cyber security Crossword Puzzles

Panda Search 2018-04-12

Panda Search crossword puzzle
Across
  1. Main character, crime solver
  2. title
  3. to find
  4. owner of the zoo
  5. author
  6. law enforcement
  7. security guard at zoo
Down
  1. taken
  2. standing out
  3. zoo owner's rival
  4. famous zoo
  5. find an answer
  6. trade
  7. stolen panda
  8. daughter of the zoo's owner

15 Clues: takentitletradeauthorto findfamous zoostanding outstolen pandafind an answerlaw enforcementowner of the zoozoo owner's rivalsecurity guard at zoodaughter of the zoo's ownerMain character, crime solver

46 2022-01-24

46 crossword puzzle
Across
  1. Comedian Daniel
  2. Yucatan native
  3. hate
  4. About Elton John
  5. Hexer
  6. U.N. Security Council permanent member
  7. Best of the bet
Down
  1. Marvel villain
  2. Waves overhead, maybe
  3. Kitchen Utensils
  4. Music Genre (3)
  5. Ballerina's gear
  6. Vegan staple
  7. Bumped into
  8. "Rocks" at a bar

15 Clues: hateHexerBumped intoVegan stapleMarvel villainYucatan nativeComedian DanielMusic Genre (3)Best of the betKitchen UtensilsAbout Elton JohnBallerina's gear"Rocks" at a barWaves overhead, maybeU.N. Security Council permanent member

Levant 2024-11-19

Levant crossword puzzle
Across
  1. type of housing
  2. Management Company
  3. Security System
  4. Case Manager
  5. I fix it
  6. I keep it fun
Down
  1. Property name
  2. Building owner
  3. Medical Provider
  4. style of housing
  5. Minimum age
  6. Onsite Manager
  7. I keep it clean
  8. Rent app
  9. Beautiful view

15 Clues: Rent appI fix itMinimum ageCase ManagerProperty nameI keep it funBuilding ownerOnsite ManagerBeautiful viewtype of housingSecurity SystemI keep it cleanMedical Providerstyle of housingManagement Company

After 9/11 what happened next 2021-05-25

After 9/11 what happened next crossword puzzle
Across
  1. How many phases did Operation Enduring Freedom have?
  2. Outlines the powers of the President and commander and chief.
  3. What was grounded after the attacks?
  4. Why was Iraq and Suddam Hussein a treat?
  5. What began on October 7th against Taliban and al Qaeda training camps in Afghanistan?
  6. What country offered bin Laden sanctuary?
  7. Who was the National Security Advisor?
  8. What Doctrine declared the War on Terror?
Down
  1. What terrorist organization was identified?
  2. What was Bush's first decision as wartime commander?
  3. Who was the leader of Al Qaeda?
  4. Where were war criminals held?interrogation Methods such as sleep deprivation, slapping, water boarding, and subjecting prisoners' to cold.
  5. Who was Security of Defense?

13 Clues: Who was Security of Defense?Who was the leader of Al Qaeda?What was grounded after the attacks?Who was the National Security Advisor?Why was Iraq and Suddam Hussein a treat?What country offered bin Laden sanctuary?What Doctrine declared the War on Terror?What terrorist organization was identified?How many phases did Operation Enduring Freedom have?...

US-China relations 2025-11-14

US-China relations crossword puzzle
Across
  1. Popular video platform facing U.S. scrutiny over data security and ownership.
  2. a symbol of agricultural trade tensions between 2 countries
  3. to reduce risks in China-related supply chains
  4. A high-level meeting between leaders to manage tensions
  5. an action that is intended to cause anger
  6. Taxes on imports, used heavily during the U.S.–China trade war
  7. Chinese tech giant central in debates over 5G security and U.S. sanctions.
Down
  1. A major flashpoint in U.S.–China relations
  2. A strategy used to limit another nation’s power, influence, or expansion.
  3. Region that is the main focus of U.S. strategy to counter China
  4. A global project expanding China’s influence
  5. When relations worsen, they____ (verb)
  6. relations between 2 countries

13 Clues: relations between 2 countriesWhen relations worsen, they____ (verb)A major flashpoint in U.S.–China relationsan action that is intended to cause angerA global project expanding China’s influenceto reduce risks in China-related supply chainsA high-level meeting between leaders to manage tensions...

SPHE Crossword 2021-11-03

SPHE Crossword crossword puzzle
Across
  1. How you might feel if you were being bullied
  2. when you spread fake news about someone
  3. what you might get if you hold in things for to long
  4. what you tell the bully when they are bullying you
  5. to leave someone out
  6. practices to maintaining health
  7. what you are if you post on social media for your job
  8. to say you are going to do something dangerous to someone
  9. False or untrue
  10. who you tell if you are being bullied in school
Down
  1. what could happen if bullying escalates
  2. To constantly annoy or hurt someone
  3. talking behind somebody’s back
  4. treat people with .....
  5. best place to find fake news
  6. how you make people feel when you point out their flaws
  7. where bullying often happens the most
  8. What you are if you are being bullied
  9. the type of bullying when you use your words to hurt someone
  10. the type of bullying that happens online

20 Clues: False or untrueto leave someone outtreat people with .....best place to find fake newstalking behind somebody’s backpractices to maintaining healthTo constantly annoy or hurt someonewhere bullying often happens the mostWhat you are if you are being bulliedwhat could happen if bullying escalateswhen you spread fake news about someone...

DM literacy crossword 2021-11-03

DM literacy crossword crossword puzzle
Across
  1. DM’s
  2. people who invade devises
  3. black app icon
  4. bird
  5. apps and platforms where we can play games and socialise
  6. you send people messages using photos
  7. when people swap their belongings for someone else’s
  8. Dilemma we watched it on Netflix
  9. the amount of time you spend on a certain device
  10. all of your apps are on here
Down
  1. mainly older people use it
  2. the online server usually through google where we gather a lot of information daily
  3. our own information that contains our recent searches and things we’ve looked at
  4. the word that tells us to be careful on the internet
  5. how people often communicate using words
  6. you can watch music video, tutorials etc on this
  7. folders displayed on our home screens that contain different social media’and games.
  8. an app that we use to message people that comes from the phrase “what’s up”
  9. bullying when people get bullied online
  10. short recording often used to capture a moment

20 Clues: DM’sbirdblack app iconpeople who invade devisesmainly older people use itall of your apps are on hereDilemma we watched it on Netflixyou send people messages using photosbullying when people get bullied onlinehow people often communicate using wordsshort recording often used to capture a momentyou can watch music video, tutorials etc on this...

Doctor Who Crossword 2014-12-27

Doctor Who Crossword crossword puzzle
Across
  1. War
  2. Captain
  3. Police Box
  4. Vegetable
  5. The Tenth Planet
  6. Baker Sixth
  7. Weeping
  8. Billie
  9. Lost Home
  10. Loves Amy
  11. Peg
  12. Teselecta
  13. Twelfth
  14. Ten's Shoes
  15. Season Specials
  16. Doctor Number
  17. 11's hat
  18. ...Sphere
  19. Fifth
  20. Droids
  21. Fat
  22. Ten
  23. Third
  24. Eighth
  25. Gogh Artist
  26. Pond Red head
  27. Skaro
  28. Fans
  29. Cyber
  30. Lambert
  31. Dog
  32. Dalek
  33. Mister
  34. Flood
Down
  1. Seventh
  2. First
  3. Ten says it
  4. You Will Be...
  5. 1 & 2
  6. Lords Doctor's People
  7. Tree Of...
  8. Girl Clara
  9. Sixth's first
  10. You are the weakest link.
  11. 11's Attire
  12. 50th
  13. Baker Fourth
  14. Where it all began
  15. Ninth
  16. He who takes the________, takes the universe!
  17. Time And ____ Dimension In Space.
  18. Don't...
  19. Second
  20. Sto
  21. The Doctor's...
  22. Screwdriver Doctor's Toy
  23. Three Beginning Year
  24. Arch Enemy
  25. Come Along...
  26. The Celestial
  27. Religious Order
  28. Eleven
  29. Daughter
  30. Granddaughter

64 Clues: WarPegStoFatTenDog50thFansFirst1 & 2NinthFifthThirdSkaroCyberDalekFloodBillieSecondDroidsEighthElevenMisterSeventhCaptainWeepingTwelfthLambertDon't...11's hatDaughterVegetableLost HomeLoves AmyTeselecta...SpherePolice BoxTree Of...Girl ClaraArch EnemyTen says itBaker Sixth11's AttireTen's ShoesGogh ArtistBaker FourthSixth's firstDoctor Number...

People and Property Crimes 2016-02-01

People and Property Crimes crossword puzzle
Across
  1. Tricking someone to in order to gain something
  2. Essentially blackmail
  3. Another word for theft
  4. Someone breaks in and steals stuff committed a
  5. Physically assaulting someone
  6. Trying to keep people from committing crimes is_______
  7. A process to better criminals
  8. Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
  9. Setting things on fire on purpose
Down
  1. Lying while under oath
  2. Threatening someone with an attack
  3. Secluding a criminal to a small space (form of imprisonment.
  4. The lady who stole money from the booster club
  5. Lisa shot Ron. Ron is the victim of_______
  6. A crime committed with the use of technology
  7. I have a gun and want your money
  8. Criminal being forced to either serve the community or pay people they have harmed
  9. When somebody dies by the actions of another. Has varying degrees.
  10. Destruction of property
  11. Seeking revenge on a criminal often very cruel

20 Clues: Essentially blackmailLying while under oathAnother word for theftDestruction of propertyPhysically assaulting someoneA process to better criminalsI have a gun and want your moneySetting things on fire on purposeThreatening someone with an attackLisa shot Ron. Ron is the victim of_______A crime committed with the use of technology...

Doug's Great, No Doug's Amazing Crossword 2023-09-02

Doug's Great, No Doug's Amazing Crossword crossword puzzle
Across
  1. Bass booster
  2. Super without the S
  3. Friend who enjoys the action-packed MMO RPG
  4. Buddy with a Hellenic surname
  5. You only live once
  6. Surname of a naval officer who led underwater vessels
  7. Canine companion of a close buddy
  8. Dave’s upcoming addition to his household
  9. Surname of a common Michael
  10. What Doug does to video games
  11. Legendary dwarf who is saluted by his comrades
  12. His favorite playthings have wheels and engines
Down
  1. Pressing this letter triggers a slogan in a mining game
  2. Furry animal that Jane keeps as companions
  3. Cyber buddy who likes to dress as an anthropomorphic animal
  4. Spit rhymes
  5. Gem-stuffed grub that is slain by spelunkers in a sci-fi game
  6. Popular chinese video sharing app
  7. ROFL’s cousin
  8. Online communication platform
  9. Video conferencing platform
  10. Slim Shady's alter ego
  11. Viral internet joke
  12. A dwarf class that can grapple and light up caves
  13. Childhood pal with an edible moniker

25 Clues: Spit rhymesBass boosterROFL’s cousinYou only live onceSuper without the SViral internet jokeSlim Shady's alter egoVideo conferencing platformSurname of a common MichaelBuddy with a Hellenic surnameOnline communication platformWhat Doug does to video gamesPopular chinese video sharing appCanine companion of a close buddy...

Working with children and adolescents 2024-08-20

Working with children and adolescents crossword puzzle
Across
  1. type of bullying done through the internet
  2. type of play counselling which is structured
  3. level of 2 in moral development
  4. Zone of ______ development
  5. type of abuse that could include ridiculing
  6. Freud's psychosexual stage
  7. child not wanting to open up or be in counselling
  8. type of trauma from hearing about others trauma
Down
  1. balanced parenting style
  2. guidance on cases from someone with more experience/training
  3. the ethical principle of keeping information safe
  4. factor that minimises someones risk
  5. integrative model for play therapy
  6. ability to overcome/bounce back
  7. Bronfenbrenner's systemic theory
  8. what do we teach children about
  9. liked by many but also disliked by many
  10. metaphor to explain anger
  11. ending of counselling
  12. ____ vs guilt
  13. causing physical harm to oneself
  14. respecting everyones right to make their own decisions
  15. type of sibling relationship
  16. when a case is out of scope
  17. skills we teach children to handle their feelings and problems
  18. factor that puts someone at risk

26 Clues: ____ vs guiltending of counsellingbalanced parenting stylemetaphor to explain angerZone of ______ developmentFreud's psychosexual stagewhen a case is out of scopetype of sibling relationshipability to overcome/bounce backwhat do we teach children aboutlevel of 2 in moral developmentBronfenbrenner's systemic theorycausing physical harm to oneself...

crack the code 2024-04-30

crack the code crossword puzzle
Across
  1. The process of verifying the identity of a user or device (10 letters)
  2. - A type of attack where an attacker intercepts communication between two parties (6 letters)
  3. - The practice of disguising malicious files to make them appear harmless (7 letters)
  4. -A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
  5. - A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
Down
  1. - Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
  2. - A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
  3. -A set of rules or guidelines designed to enhance computer security (9 letters)
  4. -A program designed to prevent, detect, and remove malware (10 letters)
  5. - The exploitation of security vulnerabilities in a computer system or network (9 letters)
  6. - Protects a computer system from unauthorized access (9 letters)
  7. - The unauthorized copying of data from a computer system (6 letters)

12 Clues: - Protects a computer system from unauthorized access (9 letters)- The unauthorized copying of data from a computer system (6 letters)The process of verifying the identity of a user or device (10 letters)-A program designed to prevent, detect, and remove malware (10 letters)...

