cyber security Crossword Puzzles

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. What is the SOX Compliant application under EHS
  2. Tool replacing Oracle HR
  3. Measure based on the deviations of individual scores from the mean
  4. One of the focus areas of EHS
  5. CDA application is hosted here
Down
  1. Tool used for Rewards and Recognitions
  2. What protocal is used to authenticate OnGuard end user's SSO
  3. Python library for machine learning
  4. Portal to view security emergency contact and other security info
  5. TCT supports export control for which country?

10 Clues: Tool replacing Oracle HROne of the focus areas of EHSCDA application is hosted herePython library for machine learningTool used for Rewards and RecognitionsTCT supports export control for which country?What is the SOX Compliant application under EHSWhat protocal is used to authenticate OnGuard end user's SSO...

SC crossword - v2 2025-12-22

SC crossword - v2 crossword puzzle
Across
  1. The area where bags and passengers are screened
  2. The building where passengers wait for flights
  3. The path planes use to get to the runway
  4. Where the pilot sits to fly the plane
Down
  1. Where you board your plane
  2. Where planes take off and land
  3. When a plane touches back down
  4. What you do with your ticket and bags before security
  5. The person who flies the plane
  6. When a plane leaves the ground

10 Clues: Where you board your planeWhere planes take off and landWhen a plane touches back downThe person who flies the planeWhen a plane leaves the groundWhere the pilot sits to fly the planeThe path planes use to get to the runwayThe building where passengers wait for flightsThe area where bags and passengers are screened...

Bradley 2025-11-07

Bradley crossword puzzle
Across
  1. A card that lets you borrow money up to a limit to buy things, and pay it back later with interest if unpaid
  2. The percentage charged by a lender for borrowing money, or earned when saving money.
  3. Something valuable (like a house or car) that a lender can take if the borrower doesn’t repay a loan.
  4. An interest rate that can change over time, depending on the market.
  5. A loan used to buy a house, where the house is the security for the loan.
  6. Replacing an old loan with a new one, usually to get a better interest rate or lower payments.
  7. A person or company (like a bank) that lends money to someone.
  8. The length of time you have to repay a loan.
Down
  1. A card that takes money directly from your bank account when you buy something.
  2. An asset (like a car or house) a borrower gives as security for a loan.
  3. A set period of time a loan or deposit lasts (e.g. a 3-year loan).
  4. The original amount of money borrowed or invested, not including interest.
  5. An interest rate that stays the same for the whole loan term.
  6. Money borrowed that must be paid back, usually with interest.
  7. The person who takes money from a lender and promises to pay it back.
  8. The maximum amount you can borrow or spend (for example, on a credit card).
  9. The chance of losing money or something valuable when making a financial decision

17 Clues: The length of time you have to repay a loan.An interest rate that stays the same for the whole loan term.Money borrowed that must be paid back, usually with interest.A person or company (like a bank) that lends money to someone.A set period of time a loan or deposit lasts (e.g. a 3-year loan)....

Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29

Whaine V. ~ 7/8 Internet Safety CrossWord! crossword puzzle
Across
  1. A hostile and insulting interaction between internet users.
  2. An image that is captured of what is shown on a phone, tablet, or computer screen
  3. Rules or manners for interacting courteously with others online
  4. unwanted emails
Down
  1. Online communities, also known as social networks
  2. Sharing someone’s secrets or embarrassing information online
  3. Setting up a fake online profile
  4. malware,cyber-destroyer, break your technology
  5. A technology that allows us to access our files through the internet from anywhere in the world.
  6. Someone who posts rude or off-topic messages in an online community

10 Clues: unwanted emailsSetting up a fake online profilemalware,cyber-destroyer, break your technologyOnline communities, also known as social networksA hostile and insulting interaction between internet users.Sharing someone’s secrets or embarrassing information onlineRules or manners for interacting courteously with others online...

Text Bullying 2019-05-22

Text Bullying crossword puzzle
Across
  1. its never too late to do / make the _____ thing / choice
  2. when someone is mean to someone else on purpose
  3. everyone is unique and ______ in their own way
  4. having _____ can give you the courage to help and stop bullying
  5. bystanders are equally evolved if they don't ____
  6. bully is identified not by their looks, but rather by their ____
Down
  1. bullying can be done by an individual or by a _____
  2. bullies often have problems with ________ and have their own way to deal with it
  3. bullying online is called ______ bullying
  4. bullying is unfair and one-______

10 Clues: bullying is unfair and one-______bullying online is called ______ bullyingeveryone is unique and ______ in their own waywhen someone is mean to someone else on purposebystanders are equally evolved if they don't ____bullying can be done by an individual or by a _____its never too late to do / make the _____ thing / choice...

Safety Crossword 2023-05-05

Safety Crossword crossword puzzle
Across
  1. Cyber-attack that is sent via SMS/Text messaging
  2. Known as scam phone calls
  3. Program to identify and assist those who may require assistance during an evacuation
  4. How many life-saving rules are there
  5. Location of buried utilities prior to a mechanical excavation cover which life-saving rule
Down
  1. Someone enters behind you without your knowledge
  2. Malicious or threatening emails sent
  3. What is the 4th value recently added to Enbridge's values
  4. Type of training to ensure our workstations are setup properly
  5. What type of alarm system does Enbridge Centre and Manulife have

10 Clues: Known as scam phone callsMalicious or threatening emails sentHow many life-saving rules are thereSomeone enters behind you without your knowledgeCyber-attack that is sent via SMS/Text messagingWhat is the 4th value recently added to Enbridge's valuesType of training to ensure our workstations are setup properly...

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Anti-Bullying 2023-11-28

Anti-Bullying crossword puzzle
Across
  1. Showing that you listen to them
  2. Doing something to someone over and over again and it annoys them or hurts them
  3. Being unkind or hurtful
  4. someone who watches a fight and doesn't help stop it
  5. This can stop fights and resolve issues.
  6. An online type of bullying via messages or social media
Down
  1. Something is angry or frustrated and they let it out on other people
  2. someone who watches a fight and tries to stop it
  3. a person you can trust or somebody you are friends with
  4. A disagrement with somebody

10 Clues: Being unkind or hurtfulA disagrement with somebodyShowing that you listen to themThis can stop fights and resolve issues.someone who watches a fight and tries to stop itsomeone who watches a fight and doesn't help stop ita person you can trust or somebody you are friends withAn online type of bullying via messages or social media...

Bullying and Decision Making 2023-09-01

Bullying and Decision Making crossword puzzle
Across
  1. Something you think and contemplate about everyday
  2. different types are racial, cyber, and physical
  3. a synonym of abuse
  4. a person who supports a person that’s is doing through bullying
  5. a mean person who physically, mentally, socially abuses for their own personal gain
Down
  1. a person who is experiencing abuse from a bully
  2. a person who teaches and gets reports about bullying
  3. of bully- a person who supports the bully and close friend
  4. a person who usually gives a bully silent approval or doesn’t want to get involved
  5. when someone gets bullied through technology

10 Clues: a synonym of abusewhen someone gets bullied through technologya person who is experiencing abuse from a bullydifferent types are racial, cyber, and physicalSomething you think and contemplate about everydaya person who teaches and gets reports about bullyingof bully- a person who supports the bully and close friend...

Trefoil Guild Website Crossword 2026-03-06

Trefoil Guild  Website Crossword crossword puzzle
Across
  1. International project acronym for adventure with Zest (5)
  2. Minimum age to to join the Trefoil Guild (8)
  3. The STARS theme involving a physical or community project (6)
  4. The"S" in STARS that focusses on personal well-being (4)
  5. One of four key messages "Find______" (10)
Down
  1. The personal award with Bronze. Silver, and Gold Levels (6)
  2. Location of Trefoil Guild HQ (6)
  3. News The quarterly magazine sent to all members (11)
  4. A specialized type of guild often for 18-30s or online (5)
  5. The colour of the Trefoil Guild promise badge (3)

10 Clues: Location of Trefoil Guild HQ (6)One of four key messages "Find______" (10)Minimum age to to join the Trefoil Guild (8)The colour of the Trefoil Guild promise badge (3)News The quarterly magazine sent to all members (11)The"S" in STARS that focusses on personal well-being (4)International project acronym for adventure with Zest (5)...

Compliance 3 2023-03-28

Compliance 3 crossword puzzle
Across
  1. ________ email sending shall be prohibited. (Information Security Policy)
  2. The ________ gifts should NOT be given to vendor/supplier China Mobile subsidiaries, government institutions and HQ of PRC state-owned enterprises. (Gift policy)
  3. Access log records in site access control and surveillance systems shall be kept for a minimum of ____ days. (Information Security Policy)
  4. ________ units have the responsibility to monitor public sentiment within the scope of business. (Public Sentiment Management Policy)
  5. ______ refers to a situation in which a person decides to report serious concerns about any suspected misconduct, malpractice or irregularity within the Company. (internal control policy)
Down
  1. _______ committee conducts the meeting which is responsible for sourcing, and make the approval in accordance with the relevant provisions of the ______ policy. (conference management policy)
  2. The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)
  3. All units can provide their preferred gift suggestions. __________ Division will evaluate and add the executable gifts to the list prepared in the middle and end of the year. (Gift policy)
  4. Three types of _________ Sponsorships are available to staff: team nomination, professional membership and professional certification examination sponsorship. (Education Sponsorships Policy)
  5. Passwords shall be ____ or more characters. (Information Security Policy)

10 Clues: ________ email sending shall be prohibited. (Information Security Policy)Passwords shall be ____ or more characters. (Information Security Policy)The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)...

Financial Jargons 2022-10-26

Financial Jargons crossword puzzle
Across
  1. a fixed income investment which is issued by the government or a company to its buyers
  2. a market where the prices of the stocks are increasing over a prolonged period of time
  3. It shows the average number of stocks which are traded during a particular time
  4. It relates to the amount of money or the value in cash that the holder of a security will obtain from the issuer of the security when the security matures at the specific date
  5. It shows how much a company or firm pays out in every year as compared to the stock price Income Stock
Down
  1. It is a form of fixed-income instrument which is not backed by security of any physical assets or collateral of the issuer
  2. An entity who purchases or sells investments/stocks on behalf of the investor/trader in return for a commission
  3. These are equity shares of companies which are well-established and financially stable
  4. It refers to a period in which the prices of equity shares fall consistently
  5. It is the final price on a specific trading day at which the equity shares of a company are sold or traded

10 Clues: It refers to a period in which the prices of equity shares fall consistentlyIt shows the average number of stocks which are traded during a particular timea fixed income investment which is issued by the government or a company to its buyersThese are equity shares of companies which are well-established and financially stable...

