. securities with maturities of less than one year
  2. location where buyers and sellers of financial products meet to conduct business
  3. investment instruments representing equity or debt
  4. another name for equity
  5. A security representing a loan issued by a business or government is known
  6. A security representing ownership in a corporation is known as
  7. maturity less than one year
  8. is another name for debt
Down
  1. investors are risk ____ meaning given a choice of two investments of equal return, the investor will choose the investment with the lower risk.
  2. Expected __. amount of future cash flows
  3. maturity more than 10 years
  4. Ability to convert an investment to cash at its full value
  5. securities with maturities of greater than one year
  6. maturity 2-10 years
  7. return/ purchase price

15 Clues: maturity 2-10 yearsreturn/ purchase priceanother name for equityis another name for debtmaturity more than 10 yearsmaturity less than one yearExpected __. amount of future cash flowssecurities with maturities of less than one yearinvestment instruments representing equity or debtsecurities with maturities of greater than one year...

Roaring Twenties Hour 5 2017-04-25

Roaring Twenties Hour 5 crossword puzzle
Across
  1. A machine with four wheels that can hold a small number of people
  2. Hoover Republican elected president in 1928.
  3. Lindbergh Who flew alone in his plane from New York to Paris in 33 ½ hours.
  4. Conservation Corps Put jobs in the forest and woods for young men.
  5. Coolidge Vice President of Massachusetts
  6. Ford Stands high among automobile makers.
Down
  1. Introduced to wireless telegraph
  2. A person exploring a new area
  3. Works Administration Sums were spent to build schools, highways, bridges, hospitals, and dams.
  4. Got people to be able buy new machines.
  5. brothers Kept in the air for one minute of a powered-machine they made
  6. The flying of an aircraft
  7. De Forest Invented a radio tube
  8. Security Act Been Expanded and extended after Social Security.
  9. Harding Was elected president in 1920.

15 Clues: The flying of an aircraftA person exploring a new areaDe Forest Invented a radio tubeIntroduced to wireless telegraphHarding Was elected president in 1920.Got people to be able buy new machines.Coolidge Vice President of MassachusettsFord Stands high among automobile makers.Hoover Republican elected president in 1928....

Ryan McGirr 2017-09-08

Ryan McGirr crossword puzzle
Across
  1. The electronic responsibilities and rules of being online.
  2. The use of electronic communication to bully
  3. Any message passed through digital devices.
  4. plagiarism When someone steals or takes information without permission.
  5. Effective passwords will help you keep your security.
  6. Someone you don’t know might be dangerous or bad.
  7. Keeping your information about yourself away from internet predators.
  8. When someone copies your image without permission.
  9. The security of your online information.
  10. Being online and active.
Down
  1. Using electronics to interact in social activities online and being responsible.
  2. A way to talk to friends and share stuff online.
  3. Digital search will help you find when you're looking for in the internet.
  4. The access you have to your stuff online.
  5. Using things on the internet fairly.

15 Clues: Being online and active.Using things on the internet fairly.The security of your online information.The access you have to your stuff online.Any message passed through digital devices.The use of electronic communication to bullyA way to talk to friends and share stuff online.Someone you don’t know might be dangerous or bad....

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. just behavior or treatment
  2. someone who writes a book
  3. a type of phone used by criminals
  4. a person accompanying another for security purposes
  5. a secret plan to do something unlawful
  6. an outfit used in order to not get recognised
  7. the act of getting away quickly, usually from a crime scene
Down
  1. a long range rifle usually equipped with a scope
  2. a building where criminal trials take place
  3. protection against and from any potential harm
  4. the practice of a person doing business or shoring assets overseas to avoid taxes
  5. an account of a person's life written as such by that person
  6. a killer for hire
  7. the act of willful killing for any reason
  8. a person who arranges deals and work between two people or groups

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Comp B 2023-12-06

Comp B crossword puzzle
Across
  1. Main screen and user interface of a computer
  2. Process of encoding data for security purposes
  3. Input device for controlling on-screen movement
  4. Security measure to protect a computer from unauthorized access
Down
  1. Device for converting physical images into digital format
  2. Wireless technology for connecting devices
  3. Activity of playing video or computer games
  4. Central unit that performs calculations in a computer
  5. Temporary storage area for frequently accessed data
  6. Collection of songs organized for playback

10 Clues: Wireless technology for connecting devicesCollection of songs organized for playbackActivity of playing video or computer gamesMain screen and user interface of a computerProcess of encoding data for security purposesInput device for controlling on-screen movementTemporary storage area for frequently accessed data...