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. , Capital stock is the amount of common and preferred shares that a company is authorized to issue
  2. a service charge assessed by a broker or investment advisor.
  3. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  4. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  5. Mark Zuckerberg
Down
  1. Electronic Data Gathering, Analysis, and Retrieval system
  2. a sales pitch or promotion made by the underwriting firm, usually on the road
  3. a security that represents the ownership of a fraction of a corporation.
  4. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
  5. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  6. , A derivative is a complex type of financial security that is set between two or more parties.
  7. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

Ipo rossword puzzle 2021-09-13

Ipo rossword puzzle crossword puzzle
Across
  1. Capital stock is the amount of common and preferred shares that a company is authorized to issue
  2. a service charge assessed by a broker or investment advisor.
  3. a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
  4. Mark Zuckerberg
  5. An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
  6. a sales pitch or promotion made by the underwriting firm, usually on the road
  7. A derivative is a complex type of financial security that is set between two or more parties.
Down
  1. a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
  2. an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
  3. process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
  4. a security that represents the ownership of a fraction of a corporation.
  5. Electronic Data Gathering, Analysis, and Retrieval system

12 Clues: Mark ZuckerbergElectronic Data Gathering, Analysis, and Retrieval systema service charge assessed by a broker or investment advisor.a security that represents the ownership of a fraction of a corporation.a sales pitch or promotion made by the underwriting firm, usually on the road...

border security 2020-12-10

border security crossword puzzle
Across
  1. people and dogs that make sure nothing bad gets in to new Zealand!
  2. the illegal movement of good in to or out of our country!
Down
  1. alive things that we don't want in our bushes but some are ok!
  2. animals that have an amazing nose to find bad and good things!
  3. animas that are bad for the environment and eat other animals.
  4. living things that grow that are not bugs or humans or animals!
  5. creepy things that crawl into our bags!

7 Clues: creepy things that crawl into our bags!the illegal movement of good in to or out of our country!alive things that we don't want in our bushes but some are ok!animals that have an amazing nose to find bad and good things!animas that are bad for the environment and eat other animals.living things that grow that are not bugs or humans or animals!...

Security protocols 2022-01-10

Security protocols crossword puzzle
Across
  1. What does the second S in SSL stand for?
  2. Security ... - a sequence of operations that ensures protection of data
  3. The negotiation between two parties on a network before they begin a secured connection. Starts with TLS ...
Down
  1. Security ... - a digital document that authenticates certain websites
  2. ... attack - one of the attacks against SSL
  3. A type of encryption
  4. It can be public or private

7 Clues: A type of encryptionIt can be public or privateWhat does the second S in SSL stand for?... attack - one of the attacks against SSLSecurity ... - a digital document that authenticates certain websitesSecurity ... - a sequence of operations that ensures protection of data...

Social Security 2024-04-23

Social Security crossword puzzle
Across
  1. you recieve this from Social Security
  2. having a physical or mental condition that limits movements, senses, or activities.
  3. a severe global economic downturn that affected many countries across the world.
  4. a situation where a person actively searches for employment but is unable to find work.
Down
  1. a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
  2. a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
  3. the action or fact of leaving one's job and ceasing to work.

7 Clues: you recieve this from Social Securitythe action or fact of leaving one's job and ceasing to work.a severe global economic downturn that affected many countries across the world.having a physical or mental condition that limits movements, senses, or activities.a situation where a person actively searches for employment but is unable to find work....

Security issues 2025-01-25

Security issues crossword puzzle
Across
  1. A barrier protecting a network from unauthorized access (
  2. A duplicate copy of data for recovery purposes
  3. The process of converting data into a secure, unreadable format
  4. Software designed to detect and block harmful programs
  5. someone who gains unauthorized access to systems
Down
  1. Measures taken to protect data and systems
  2. Harmful software like viruses or ransomware

7 Clues: Measures taken to protect data and systemsHarmful software like viruses or ransomwareA duplicate copy of data for recovery purposessomeone who gains unauthorized access to systemsSoftware designed to detect and block harmful programsA barrier protecting a network from unauthorized access (...

Food Security 2025-01-14

Food Security crossword puzzle
Across
  1. Singapore relies heavily on _______, with 90% of its food resource coming from more than 170 countries.
  2. Lack of proper nutrition.
Down
  1. Beyond farming, food processing, storage, and distribution sectors also generate __________.
  2. Region that has the most hungry people.
  3. The community grows a wide variety of edible plant species to promote food __________.
  4. Country that is facing food insecurity mentioned in the slides.
  5. _______ farming is embraced by Singapore as a solution to limited land availability.

7 Clues: Lack of proper nutrition.Region that has the most hungry people.Country that is facing food insecurity mentioned in the slides._______ farming is embraced by Singapore as a solution to limited land availability.The community grows a wide variety of edible plant species to promote food __________....

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. TCT Application access provisioning is done by?
  2. Which Predix service is used to store documents in CDA product?
  3. Security model used by most of the ERP applications
  4. Re-tag in TCT can be done by?
  5. Source data ($) for deriving $ Thresholds?
Down
  1. Regression technique used in Improper Payments model
  2. Tool currently used for onboarding
  3. System that makes automated calls from security
  4. Deep learning architecture used in CDA application
  5. Greek letter that denotes mean of a statistical distribution

10 Clues: Re-tag in TCT can be done by?Tool currently used for onboardingSource data ($) for deriving $ Thresholds?System that makes automated calls from securityTCT Application access provisioning is done by?Deep learning architecture used in CDA applicationSecurity model used by most of the ERP applications...

Cybersecurity 2025-07-29

Cybersecurity crossword puzzle
Across
  1. Network of private computers infected with malicious software
  2. Technique of making data unreadable to unauthorized users
  3. Fraudulent attempt to obtain sensitive information
  4. Barrier between a trusted network and untrusted networks
  5. Software designed to damage, disrupt, or gain unauthorized access
  6. Secret string used to authenticate access
Down
  1. Attacker tricks someone into breaking security procedures
  2. Attempts to guess a password by trying many combinations
  3. Method of verifying identity using fingerprints, retina, etc.
  4. Security flaw allowing attackers to access restricted data

10 Clues: Secret string used to authenticate accessFraudulent attempt to obtain sensitive informationAttempts to guess a password by trying many combinationsBarrier between a trusted network and untrusted networksAttacker tricks someone into breaking security proceduresTechnique of making data unreadable to unauthorized users...

RU ITEC411 Crime and Security 2021-12-01

RU ITEC411 Crime and Security crossword puzzle
Across
  1. A verbal form of defamation
  2. One of the three principles of the CIA triad
  3. One of the three principles of the CIA triad
  4. A group of computers infected with malware controlled by a host
  5. One of the three principles of the CIA triad
  6. Software that can replicate itself and does not need to be activated
  7. Hacking for political motivation
  8. A way of protecting data through scrambling text
  9. A written form of defamation
Down
  1. directing people to fake websites to collect personal data
  2. Software that can replicate itself but needs to be activated
  3. Physical characteristics used to secure data
  4. The act of protecting computer systems
  5. Malicious code that looks to be harmless
  6. Gaining access to a computer or system without permission
  7. Act of sending emails in order to gain someone's personal information
  8. A type a malware that records activities on a computer
  9. Recording devices that are installed in card readers
  10. A method used to get around normal security measures
  11. A type of malware that locks a computer until money is paid

20 Clues: A verbal form of defamationA written form of defamationHacking for political motivationThe act of protecting computer systemsMalicious code that looks to be harmlessPhysical characteristics used to secure dataOne of the three principles of the CIA triadOne of the three principles of the CIA triadOne of the three principles of the CIA triad...

A+ 2025-02-11

A+ crossword puzzle
Across
  1. A type of software designed to steal personal data.
  2. A Microsoft cloud storage service.
  3. A protocol used for remote desktop access.
  4. A method used to prevent unauthorized access by requiring two credentials.
  5. Background processes.
  6. A Windows recovery option for rolling back changes.
  7. A type of social engineering where an attacker impersonates someone trusted.
  8. A feature that allows users to run older programs on new Windows versions.
Down
  1. A Windows security tool that helps prevent malware infections.
  2. A virtualization platform for running multiple OS.
  3. A type of virus that hides within legitimate software.
  4. A type of cyberattack that floods a system with traffic.
  5. A type of attack that intercepts and alters communication.
  6. A method of verifying system integrity using cryptography.
  7. A Windows feature that encrypts individual files and folders.
  8. A security policy that enforces password changes.
  9. A type of malware that locks users out of their system.
  10. A command used to trace network routes.

18 Clues: Background processes.A Microsoft cloud storage service.A command used to trace network routes.A protocol used for remote desktop access.A security policy that enforces password changes.A virtualization platform for running multiple OS.A type of software designed to steal personal data.A Windows recovery option for rolling back changes....

Internet 2024-12-04

Internet crossword puzzle
Across
  1. a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
  2. Everything having to do with the Internet
  3. To transfer files or data stored on the internet
  4. Electronic mail
Down
  1. a device that directs data traffic between your local network and the Internet.
  2. The computer software or app you use to access the internet
  3. a wireless networking technology
  4. A number that is used to identify networks within the routing system

8 Clues: Electronic maila wireless networking technologyEverything having to do with the InternetTo transfer files or data stored on the internetThe computer software or app you use to access the internetA number that is used to identify networks within the routing systema device that directs data traffic between your local network and the Internet....

KUKODI NYUMBA 2022-09-26

KUKODI NYUMBA crossword puzzle
Across
  1. STOREY
  2. SECURITY
  3. NEIGHBORHOOD
  4. CONTRACT
  5. TO RENT A HOUSE
Down
  1. FURNATURE
  2. TO MOVEIN
  3. TO RELOCATE
  4. REGION
  5. TENANT

10 Clues: STOREYREGIONTENANTSECURITYCONTRACTFURNATURETO MOVEINTO RELOCATENEIGHBORHOODTO RENT A HOUSE

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sending
  2. data
  3. protocol levels
  4. common clock
  5. interface, transmitter
Down
  1. decodes
  2. creation
  3. mediums
  4. security
  5. server, user's identity

10 Clues: datadecodessendingmediumscreationsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identity

CMSC 125: Operating Systems LE04 pt 1 2017-05-17

CMSC 125: Operating Systems LE04 pt 1 crossword puzzle
Across
  1. Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
  2. Pretending to be an authorized user to escalate privileges.
  3. Bypasses CPU to transfer data directly between I/O device and memory.
  4. The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
  5. Same key used to encrypt and decrypt.
  6. A destructive program that masquerades as a benign application.
  7. Results from disk head making contact with the disk surface.
  8. the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
Down
  1. Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
  2. Provides an object oriented way of implementing file systems.
  3. Storage structure consisting of information about a file.
  4. Program that initates a security incident under certain circumstances.
  5. The art of hiding messages by converting them into hidden texts.
  6. A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
  7. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
  8. The study of codes, or the art of writing and solving them.
  9. Intercepting an already established session to bypass authentication.
  10. Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
  11. Is a storage made available over a network rather than over a local connection.