Human Rights 2020-12-14

Human Rights crossword puzzle
Across
  1. arrest
  2. discrimination
  3. treatment
  4. security
  5. spirit brotherhood
  6. declaration
Down
  1. cruel
  2. servitude
  3. recogniton
  4. limitation of sovereignty

10 Clues: cruelarrestsecurityservitudetreatmentrecognitondeclarationdiscriminationspirit brotherhoodlimitation of sovereignty

Human Rights 2020-12-14

Human Rights crossword puzzle
Across
  1. servitude
  2. spirit brotherhood
  3. limitation of sovereignty
Down
  1. discrimination
  2. security
  3. declaration
  4. cruel
  5. treatment
  6. arrest
  7. recogniton

10 Clues: cruelarrestsecurityservitudetreatmentrecognitondeclarationdiscriminationspirit brotherhoodlimitation of sovereignty

At the airport 2025-10-22

At the airport crossword puzzle
Across
  1. AIRLINE
  2. SECURITY
  3. GATE
Down
  1. DEPART
  2. FLIGHT
  3. IN CHECK IN

6 Clues: GATEDEPARTFLIGHTAIRLINESECURITYIN CHECK IN

PPB 0035.14 - Mobile Computing 2020-11-13

PPB 0035.14 - Mobile Computing crossword puzzle
Across
  1. Internet standard that has security vulnerabilities.
  2. Security __________ must be in place prior to its implementation.
  3. Health information stored or captured by clinicians or if it is communicated to a healthcare provider who uses it to deliver care is governed by what law (i.e. PHIPA)?
  4. To support a facility’s functional needs for staying connected to a network, __________ points are created.
  5. Other than tracking health records, what is the other challenge for HIM professionals when these information are residing on mobile devices?
  6. Applications used in mobile devices allow healthcare providers and patients to access to __________ test results, medical records, and reference materials.
  7. What are used for storing addresses, organizing tasks, and scheduling functions?
  8. __________ or Wi_Fi is the technology used to connect devices and computers together.
  9. These devices, known as mobile healthcare computing devices or abbreviated __________, range from the size of a cell phone with a tiny screen to tablets.
  10. This must be required to access a mobile device.
  11. Evolution in mobile technology and the use of wireless networks has opened many doors to support mHealth, however, mobile devices may also provide challenges such as ___________ and data loss.
  12. mhealth refers to the use of mobile and __________ devices to improve healthcare.
  13. Wifi access provides clinicians with more mobility and what?
  14. The use of mobile devices is an important ___________ that Infoway believes can address several of the key challenges facing the healthcare system.
  15. Health information generated by a mobile device that uses medical records for situations such as audits, health research, and information reporting are what type of applications?
  16. Typically, clinicians use cellular phones and __________ for communication.
  17. A study found that approximately __________ of physicians had increased productivity with the use of this technology in the hospital setting.
  18. Healthcare organizations would need to outline the ____________ and acceptable uses of mobile devices that capture and store clinical information.
  19. If a healthcare organization is implementing mHealth into their system, they must take ownership and the possibility of device loss or ___________ into consideration.
  20. According to Canada Health Infoway (Infoway), Clinicians want portable, __________, and useful tools to assist them in their practice.
  21. In order to evolve to address their privacy and security considerations, healthcare organizations must put out ___________ and regulation.
Down
  1. mHealth can be downloaded by consumers from provider portals or by health providers to collect, record and report information either manually or via interfaces with what devices?
  2. What must clinicians search for to achieve the most effective application(s) for their myriad of needs?
  3. What will be harmonized with mHealth’s initiatives and directions in the short and long-term once policies are implemented?
  4. Policies would need to address mobile device ____________.
  5. The most popular connection is __________ that allows high speed transfer.
  6. Remotely monitoring hospital patients or the elderly can free up much needed what in hospitals and nursing homes?
  7. mHealth has the potential to benefit society in a number of ways, such as cutting the costs of providing healthcare, maintaining and improving __________ of care, and reaching patients in remote locations.
  8. Intermittently connected MHCD’s pose what great risk?
  9. __________ can also be used as a tool for patients to manage appointments, renew prescriptions, or view medical records.
  10. With this implementation, practitioners can access the hospital’s internet guidelines in what way?
  11. The term __________ health has become visible as a new capability of information management within health delivery organizations (HDOs).
  12. Where should policy makers and program managers need to be aware of privacy security issues to ensure appropriate policies and strategies are developed and implemented?
  13. Studies predict mHealth has the potential to reduce the __________ burden of healthcare delivery for clinicians by 20 to 30 percent.
  14. The functional categories of MHCDs each have different requirements for __________, security, communication, and systems integration.
  15. mHealth is also part of an organization’s ___________ health record and is subject to requests for disclosures, subpoenas, and e-discovery.
  16. It is also empowering the elderly by providing them with __________involvement in their treatment.
  17. What type of devices do practitioners use in order to access databases, drug details, or drug reactions?
  18. What must be replaced in order for information updates to be done?
  19. Message ___________ security and data storage security can put citizen information at risk if the necessary precautions are not taken.
  20. The use of these technologies can __________ healthcare costs by supporting care delivery, promoting healthy behavior changes in patients, and transforming the caregiver-to-patient and care-giver-to caregiver relationships.
  21. Many functions that can be performed and being ported to mobile platforms are using what kind of clinical information system?
  22. To avoid problems, assessing the validity of the quality of mHealth applications should include privacy, security, ___________, and content features.
  23. Many challenges include preventing unauthorized access to, ensuring that it is not stored on a mobile device, and particularly dealing with what kind of sensitive patient information?
  24. Physicians are increasingly using smartphones which allows them to access medical resources in order to support __________ based decision making.
  25. mHealth implementers must pay attention to storage issues and the concept of the extensive amount of health data being generated is called?
  26. mHealth also has the potential to reduce the per __________ cost of healthcare, while simultaneously maintaining or improving care quality.
  27. What control concerns are related to these mobile devices that must be dealt with and resolved?
  28. Policies may be involved in how mobile devices are handled when the information they contain may become involved in what potential legal action?

49 Clues: This must be required to access a mobile device.Internet standard that has security vulnerabilities.Intermittently connected MHCD’s pose what great risk?Policies would need to address mobile device ____________.Wifi access provides clinicians with more mobility and what?Security __________ must be in place prior to its implementation....

WatchGuard Dictionary Day 2022-10-11

WatchGuard Dictionary Day crossword puzzle
Across
  1. WatchGuard's signature red box
  2. security simplified
  3. WatchGuard's Security Platform
Down
  1. WatchGuard Cloud
  2. XDR based threat detection and remediation platform
  3. An easy-to-use MFA product
  4. proactive defense strategy

7 Clues: WatchGuard Cloudsecurity simplifiedAn easy-to-use MFA productproactive defense strategyWatchGuard's signature red boxWatchGuard's Security PlatformXDR based threat detection and remediation platform

System Securiy 2018-07-12

System Securiy crossword puzzle
Across
  1. The most effective way to achieve data security
  2. a code which unlocks personal accounts
  3. An attack which requires trial and error.
  4. and theft Act of stealing computer information.
  5. A category of manipulating in order to reveal personal information.
  6. Its also known as antivirus
  7. faking to be someone else in order to acquire information.
  8. Its an computer attack which has a code embedded in a badly designed application.
  9. A set of rules that limit computer network access
Down
  1. A type of viruses.
  2. monitoring computer network trafficking to gather information
  3. is an attempt to check the security of facilities
  4. A type of attack which prevents users from accessing servers.
  5. Higher accessed people have a wider set of information in comparison to lower level users
  6. To protect a network or system

15 Clues: A type of viruses.Its also known as antivirusTo protect a network or systema code which unlocks personal accountsAn attack which requires trial and error.The most effective way to achieve data securityand theft Act of stealing computer information.is an attempt to check the security of facilitiesA set of rules that limit computer network access...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

great depression 2023-10-16

great depression crossword puzzle
Across
  1. a long period without precipitation
  2. bowl was the sand storm in the mid west
  3. security program that help security of elderly
  4. people that dont have a job
  5. a law passed after the civil war
  6. a series of speeches over the radio
  7. where people went to steal their foods
Down
  1. was an upwards movement of price for goods
  2. a person who moves from place to place to search for work
  3. a series of program intended to help the citizen
  4. the place where people were encamping at in the 1930s
  5. to remove people against their will
  6. failure was when the bank turns bankrupt and has to shut down
  7. works is a program that helps clean up the cities.
  8. is a little machine that has a person talking in it giving information

15 Clues: people that dont have a joba law passed after the civil wara long period without precipitationto remove people against their willa series of speeches over the radiowhere people went to steal their foodsbowl was the sand storm in the mid westwas an upwards movement of price for goodssecurity program that help security of elderly...

Vocabulary Assingment 2024-03-07

Vocabulary Assingment crossword puzzle
Across
  1. a type of phone used by criminals
  2. the act of willful killing for any reason
  3. a person who arranges deals and work between two people or groups
  4. the act of getting away quickly, usually from a crime scene
  5. a person accompanying another for security purposes
  6. the practice of a person doing business or shoring assets overseas to avoid taxes
  7. a secret plan to do something unlawful
Down
  1. a killer for hire
  2. protection against and from any potential harm
  3. an account of a person's life written as such by that person
  4. a long range rifle usually equipped with a scope
  5. an outfit used in order to not get recognised
  6. a building where criminal trials take place
  7. just behavior or treatment
  8. someone who writes a book

15 Clues: a killer for hiresomeone who writes a bookjust behavior or treatmenta type of phone used by criminalsa secret plan to do something unlawfulthe act of willful killing for any reasona building where criminal trials take placean outfit used in order to not get recognisedprotection against and from any potential harm...

Competency 5, Information Security 2020-10-10

Competency 5, Information Security crossword puzzle
Across
  1. A method for confirming users' identities.
  2. A virus and worm are two types.
  3. Right to choose the conditions and the extent to which information and beliefs are shared with others. Informed consent for the release of medical records represents the application of information privacy.
  4. The protection of physical items, objects, or areas from unauthorized access and misuse.
  5. US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
  6. Electronic tool that can track system access by individual user, by user class, or by all persons who viewed a specific client record.
  7. Unspoken understanding that private information shared in a situation in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
  8. Freedom to do things without other people watching you or knowing what you are doing. Privacy includes the right to determine what information is collected, how it is used, and the ability to access collected information to review its security and accuracy.
  9. Acronym for the exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies.
  10. Acronym for Health Insurance Portability and Accountability Act.
Down
  1. Protection of information systems and the information housed on them from unauthorized use or threats to integrity.
  2. The exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies
  3. The protection of non-tangible items such as software and data integrity from unauthorized access and misuse.
  4. Programs written for the purpose of stealing information, causing annoyance or performing covert actions.
  5. Data that has been interpreted.
  6. Type of gateway designed to protect private network resources from outside hackers, network damage, and theft or misuse of information.