19 Clues: Same key used to encrypt and decrypt.Storage structure consisting of information about a file.Pretending to be an authorized user to escalate privileges.The study of codes, or the art of writing and solving them.Results from disk head making contact with the disk surface.Provides an object oriented way of implementing file systems....

fanf 2022-02-09

fanf crossword puzzle
Across
  1. big idiot
  2. bunny
  3. stupid bear
  4. kuu pää
  5. perfect
Down
  1. stupid kid
  2. pirate
  3. guardian of security
  4. fat chiken
  5. aurinko pää
  6. crying wolf

11 Clues: bunnypiratekuu pääperfectbig idiotstupid kidfat chikenaurinko päästupid bearcrying wolfguardian of security

FCC 2025-03-24

FCC crossword puzzle
Across
  1. _CC
  2. New form of audio media
  3. Like texting
  4. F_C
  5. Who?
  6. National _ Act
  7. Where?
Down
  1. When? (Spelled out)
  2. Ring, ring
  3. What?
  4. FC_

11 Clues: _CCFC_F_CWho?What?Where?Ring, ringLike textingNational _ ActWhen? (Spelled out)New form of audio media

RDC Shows 2020-03-27

RDC Shows crossword puzzle
Across
  1. Shakespeare play which includes 3 witches
  2. RDC Musical Theatre Workshops 2020 production
  3. RDC's theatre festival in 2014
  4. Tale of a woman who loses her glass slipper
  5. Cyber Bully in rock musical Out Of My Comfort Zone
  6. The West End Tenors who performed at RDC in 2019
  7. Poem written by Lewis Carroll (Hunting of The ---)
  8. one-man comedy show mixing martial arts & cards(Card--)
  9. RDC Young Theatre Workshop's 2019 production
  10. regular comedy show for parents (Bring Your Own ---)
  11. Magical nanny in a book written by P.L. Travers(Mary--)
Down
  1. Regular night which showcases new work and new writing
  2. Kai's best friend in The Snow Queen
  3. Story of The Nutbrown Hares (Guess How Much I --- You)
  4. Complete the title - Boyface and the ---- ponies
  5. RYTW's 2016 Show, Performed at the National Theatre
  6. RDC and RMS collaboration performed at Hawkey Hall
  7. RDC's 2018 Christmas production (--- Christmas Dream)
  8. Julia Donaldson book - The Scarecrow's ---
  9. Crazy Chef who visited RDC last year (Signor ---)

20 Clues: RDC's theatre festival in 2014Kai's best friend in The Snow QueenShakespeare play which includes 3 witchesJulia Donaldson book - The Scarecrow's ---Tale of a woman who loses her glass slipperRDC Young Theatre Workshop's 2019 productionRDC Musical Theatre Workshops 2020 productionComplete the title - Boyface and the ---- ponies...

Vy´s second crossword 2020-05-11

Vy´s second crossword crossword puzzle
Across
  1. to see someone in real life
  2. to write on paper and send it to your friends
  3. if someone is hurt or is missing
  4. if you are really bad
  5. if someone is bullying you on the internet
  6. if you are a drama queen
  7. a very beautiful place that you will never forget
  8. if you are like a mom
  9. 13-18 years old
  10. to do a phone number away if you hate them
Down
  1. to write a message to someone
  2. to send a teacher a message if you don´t have their phone number
  3. to answer on a text message
  4. the opposite of not understanding
  5. to look after your siblings or if someone is important to you
  6. the opposite of receive
  7. if you meet someone new you want to be friends with them then you have to ask them something
  8. the opposite of write
  9. If you want everyone to look at you all the time
  10. to have a job

20 Clues: to have a job13-18 years oldif you are really badthe opposite of writeif you are like a momthe opposite of receiveif you are a drama queento see someone in real lifeto answer on a text messageto write a message to someoneif someone is hurt or is missingthe opposite of not understandingif someone is bullying you on the internet...

Mortal Kombat 2021-08-31

Mortal Kombat crossword puzzle
Across
  1. Not Goro
  2. Servant of Chi
  3. Riots
  4. Moroi
  5. Bow
  6. Blind
  7. Wind
  8. Cleric
  9. Bodyguard
  10. Chill
  11. Come here!
  12. Alliance
  13. Monk
  14. Skinned
  15. Demon slaying demon
  16. No loyalty
  17. Scales
  18. Shokan Prince
  19. Villain
  20. Kai
  21. Fire
  22. Chop chop
  23. Red Dragon
  24. Speed
  25. Ketchup
  26. Ruler
  27. Brotherhood
  28. Mustard
  29. Hero
  30. Princess
  31. Sun
  32. Black Dragoness
  33. Drunken Master
  34. Queen
  35. Duo
  36. Cyber
  37. Champion
  38. Rainbow
Down
  1. Kiss
  2. Shake
  3. Deceived
  4. Fusion
  5. Brutality
  6. Grin
  7. Pretty
  8. Stripes
  9. Blood
  10. Grey Cloud
  11. Special Forces
  12. Elder Goddess
  13. Incect
  14. Oni
  15. Cold
  16. Motion
  17. Titan
  18. Cowboy
  19. Order
  20. Kenshi Jr.
  21. Club
  22. Sand
  23. Vanity
  24. Souls
  25. King
  26. Not Kano
  27. Clip clop
  28. Arms
  29. Hated
  30. Guide
  31. Fame
  32. Shadow
  33. Six
  34. Jade Enemy
  35. Not Liu Kang
  36. Rainbow
  37. Dreamer
  38. Mercenary
  39. Water
  40. Armageddon

78 Clues: BowOniKaiSixSunDuoKissGrinWindColdMonkClubSandFireKingArmsFameHeroShakeRiotsMoroiBlindBloodChillTitanOrderSoulsSpeedRulerHatedGuideQueenWaterCyberFusionPrettyClericIncectMotionCowboyScalesVanityShadowStripesSkinnedVillainKetchupMustardRainbowDreamerRainbowNot GoroDeceivedAllianceNot KanoPrincessChampionBrutalityBodyguardChop chopClip clopMercenary...

SPHE Crossword 2021-11-03

SPHE Crossword crossword puzzle
Across
  1. How you might feel if you were being bullied
  2. when you spread fake news about someone
  3. what you might get if you hold in things for to long
  4. what you tell the bully when they are bullying you
  5. to leave someone out
  6. practices to maintaining health
  7. what you are if you post on social media for your job
  8. to say you are going to do something dangerous to someone
  9. False or untrue
  10. who you tell if you are being bullied in school
Down
  1. what could happen if bullying escalates
  2. To constantly annoy or hurt someone
  3. talking behind somebody’s back
  4. treat people with .....
  5. best place to find fake news
  6. how you make people feel when you point out their flaws
  7. where bullying often happens the most
  8. What you are if you are being bullied
  9. the type of bullying when you use your words to hurt someone
  10. the type of bullying that happens online

20 Clues: False or untrueto leave someone outtreat people with .....best place to find fake newstalking behind somebody’s backpractices to maintaining healthTo constantly annoy or hurt someonewhere bullying often happens the mostWhat you are if you are being bulliedwhat could happen if bullying escalateswhen you spread fake news about someone...

SPHE Crossword 2021-11-03

SPHE Crossword crossword puzzle
Across
  1. to say you are going to do something dangerous to someone
  2. What you are if you are being bullied
  3. what could happen if bullying escalates
  4. what you tell the bully when they are bullying you
  5. what you might get if you hold in things for to long
  6. best place to find fake news
  7. what you are if you post on social media for your job
  8. treat people with .....
  9. who you tell if you are being bullied in school
Down
  1. to leave someone out
  2. when you spread fake news about someone
  3. To constantly annoy or hurt someone
  4. How you might feel if you were being bullied
  5. the type of bullying when you use your words to hurt someone
  6. talking behind somebody’s back
  7. practices to maintaining health
  8. where bullying often happens the most
  9. the type of bullying that happens online
  10. how you make people feel when you point out their flaws
  11. False or untrue

20 Clues: False or untrueto leave someone outtreat people with .....best place to find fake newstalking behind somebody’s backpractices to maintaining healthTo constantly annoy or hurt someoneWhat you are if you are being bulliedwhere bullying often happens the mostwhen you spread fake news about someonewhat could happen if bullying escalates...

Halloween 2017-11-04

Halloween crossword puzzle
Across
  1. / The Last...
  2. / He's been stuck in the matrix
  3. / versus Predator
  4. / Nocturnal creatures
  5. / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
  6. Intelligence / Many believe this will take over the world
  7. / a common Sci-fi name for the Reanimated
  8. Edward Hyde / The good side of Dr Jekyll and Mr Hyde
  9. / The Famous and 'Shocking' Experiment
  10. / to do with Rebirth in Norse mythology
  11. / Where the Count lives
Down
  1. / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
  2. / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
  3. / Asimov of science fiction
  4. / The man who could eat anything
  5. / The Large Hadron Collider is situated in...
  6. / Famous Prison Experiment
  7. / When an aptitude test goes awry, Beatrice discovers she has a special quality.
  8. / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
  9. Ray / Nikola Tesla's famous...

20 Clues: / The Last.../ versus Predator/ Nocturnal creatures/ Where the Count lives/ Famous Prison Experiment/ Asimov of science fiction/ He's been stuck in the matrixRay / Nikola Tesla's famous.../ The man who could eat anything/ The Famous and 'Shocking' Experiment/ to do with Rebirth in Norse mythology...

The Ultimate EMC Crossword 2013-07-02

The Ultimate EMC Crossword crossword puzzle
Across
  1. VCE partner
  2. scale-out storage
  3. Harddrive storing
  4. Chairman Tucci's Nickname
  5. NOVA, NOVAii, AViiON ...
  6. Your own cloud infrastructure
  7. analyzes big data
  8. VMware has 91% less Operational cost than this vendor
  9. EMC Headquarter State
  10. EMC's competition to Puredisk
  11. Avamars Encryption
  12. Management console
  13. Recommended storage for individual departments
  14. the remote control for storage
  15. The "P" in Paas
  16. The cloud from were cyber criminals act
  17. Fastest drives
Down
  1. A visible mass of liquid or frozen water
  2. Cloud Company owned by EMC and VMware
  3. remove identical data when merging two databases
  4. this bio-science project use ISILON IQ
  5. IHI wants to protect the worlds ... heritage
  6. Chad's (Chad's World) Twitter account
  7. VFCashes secret project name
  8. Isilon's Operating System
  9. Mass*speed of light ^2 =
  10. RSA Hacker-prevention
  11. The baby of Moshe Yanai
  12. Location of EMC's 15.000sq feet E-lab
  13. Engineer Mode Password
  14. Datacenter desktops
  15. Fully Automated Storage Tiering

32 Clues: VCE partnerFastest drivesThe "P" in Paasscale-out storageHarddrive storinganalyzes big dataAvamars EncryptionManagement consoleDatacenter desktopsEMC Headquarter StateRSA Hacker-preventionEngineer Mode PasswordThe baby of Moshe YanaiNOVA, NOVAii, AViiON ...Mass*speed of light ^2 =Chairman Tucci's NicknameIsilon's Operating System...

charlotte's computer apps review 2022-05-02

charlotte's computer apps review crossword puzzle
Across
  1. Protects your computer from cyber attacks
  2. Where all of your stuff is stored.
  3. An app that you use functions in.
  4. The page at the very end of something to show where you got your information
  5. What app do you make a poster or card on?
  6. Teacher.
  7. What app do you use to communicate with teachers or other students during school time?
  8. Mean people that try to steal your information online
  9. An app used to make your works cited page.
  10. Copying other people's words is known as _____
Down
  1. This class.
  2. An app that makes it easy to present your ideas.
  3. Something that is really bad in Ms. Burghorns class
  4. You can make videos or podcasts on _____.
  5. Something supplied by the school so we can do all of this.
  6. An app used to make a survey.
  7. What is the default size margin?
  8. Format for English essays
  9. Quick access to websites or apps.
  10. What app can you write essays and papers in.

20 Clues: Teacher.This class.Format for English essaysAn app used to make a survey.What is the default size margin?An app that you use functions in.Quick access to websites or apps.Where all of your stuff is stored.Protects your computer from cyber attacksYou can make videos or podcasts on _____.What app do you make a poster or card on?...

BAB 4 NKRI 2025-04-22

BAB 4 NKRI crossword puzzle
Across
  1. Contoh agresi dan nonagresi
  2. Loyalitas ganda
  3. Mendasari kehidupan berbangsa dan bernegara di Indonesia dilandasi oleh falsafah Pancasila.
  4. Usaha yang berasal dari luar, yang bersifat atau bertujuan melemahkan dan menghalangi
  5. Contoh ideologi, politik, ekonomi, dan sosial budaya
  6. Ancaman yang sering terjadi dan dihadapi setiap saat
  7. Contoh konvensional, asimetris, teroris, dan cyber warfare
  8. Mendasarkan diri pada kekuasaan.
  9. Ancaman terhadap ketahanan nasional yang berasal dari luar negri
Down
  1. Penggunaan kekuatan bersenjata oleh negara lain terhadap kedaulatan negara
  2. Sisi penting dari globalisasi
  3. Bersifat kebangsaan
  4. Hal atau objek yang perlu ditanggulangi
  5. Aktivitas pengumpulan informasi dan data yang dilakukan oleh suatu negara terhadap negara lain
  6. Ancaman terhadap ketahanan nasional yang berasal dari dalam negri
  7. Menciptakan kesepakatan bersama mengenai norma dan nilai nilai soaial
  8. Indonesia memiliki jumlah penduduk yang besar, tetapi penyebaran penduduknya tidak merata.
  9. Pembaruan hingga menjadi kesatuan yang utuh atau bulat
  10. (2 kata) Globalisasi berdampak pada kehidupan sosial budaya dari..
  11. Ancaman, tantangan, hambatan, dan gangguan

20 Clues: Loyalitas gandaBersifat kebangsaanContoh agresi dan nonagresiSisi penting dari globalisasiMendasarkan diri pada kekuasaan.Hal atau objek yang perlu ditanggulangiAncaman, tantangan, hambatan, dan gangguanContoh ideologi, politik, ekonomi, dan sosial budayaAncaman yang sering terjadi dan dihadapi setiap saat...

ANALISIS DATA, ALGORITMA DAN PEMOGRAMAN, LITERASI DIGITAL (Maria Rachquel Aziziyah l 13 l VIII H) 2025-06-09

ANALISIS DATA, ALGORITMA DAN PEMOGRAMAN, LITERASI DIGITAL       (Maria Rachquel Aziziyah l 13 l VIII H) crossword puzzle
Across
  1. mendapatkan data tentang sesuatu
  2. merupakan ciri ciri opini kecuali
  3. proses memberi instruksi komputer untuk tugas tertentu
  4. kondisi benar dalam fungsi logika
  5. ciri ciri opini
  6. berpikir sebelum bertindak
  7. scratch dikembangkan oleh
  8. pesan teks isinya amarah atau frontal
  9. merupakan ciri ciri fakta kecuali
  10. alur logika dijalankan secara berurutan
  11. kesalahan tanpa niat buruk
Down
  1. fungsi Ms.excel digunakan untuk membaca tabel horizontal
  2. melakukan operasi matematika nilai atau membandingkan
  3. membujuk seseorang dengan tipe daya
  4. cara mengelola dan mengatur tampilan visual
  5. merupakan contoh pemrograman visual
  6. perundungan digital
  7. kata lain percabangan
  8. kondisi salah dalam logika
  9. pernyataan yang dapat dibuktikan kebenarannya
  10. Microsoft Exel disebut dengan nama aplikasi
  11. memahami perasaan orang lain
  12. mengontrol pergerakan spite
  13. hasil dari proses yang dilakukan terhadap data input
  14. yang bukan tipe data variabel
  15. alat untuk membuat tabel dan grafik
  16. informasi yang benar atau akurat
  17. ciri ciri fakta
  18. menyaring informasi palsu
  19. yang tidak merupakan ciri ciri cyber bullying

30 Clues: ciri ciri opiniciri ciri faktaperundungan digitalkata lain percabanganscratch dikembangkan olehmenyaring informasi palsukondisi salah dalam logikaberpikir sebelum bertindakkesalahan tanpa niat burukmengontrol pergerakan spitememahami perasaan orang lainyang bukan tipe data variabelmendapatkan data tentang sesuatuinformasi yang benar atau akurat...

TEKA-TEKI SILANG INFORMATIKA 2025-06-09

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. mendapatkan data tentang sesuatu
  2. merupakan ciri ciri opini kecuali
  3. proses memberi instruksi komputer untuk tugas tertentu
  4. kondisi benar dalam fungsi logika
  5. ciri ciri opini
  6. berpikir sebelum bertindak
  7. scratch dikembangkan oleh
  8. pesan teks isinya amarah atau frontal
  9. merupakan ciri ciri fakta kecuali
  10. alur logika dijalankan secara berurutan
  11. kesalahan tanpa niat buruk
Down
  1. fungsi Ms.excel digunakan untuk membaca tabel horizontal
  2. melakukan operasi matematika nilai atau membandingkan
  3. membujuk seseorang dengan tipe daya
  4. cara mengelola dan mengatur tampilan visual
  5. merupakan contoh pemrograman visual
  6. perundungan digital
  7. kata lain percabangan
  8. kondisi salah dalam logika
  9. pernyataan yang dapat dibuktikan kebenarannya
  10. Microsoft Exel disebut dengan nama aplikasi
  11. memahami perasaan orang lain
  12. mengontrol pergerakan spite
  13. hasil dari proses yang dilakukan terhadap data input
  14. yang bukan tipe data variabel
  15. alat untuk membuat tabel dan grafik
  16. informasi yang benar atau akurat
  17. ciri ciri fakta
  18. menyaring informasi palsu
  19. yang tidak merupakan ciri ciri cyber bullying

30 Clues: ciri ciri opiniciri ciri faktaperundungan digitalkata lain percabanganscratch dikembangkan olehmenyaring informasi palsukondisi salah dalam logikaberpikir sebelum bertindakkesalahan tanpa niat burukmengontrol pergerakan spitememahami perasaan orang lainyang bukan tipe data variabelmendapatkan data tentang sesuatuinformasi yang benar atau akurat...

Nguyễn Vân Khôi - Trần Thị Ngọc Châu 2023-02-16

Nguyễn Vân Khôi - Trần Thị Ngọc Châu crossword puzzle
Across
  1. owned by the richest man in the world.
  2. like a computer but flat
  3. relating to the Internet
Down
  1. who has an interesting technology
  2. electronic machine that can do everything you want

5 Clues: like a computer but flatrelating to the Internetwho has an interesting technologyowned by the richest man in the world.electronic machine that can do everything you want

Technology 2023-02-16

Technology crossword puzzle
Across
  1. owned by the richest man in the world.
  2. like a computer but flat
  3. relating to the Internet
Down
  1. who has an interesting technology
  2. electronic machine that can do everything you want

5 Clues: like a computer but flatrelating to the Internetwho has an interesting technologyowned by the richest man in the world.electronic machine that can do everything you want

agriculture crossword 2024-10-23

agriculture crossword crossword puzzle
Across
  1. drift
  2. Conditions
  3. Exchange
  4. Liberalisation
Down
  1. land use
  2. security
  3. larceny
  4. National Product (GNP)
  5. tenure
  6. equality

10 Clues: drifttenurelarcenyland usesecurityequalityExchangeConditionsLiberalisationNational Product (GNP)

Pekarjaan-Chareef 2025-05-16

Pekarjaan-Chareef crossword puzzle
Across
  1. driver
  2. gardener
  3. Farmer
  4. lawyer
  5. security-guard
Down
  1. firefighter
  2. chef
  3. plumber
  4. waiter
  5. police

10 Clues: chefdriverwaiterFarmerlawyerpoliceplumbergardenerfirefightersecurity-guard

Airport 2024-04-05

Airport crossword puzzle
Across
  1. Cesta
  2. Odlet
  3. Palubní-lístek
  4. Časové-pásmo
Down
  1. Let
  2. Brána
  3. Zavazadla
  4. Přílet
  5. Bezpečnostní-kontrola
  6. Pas

10 Clues: LetPasBránaCestaOdletPříletZavazadlaČasové-pásmoPalubní-lístekBezpečnostní-kontrola

Leadership 2024-12-19

Leadership crossword puzzle
Across
  1. A sophomore that is on the basketball team.
  2. A freshman with a great speaking voice.
  3. A senior that has a lot of family in Faridale.
  4. A sophomore whose Crew teacher is Ms. Jaggers.
  5. A junior who has a double letter in their first and last names.
  6. A sophomore who is on the wrestling team.
  7. A senior who is also a peer tutor.
  8. A sophomore that is bilingual.
  9. A sophomore in the teaching and learning program.
Down
  1. A senior who could've been a student aide instead of in this class.
  2. A sophomore in the cyber pathway.
  3. A sophomore that is also a student ambassador.
  4. A senior who is also on the yearbook staff.
  5. A a freshman that uses fun graphics in their presentations.
  6. A senior that is soft-spoken.
  7. A a freshman with a sister that is a senior.
  8. A junior that has to have Ms. Adams twice a day.

17 Clues: A senior that is soft-spoken.A sophomore that is bilingual.A sophomore in the cyber pathway.A senior who is also a peer tutor.A freshman with a great speaking voice.A sophomore who is on the wrestling team.A sophomore that is on the basketball team.A senior who is also on the yearbook staff.A a freshman with a sister that is a senior....

MONDAY 7th OCTOBER 2019-10-04

MONDAY 7th OCTOBER crossword puzzle
Across
  1. SECURITY
  2. NOUVEAUX ARRIVÉS
  3. S'INSCIRE
  4. ORDINATEUR PORTABLE
  5. NOT MARRIED
  6. NOT LONG AGO
  7. MONEY YOU MUST PAY BACK
Down
  1. WOMAN WHOSE HUSBAND IS DEAD
  2. AVOCAT
  3. COMPTABLE
  4. GÉRER
  5. CORRIGER

12 Clues: GÉRERAVOCATSECURITYCORRIGERCOMPTABLES'INSCIRENOT MARRIEDNOT LONG AGONOUVEAUX ARRIVÉSORDINATEUR PORTABLEMONEY YOU MUST PAY BACKWOMAN WHOSE HUSBAND IS DEAD

The Financial Vault Quiz - based on emails send on Financial Terms 2018-02-26

The Financial Vault Quiz - based on emails send on Financial Terms crossword puzzle
Across
  1. It refers to the amount of uncertainty or risk about the size of changes in a security's value.
  2. When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
  3. Short selling is motivated by the belief that a security's price will ____
  4. The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
  5. Portfolios that lie below the efficient frontier are
  6. A minimum of ___ persons are required to create an omnibus account
  7. The _____ the volatility, the riskier the security.
Down
  1. It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
  2. One measure of the relative volatility of a particular stock to the market is its
  3. The sale of a security that is not owned by the seller or that the seller has borrowed
  4. Employee’s Provident Fund is maintained and overseen by the ___
  5. An omnibus account is normally overseen by a ____ manager
  6. Account Is an account between two futures merchants (brokers)

13 Clues: The _____ the volatility, the riskier the security.Portfolios that lie below the efficient frontier areAn omnibus account is normally overseen by a ____ managerAccount Is an account between two futures merchants (brokers)Employee’s Provident Fund is maintained and overseen by the ___A minimum of ___ persons are required to create an omnibus account...