16 Clues: A virus and worm are two types.Data that has been interpreted.A method for confirming users' identities.Acronym for Health Insurance Portability and Accountability Act.The protection of physical items, objects, or areas from unauthorized access and misuse....

Security awareness month 2021 2021-10-04

Security awareness month 2021 crossword puzzle
Across
  1. Tide's bug bounty program
  2. This is commonly assigned to bank customers for use with ATMs and for use with debit cards.
  3. Security is the job of __________.
  4. A service that both encrypts your data and hides your IP address
  5. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. Tide's Information classification procedure has four colours. Green, Amber, Red and _________.
  7. Unauthorised person follows an authorised individual to enter a typically secured area.
  8. Any data that could potentially be used to identify a particular person.
Down
  1. You should _____ a device before stepping away from it.
  2. Where is Tide's Information Security Management System kept
  3. You message in this channel if an incident occurs.
  4. For a password to be secure, it should contain upper and lower case letters, numbers, and ________
  5. You should never share your __________.
  6. Who is Tide's Ciso?
  7. A type of online scam where criminals impersonate legitimate organisations via email
  8. A malicious code that can infect your system.

16 Clues: Who is Tide's Ciso?Tide's bug bounty programSecurity is the job of __________.You should never share your __________.A malicious code that can infect your system.You message in this channel if an incident occurs.You should _____ a device before stepping away from it.Where is Tide's Information Security Management System kept...

Infant Safety and Security 2016-11-19

Infant Safety and Security crossword puzzle
Across
  1. Function allowing caregivers to adjust/change banding material
  2. Code name for infant abduction
  3. Allows caregiver to automatically enroll infant in the Safe Place system 60 seconds after the infant in banded with transmitter
  4. Never assume an alarm is ________
  5. In case of a code pink, use Vocera to "__________ to Everyone Everywhere"
  6. Allows caregiver to pre-assign a transmitter to a specific infant before banding the infant
  7. Information alarm color (auto-enroll, transfer complete, expired alarms)
  8. Color for check band, device fault and client missing alarms
  9. Function allowing movement between monitored units
Down
  1. Function allowing movement to unmonitored areas (MRI, CT, etc)
  2. On employee badges letting families know who is authorized to transport the baby
  3. Staff should ALWAYS respond __________ to all alarms
  4. The number to call to report a Code Pink can be found on most unit
  5. Function to remove the infant from the system
  6. Infant safety and security is the responsibility of _________ in the healthcare facility.
  7. Color for cut band, door alarm, no signal and 'band off" alarms

16 Clues: Code name for infant abductionNever assume an alarm is ________Function to remove the infant from the systemFunction allowing movement between monitored unitsStaff should ALWAYS respond __________ to all alarmsColor for check band, device fault and client missing alarmsFunction allowing movement to unmonitored areas (MRI, CT, etc)...

Security Awareness Month 2025 2025-09-25

Security Awareness Month 2025 crossword puzzle
Across
  1. Locks files and demands you pay money
  2. Pressing on something with your mouse. Think before you do this
  3. A formal rule set by the company to govern behavior
  4. A saved copy of your files
  5. What you should do if you spot a phishing email
  6. Watches what you do on your computer
  7. A secret word used to log in
  8. What you click to open a webpage
Down
  1. Bad software that harms your computer
  2. People who break into computer systems
  3. A warning about something important
  4. A message sent over the internet
  5. Adds new features and fixes security problems on devices
  6. Keeping personal info safe
  7. Fake emails that try to trick you
  8. We do this every month via Terranova

16 Clues: A saved copy of your filesKeeping personal info safeA secret word used to log inA message sent over the internetWhat you click to open a webpageFake emails that try to trick youA warning about something importantWatches what you do on your computerWe do this every month via TerranovaBad software that harms your computer...

CSAM 2022 - Be Cyber Smart 2022-10-02

CSAM 2022 - Be Cyber Smart crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
  2. THe A in the C-I-A Triad. It ensures authorized users have access.
  3. A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. Verifying identity
  5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  2. Facebook, Twitter, Instagram, etc. (two words)
  3. Hardware or software designed to prevent unauthorized access to or from private network.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
  7. Threatening behavior facilitated through electronic means such as texting.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Unauthorize access to a network, information systems, or application.
  10. The I in the C-I-A Triad; protection from unauthorized changes.
  11. Should be constructed of upper and lower case letters, numbers, and special characters.
  12. A fraudalent email purportedly from a reputable company attempting to get personal information.

20 Clues: Verifying identityFacebook, Twitter, Instagram, etc. (two words)The I in the C-I-A Triad; protection from unauthorized changes.THe A in the C-I-A Triad. It ensures authorized users have access.Unauthorize access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Super Cryptic Cyber Crossword 9000 2022-02-02

Super Cryptic Cyber Crossword 9000 crossword puzzle
Across
  1. Password 2.0.
  2. Spoofing, at the very top of the company’s hierarchy.
  3. Protecting your door with a lock made of Cheetos
  4. Online advertising used to spread malware.
  5. Much stronger than SMS, but weaker than U2F.
  6. A Wi-Fi access point that wants to hurt you, bad…
  7. Oh you wanted access to your system? NOPE.
  8. Everyone needs protection… even Wi-Fi connections in hotel lobbies!
  9. Reason #999 not to use SMS as an MFA mechanism.
  10. Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
  11. registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
  12. Pay us money… or else have fun having no access to your files!
  13. Don’t get (personally) hooked!
  14. A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
  15. An item of value and/or importance to our business operations.
Down
  1. Hide this to have a (minor) edge over your Wi-Fi attackers!
  2. Lets you authenticate by the way you sign your name or walk the walk!
  3. An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
  4. This is how I prove who I claim to be to a system.
  5. You swipe your card into the reader, I will blindly follow.
  6. The risk posture of our company is situated somewhere between a bank and this.
  7. Ninja IT’s meaner and nastier cousin.
  8. A security model which assumes that there is always at least one person on every team that is compromised or coerced.
  9. The internet’s telephone directory.
  10. A vendor assessment a day keeps external audits away.
  11. Phishing for those partial to phone calls.
  12. Don’t get hooked to this social “experiment”!
  13. Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
  14. The practice and study of methods for hiding information.
  15. I will execute independently and self-replicate through your network connections. Sounds cool, eh?
  16. Defines and manages controls that an organization needs to implement.

31 Clues: Password 2.0.Don’t get (personally) hooked!The internet’s telephone directory.Ninja IT’s meaner and nastier cousin.Online advertising used to spread malware.Phishing for those partial to phone calls.Oh you wanted access to your system? NOPE.Much stronger than SMS, but weaker than U2F.Don’t get hooked to this social “experiment”!...

Networking Concepts and Cyber Ethics 2025-06-04

Networking Concepts and Cyber Ethics crossword puzzle
Across
  1. Local Area Network
  2. Information about a person that exists on the internet because of their online activities
  3. Bulk Emails
  4. Distributing copied software illigaly
  5. this topology forms a circle
  6. Safety Rules and regulations on the internet
  7. It is requires the cheapest topology setup
  8. Does not broadcast the message on the entire internet
  9. Metropolitan Area Network
Down
  1. Used in wireless networking
  2. One of the most common type of topology
  3. Presenting someone else's work as your own
  4. Combination of two terms 'net' and 'etiquette'
  5. Enables you to connect to the available internet
  6. Illegally using someone else's identity
  7. Illigal activities done online
  8. This topology uses a single communication line
  9. Connect two internets together,LAN and WAN
  10. A network device used to connect all computers
  11. World Area Network

20 Clues: Bulk EmailsLocal Area NetworkWorld Area NetworkMetropolitan Area NetworkUsed in wireless networkingthis topology forms a circleIlligal activities done onlineDistributing copied software illigalyOne of the most common type of topologyIllegally using someone else's identityPresenting someone else's work as your own...

IT: Networking and Cyber Ethics 2025-05-27

IT: Networking and Cyber Ethics crossword puzzle
Across
  1. Device that connects devices in a network
  2. Online manners and rules
  3. Copying work without giving credit
  4. Security system that controls network traffic
  5. Protecting data by converting it into code
  6. Wide Area Network
  7. Fraud attempt to obtain sensitive data
  8. Unauthorized access to data
  9. Device that forwards data packets between networks
  10. Local Area Network
Down
  1. Common wired networking technology
  2. Malicious software
  3. Online harassment or bullying
  4. Set of rules for data transmission
  5. Converts signals for internet access
  6. Data transfer capacity of a network
  7. Address: Unique string identifying a device on a network
  8. Legal right to protect creative work
  9. Footprint: Online trail of user activity
  10. Right to control personal data

20 Clues: Wide Area NetworkMalicious softwareLocal Area NetworkOnline manners and rulesUnauthorized access to dataOnline harassment or bullyingRight to control personal dataCommon wired networking technologySet of rules for data transmissionCopying work without giving creditData transfer capacity of a networkConverts signals for internet access...

Cyber Awareness Passwords and MFAs 2025-08-14

Cyber Awareness Passwords and MFAs crossword puzzle
Across
  1. The process of verifying a user's identity.
  2. These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
  3. This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
  4. This type of attack uses a predefined list of common words and phrases to guess passwords.
  5. A flaw or weakness in a computer system that could be exploited to violate the system's security.
  6. Changing this immediately is recommended on accounts you suspect may have been compromised.
  7. Avoid using easily __________ information like names or birthdays in your passwords.
  8. This type of attack tries out countless password combinations until the correct one is found.
Down
  1. A strong password should be at least ______ characters long, according to NIST recommendations.
  2. A method of authentication using unique patterns on an individual's fingertip.
  3. An unauthorized user who attempts to gain access to an information system.
  4. A common bad habit where users employ the same credentials across different websites and services.
  5. The process of converting data into a format unreadable to anyone except those possessing a "key".
  6. Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
  7. A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
  8. This type of authentication adds an extra layer of security beyond just a password.
  9. Should be at least 16 characters long and combine random words to be strong.
  10. A specific form of phishing that targets high-profile business executives.
  11. A sequence of words or text used to control access to a computer; similar to a password.
  12. and Clues (Word TAB Clue)
  13. Passkeys often rely on this type of factor, like a fingerprint or facial scan.
  14. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.

22 Clues: and Clues (Word TAB Clue)The process of verifying a user's identity.An unauthorized user who attempts to gain access to an information system.A specific form of phishing that targets high-profile business executives.Should be at least 16 characters long and combine random words to be strong....