Issue #007 2022-09-16

Issue #007 crossword puzzle
Across
  1. deadly drink
  2. safe, protection
  3. envious
  4. criminal, wrong
  5. traitor
Down
  1. secrets, hiding
  2. tuilg (anagram)
  3. sharp blades
  4. royalty, leader
  5. athed (anagram)
  6. incorrect, untrue

11 Clues: envioustraitorsharp bladesdeadly drinksecrets, hidingtuilg (anagram)royalty, leadercriminal, wrongathed (anagram)safe, protectionincorrect, untrue

CLOUD DEPLOYMENT 2025-03-07

CLOUD DEPLOYMENT crossword puzzle
Across
  1. Technology
  2. Redundancy and Replication
  3. Analysis
  4. and Management Tools
  5. and Security
  6. Engagement
Down
  1. Storage
  2. of Current Infrastructure
  3. Strategy
  4. Management
  5. and Disaster Recovery

11 Clues: StorageStrategyAnalysisTechnologyManagementEngagementand Securityand Management Toolsand Disaster Recoveryof Current InfrastructureRedundancy and Replication

The Making of a Provisional 2015-02-17

The Making of a Provisional crossword puzzle
Across
  1. - capital of Northern Ireland
  2. - Irish Republican Army
  3. - men who parades through streets of Belfast
  4. - what the security force did to the shoes of the son
Down
  1. - to live separately
  2. - what the security force did to Frankie and Patricia's family
  3. - column in the paper when someone has died
  4. - Frankie Ryan's accent

8 Clues: - to live separately- Irish Republican Army- Frankie Ryan's accent- capital of Northern Ireland- column in the paper when someone has died- men who parades through streets of Belfast- what the security force did to the shoes of the son- what the security force did to Frankie and Patricia's family

Bonds 2024-02-08

Bonds crossword puzzle
Across
  1. exersising before the maturity date
  2. Pooling assets to make a financial security
  3. Security bound by morgages or other assets
  4. matures in less than 1 year
  5. State bonds
Down
  1. Risk is higher,so yeild is greater from a company
  2. federal governments ability to back money
  3. group of loans with similar charecteristics

8 Clues: State bondsmatures in less than 1 yearexersising before the maturity datefederal governments ability to back moneySecurity bound by morgages or other assetsPooling assets to make a financial securitygroup of loans with similar charecteristicsRisk is higher,so yeild is greater from a company

NATIONAL SECURITY 2023-03-05

NATIONAL SECURITY crossword puzzle
Across
  1. refers to the set of standards or conditions that must be met for a country to be considered economically secure.
  2. refers to the measures taken by a country to protect its economy and ensure its stability.
  3. refers to the interdependent network of living and non-living elements in a particular environment.
  4. refers to the systematic observation and analysis of the social and economic factors that affect a country's security.INTERNATIONAL refers to the measures taken by countries to ensure their economic stability and protect themselves from external economic threats.
  5. INDICATOR THRESHOLD refers to the minimum level of a security indicator that must be met to ensure the security of a country or its citizens.
Down
  1. refers to the ability of a country to maintain its economic stability and protect its citizens from economic risks.
  2. THREAT refers to any potential danger or risk to the security of a country or its citizens.
  3. refers to the protection of a nation's citizens, borders, and infrastructure from internal and external threats.
  4. INDICATOR refers to a measurable factor that is used to assess the level of security in a particular area.

9 Clues: refers to the measures taken by a country to protect its economy and ensure its stability.THREAT refers to any potential danger or risk to the security of a country or its citizens.refers to the interdependent network of living and non-living elements in a particular environment....

Digital security 2023-04-01

Digital security crossword puzzle
Across
  1. A live, online seminar or presentation conducted over the internet
  2. A written or printed communication that is sent or received electronically via a phone or computer.
  3. A social networking website that allows users to connect with friends and family and share information.
Down
  1. A software application that allows users to make voice and video calls and chat over the internet.
  2. A digital audio file made available on the internet for downloading or streaming.
  3. An online conversation between two or more people in real-time.
  4. A message distributed by electronic means from one computer user to one or more recipients via a network.

7 Clues: An online conversation between two or more people in real-time.A live, online seminar or presentation conducted over the internetA digital audio file made available on the internet for downloading or streaming.A software application that allows users to make voice and video calls and chat over the internet....

tss security 2021-10-27

tss security crossword puzzle
Across
  1. finds people
  2. laeding officer
  3. spy club
  4. makes decisions, buys stuff
Down
  1. print, ink pad and file
  2. wears ppe and carrys boxes
  3. looks for clues and finds awnsers

7 Clues: spy clubfinds peoplelaeding officerprint, ink pad and filewears ppe and carrys boxesmakes decisions, buys stufflooks for clues and finds awnsers

Information Security 2023-10-23

Information Security crossword puzzle
Across
  1. A program that appears legitimate but actually contains malicious code
  2. The process of identifying and fixing security vulnerabilities.
  3. A malicious software that encrypts data and demands a ransom
  4. A technique for verifying the identity of users or devices
Down
  1. The act of browsing the internet without revealing your identity.
  2. Unauthorized access to computer systems or data
  3. A unique combination of characters used to access a system

7 Clues: Unauthorized access to computer systems or dataA unique combination of characters used to access a systemA technique for verifying the identity of users or devicesA malicious software that encrypts data and demands a ransomThe process of identifying and fixing security vulnerabilities....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. Opposite of hungry.
  2. A place where food is sold.
  3. Growing plants to eat
Down
  1. Sharing food helps stop this.
  2. Something we drink to stay healthy
  3. Food that helps us grow strong
  4. We need this to live and grow

7 Clues: Opposite of hungry.Growing plants to eatA place where food is sold.Sharing food helps stop this.We need this to live and growFood that helps us grow strongSomething we drink to stay healthy

Computer security 2022-09-07

Computer security crossword puzzle
Across
  1. Code breaker
  2. Can be stolen
  3. Keep this safe
Down
  1. Stores your money
  2. Vulnerability
  3. Not a cold
  4. Angry pet

7 Clues: Angry petNot a coldCode breakerVulnerabilityCan be stolenKeep this safeStores your money

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

Logistics Crossword 2021-11-18

Logistics Crossword crossword puzzle
Across
  1. -Most used app on the internet
  2. -Temporary group made to do a specific task
  3. -The logistics cycle is driven by the ________
  4. -Where products are temporarily stored while being given out to transportation units or elsewhere
  5. -Mines, farms, etc that provide base materials from a natural source
  6. -First major global security initiative
  7. -Where products are stored for long periods of time
  8. -Expected volume of goods expected to go through particular workplace
Down
  1. -Dangerous substance that holds risk to workers or the environment
  2. -Most secure dock
  3. -Most common dock
  4. somewhat permanent group of people who come together to get jobs done
  5. -Massive amount of money designated to help companies get rid of waste
  6. -the process and paers of the process of getting a product from a raw material provider to a customer
  7. -Global connection of computers and other technology
  8. -Security agreement between USA, Canada, and Mexico

16 Clues: -Most secure dock-Most common dock-Most used app on the internet-First major global security initiative-Temporary group made to do a specific task-The logistics cycle is driven by the ________-Security agreement between USA, Canada, and Mexico-Where products are stored for long periods of time-Global connection of computers and other technology...

Cybersecurity Awareness Month - Week 3 2022-10-05

Cybersecurity Awareness Month - Week 3 crossword puzzle
Across
  1. Cirrus' tool for endpoint security
  2. A memorized secret consisting of a sequence of random words that is longer than a typical password
  3. Cirrus' email security platform
  4. A password attack that uses trial-and-error by attempting every possible combination
  5. Malware that disables access to data until a fee is paid
  6. A type of virus that automatically spreads itself
Down
  1. software designed to detect and destroy viruses
  2. A network of devices infected and controlled by the same virus
  3. A physical device that connects to a network
  4. A social engineering attack delivered by SMS text message
  5. A phishing attack aimed at senior executives
  6. The process of encoding data using complex algorithms for confidentiality
  7. An attack that prompts an MFA approval request over and over
  8. Malware that is disguised as legitimate software
  9. A social engineering technique where an attacker creates a fake scenario
  10. A type of trojan spyware that records your keystrokes

16 Clues: Cirrus' email security platformCirrus' tool for endpoint securityA physical device that connects to a networkA phishing attack aimed at senior executivessoftware designed to detect and destroy virusesMalware that is disguised as legitimate softwareA type of virus that automatically spreads itselfA type of trojan spyware that records your keystrokes...

Recap - Day 1 2023-11-28

Recap - Day 1 crossword puzzle
Across
  1. WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
  2. A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOUDO IN THIS CASE?“
  3. THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING -
  4. SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
  5. A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
  6. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
  7. MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
  8. THIS IS A TYPE OF TRAVEL DOCUMENT
  9. A...LIKES TO LEARN FROM DEMONSTRATIONS
Down
  1. A TYPE OF LIGHT TO EXAMINE ADOCUMENT SECURITY FEATURE USING MIDAS
  2. BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
  3. A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
  4. WHAT DOES THE D IN MIDAS STAND FOR?
  5. AN...HAS ACCESS TO THE WHOLE SYSTEM
  6. IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
  7. WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?

16 Clues: THIS IS A TYPE OF TRAVEL DOCUMENTWHAT DOES THE D IN MIDAS STAND FOR?AN...HAS ACCESS TO THE WHOLE SYSTEMA...LIKES TO LEARN FROM DEMONSTRATIONSMACHINE READABLE TRAVEL DOCUMENTS HAVE A...WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPHSETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURSIN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS...

American Express Travelers Cheque 2021-11-22

American Express Travelers Cheque crossword puzzle
Across
  1. _____ Express uses the Cheques
  2. Can you have counterfeit Cheques
  3. What is one security feature
  4. How do you verify
Down
  1. What do you have to do for the signatures
  2. How many security features do they have
  3. Where can you find the phone number to call
  4. What code do you need on the Cheque
  5. Is the process where you validate both the presenter and the cheque

9 Clues: How do you verifyWhat is one security feature_____ Express uses the ChequesCan you have counterfeit ChequesWhat code do you need on the ChequeHow many security features do they haveWhat do you have to do for the signaturesWhere can you find the phone number to callIs the process where you validate both the presenter and the cheque

Food insecurity 2023-12-06

Food insecurity crossword puzzle
Across
  1. what is low food security?
  2. what causes food insecurity?
  3. What is another solution for food insecurity?
  4. can extra help with grades for food insecure kids help?
  5. food what is high food security?
Down
  1. what food insecurity solution has tapp middle school tried?
  2. how many people are helped by food drives every year?
  3. Why dont people like to do food drives often?
  4. How can food insecurity affect kids learning?
  5. If more people helped could food insecurity be reduced?

10 Clues: what is low food security?what causes food insecurity?food what is high food security?Why dont people like to do food drives often?How can food insecurity affect kids learning?What is another solution for food insecurity?how many people are helped by food drives every year?If more people helped could food insecurity be reduced?...

Guest Services 2025-07-10

Guest Services crossword puzzle
Across
  1. Who do you call when people are acting inappropriately
  2. This person gets notified when we are almost out of stickers
  3. ______ license gets placed in the scanner
  4. People on this list need Security approval prior to entering
Down
  1. ________ Service is our priority.
  2. Program for people needing food
  3. _____Briggs
  4. Government issued book that lets a person travel to other countries.
  5. May be used when person has no government ID

9 Clues: _____BriggsProgram for people needing food________ Service is our priority.______ license gets placed in the scannerMay be used when person has no government IDWho do you call when people are acting inappropriatelyThis person gets notified when we are almost out of stickersPeople on this list need Security approval prior to entering...

Nates Crossword 2023-08-22

Nates Crossword crossword puzzle
Across
  1. bulling- bulling someone through a computer
  2. - a secret word or phrase
Down
  1. person who uses computers to gain access to data
  2. drive- a high capacity storage device
  3. - uneversial serial bus

5 Clues: - uneversial serial bus- a secret word or phrasedrive- a high capacity storage devicebulling- bulling someone through a computerperson who uses computers to gain access to data

IT Security Week 7 2021-08-16

IT Security Week 7 crossword puzzle
Across
  1. the process of deploying an application to the target environment
  2. is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
  3. a corporate directive that specifies how employees should leave their working space when they leave the office.
  4. the information is too valuable to permit any risk of its capture. Viewing is severely restricted\
  5. the policies of persistent data and records management for meeting legal and business data archival requirements.
  6. there are no restrictions on viewing the document.
Down
  1. the software vendor may suspend all licenses if the customer is found to be non-compliant
  2. unlicensed software exposes an organization to large fines and
  3. looking for treasure in someone else's trash
  4. is a type of Man-in-the-Middle Attack specifically involving a browser infected with some type of proxy malware.
  5. an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of.
  6. memory allocated to application
  7. the process where fibers are separated and treated to produce pulp.
  8. the series of processes and procedures in the software development cycle, designed to enable development teams to create software and applications in a manner that significantly reduces security risks, eliminating security vulnerabilities and reducing costs.
  9. to indicate a set of instructions that lends itself to a definite or standardized procedure without loss of effectiveness

15 Clues: memory allocated to applicationlooking for treasure in someone else's trashthere are no restrictions on viewing the document.unlicensed software exposes an organization to large fines andthe process of deploying an application to the target environmentthe process where fibers are separated and treated to produce pulp....

Code 2016-02-08

Code crossword puzzle
Across
  1. bully Bullies that are online
  2. A place where power or information leaves a system
  3. The use of parallel in computers
  4. to identify or remove errors from the computer
  5. A block to a puzzle for games or programs
  6. A folder that items
  7. A logic gate is an elementary building block on a digital circuit
  8. Get mail from the computer, phone, tablet, and computers
  9. When you add something onto your computer
Down
  1. A conditional clause or conjunction
  2. A virus on the computer
  3. When something repeats it self
  4. A part of a puzzle for coding
  5. citizenship Behaviors online
  6. A site that you visit or when you install a game on a software
  7. A programming language is formal constructed language that is programmed in the computer
  8. A system
  9. When you are working on a website and it needs to be ___
  10. block A block that repeats how many times in coding
  11. When something bad gets into your computer

20 Clues: A systemA folder that itemsA virus on the computercitizenship Behaviors onlinebully Bullies that are onlineA part of a puzzle for codingWhen something repeats it selfThe use of parallel in computersA conditional clause or conjunctionA block to a puzzle for games or programsWhen you add something onto your computer...

People and Property Crimes 2016-02-01

People and Property Crimes crossword puzzle
Across
  1. Lying while under oath
  2. Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
  3. Trying to keep people from committing crimes is_______
  4. Another word for theft
  5. Setting things on fire on purpose
  6. Lisa shot Ron. Ron is the victim of_______
  7. A process to better criminals
  8. Essentially blackmail
  9. Criminal being forced to either serve the community or pay people they have harmed
  10. A crime committed with the use of technology
Down
  1. Someone breaks in and steals stuff committed a
  2. When somebody dies by the actions of another. Has varying degrees.
  3. The lady who stole money from the booster club
  4. Secluding a criminal to a small space (form of imprisonment.
  5. Threatening someone with an attack
  6. Tricking someone to in order to gain something
  7. Destruction of property
  8. Seeking revenge on a criminal often very cruel
  9. Physically assaulting someone
  10. I have a gun and want your money

20 Clues: Essentially blackmailLying while under oathAnother word for theftDestruction of propertyA process to better criminalsPhysically assaulting someoneI have a gun and want your moneySetting things on fire on purposeThreatening someone with an attackLisa shot Ron. Ron is the victim of_______A crime committed with the use of technology...

Halloween 2017-11-04

Halloween crossword puzzle
Across
  1. / The Famous and 'Shocking' Experiment
  2. / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
  3. / Where the Count lives
  4. / versus Predator
  5. Edward Hyde / The good side of Dr Jekyll and Mr Hyde
  6. Intelligence / Many believe this will take over the world
  7. / He's been stuck in the matrix
  8. Ray / Nikola Tesla's famous...
  9. / Nocturnal creatures
  10. / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
Down
  1. / a common Sci-fi name for the Reanimated
  2. / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
  3. / The Large Hadron Collider is situated in...
  4. / Asimov of science fiction
  5. / to do with Rebirth in Norse mythology
  6. / When an aptitude test goes awry, Beatrice discovers she has a special quality.
  7. / The Last...
  8. / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
  9. / Famous Prison Experiment
  10. / The man who could eat anything

20 Clues: / The Last.../ versus Predator/ Nocturnal creatures/ Where the Count lives/ Famous Prison Experiment/ Asimov of science fiction/ He's been stuck in the matrixRay / Nikola Tesla's famous.../ The man who could eat anything/ The Famous and 'Shocking' Experiment/ to do with Rebirth in Norse mythology...

Ready Player One (First 6 Chapters) 2015-04-20

Ready Player One (First 6 Chapters) crossword puzzle
Across
  1. Wade's aunt
  2. The username Wade uses
  3. The clues that Halliday left behind for the easter egg are in this
  4. Your customizable character in OASIS
  5. The right for your personal information to remain unknown when using The OASIS
  6. The group of people who work for IOI that search for Halliday's easter egg
  7. A large internet service provider, largely used to search for Halliday's easter egg
  8. Where Wade goes to escape his Aunt and others
  9. The form of mobile homes that Wade and his Aunt live in
  10. The main character
  11. People who search for Halliday's easter egg
Down
  1. What is used to run OASIS
  2. The virtual reality program
  3. Halliday and Morrows game company
  4. Wade's aunt pawned this to get more money
  5. Wade's cyber crush
  6. Halliday left this behind and anyone who finds it gains control of The OASIS
  7. Wade's best friend
  8. What is used to see into the virtual reality
  9. Wade's home planet in OASIS

20 Clues: Wade's auntWade's cyber crushWade's best friendThe main characterThe username Wade usesWhat is used to run OASISThe virtual reality programWade's home planet in OASISHalliday and Morrows game companyYour customizable character in OASISWade's aunt pawned this to get more moneyPeople who search for Halliday's easter egg...

Villanova 2021-02-20

Villanova crossword puzzle
Across
  1. The nickname for the dining hall on south
  2. The building with the famous Arch on Main Campus
  3. The mansion at the edge of West Campus
  4. Science Center
  5. Mascot
  6. The year Villanova was founded
  7. Men's basketball coach
  8. Veritas, Unitas, __________
  9. The loop that the Oreo lives in
Down
  1. School of Business building
  2. The new name of the Pavilion
  3. A new pedestrian bridge now allows easier passage from this part of campus to Main
  4. Home of the Villanova Room, a small theater, an art Gallery, and a cyber lounge
  5. Official trivia every Thursday night
  6. The name of the new senior housing dorms along Lancaster Ave
  7. The first year that the Wildcats won March Madness
  8. Home of the Campus Ministry and student dorms
  9. Scored the game winning 2016 March Madness Championship Game buzzer beater
  10. This building on West Campus has dorms, a dining hall, a gymnasium, and class rooms inside of it
  11. The on campus "police"
  12. The current president of the University

21 Clues: MascotScience CenterMen's basketball coachThe on campus "police"School of Business buildingVeritas, Unitas, __________The new name of the PavilionThe year Villanova was foundedThe loop that the Oreo lives inOfficial trivia every Thursday nightThe mansion at the edge of West CampusThe current president of the University...

Working with children and adolescents 2024-08-20

Working with children and adolescents crossword puzzle
Across
  1. type of bullying done through the internet
  2. type of play counselling which is structured
  3. level of 2 in moral development
  4. Zone of ______ development
  5. type of abuse that could include ridiculing
  6. Freud's psychosexual stage
  7. child not wanting to open up or be in counselling
  8. type of trauma from hearing about others trauma
Down
  1. balanced parenting style
  2. guidance on cases from someone with more experience/training
  3. the ethical principle of keeping information safe
  4. factor that minimises someones risk
  5. integrative model for play therapy
  6. ability to overcome/bounce back
  7. Bronfenbrenner's systemic theory
  8. what do we teach children about
  9. liked by many but also disliked by many
  10. metaphor to explain anger
  11. ending of counselling
  12. ____ vs guilt
  13. causing physical harm to oneself
  14. respecting everyones right to make their own decisions
  15. type of sibling relationship
  16. when a case is out of scope
  17. skills we teach children to handle their feelings and problems
  18. factor that puts someone at risk

26 Clues: ____ vs guiltending of counsellingbalanced parenting stylemetaphor to explain angerZone of ______ developmentFreud's psychosexual stagewhen a case is out of scopetype of sibling relationshipability to overcome/bounce backwhat do we teach children aboutlevel of 2 in moral developmentBronfenbrenner's systemic theorycausing physical harm to oneself...

Internet vocabulary 2025-02-27

Internet vocabulary crossword puzzle
Across
  1. pretending to be companies to get someone's persona information
  2. editing a photo online to get desired results
  3. software used to block use of computer soft ware for a sum of monry
  4. place to communicate online
  5. being protected against online cyber attacks
  6. proper way to communicate on the internet
  7. using the internet to exploit people usually minors
  8. data left behind on the internet
  9. Speaking in All Caps to convey shouting
Down
  1. someone post or comment to purposely invoke anger
  2. a frequently updated webpage for business purposes
  3. recording and posting videos of assault
  4. a packet of data used to track their user anytime they use a site
  5. criminal activities committed using electrics
  6. using the internet to illegally copy software and give it to others
  7. bullying that occurs over the internet
  8. website setting allowing to control who see the information of the user
  9. someone who exploits others
  10. using someone else's identity for financial gain
  11. using electronics to harass someone

20 Clues: someone who exploits othersplace to communicate onlinedata left behind on the internetusing electronics to harass someonebullying that occurs over the internetrecording and posting videos of assaultSpeaking in All Caps to convey shoutingproper way to communicate on the internetbeing protected against online cyber attacks...

22 2024-11-04

22 crossword puzzle
Across
  1. Athletic brand associated with Black culture
  2. Modern prefix for internet terms
  3. Type of instrument used in blues
  4. West African drum
  5. Boxing icon's original last name
  6. Black Panther Party co-founder Bobby
  7. Legendary jazz singer Lena
  8. Hip-hop artist Goldblum, remixer
  9. Strong Black role model
  10. Instrument played by Miles Davis
  11. Jazz style popular in the 1930s
  12. Vibrant African print fabric
  13. Civil rights icon Parks' first name
  14. Filled with deep feeling
  15. Jazz singer Holiday's first name
Down
  1. Selfless acts for others
  2. "Thriller" singer Michael
  3. Supremes singer Diana Ross’s daughter
  4. Rhythmic feel in music
  5. New Orleans music style
  6. Day Martin Luther King Jr. envisioned
  7. Clear mental image or goal
  8. Will Smith's son
  9. African storyteller
  10. City with Drake and The Weeknd
  11. Dance popularized by Chubby Checker
  12. Jazz great Fitzgerald's nickname
  13. Fashionable necklace, symbol of elegance
  14. Opposite of strong female role
  15. A principle of Kwanzaa

30 Clues: Will Smith's sonWest African drumAfrican storytellerRhythmic feel in musicA principle of KwanzaaNew Orleans music styleStrong Black role modelSelfless acts for othersFilled with deep feeling"Thriller" singer MichaelClear mental image or goalLegendary jazz singer LenaVibrant African print fabricCity with Drake and The Weeknd...

Classroom Hunt 2025-10-31

Classroom Hunt crossword puzzle
Across
  1. Ways to stop _________ bullying.
  2. Respect by raising your hand to speak and no interrupting others.
  3. Speed up your workflow with these essential ________ shortcuts.
  4. If you don't believe in _________ no one will do it for you.
  5. Made with 100% _______ cheese.
  6. Keep your ________area neat.
  7. Water mineral enhanced for taste.
  8. Any bad attitudes or negative thinking.
  9. The computer lab prepared and ready to work.
  10. Everyone is ________ here.
  11. _________ only when necessary.
  12. Save the _________ or message and share with an adult.
  13. Be patient....I'm thinking.
  14. Do not use a computer to harm, bully or ______ others.
Down
  1. 10 Rules for ___________ computer use.
  2. Your uniqueness is your __________.
  3. ______ 06 unlocked.
  4. Click to select this object.
  5. _________ in place.
  6. Be prepared and ready to ______.
  7. Do not _________ with another person's computer work or activity.
  8. _________belongs.
  9. Don't change _________.
  10. The moment you give up is the _________ you let someone else win.
  11. Because they think they can they ___________.
  12. Do not _________ someone else's work as your own.

26 Clues: _________belongs.______ 06 unlocked._________ in place.Don't change _________.Everyone is ________ here.Be patient....I'm thinking.Click to select this object.Keep your ________area neat.Made with 100% _______ cheese._________ only when necessary.Ways to stop _________ bullying.Be prepared and ready to ______.Water mineral enhanced for taste....

CTF-CW-11 2025-11-14

CTF-CW-11 crossword puzzle
Across
  1. Document on every website about rules for handling details
  2. When the cloud gets graded for playing by the compliance rulebook.
  3. At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
  4. The elevator hack from novice to boss
  5. Tech world’s fire brigade—second shout
  6. Safety scissors for your network
  7. Tekion’s legendary vault no hacker can touch.
  8. Buzzing threat hunter hangout
  9. Pop-up or email outlining changes in how data gets used
Down
  1. Any data, direct or indirect, that reveals a person’s identity
  2. Processes to ensure robots don’t go rogue
  3. When a hacker sneaks past your digital guard
  4. The organization behind the ATT&CK plots
  5. DNA test for who’s calling the shots
  6. When your browser “remembers” you, for a while
  7. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
  8. Slamming the panic room door on hackers
  9. Every journey’s pit stops
  10. Red ink on the corporate report card
  11. Info swap: turn gold into poker chips

20 Clues: Every journey’s pit stopsBuzzing threat hunter hangoutSafety scissors for your networkDNA test for who’s calling the shotsRed ink on the corporate report cardThe elevator hack from novice to bossInfo swap: turn gold into poker chipsTech world’s fire brigade—second shoutSlamming the panic room door on hackersThe organization behind the ATT&CK plots...