ICS/OT Cyber Cryptic Crossword 2026-01-23

ICS/OT Cyber Cryptic Crossword crossword puzzle
Across
  1. Roman wares looted digital extortion (10)
  2. Knightly honorific with no time or energy in vote rotating (5)
  3. Rare minerals opt for Caribbean spirits (8)
  4. Mother confused teams with pair sensing heat (12)
  5. Automaton formed from Dragos CEO and operational technology (5)
  6. Initially, some cyber alerts disrupt automation control system (5)
  7. Stage 2 pivot pie ordered, Ken Burns? (9)
  8. Mickey overheard whole OPC-UA component (9)
Down
  1. Throttles as wolf inverts, trapped in rival vendor (9)
  2. Safety-critical broadcasts enter Scottish lake (9)
  3. Industrial routine scrambled in DoD grid call (12)
  4. Factory efficiency — TV award announced down south (3)
  5. Energy exchanged hour after spilling tea (4)
  6. RIP! Victor over Romeo (7)
  7. Industrial middleware confused cop and initially District Attorney (5)
  8. Crude plant fiery nurse germinates (8)
  9. Noisy attempt joins sibling malware (6)
  10. Individual broke IDS before largest Greek island (8)
  11. Package installer adds final code including strangely armed hallucination (9)
  12. Evil Scholar’s voice from leaders of fraudulent insidious new scripture (4)

20 Clues: RIP! Victor over Romeo (7)Crude plant fiery nurse germinates (8)Noisy attempt joins sibling malware (6)Roman wares looted digital extortion (10)Stage 2 pivot pie ordered, Ken Burns? (9)Rare minerals opt for Caribbean spirits (8)Mickey overheard whole OPC-UA component (9)Energy exchanged hour after spilling tea (4)...

Crossword 2021-02-14

Crossword crossword puzzle
Across
  1. round trip ticket
  2. to go on vacation
  3. boarding pass
  4. to get in line
  5. monitor
  6. to pack a suitcase
  7. flight attendant
Down
  1. to go through security
  2. luggage
  3. bus stop
  4. passport
  5. airport
  6. to take a taxi
  7. to travel
  8. passenger

15 Clues: luggageairportmonitorbus stoppassportto travelpassengerboarding passto get in lineto take a taxiflight attendantround trip ticketto go on vacationto pack a suitcaseto go through security

Virtual Learning 2024-08-11

Virtual Learning crossword puzzle
Across
  1. - Access account.
  2. - Saved webpage.
  3. - Online conversation.
  4. - Video device.
  5. - Post a file.
  6. - Internet tool.
  7. - Silence your mic.
Down
  1. - Short assessment.
  2. - Web connection.
  3. - Video call platform.
  4. - Security code.
  5. - Live video transmission.
  6. - Small discussion group.
  7. - Online course platform.
  8. - Typing tool.

15 Clues: - Typing tool.- Post a file.- Video device.- Security code.- Saved webpage.- Internet tool.- Access account.- Web connection.- Short assessment.- Silence your mic.- Video call platform.- Online conversation.- Small discussion group.- Online course platform.- Live video transmission.

PKN Group kevin, akio, nelson, daniel 2023-03-15

PKN Group kevin, akio, nelson, daniel crossword puzzle
Across
  1. sebuah contoh dari integrasi nasional adalah pembangunan ______ oleh pemerintahan R.I,
  2. apa kata benda dari integritas?
  3. kampanye yang berbau ______ bisa menjadi ancaman terbangunnya integrasi nasional
  4. Dunia maya disebut juga dengan ______
  5. integrasi nilai indonesia ada dalam ______
  6. Sikap percaya diri merupakan khas nasionalisme Indonesia menurut _______
  7. _______ menjadi ciri khas bangsa indonesia
  8. salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah
  9. penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI
Down
  1. kita harus menghadapi bersama ancaman supaya _______ nasional dapat terwujud
  2. budaya beragam seharusnya menjadi ______ bukan untuk merendahkan budaya lain
  3. mencintai produk lokal dan budaya bangsa sendiri merupakan implementasi dari ______
  4. untuk mencegah terjadinya disintegrasi di masa depan, perlu ada ________ kebudayaan yang menyeluruh & berkesinambungan
  5. memelihara lingkungan hidup merupakan bentuk partisipasi warga negara dilingkungan ______ dan negara
  6. ________ menyediakan segala macam bentuk kekuatan manusia melalui berbagai proses
  7. dalam uud 1945 dinyatakan 4 tujuan ______

16 Clues: apa kata benda dari integritas?Dunia maya disebut juga dengan ______dalam uud 1945 dinyatakan 4 tujuan ______integrasi nilai indonesia ada dalam _____________ menjadi ciri khas bangsa indonesiapenguatan ______ perlu ditempuh untuk menjaga wilayah NKRIsalah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah...

PROTECTING YOUR COMPUTER 2016-04-24

PROTECTING YOUR COMPUTER crossword puzzle
Across
  1. Security __________ offer a wide range of protection.
  2. These type of evaluations are a great way to check it out.
  3. This OS has built in protections.
  4. These products offer advanced users a pick-and-mix approach.
  5. Do this often to keep the best protection.
  6. These should be installed regularly.
  7. These also have built in security settings.
Down
  1. These reviews are better than the manufacturer review.
  2. One of the three components protection should contain.
  3. Official looking notices that warn of viruses and a fix.
  4. Best software against Internet threats.
  5. System _________ takes you back to a time before the problem.
  6. This should be done to your computer at least once per week.
  7. Never forget to reverse this action when done.

14 Clues: This OS has built in protections.These should be installed regularly.Best software against Internet threats.Do this often to keep the best protection.These also have built in security settings.Never forget to reverse this action when done.Security __________ offer a wide range of protection.These reviews are better than the manufacturer review....

CyberSmart Crossword 2025-09-26

CyberSmart Crossword crossword puzzle
Across
  1. What to do when walking a visitor through secure areas
  2. A dishonest scheme or trick
  3. Malicious software that locks files until money is paid
  4. Type of information that must be carefully guarded
  5. What you should do with a suspicious email
  6. Fraudulent emails that trick people into revealing personal info
  7. – What you should do to your workstation when you leave your desk
Down
  1. A secret code used to access systems or accounts
  2. Software patches that fix bugs and security flaws
  3. Malicious code that spreads from one computer to another
  4. Software that secretly collects your information
  5. Worn to identify you as an employee
  6. Watching over somebody's shoulder to see what they are typing
  7. What good security habits do for your data

14 Clues: A dishonest scheme or trickWorn to identify you as an employeeWhat you should do with a suspicious emailWhat good security habits do for your dataA secret code used to access systems or accountsSoftware that secretly collects your informationSoftware patches that fix bugs and security flawsType of information that must be carefully guarded...

3.4 Crossword 2024-10-19

3.4 Crossword crossword puzzle
Across
  1. үйрету, учить, преподавать
  2. жұмыс, работа
  3. кәмпиттер, конфеты
  4. қауіпсіздік, охрана
  5. оғаш, странный
  6. жол, дорога
  7. әкелу, приносить
Down
  1. тауық, курица, цыпленок
  2. қол бұлғау, махать (рукой)
  3. сағыну, скучать
  4. туған, рожденный
  5. кейбір, несколько
  6. жылы шырайлы, дружелюбный
  7. ақылды, умный

14 Clues: жол, дорогажұмыс, работаақылды, умныйоғаш, странныйсағыну, скучатьтуған, рожденныйәкелу, приноситькейбір, несколькокәмпиттер, конфетықауіпсіздік, охранатауық, курица, цыпленокжылы шырайлы, дружелюбныйқол бұлғау, махать (рукой)үйрету, учить, преподавать

GSPR Knowledge 2022-12-04

GSPR Knowledge crossword puzzle
Across
  1. PR Hospital
  2. kick-off governance
  3. regulated div
  4. inflationary pain
  5. not football
  6. security impact
Down
  1. first step to six
  2. legal matters
  3. engagement metric
  4. supplier control
  5. who signs
  6. PR gatecheck
  7. personal development framework
  8. procure to..

14 Clues: who signsPR HospitalPR gatechecknot footballprocure to..legal mattersregulated divsecurity impactsupplier controlfirst step to sixengagement metricinflationary painkick-off governancepersonal development framework

digital media 2023-10-10

digital media crossword puzzle
Across
  1. two sides from the digitalisation
  2. cyber criminal
Down
  1. << follower
  2. big media company

4 Clues: << followercyber criminalbig media companytwo sides from the digitalisation

PLACES AT ASCHOOL 2025-03-18

PLACES AT ASCHOOL crossword puzzle
Across
  1. Area^Area Parkir
  2. Field^Lapangan Olahraga
  3. Area^Area Loker
  4. Perpustakaan
  5. Room^Ruang Seni
  6. Office^Ruang Kepala Sekolah
  7. Room^Ruang Guru
  8. Post^Pos Keamanan
  9. Hall^Aula Sekolah
  10. Bermain
Down
  1. Olahraga
  2. Room^Ruang Kesehatan
  3. Room^Mushola
  4. Ruang Kelas
  5. Kantin
  6. Room^Ruang Komputer
  7. Room^Ruang Musik
  8. Yard Halaman Sekolah

18 Clues: KantinBermainOlahragaRuang KelasRoom^MusholaPerpustakaanArea^Area LokerRoom^Ruang SeniRoom^Ruang GuruArea^Area ParkirRoom^Ruang MusikPost^Pos KeamananHall^Aula SekolahRoom^Ruang KomputerRoom^Ruang KesehatanField^Lapangan OlahragaYard Halaman SekolahOffice^Ruang Kepala Sekolah

Computer Language 2025-06-01

Computer Language crossword puzzle
Across
  1. Data storage unit
  2. Internet safety term
  3. Computer type
  4. Computer input device
  5. Computer security term
  6. Computer operating system
  7. Computer graphics term
  8. Computer coding term
  9. Computer software
  10. Computer hardware part
Down
  1. Computer Term
  2. Computer input device
  3. Webpage address
  4. Computer software term
  5. Programming language
  6. Computer graphics term
  7. Computer programming term
  8. Computer network term
  9. Computer network
  10. Computer coding term

20 Clues: Computer TermComputer typeWebpage addressComputer networkData storage unitComputer softwareInternet safety termProgramming languageComputer coding termComputer coding termComputer input deviceComputer input deviceComputer network termComputer software termComputer security termComputer graphics termComputer graphics termComputer hardware part...