Rolando Grade 6th -ity 2021-03-16

Rolando Grade 6th -ity crossword puzzle
Across
  1. to be mature
  2. money
  3. the country where you born
  4. skill
  5. famous
  6. careful you can fall
  7. pain and hurt
Down
  1. that is wet
  2. a chance
  3. all people
  4. people that protect
  5. all together
  6. most part
  7. that is forever

14 Clues: moneyskillfamousa chancemost partall peoplethat is wetto be matureall togetherpain and hurtthat is foreverpeople that protectcareful you can fallthe country where you born

Mortgage Terminology 2020-08-01

Mortgage Terminology crossword puzzle
Across
  1. lenders will check this report to assess your character
  2. required for loans above 80% lending
  3. government tax payable when a property is purchased
  4. when a property has a clear title with no mortgage
  5. the most common interest rate choice
  6. to move a loan from one lender to another
  7. written agreement outlining the terms of a purchase
  8. value of an asset minus the debt owing
  9. additional loan repayments that can be drawn on
  10. the percentage value of debt against asset
  11. an independent assessment of a property
  12. increase in property value over time
Down
  1. asset offered by the borrower to the lender
  2. a third party who provides additional security
  3. any outstanding financial debt
  4. the process of building a house
  5. approval from a bank that is not yet confirmed
  6. lowest loan repayments without paying the principle
  7. to lock in your repayments for a set time
  8. loss tax benefit for investment property
  9. will be lodged if you don't pay a bill for 90+ days
  10. completion of the sale or purchase of a property

22 Clues: any outstanding financial debtthe process of building a houserequired for loans above 80% lendingthe most common interest rate choiceincrease in property value over timevalue of an asset minus the debt owingan independent assessment of a propertyloss tax benefit for investment propertyto lock in your repayments for a set time...

Cold War by Jaimi Taylor 2014-02-17

Cold War by Jaimi Taylor crossword puzzle
Across
  1. European economic recovery made by the USA
  2. The theroy that if one country falls then the rest will soon follow
  3. Line that separates North Korea from South Korea
  4. countries controlled by USSR
  5. working class women and men
  6. Cuban communist leader
  7. Chinese nationalist who took over China
  8. the man who wanted to contain communism so he made the Marshall Plan
  9. investigates disloyaity on the eve of war
  10. Vietnam city
Down
  1. Divided North Vietnam from South Vietnam
  2. Two people accused of passing atomic secrets to the soviets during the war
  3. freed people from resisting communism
  4. moved supplys to West Berlin
  5. An organization made for peace, security, and economic developement
  6. Republican Senator who accused Government Officials of communism
  7. High ranking state department leader investigated for spying
  8. when the central government rules by terrorizing citizens
  9. Security council doccument that suggested trippling defence budget
  10. conflict between USA and USSR
  11. 10 nations pleged mutual assistance in the event of a attck
  12. the act of preventing spread of communism
  13. Leader of Indochina communist party

23 Clues: Vietnam cityCuban communist leaderworking class women and menmoved supplys to West Berlincountries controlled by USSRconflict between USA and USSRLeader of Indochina communist partyfreed people from resisting communismChinese nationalist who took over ChinaDivided North Vietnam from South Vietnamthe act of preventing spread of communism...

Income Tax Vocabulary 2015-07-03

Income Tax Vocabulary crossword puzzle
Across
  1. When you overpay the government, you receive a refund
  2. Expenses the government has
  3. gross income Total income
  4. withholding Money an employer holds from your paycheck
  5. status Married/single/head of household
  6. Income from stocks and bonds
  7. Income the government receives from taxpayers, etc.
  8. Dependents you are claiming
  9. Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
  10. Set $ amount not taxed for each dependent
  11. Money you earn from employment
  12. income Money earned before deductions
  13. Husband/Wife
Down
  1. care expenses Money you pay for someone else to care for a child or elder dependent
  2. tax Taxes on income
  3. deduction $ amount non itemizers may subtract from income based upon filing status
  4. security Your personal identification number
  5. income Income received from interest, dividends, social security & pentions
  6. Money received from saving account
  7. A person who relies on someone for living expenses
  8. Your banks identification number
  9. of household Single person who has dependents
  10. No withholding
  11. pay Money you earn to take home

24 Clues: Husband/WifeNo withholdingtax Taxes on incomegross income Total incomeExpenses the government hasDependents you are claimingIncome from stocks and bondsMoney you earn from employmentpay Money you earn to take homeYour banks identification numberMoney received from saving accountincome Money earned before deductions...

Crossword Puzzle unit 6 2023-02-23

Crossword Puzzle unit 6 crossword puzzle
Across
  1. Term used in the oil industry to indicate the searching for the product
  2. Political person with great knowledge ando experience in state affairs
  3. last name of the one who took Office as presidente on October 6 of 1911
  4. A groupof people who opposed reelection
  5. Who wrote the novel Balun Canan?
  6. Plan thatvwas develope bye Emiliano Zapata
  7. Form of gorvernment in which power was obtained through authoritarian or violent methods
  8. Where did Porfirio Díaz exile ando died?
  9. The security institute that was founded in 1943
  10. Oficial rate or tax which determines the feeds yo be paid
  11. The mexican miracle start during the presidency of-
  12. Social security Ford state workers
Down
  1. Who kill madero in 1913
  2. What was the crisis in the countryside
  3. Group that was formed bye Carranza
  4. Workers that temporarily migrates
  5. Economy that si applied un times of armed conflicto or violent convulsions
  6. What does the articule 27 about
  7. What battle began in colonial times when haciendas where form
  8. Independient of any religioso organización or denomination

20 Clues: Who kill madero in 1913What does the articule 27 aboutWho wrote the novel Balun Canan?Workers that temporarily migratesGroup that was formed bye CarranzaSocial security Ford state workersWhat was the crisis in the countrysideA groupof people who opposed reelectionWhere did Porfirio Díaz exile ando died?Plan thatvwas develope bye Emiliano Zapata...

CROSSWORD PUZZLE U6 2023-02-27

CROSSWORD PUZZLE U6 crossword puzzle
Across
  1. Drastically reduced in numbers
  2. Made a constitutional reform
  3. Group led by Emiliano Zapata
  4. Was part of a social sector called “the anti-re-electionists”
  5. The increasing pace of the Mexican economy came to be known as
  6. Was considered the father of education in Mexico
  7. Paid on a regular basis
  8. The essential nature or the main part of something
  9. A group led by Francisco Villa
  10. An act or strategy intended to resolve a problem or improve a situation
Down
  1. Group led by Venustiano Carranza
  2. Economy that is applied in times of armed conflict or violent convulsions
  3. A group of people who opposed reelection
  4. To create a system that depends on a central power
  5. Piece of land that is worked by a community and whose earnings are distributed among all
  6. Mexican political period from 1928-1934
  7. Committed fraud in the elections of 1910
  8. Institute of Social Security and Services for State Workers
  9. The Secretary of Public Education
  10. The Mexican Social Security Institute

20 Clues: Paid on a regular basisMade a constitutional reformGroup led by Emiliano ZapataDrastically reduced in numbersA group led by Francisco VillaGroup led by Venustiano CarranzaThe Secretary of Public EducationThe Mexican Social Security InstituteMexican political period from 1928-1934A group of people who opposed reelection...

Environmental Services 2017-08-18

Environmental Services crossword puzzle
Across
  1. These are used to keep your hands clean.
  2. What is the name of the disinfectant we use to clean?
  3. Who is the head of safety and security?
  4. What is used to clean the toilets?
  5. What company takes care of RED trash and sharps for the hospital?
  6. Who is the manager of ES?
  7. Evening discharge cleaners are called?
  8. What brand of bleach do we use to clean with?
  9. This is used to clean the carpet.
  10. What floor is ICU on?
Down
  1. What is the name of the security company?
  2. Used to collect trash from multiple areas.
  3. What is the name of the fragrance spray we use?
  4. What tupe of rags do we use to clean? (blue and yellow)
  5. Weeks How far out should you schedule PTO?
  6. What is the brand of electronic paper towels we use?
  7. This is used to swipe you into the building or certain areas.
  8. What is the Color of ES Scrubs?
  9. What program is used to look up chemicals?
  10. What company takes care of pest control?

20 Clues: What floor is ICU on?Who is the manager of ES?What is the Color of ES Scrubs?This is used to clean the carpet.What is used to clean the toilets?Evening discharge cleaners are called?Who is the head of safety and security?These are used to keep your hands clean.What company takes care of pest control?What is the name of the security company?...

Great Depression Crossword Puzzle 2024-10-15

Great Depression Crossword Puzzle crossword puzzle
Across
  1. Projects that are used for public uses
  2. Closing of banks during the Great Depression to avoid bank runs
  3. A homeless, penniless wanderer
  4. Program that presented the struggles of middle-class people
  5. Eleanor Roosevelt's mother
  6. General who would ignore Herbert Hoover
  7. Method of boycotting work by sitting down at work and refusing to leave
  8. A very controversial president at the time
  9. To attempt to resolve conflict between hostile people or groups
  10. Act that Americans were unsure of because it excluded African Americans
Down
  1. The incident that resulted in 10 deaths and 90 injuries
  2. A person who risks money in hopes of a financial profit
  3. First Roman Catholic to win a major party presidential nomination
  4. Spending borrowed money rather than raising taxes to boost money
  5. First African American to win an Academy Award
  6. Something that provides security against misfortune
  7. A long period of rising stock prices
  8. The acronym for Federal Deposit Insurance Corporation
  9. Role of government to work out conflicts among competing interest groups
  10. This didn't end the depression, but gave Americans a stronger sense of security

20 Clues: Eleanor Roosevelt's motherA homeless, penniless wandererA long period of rising stock pricesProjects that are used for public usesGeneral who would ignore Herbert HooverA very controversial president at the timeFirst African American to win an Academy AwardSomething that provides security against misfortune...

Chapter 11 2025-04-09

Chapter 11 crossword puzzle
Across
  1. In ____ 1935, Congress passed the Social Security Act
  2. President ____ believed that the economy would improve soon
  3. The Security Act placed a tax on workers and _____
  4. In ____ 1929, Investors started selling their stocks
  5. During the Depression, a disaster hit the ________
  6. The United States slid into an economic crisis called the ____
  7. On October 24, 1929, investors sold almost ____ shares
  8. By ____, 75 percent of Americans lived in poverty
Down
  1. Small banks suffered losses when farmers ____
  2. Migrant workers moved here
  3. Many ____ moved to California and became migrant workers
  4. Stock market crashed on black _____
  5. Hoover believed that the government could not fix the ______
  6. Some people who lost their homes lived in shelters made of old ____
  7. By the late 1920s,____ prices were very high
  8. In ____ Congress created the Works Progress Administration (WPA)
  9. Many investors did not have the money to buy stocks so they bought on ___ instead
  10. ____ borrowed their money from banks
  11. Many ___ were forced to look for work
  12. In ____ Roosevelt created a new set of programs, often called the Second New Deal.

20 Clues: Migrant workers moved hereStock market crashed on black _________ borrowed their money from banksMany ___ were forced to look for workSmall banks suffered losses when farmers ____By the late 1920s,____ prices were very highBy ____, 75 percent of Americans lived in povertyThe Security Act placed a tax on workers and _____...

Christian Hulet crossword 2025-03-25

Christian Hulet crossword crossword puzzle
Across
  1. this celebrity lost 30 million with FTX
  2. a digital system of transactions that is distributed across a network
  3. Warren Buffet is the ceo of this company
  4. how old to invest in crypto
  5. the age for RMD in IRA account you need to draw from
  6. contribute a max of 23,500 (spell how it sounds)
  7. for low risk people and is automotion
  8. what risk tolerance is for aggressive people
  9. Warren Buffet’s rule #1
Down
  1. is backed by the government
  2. combined with medicare and social security
  3. made in 1935 by FDR
  4. buy low ___
  5. move to another plan
  6. one problem if you put all your money into one company and it goes
  7. what also sometimes contributes to your pension
  8. traditional IRA contributions are made
  9. age of retirement
  10. roth IRA contributions are made
  11. social security is funded by this
  12. part of the fica tax
  13. what is backing crypto
  14. is managed by, in pension plans
  15. the biggest financial fraud in the U.S.
  16. offered to people with jobs in trades, manufacturing, and educators

25 Clues: buy low ___age of retirementmade in 1935 by FDRmove to another planpart of the fica taxwhat is backing cryptoWarren Buffet’s rule #1is backed by the governmenthow old to invest in cryptoroth IRA contributions are madeis managed by, in pension planssocial security is funded by thisfor low risk people and is automotion...