Unit 11 2023-02-27

Unit 11 crossword puzzle
Across
  1. to order
  2. protection
  3. silly
  4. tangy
  5. a standard
Down
  1. to guide
  2. protection
  3. achievable
  4. a landslide
  5. to confirm
  6. to cuddle
  7. an appeal

12 Clues: sillytangyto guideto orderto cuddlean appealprotectionachievableto confirmprotectiona standarda landslide

CROSSWORD 9th APRIL 2018-04-03

CROSSWORD 9th APRIL crossword puzzle
Across
  1. COMBAT
  2. SALARY
  3. SECURITY
  4. MORE AND MORE
  5. LABEL
  6. ERA
Down
  1. ACT DISHONESTLY
  2. CANDID/DIRECT
  3. INFERIOR
  4. A MOINS QUE
  5. REMAINS OF A FIRE
  6. WOMAN RECENTLY MARRIED

12 Clues: ERALABELCOMBATSALARYINFERIORSECURITYA MOINS QUECANDID/DIRECTMORE AND MOREACT DISHONESTLYREMAINS OF A FIREWOMAN RECENTLY MARRIED

Noah's crossword for bullying 2023-03-21

Noah's crossword for bullying crossword puzzle
Across
  1. a person the watches someone get bullied.
  2. a person that gets picked on continuously.
  3. a type of bullying that happens on social media.
  4. a person that picks on people continuously.
  5. something that happens continuously.
Down
  1. a type of bullying that is physical.
  2. a type of bullying that you are rejected from your friend group or not invited into a group.
  3. bullying you don't get physically hurt but emotionally and mentally

8 Clues: a type of bullying that is physical.something that happens continuously.a person the watches someone get bullied.a person that gets picked on continuously.a person that picks on people continuously.a type of bullying that happens on social media.bullying you don't get physically hurt but emotionally and mentally...

Safe, ethical and responsible use of social media for teenagers 2024-04-25

Safe, ethical and responsible use of social media for teenagers crossword puzzle
Across
  1. plagiarism What is the unattributed use of information from the web?
  2. What is understood as the process of boundary management and control of information sharing and access
  3. When someone receives unwanted sexual communications
  4. What does the N mean in SNS?
Down
  1. The Internet presents special challenges to behaving how?
  2. When someone provides sexually explicit images
  3. When someone is being cruel to others sending or posting harmful material
  4. An example of a SNS

8 Clues: An example of a SNSWhat does the N mean in SNS?When someone provides sexually explicit imagesWhen someone receives unwanted sexual communicationsThe Internet presents special challenges to behaving how?plagiarism What is the unattributed use of information from the web?When someone is being cruel to others sending or posting harmful material...

words often confused 2022-04-07

words often confused crossword puzzle
Across
  1. a part of something
  2. a flying object
  3. form of they
  4. hurled
  5. revealed
  6. writing paper
  7. a place
  8. still and peaceful
  9. simple, common
  10. detail
Down
  1. the head of a school
  2. to a great extent
  3. quiet order and security
  4. a rule of conduct
  5. glowed
  6. they + are
  7. comparisons
  8. in a fixed position
  9. at that time

19 Clues: glowedhurleddetaila placerevealedthey + arecomparisonsform of theyat that timewriting papersimple, commona flying objectto a great extenta rule of conductstill and peacefula part of somethingin a fixed positionthe head of a schoolquiet order and security

Erica 2025-12-16

Erica crossword puzzle
Across
  1. Painting acquired
  2. Georigan Adventure
  3. Canoe Camping 2025
  4. Atlanta School
  5. Fastest Runners in Person
  6. Tall active activity
  7. Elias Tatiana First
  8. _ challenge
  9. New Haven "Her"
  10. Wakeup Beverage
Down
  1. No Security Red Bull
  2. Heatsource
  3. First African Nation
  4. Travel Goal, 50
  5. Ferdi & Tamara Present
  6. Snowpants Feature
  7. Best Bike
  8. Animal seen from tent
  9. Backyard Structure

19 Clues: Best BikeHeatsource_ challengeAtlanta SchoolTravel Goal, 50New Haven "Her"Wakeup BeveragePainting acquiredSnowpants FeatureGeorigan AdventureCanoe Camping 2025Backyard StructureElias Tatiana FirstNo Security Red BullFirst African NationTall active activityAnimal seen from tentFerdi & Tamara PresentFastest Runners in Person

MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY 2025-04-21

MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY crossword puzzle
Across
  1. It is recognized as a significant social and political endeavor that promotes gender equality and addresses violence against women.
  2. Analyzes state politics, economics, and nationalism, noting that feminist movements may disrupt national unity or economic progress if viewed against government policies.
  3. Explores how governments use force to maintain control and suppress dissent, with activists becoming targets if viewed as inciting unrest or challenging state authority.
  4. Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors.
  5. Accentuate the socialconstruction of reality and the critical role of identity and societal norms.
  6. Focuses on individual empowerment over state security; feminist movements expose issues like gender violence, risking state backlash.
  7. National Commission to Prevent and Eradicate Violence
Down
  1. Explores how gender power dynamics shape security. Feminists can be seen as threats when they challenge patriarchal systems supporting national security
  2. Argues that state sovereignty and security can lead to groups such as feminist movements being perceived as challenging established norms.
  3. Analyzes the motivations, beliefs, and actions of influential leaders in feminist movements. Governments often perceive feminists as threats, influenced by specific individuals who embody larger challenges to authority.

10 Clues: National Commission to Prevent and Eradicate ViolenceAccentuate the socialconstruction of reality and the critical role of identity and societal norms.Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors....

TMA Behavior Styles 2026-02-07

TMA Behavior Styles crossword puzzle
Across
  1. may take more time to think over their options as they prefer security
  2. As opposed to being introverted, talkers are
  3. may not be as interested in all the details
  4. would focus on results and need security
Down
  1. Talkers and Doers both prioritize this over security
  2. Supporters tend to keep their business with one company, making them
  3. are very direct and to the point

7 Clues: are very direct and to the pointwould focus on results and need securitymay not be as interested in all the detailsAs opposed to being introverted, talkers areTalkers and Doers both prioritize this over securitySupporters tend to keep their business with one company, making themmay take more time to think over their options as they prefer security

King of Tokyo Crossword 2022-08-15

King of Tokyo Crossword crossword puzzle
Across
  1. The oldest King of Tokyo robot that is still around today
  2. Which monster is an Egyptian God?
  3. This monster's name rhymes
  4. Which monster is based on King Kong?
  5. This monster was the same colour and food type as the promo monster 'Orange Death'
  6. The monster from the latest Monster Pack
Down
  1. Which monster is based on Godzilla?
  2. Who replaced 'Kraken' in the 2nd edition game?
  3. This monster was in a famous 1933 movie
  4. This monster was a 'Target' exclusive
  5. Which monster was in the Power Up expansion?
  6. The name of the game all of these monsters belong to
  7. The monster who replaced 'Cyber Bunny' in the 2nd edition game
  8. Which monster is first alphabetically?
  9. The monster who 'Kraken' from the original game was based on

15 Clues: This monster's name rhymesWhich monster is an Egyptian God?Which monster is based on Godzilla?Which monster is based on King Kong?This monster was a 'Target' exclusiveWhich monster is first alphabetically?This monster was in a famous 1933 movieThe monster from the latest Monster PackWhich monster was in the Power Up expansion?...

Crime vocabulary 2017-03-13

Crime vocabulary crossword puzzle
Across
  1. / A type of punishment whereby the offender has to pay money
  2. / To intentionally set fire to property
  3. / To attack someone
  4. / Repeatedly watching or following another person without them knowing
  5. / Criminal activity carried out online
  6. / Dishonest actions by those who hold power or authority
  7. / The consequences of committing a crime
  8. / Taking or receiving something to gain something more
Down
  1. / To betray one's own country
  2. / The action of taking someone else's property from them, without their consent
  3. / Assault or threatening of a partner, spouse or family member
  4. / A criminal offense of using threats or intimidation to make a gain
  5. / Treatment that is considered fair and equal
  6. / To fake or copy an important piece of document
  7. / A place where people are held for a crime they have committed

15 Clues: / To attack someone/ To betray one's own country/ Criminal activity carried out online/ To intentionally set fire to property/ The consequences of committing a crime/ Treatment that is considered fair and equal/ To fake or copy an important piece of document/ Taking or receiving something to gain something more...

CAB 2021-05-04

CAB crossword puzzle
Across
  1. A mean moment is what kind of event?
  2. By the age of 25 , 1/4 who have bullied will spend time where?
  3. The what of power is unequal when it is bullying?
  4. what kind of bullying is online?
  5. what is the C in ABCD of bullying?
  6. excluding, spreading rumors is what king of bullying?
  7. An action that does not happen regularly is a mean what?
Down
  1. The D in ABCD of bullying is what?
  2. Name calling, threatening is what type of bullying?
  3. teasing is when everyone is having what?
  4. punching, kicking is what type of bullying?
  5. what is repeatitive, aggressive unwanted behavior?
  6. What is the A in ABCD of bullying?
  7. There's a solution to the problem..
  8. when everyone is having fun it is?

15 Clues: what kind of bullying is online?The D in ABCD of bullying is what?What is the A in ABCD of bullying?when everyone is having fun it is?what is the C in ABCD of bullying?There's a solution to the problem..A mean moment is what kind of event?teasing is when everyone is having what?punching, kicking is what type of bullying?...

Tech terms 2019-08-23

Tech terms crossword puzzle
Across
  1. A method of giving a false appearances of a helpful program when in reality it is a virus
  2. A physical device and anything attached to the physical computer
  3. Permeant storage inside of the computer
  4. A type of zip file
  5. A picture that jumps you to a new document
  6. Programs you add to the existing comp
  7. Bad software made to change settings without permission
Down
  1. The address of your tech assigned through the roughter
  2. The max amount of data transfer
  3. Joint photographic expert
  4. Cyber ethics, unwritten rules of the internet
  5. Graphic interface format
  6. A graphic on screen interface that represents a program
  7. A function used on twitter and other services that signs a post word used to sort post
  8. Allows you to send and receive over the telephone lines

15 Clues: A type of zip fileGraphic interface formatJoint photographic expertThe max amount of data transferPrograms you add to the existing compPermeant storage inside of the computerA picture that jumps you to a new documentCyber ethics, unwritten rules of the internetThe address of your tech assigned through the roughter...

Business Law 123 2014-01-23

Business Law 123 crossword puzzle
Across
  1. Another word for a law.
  2. Law for offenses against society.
  3. Method of settling a dispute when a third party's advice is sought, but is not legally binding
  4. Court that reviews the decisions of lower courts.
  5. Laws that govern the use of computers and the Internet.
  6. Term used to add provisions to the constitution
  7. Method of settling a dispute when a third party's decision is legally binding.
  8. Decision of a court.
  9. Method of settling a dispute when both parties reach an agreement by themselves
  10. Settling a dispute through the courts.
  11. Court of original jurisdiction.
  12. Court for individuals under the age of 18.
Down
  1. Court responsible for handling wills and estates.
  2. Branch of government that may rule laws unconstitutional.
  3. Law based on current standards or customs.
  4. A law passed at the city level.
  5. Verbatim (word-for-word) record of court proceedings.
  6. Branch of government that can veto laws.
  7. Authority of a court to decide a case
  8. Law used to provide remedy for wrongs against individuals.