Cybersecurity Awareness Puzzle 2025-10-14

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. An event or occurrence, often unexpected or problematic.
  2. Hidden programs providing remote access.
  3. Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
  4. More than one kind of proof.
  5. Special access or rights given to certain users.
  6. Self-replicating malware spreading across systems.
  7. Encrypts data and demands payment for decryption.
  8. You should do this to all of your software.
  9. Voice (phone-based) phishing.
  10. SMS/text-based phishing.
  11. Security Awareness Training is provided ___.
Down
  1. Proof of who someone is.
  2. Permission to access a system, file, or resource.
  3. A modification or update to a system, process, or configuration.
  4. Protection against threats or attacks on computer and data.
  5. Using someone else's access without permission to enter a building.
  6. Records everything you type on a keyboard.
  7. A system that blocks unauthorized access to a network or computer.
  8. Cheating someone out of Money or personal Information
  9. Deceptive emails that trick users into clicking malicious links or sharing credentials.
  10. Secret words or codes used to unlock accounts.
  11. Copying data to keep it safe in case something is lost or damaged.

22 Clues: Proof of who someone is.SMS/text-based phishing.More than one kind of proof.Voice (phone-based) phishing.Hidden programs providing remote access.Records everything you type on a keyboard.You should do this to all of your software.Security Awareness Training is provided ___.Secret words or codes used to unlock accounts....

Cybersecurity Crossword 2025-09-25

Cybersecurity Crossword crossword puzzle
Across
  1. Requiring more than one form of verification. ____________ authentication
  2. A network security system that monitors and controls traffic.
  3. The process of verifying identity before granting access.
  4. The process of converting data into a secure code.
  5. A secret string of characters used for authentication.
  6. The practice of protecting systems, networks, and programs from attacks.
Down
  1. Technology simulating human intelligence, used in modern cybersecurity.
  2. Malicious software disguised as legitimate software.
  3. Malware that locks files and demands payment.
  4. A scam using fake emails or messages to trick people into revealing information.
  5. A clickable reference to another webpage or document.
  6. Phishing conducted through SMS text messages
  7. Software designed to harm or exploit systems.
  8. A type of malware that replicates itself by infecting other programs.
  9. Software that detects and removes malicious programs.
  10. A well-known security awareness training platform.
  11. A secure tunnel for internet traffic, stands for Virtual Private Network.
  12. An attempt to damage, steal, or disrupt digital systems.
  13. Manipulating people into revealing confidential information. ________ engineering
  14. A hidden method of bypassing normal authentication.

20 Clues: Phishing conducted through SMS text messagesMalware that locks files and demands payment.Software designed to harm or exploit systems.The process of converting data into a secure code.A well-known security awareness training platform.A hidden method of bypassing normal authentication.Malicious software disguised as legitimate software....

Forensic Disciplines Practice 2024-02-29

Forensic Disciplines Practice crossword puzzle
Across
  1. Small or microscopic pieces of evidence at a scene.
  2. Matching fur, wool, or follicle samples with suspects and victims.
  3. Studies human biological and physiological manners of death from autopsies.
  4. Analyzes poisons, drugs, toxins, and their transmission.
  5. Studies the general processes of the brain and mind.
  6. Dentistry and teeth analysis for forensic identification.
  7. Observing and collecting oily prints left at a scene.
  8. Using cyber or computer evidence in a case.
Down
  1. Analyzes behaviors of criminals and develops profiles of suspects.
  2. Observing clothing or fabric textiles from a crime scene.
  3. Uses information from diseases and illnesses in investigations.
  4. Studies insects and bugs relationship to decomposing bodies.
  5. Photographing and casting tracks left like tire tracks, shoe prints, and tool marks.
  6. Analysis of dead remains and the information derived from them.
  7. Analyzing the use of firearms.
  8. Analyzing patterns and presence of blood
  9. Analyzing and using the genetics in evidence

17 Clues: Analyzing the use of firearms.Analyzing patterns and presence of bloodUsing cyber or computer evidence in a case.Analyzing and using the genetics in evidenceSmall or microscopic pieces of evidence at a scene.Studies the general processes of the brain and mind.Observing and collecting oily prints left at a scene....

The Financial Vault Quiz 2018-02-26

The Financial Vault Quiz crossword puzzle
Across
  1. An omnibus account is normally overseen by a ____ manager
  2. When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
  3. It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
  4. The _____ the volatility, the riskier the security.
  5. A minimum of ___ persons are required to create an omnibus account
  6. The sale of a security that is not owned by the seller or that the seller has borrowed
  7. It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
  1. Short selling is motivated by the belief that a security's price will ____
  2. The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
  3. Portfolios that lie below the efficient frontier are
  4. Account Is an account between two futures merchants (brokers)
  5. Employee’s Provident Fund is maintained and overseen by the ___
  6. One measure of the relative volatility of a particular stock to the market is its

13 Clues: The _____ the volatility, the riskier the security.Portfolios that lie below the efficient frontier areAn omnibus account is normally overseen by a ____ managerAccount Is an account between two futures merchants (brokers)Employee’s Provident Fund is maintained and overseen by the ___A minimum of ___ persons are required to create an omnibus account...

Transformers 2018 2018-07-25

Transformers 2018 crossword puzzle
Across
  1. You shall lock away or take home portable devices and cabinet_____ a the end of each working day.
  2. During brief_____ (eg lunchtimes), rooms may be securely locked, where appropriate.
  3. Personal computers and terminals must be switched off and/ or protected against___________ access
  4. Flip charts, ports, and wall displays containing______ or sensitive information should be removed, and black/white boards wiped clean at the end of work sessions.
  5. Drawers must be locked when you are away from your_______ and at the end of the workday.
  6. Laptop and personal bags must be safely stored under your_____.
  7. Compliance is______.
Down
  1. After close of business, random _____ are to be conducted of photocopiers, faxes, cabinets and desk spaces to ensure that sensitive material and attractive items have been secured appropriately
  2. _____ Security Emergency Number is 5777(if you observe a suspicious package)
  3. It is an individual's ________ to ensure the security of personal items.
  4. All infringements will be considered as non-compliant behavior and recorded via_____.
  5. Classified and _______ material, including any items which have not yet been assessed, and proprietary third party documents, must be securely locked away in appropriate containeers.
  6. Personalized items that are workplace_______ (eg picture frames, certificated, paper weights), must be kept to a minimum.
  7. _______ Security Emergency Number is 4444 (if you observe a suspicious package)

14 Clues: Compliance is______.Laptop and personal bags must be safely stored under your_____.It is an individual's ________ to ensure the security of personal items._____ Security Emergency Number is 5777(if you observe a suspicious package)_______ Security Emergency Number is 4444 (if you observe a suspicious package)...

E-Commerce Security and Payments 2025-05-01

E-Commerce Security and Payments crossword puzzle
Across
  1. - Scam using fake links (e.g., "Pos Laju" fraud).
  2. - Harmful software (e.g., viruses, ransomware).
  3. - Security principle ensuring data confidentiality.
  4. - Text files tracking user activity on websites.
  5. - Guarantees timely access to avoid delays.
Down
  1. - Security tool blocking unauthorized network access.
  2. - Prevents unauthorized data modification.
  3. - Malicious actor who illegally accesses computer systems.

8 Clues: - Prevents unauthorized data modification.- Guarantees timely access to avoid delays.- Harmful software (e.g., viruses, ransomware).- Text files tracking user activity on websites.- Scam using fake links (e.g., "Pos Laju" fraud).- Security principle ensuring data confidentiality.- Security tool blocking unauthorized network access....

For People Crossword 2023-10-03

For People Crossword crossword puzzle
Across
  1. SCIFs are built according to the ICD 705 ________ Specifications
  2. The word for the study, investigation and mitigation of compromising emanations
  3. We have offices in Vista, San Diego, and ______ Heights
  4. You need to report any _______ travel to the FSO
  5. The heritage breed of pigs that Land & Feast raises
  6. The type of agriculture that Land & Feast practices
  7. If you get a ______ email, you should send it to the security team!
  8. Lab 7 manufactures waveguides and _________ SCIFs
Down
  1. The fancy breed of chicken Land & Feast sells
  2. Land & Feast’s farm has orchards with lemon and _______ trees
  3. The acronym for a required role for SCIF construction who oversees a construction site
  4. Our first core value
  5. FSO Stands for ______ Security Officer
  6. One thing Adamo's alarm services install is a _________ Detection System
  7. Adamo does RF shielding and ________ protection testing
  8. The manual the FSO team uses is called the ______

16 Clues: Our first core valueFSO Stands for ______ Security OfficerThe fancy breed of chicken Land & Feast sellsYou need to report any _______ travel to the FSOThe manual the FSO team uses is called the ______Lab 7 manufactures waveguides and _________ SCIFsThe heritage breed of pigs that Land & Feast raises...

2025 Compliance & Ethics 2025-10-31

2025 Compliance & Ethics crossword puzzle
Across
  1. A document that provides guidance for how Mindpath or its employees should act
  2. Federal law that protects the privacy and security of patients' health information
  3. A recommendation of a patient to another healthcare provider
  4. The possibility of something bad happening
  5. Moral principles and values governing healthcare practices
  6. Maintaining the confidentiality of patient information
  7. Protecting patient data from unauthorized access or breaches
  8. An official inspection to ensure compliance
  9. The federal agency responsible for investigating healthcare fraud and abuse
Down
  1. A mechanism (like EthicsPoint) for anonymous reporting of compliance violations
  2. Items or services given to healthcare providers as incentives
  3. Adherence to legal and ethical standards in healthcare
  4. Intentional and improper practices that harm patients or defraud the healthcare system
  5. Informing authorities or superiors about unethical or illegal actions
  6. An illegal payment or reward for patient referrals
  7. The unnecessary or excessive use of healthcare resources

16 Clues: The possibility of something bad happeningAn official inspection to ensure complianceAn illegal payment or reward for patient referralsAdherence to legal and ethical standards in healthcareMaintaining the confidentiality of patient informationThe unnecessary or excessive use of healthcare resources...

HOW WELL DO YOU KNOW YOUR RHYTHMITES? 2021-07-21

HOW WELL DO YOU KNOW YOUR RHYTHMITES? crossword puzzle
Across
  1. language
  2. Healthy
  3. HERAPHERI
  4. Security
Down
  1. Fun
  2. Incredible
  3. TENSION
  4. design
  5. SIP

9 Clues: FunSIPdesignTENSIONHealthylanguageSecurityHERAPHERIIncredible

UNIT 1 2023-05-03

UNIT 1 crossword puzzle
Across
  1. g
  2. d
  3. er
  4. ü
Down
  1. o
  2. ea
  3. e
  4. a
  5. v

9 Clues: ogeadvüeaer

Surfers Paradise Safety Action Project 2024-09-01

Surfers Paradise Safety Action Project crossword puzzle
Across
  1. Security personnel received this in order to effectively manage venues
  2. Street where majority of the nightclubs are concentrated
  3. Crime problem
Down
  1. This was implemented by all night clubs with the exception of one
  2. The project sought to implement this between police and security personnel
  3. Surfers Paradise is famous for this
  4. Where the project took place
  5. 22 of these were under observation during the project
  6. State of intoxication

9 Clues: Crime problemState of intoxicationWhere the project took placeSurfers Paradise is famous for this22 of these were under observation during the projectStreet where majority of the nightclubs are concentratedThis was implemented by all night clubs with the exception of oneSecurity personnel received this in order to effectively manage venues...

Digital Citizenship Vocabulary 2021-02-25

Digital Citizenship Vocabulary crossword puzzle
Across
  1. belonging to one person
  2. 2 words. rules and behaviors while using technology
  3. 2 words. meaning people you did not know looking at your post online
Down
  1. 2 words. before the internet these were newspapers, magazines, billboards, radio, and broadcast TV and direct mail.
  2. the act of posting insults online
  3. 2 words. meaning anything broadcasting through a screen or online
  4. like cyber-stalking online
  5. to form a set value
  6. 2 words. someone pretends to be you online and commits fraud
  7. scamming companies sending fake emails to get your private information
  8. a string of characters used to verify the identity of a user during the authentication process.
  9. another word meaning to fool someone

12 Clues: to form a set valuebelonging to one personlike cyber-stalking onlinethe act of posting insults onlineanother word meaning to fool someone2 words. rules and behaviors while using technology2 words. someone pretends to be you online and commits fraud2 words. meaning anything broadcasting through a screen or online...