20 Clues: Decision of a court.Another word for a law.A law passed at the city level.Court of original jurisdiction.Law for offenses against society.Authority of a court to decide a caseSettling a dispute through the courts.Branch of government that can veto laws.Law based on current standards or customs.Court for individuals under the age of 18....

Code 2016-02-08

Code crossword puzzle
Across
  1. When something bad gets into your computer
  2. A block to a puzzle for games or programs
  3. When you add something onto your computer
  4. A place where power or information leaves a system
  5. A programming language is formal constructed language that is programmed in the computer
  6. block A block that repeats how many times in coding
  7. to identify or remove errors from the computer
  8. A conditional clause or conjunction
  9. When you are working on a website and it needs to be ___
  10. Get mail from the computer, phone, tablet, and computers
Down
  1. A system
  2. A folder that items
  3. A part of a puzzle for coding
  4. The use of parallel in computers
  5. A virus on the computer
  6. A site that you visit or when you install a game on a software
  7. bully Bullies that are online
  8. citizenship Behaviors online
  9. A logic gate is an elementary building block on a digital circuit
  10. When something repeats it self

20 Clues: A systemA folder that itemsA virus on the computercitizenship Behaviors onlineA part of a puzzle for codingbully Bullies that are onlineWhen something repeats it selfThe use of parallel in computersA conditional clause or conjunctionA block to a puzzle for games or programsWhen you add something onto your computer...

Health Period 2 2023-04-24

Health Period 2 crossword puzzle
Across
  1. natural sweet tasting substance found in most foods
  2. most popular sport at Malden High
  3. nutrient found in meat, dairy, eggs, nuts
  4. a chronic relapsing disorder often associated with drugs and alcohol
  5. structured conversation with questions to evaluate qualifications
  6. type of health related to a persons psychological and emotional well-being
  7. group of people united by blood or experience
  8. my sisters son Asher is my
  9. Michelle Conrad was convicted of this
  10. state of complete physical, mental, and social well-being
  11. "some people are worth melting for"
Down
  1. online bullying
  2. unwanted aggressive behavior that involves a real or perceived power imbalance
  3. family value based on right or wrong behavior
  4. unit of energy in a food or drink item
  5. second leading cause of death amongst teens
  6. custom passed down from previous generations
  7. parking between two cars aligned with the street
  8. most commonly the highest fixed expense
  9. how the body converts nutrients to energy

20 Clues: online bullyingmy sisters son Asher is mymost popular sport at Malden High"some people are worth melting for"Michelle Conrad was convicted of thisunit of energy in a food or drink itemmost commonly the highest fixed expensenutrient found in meat, dairy, eggs, nutshow the body converts nutrients to energysecond leading cause of death amongst teens...

Digital Media Literacy 2021-11-03

Digital Media Literacy crossword puzzle
Across
  1. place where you can see all the content from a creator
  2. documentary about social media apps
  3. videos or images selling a product
  4. social media app owned by Facebook
  5. owner of Facebook
  6. if someone wants to say something about a video they do this
  7. a person who gives away secrets
  8. red pin to car
  9. harassment or bullying on the internet
Down
  1. Owner of YouTube
  2. a messaging app owned by Facebook
  3. social media which name sounds like what noise a bird makes
  4. if someone wants to let their friends see a video they do this
  5. if someone doesn’t enjoy a video they click this
  6. popular social media app that sounds like a clock
  7. massive social media company
  8. users that have subscribed to certain content
  9. online conspiracy to do with pizzerias
  10. The recording, reproducing, or broadcasting of moving visual images
  11. if someone enjoys a video they click this

20 Clues: red pin to carOwner of YouTubeowner of Facebookmassive social media companya person who gives away secretsa messaging app owned by Facebookvideos or images selling a productsocial media app owned by Facebookdocumentary about social media appsonline conspiracy to do with pizzeriasharassment or bullying on the internet...

Digital Media Literacy 2021-11-03

Digital Media Literacy crossword puzzle
Across
  1. place where you can see all the content from a creator
  2. documentary about social media apps
  3. videos or images selling a product
  4. social media app owned by Facebook
  5. owner of Facebook
  6. if someone wants to say something about a video they do this
  7. a person who gives away secrets
  8. red pin to car
  9. harassment or bullying on the internet
Down
  1. Owner of YouTube
  2. a messaging app owned by Facebook
  3. social media which name sounds like what noise a bird makes
  4. if someone wants to let their friends see a video they do this
  5. if someone doesn’t enjoy a video they click this
  6. popular social media app that sounds like a clock
  7. massive social media company
  8. users that have subscribed to certain content
  9. online conspiracy to do with pizzerias
  10. The recording, reproducing, or broadcasting of moving visual images
  11. if someone enjoys a video they click this

20 Clues: red pin to carOwner of YouTubeowner of Facebookmassive social media companya person who gives away secretsa messaging app owned by Facebookvideos or images selling a productsocial media app owned by Facebookdocumentary about social media appsonline conspiracy to do with pizzeriasharassment or bullying on the internet...

TTS informatika 2024-03-23

TTS informatika crossword puzzle
Across
  1. kegiatan jual beli dengan media elektronik
  2. perintah untuk mematikan komputer
  3. Rumus ms.word untuk menampilkan nilai pada kumpulan data yang bersumber dari suatu tabel dengan format susunan vertikal
  4. sebuah kejahatan cyber yang bertujuan untuk merusak atau memanipulasi data
  5. layanan mobile perbankan melalui jaringan Short Message Services atau SMS
  6. aplikasi untuk membuat sebuah games dan simulasi pembelajan tanpa harus berkutat dengan bahasa pemrograman
  7. layanan perbankan yang menggunakan media telepon
  8. nama fitur pada google collab untuk mengganti nama file
  9. rumus untuk menghitung rata rata pada ms.excel
Down
  1. rumus untuk menjumlahkan angka pada ms.excel
  2. aplikasi pengolah kata
  3. persimpangan baris dan kolom
  4. aktivitas yang dibatasi dalam google collab
  5. Central Processing Unit
  6. berita atau informasi yang tidak benar
  7. bahasa pemrograman yang digunakan pada google collab
  8. kejahatan yang ada dalam media sosial
  9. aktivitas yang berusaha menyusupi,mengakses,atau memodifikasi sistem atau jaringan tanpa izin
  10. "CTRL+S" merupakan perintah untuk
  11. lembar kerja yang ada dalam ms.excel
  12. aplikasi pengolah angka

21 Clues: aplikasi pengolah kataCentral Processing Unitaplikasi pengolah angkapersimpangan baris dan kolomperintah untuk mematikan komputer"CTRL+S" merupakan perintah untuklembar kerja yang ada dalam ms.excelkejahatan yang ada dalam media sosialberita atau informasi yang tidak benarkegiatan jual beli dengan media elektronik...

Kesehatan mental 2026-02-24

Kesehatan mental crossword puzzle
Across
  1. Perasaan sedih, marah, atau senang yang dirasakan seseorang disebut
  2. Orang yang melihat bullying tetapi diam saja disebut ..... pasif
  3. Jenis bullying yang dilakukan melalui media sosial atau internet
  4. Perasaan terkejut mendadak
  5. Sifat asli seseorang yang membedakannya dengan orang lain
  6. ​Perasaan sangat senang karena mendapatkan sesuatu yang diinginkan.
  7. Tindakan mengucilkan atau menjauhi teman dari pergaulan
  8. Tindakan menyakiti orang lain secara berulang melalui kata-kata atau fisik yaitu
  9. Keadaan emosi yang tidak stabil
  10. Sikap tidak memihak dan memberikan hak kepada yang seharusnya
Down
  1. Sikap jujur dan memiliki prinsip moral yang kuat.
  2. Istilah untuk orang yang menjadi sasaran perundungan
  3. Perasaan tidak senang melihat keberhasilan orang lain
  4. Perasaan menyesal setelah melakukan kesalahan
  5. Bullying yang dilakukan dengan kontak tubuh seperti memukul atau menendang.
  6. Perasaan takut atau khawatir yang berlebihan.
  7. Kata lain dari perilaku mengejek atau menghina nama orang tua
  8. Sifat selalu berkata apa adanya
  9. Sikap menghargai perbedaan dan pendapat orang lain
  10. Kemampuan untuk merasakan atau memahami apa yang dirasakan orang lain.

20 Clues: Perasaan terkejut mendadakSifat selalu berkata apa adanyaKeadaan emosi yang tidak stabilPerasaan menyesal setelah melakukan kesalahanPerasaan takut atau khawatir yang berlebihan.Sikap jujur dan memiliki prinsip moral yang kuat.Sikap menghargai perbedaan dan pendapat orang lainIstilah untuk orang yang menjadi sasaran perundungan...

Remaja Muslim 2026-03-01

Remaja Muslim crossword puzzle
Across
  1. Sifat jujur yang harus dimiliki remaja muslim
  2. Remaja yang memiliki akhlak baik disebut ….
  3. Media untuk berdakwah secara online
  4. Membersihkan hati dari iri dan dengki
  5. Menyaring informasi sebelum membagika
  6. Menahan diri dari konten negatif
  7. Ibadah utama di bulan Ramadhan
  8. Membaca Al-Qur’an secara rutin
  9. Perilaku sopan dalam berkomunikasi online
  10. Perkembangan teknologi informasi saat ini disebut era ….
  11. Menghindari perundungan di internet (cyber…)
  12. Perilaku mencerminkan kepribadian seseorang
  13. Menghargai perbedaan pendapat
  14. Menjaga diri dari pengaruh buruk media sosial
  15. Sikap bertanggung jawab atas perbuatan sendiri
  16. Tidak sombong dalam pergaulan
Down
  1. Saling menghargai sesama teman
  2. Bersungguh-sungguh dalam kebaikan
  3. Menggunakan waktu secara efektif
  4. Menjaga rahasia pribadi di interne
  5. Menjaga niat hanya karena Allah
  6. Menggunakan internet secara bijak disebut literasi ….
  7. Menghormati orang tua adalah bentuk ….
  8. Menuntut ilmu dengan sungguh-sungguh
  9. Tidak menyebarkan berita bohong
  10. Rasa takut kepada Allah
  11. Platform komunikasi remaja secara daring
  12. Menjaga kehormatan diri di dunia maya
  13. Menjaga perkataan di media sosial
  14. Tidak mudah terpengaruh ajakan negatif
  15. Perbuatan baik yang berpahala
  16. Menyampaikan kebaikan melalui media

32 Clues: Rasa takut kepada AllahMenghargai perbedaan pendapatPerbuatan baik yang berpahalaTidak sombong dalam pergaulanSaling menghargai sesama temanIbadah utama di bulan RamadhanMembaca Al-Qur’an secara rutinMenjaga niat hanya karena AllahTidak menyebarkan berita bohongMenggunakan waktu secara efektifMenahan diri dari konten negatif...

Cyber Month Crossword Puzzle 2024-08-26

Cyber Month Crossword Puzzle crossword puzzle
Across
  1. The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
  2. Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
  3. An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
  4. Process of determining whether someone or something is who or what they say they are.
  5. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
  6. A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
  1. Characters used to verify identity, usually to gain access to an account, website, or system. For more information
  2. Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
  3. Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
  4. The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  5. An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
  6. An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
  7. Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
  8. A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.

14 Clues: Process of determining whether someone or something is who or what they say they are.A type of malicious software designed to block access to a computer system or data until a sum of money is paid.Characters used to verify identity, usually to gain access to an account, website, or system. For more information...

SID 3b Hass im Netz 2021-04-30

SID  3b Hass im Netz crossword puzzle
Across
  1. Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
  2. Unwahre Nachrichten/Informationen im Internet
  3. Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
Down
  1. Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
  2. Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
  3. Man sollte wegen ... -accounts im Internet vorsichtig sein.
  4. erfundene „Tatsachen“.

7 Clues: erfundene „Tatsachen“.Unwahre Nachrichten/Informationen im InternetMan sollte wegen ... -accounts im Internet vorsichtig sein.Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der......

Global Unrest & Conflict 2025-09-13

Global Unrest & Conflict crossword puzzle
Across
  1. Volunteer group that helped Ukraine during cyberattacks
  2. Middle Eastern region central to ongoing conflict with Israel
  3. One of the superpowers in the Cold War
  4. Type of warfare heavily used in Russia–Ukraine conflict
Down
  1. Peninsula annexed by Russia in 2014
  2. Indian state affected by ethnic unrest in 2023
  3. City claimed as the capital by both Israel and Palestine

7 Clues: Peninsula annexed by Russia in 2014One of the superpowers in the Cold WarIndian state affected by ethnic unrest in 2023Volunteer group that helped Ukraine during cyberattacksType of warfare heavily used in Russia–Ukraine conflictCity claimed as the capital by both Israel and PalestineMiddle Eastern region central to ongoing conflict with Israel

Supranationalism 2021-01-04

Supranationalism crossword puzzle
Across
  1. mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
  2. promotes unity and solidarity and spurs economic development in Africa
  3. organization governing common economic, social, and security issues in its European member states
  4. trading bloc between the countries of North America
  5. military alliance of countries in Western Europe and North America
Down
  1. high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
  2. integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
  3. global international organization that maintains peace and security and promotes economic and social development
  4. maintains peace and security and accelerates economic growth in Southeast Asia

9 Clues: trading bloc between the countries of North Americamilitary alliance of countries in Western Europe and North Americapromotes unity and solidarity and spurs economic development in Africamaintains peace and security and accelerates economic growth in Southeast Asia...

Red Chair Report Q4 2022-09-28

Red Chair Report Q4 crossword puzzle
Across
  1. NHL 2022 Champions
  2. Morning ___
  3. Rick & Carl's alma mater
  4. AgilLink's App
  5. A favorite winter sport
  6. A colorado view
  7. Broncos
  8. CEO
Down
  1. ___ Trail Road
  2. Challenges & ___
  3. Code storage
  4. City where Risclarity HQ is located
  5. Time Tracker
  6. The color of the chair lift
  7. Security Training
  8. ___ is coming

16 Clues: CEOBroncosMorning ___Code storageTime Tracker___ is coming___ Trail RoadAgilLink's AppA colorado viewChallenges & ___Security TrainingNHL 2022 ChampionsA favorite winter sportRick & Carl's alma materThe color of the chair liftCity where Risclarity HQ is located

Amazing AKHLAK 2022-11-04

Amazing AKHLAK crossword puzzle
Across
  1. agen perubahan
  2. gas alam cair
  3. way of lives
  4. nilai-nilai utama
  5. bagian hulu
  6. bertindak proaktif
  7. memiliki kemampuan
  8. saling bekerjasama
Down
  1. menghargai perbedaan
  2. pekerja pertamina
  3. menjaga kepercayaan
  4. mengutamakan perusahaan
  5. bagian dari holding
  6. health safety security environment
  7. cara meraih tujuan
  8. pertamina reference level

16 Clues: bagian huluway of livesgas alam cairagen perubahanpekerja pertaminanilai-nilai utamacara meraih tujuanbertindak proaktifmemiliki kemampuansaling bekerjasamamenjaga kepercayaanbagian dari holdingmenghargai perbedaanmengutamakan perusahaanpertamina reference levelhealth safety security environment

16 Career Clusters 2024-04-11

16 Career Clusters crossword puzzle
Across
  1. _____ technology, engineering and mathematics
  2. ______ accountant
  3. ______ and construction
  4. ______ science
  5. ______ services
  6. Aircraft Assembler
  7. ______ technology
  8. ______ food and natural resources
  9. _______ public safety, corrections and security
Down
  1. ______ and public administration
  2. ______ management and administration
  3. ______ distribution and logistics
  4. advertising manager
  5. ______ and training
  6. ______ A/V technology and communications
  7. ______ and tourism

16 Clues: ______ science______ services______ accountant______ technologyAircraft Assembler______ and tourismadvertising manager______ and training______ and construction______ and public administration______ distribution and logistics______ food and natural resources______ management and administration______ A/V technology and communications...

Service Desk Puzzle 2021-01-21

Service Desk Puzzle crossword puzzle
Across
  1. Medication dispensing system
  2. Software used by Food Services for patient diet orders
  3. System used to manage schedules, call recordings, and QA processes
  4. Cisco System that allows phone calls and work to be routed to individuals
  5. Abbreviation for the Stanley Healthcare infant protection system
  6. Image management system for OB/GYN ultrasound
  7. System used by Physical Security for badging, door access control, and intrusion alerts
Down
  1. Security camera monitoring software
  2. Application used for e-prescribing
  3. Used by Pharmacy for workflow management and drug/dose documentation
  4. System used for online learning/compliance videos

11 Clues: Medication dispensing systemApplication used for e-prescribingSecurity camera monitoring softwareImage management system for OB/GYN ultrasoundSystem used for online learning/compliance videosSoftware used by Food Services for patient diet ordersAbbreviation for the Stanley Healthcare infant protection system...

LPSCS: Operational Strategies 2024-11-12

LPSCS: Operational Strategies crossword puzzle
Across
  1. law that established minimum wage
  2. responsibility of LPSCS employees to act in accordance with laws and regulations, promoting transparency and trust.
  3. Activities aimed at enhancing community safety.
  4. procedure
  5. federal law that protects employee safety in the workplace
Down
  1. Services that provide immediate medical care during emergencies.
  2. The entry-level position in law enforcement.
  3. geographical area that someone has power within
  4. The highest-ranking officer in a law enforcement agency, responsible for overall operations.
  5. type of security is when a company hires an outside security company to provide specific services.
  6. personal protective equipment

11 Clues: procedurepersonal protective equipmentlaw that established minimum wageThe entry-level position in law enforcement.geographical area that someone has power withinActivities aimed at enhancing community safety.federal law that protects employee safety in the workplaceServices that provide immediate medical care during emergencies....

Ready for Takeoff: The Mobility Crossword 2026-01-26

Ready for Takeoff: The Mobility Crossword crossword puzzle
Across
  1. System required for international travel requests, people mobility gateway
  2. Project code used to charge travel and expenses
  3. Where all Accenture business travel must be booked
  4. Mindset encouraged to reduce the carbon impact of travel
  5. Accenture’s corporate card for business expenses
Down
  1. Approval required for Song production shoots and events
  2. Tool that provides travel risk and security guidance
  3. Accenture’s top priority when employees are traveling
  4. Daily allowance for meals and incidentals while traveling
  5. Accenture’s global security team that supports employees worldwide
  6. Tool used to submit expenses and get reimbursed

11 Clues: Project code used to charge travel and expensesTool used to submit expenses and get reimbursedAccenture’s corporate card for business expensesWhere all Accenture business travel must be bookedTool that provides travel risk and security guidanceAccenture’s top priority when employees are traveling...

Cyberbullying, Miss Audrey's Class 2022-11-03

Cyberbullying, Miss Audrey's Class crossword puzzle
Across
  1. a telephone service providing help
  2. relating to computers
Down
  1. used to prove something is true or not true
  2. a person who stands up for something
  3. mean and hurtful behavior

5 Clues: relating to computersmean and hurtful behaviora telephone service providing helpa person who stands up for somethingused to prove something is true or not true

Know your Products 2016-01-29

Know your Products crossword puzzle
Across
  1. 140+ channels
  2. Two Services
  3. Communities with contracted services
  4. Our Guarantee
  5. 240+ Channels
  6. Ultimate video package
  7. 25 Mbps Internet
  8. Home Security
  9. 75 Mbps Internet
Down
  1. Three Services
  2. Telephone
  3. Four Services
  4. High Speed Internet
  5. Customers not in Community Contract
  6. Keeping our customers
  7. 150 Mbps Internet
  8. Discounted Telephone

17 Clues: TelephoneTwo Services140+ channelsFour ServicesOur Guarantee240+ ChannelsHome SecurityThree Services25 Mbps Internet75 Mbps Internet150 Mbps InternetHigh Speed InternetDiscounted TelephoneKeeping our customersUltimate video packageCustomers not in Community ContractCommunities with contracted services

Computer Language 2025-06-01

Computer Language crossword puzzle
Across
  1. Data storage unit
  2. Internet safety term
  3. Computer type
  4. Computer input device
  5. Computer security term
  6. Computer operating system
  7. Computer graphics term
  8. Computer coding term
  9. Computer software
  10. Computer hardware part
Down
  1. Computer Term
  2. Computer input device
  3. Webpage address
  4. Computer software term
  5. Programming language
  6. Computer graphics term
  7. Computer programming term
  8. Computer network term
  9. Computer network
  10. Computer coding term

20 Clues: Computer TermComputer typeWebpage addressComputer networkData storage unitComputer softwareInternet safety termProgramming languageComputer coding termComputer coding termComputer input deviceComputer input deviceComputer network termComputer software termComputer security termComputer graphics termComputer graphics termComputer hardware part...

April Fools 2026-03-18

April Fools crossword puzzle
Across
  1. luxuriously smooth fabric
  2. casual way to refer to your sibling, Natalie
  3. casual way to refer to your insect sibling
  4. if one were to use poor past-tense grammar not to stand
  5. potential result of sitting on a can
  6. opposite of "as isn't tmr"
Down
  1. left on dirty clothes
  2. what to say in caveman language if Stanley just got back from Florida
  3. response to "what is the abbreviation of the National Security Agency?"
  4. what to say in caveman language to ask about your friend Stanley
  5. Mascot of our humble university
  6. opposite of "as is"
  7. what to say in caveman language if your sister, Natalie, just got back from Florida
  8. telling the National Security Agency not to stand

14 Clues: opposite of "as is"left on dirty clothesluxuriously smooth fabricopposite of "as isn't tmr"Mascot of our humble universitypotential result of sitting on a cancasual way to refer to your insect siblingcasual way to refer to your sibling, Natalietelling the National Security Agency not to standif one were to use poor past-tense grammar not to stand...

Crossword 2023-07-19

Crossword crossword puzzle
Across
  1. Insurance which provides protection to farmer
  2. Supervises the functioning of insurance business in India
Down
  1. An insurance company providing business and cyber insurance
  2. An amount to be paid for a contract of insurance
  3. A type of policy offered under property insurance
  4. A type of health insurance

6 Clues: A type of health insuranceInsurance which provides protection to farmerAn amount to be paid for a contract of insuranceA type of policy offered under property insuranceSupervises the functioning of insurance business in IndiaAn insurance company providing business and cyber insurance

Computer Science 07 2020-01-22

Computer Science 07 crossword puzzle
Across
  1. xxx controls, methods to stop children accessing inappropriate content on the internet.
  2. xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
  3. act helps to protect intellectual property, copyright, designs and patents, written and recorded content
  4. xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
  5. xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
  6. if computer hardware is not recycled properly it can lead to
  7. xxx divide, Some people have greater access to technology than others
  8. xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
  1. possible result of impact of cyberbullying.
  2. unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
  3. xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
  4. Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
  5. xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
  6. xxx misuse act is the legislation that can be used to prosecute hackers
  7. Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection

15 Clues: possible result of impact of cyberbullying.if computer hardware is not recycled properly it can lead toxxx divide, Some people have greater access to technology than othersxxx misuse act is the legislation that can be used to prosecute hackersunauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop...

A Dog Day Afternoon 2019-02-20

A Dog Day Afternoon crossword puzzle
Across
  1. A Crocheted Blanket
  2. Pampered Pooch
  3. Gives Directions
  4. PA State Dog
  5. Sniffs out Bad Guys
  6. Rescues Skiers
  7. The Most Famous is Uga
  8. Speed King
  9. Deutschland Herder
  10. Snoopy is One
Down
  1. Lassie Lineage
  2. Peek-a-boo Hairdo
  3. Short Legs Long Ears
  4. Mexican Mut
  5. Firehouse Favorite
  6. Yellow Go Getter
  7. Hot Dog Dog
  8. Sled Propeller
  9. Security Guard
  10. Ravishing Redhead

20 Clues: Speed KingMexican MutHot Dog DogPA State DogSnoopy is OneLassie LineagePampered PoochRescues SkiersSled PropellerSecurity GuardGives DirectionsYellow Go GetterPeek-a-boo HairdoRavishing RedheadFirehouse FavoriteDeutschland HerderA Crocheted BlanketSniffs out Bad GuysShort Legs Long EarsThe Most Famous is Uga

The London life 2015-11-11

The London life crossword puzzle
Across
  1. fähre
  2. square
  3. flight
  4. palace
  5. danger
  6. traffic
  7. youth
  8. fine
  9. loud
  10. train
  11. detective
  12. airport
  13. gate
  14. stand
  15. respect
  16. security
  17. keep
  18. pickpockets
  19. queen
  20. arrival
  21. famous
  22. safe
  23. throw
Down
  1. travel
  2. point
  3. departure
  4. bell
  5. plane
  6. escalator
  7. sights
  8. begin
  9. bus
  10. tower
  11. king
  12. mean
  13. fight
  14. ticket

37 Clues: busbellfineloudgatekeepkingmeansafefährepointplaneyouthtrainbeginstandtowerqueenfightthrowtravelsquareflightpalacedangersightsticketfamoustrafficairportrespectarrivalsecuritydepartureescalatordetectivepickpockets

En avion! 2023-03-16

En avion! crossword puzzle
Across
  1. subway station
  2. airport
  3. boarding gate
  4. flight
  5. train station
  6. check in luggage
  7. abroad (in another country)
  8. world
  9. bus stop
  10. flight attendant (male)
  11. people
  12. ticket counter
Down
  1. country
  2. flight attendant
  3. exit
  4. plane ticket
  5. customs
  6. arrival
  7. round-trip ticket
  8. to take off (plane)
  9. to land (plane)
  10. to go through security
  11. capital
  12. countryside
  13. departure

25 Clues: exitworldflightpeoplecountrycustomsairportarrivalcapitalbus stopdeparturecountrysideplane ticketboarding gatetrain stationsubway stationticket counterto land (plane)flight attendantcheck in luggageround-trip ticketto take off (plane)to go through securityflight attendant (male)abroad (in another country)

Group 7 2018-03-18

Group 7 crossword puzzle
Across
  1. 돈,화폐
  2. small,tiny
  3. 화해시키다,결말짓다,해결하다
  4. 눈에 띄는,두드러진
  5. safety,protection
  6. make worse
  7. 감소하다
  8. 두렵게 하여 비키게 하다,방해하다,단념하다
  9. copy,reproduction
Down
  1. 합의,일치
  2. 자발적인 행위,의지,의도
  3. 힘,정력,끈기
  4. 상상의,거짓의
  5. 사이에 끼다,사이에 있다,중재하다,간섭하다
  6. 얼룩이없는,아주 흠이없는
  7. skill,guile
  8. 싸움을 좋아하는,도전적인
  9. 시골의
  10. 비겁한,비열한,소심한
  11. group of five

20 Clues: 시골의돈,화폐감소하다합의,일치힘,정력,끈기상상의,거짓의small,tiny눈에 띄는,두드러진make worseskill,guile비겁한,비열한,소심한자발적인 행위,의지,의도얼룩이없는,아주 흠이없는싸움을 좋아하는,도전적인group of five화해시키다,결말짓다,해결하다safety,protectioncopy,reproduction사이에 끼다,사이에 있다,중재하다,간섭하다두렵게 하여 비키게 하다,방해하다,단념하다

3EMES JOBS CROSSWORD PUZZLE 2023-09-17

3EMES JOBS CROSSWORD PUZZLE crossword puzzle
Across
  1. marchand de poisson
  2. pharmacien
  3. keeper, commerçant
  4. grossiste
  5. couturière
  6. boulanger
  7. guard, agent de sécurité
  8. réparateur
  9. teinturier
  10. comptable
  11. traiteur
  12. sage-femme
  13. boucher
  14. chauffeur
Down
  1. kiné
  2. agent, agent immobilier
  3. officer, douanier
  4. chirurgien
  5. maire
  6. driver, chauffeur routier
  7. secouriste
  8. bijoutier
  9. peintre
  10. jardinier
  11. marin
  12. présentateur météo
  13. plombier
  14. attendant, hôtesse de l'air

28 Clues: kinémairemarinpeintrebouchertraiteurplombiergrossisteboulangerbijoutiercomptablejardinierchauffeurpharmacienchirurgiencouturièresecouristeréparateurteinturiersage-femmeofficer, douanierprésentateur météomarchand de poissonkeeper, commerçantagent, agent immobilierguard, agent de sécuritédriver, chauffeur routierattendant, hôtesse de l'air

Occupations and professions 2023-10-07

Occupations and professions crossword puzzle
Across
  1. Pemadam Kebakaran
  2. Dokter hewan
  3. Sales
  4. Tukang kebun
  5. Pemandu wisata
  6. Polisi
  7. Pengacara
  8. Petani
  9. Pekerja konstruksi
  10. Musisi
  11. Supir
  12. Perawat
  13. Petugas keamanan
  14. Petugas kebersihan
  15. Dokter
Down
  1. Pemain sepak bola
  2. Insinyur
  3. Tukang kayu
  4. Juru masak
  5. Guru
  6. Dokter gigi
  7. Resepsionis
  8. Astronot
  9. Arsitek
  10. Pramusaji
  11. Nelayan
  12. Tentara
  13. Kasir
  14. Penjahit
  15. Pilot

30 Clues: GuruSalesSupirKasirPilotPolisiPetaniMusisiDokterArsitekNelayanPerawatTentaraInsinyurAstronotPenjahitPengacaraPramusajiJuru masakTukang kayuDokter gigiResepsionisDokter hewanTukang kebunPemandu wisataPetugas keamananPemadam KebakaranPemain sepak bolaPekerja konstruksiPetugas kebersihan

Occupations and professions 2023-10-07

Occupations and professions crossword puzzle
Across
  1. Juru masak
  2. Tukang kebun
  3. Dokter
  4. Dokter gigi
  5. Astronot
  6. Nelayan
  7. Pilot
  8. Pramusaji
  9. Dokter hewan
  10. Pengacara
  11. Insinyur
  12. Arsitek
  13. Pemandu wisata
  14. Perawat
  15. Musisi
  16. Petani
  17. Pekerja konstruksi
  18. Tentara
Down
  1. Pemadam Kebakaran
  2. Pemain sepak bola
  3. Kasir
  4. Sales
  5. Petugas kebersihan
  6. Polisi
  7. Tukang kayu
  8. Penjahit
  9. Guru
  10. Petugas keamanan
  11. Resepsionis
  12. Supir

30 Clues: GuruKasirSalesPilotSupirDokterPolisiMusisiPetaniNelayanArsitekPerawatTentaraAstronotPenjahitInsinyurPramusajiPengacaraJuru masakDokter gigiTukang kayuResepsionisTukang kebunDokter hewanPemandu wisataPetugas keamananPemadam KebakaranPemain sepak bolaPetugas kebersihanPekerja konstruksi

Crossword History puzzle 2024-09-23

Crossword History puzzle crossword puzzle
Across
  1. Renaissance
  2. Land Boom
  3. Security
  4. Age
  5. movement
  6. Civil Liberties Union (ACLU)
  7. Tuesday
  8. Naval ConferenEqual Rights Amendmentual rights amendment (ERA)
  9. Tariff Act
  10. on margin
Down
  1. League (ADL)
  2. Industrial Recovery Act
  3. of Women Voters
  4. Adjustment Administration (AAA)
  5. of Industrial Organizations (CIO
  6. WagnerAct
  7. Dome Scandal
  8. Conservation Corps (CCC)
  9. Progress Administration (WPA)
  10. Jones Industrial Average

20 Clues: AgeTuesdaySecuritymovementLand BoomWagnerActon marginTariff ActRenaissanceLeague (ADL)Dome Scandalof Women VotersIndustrial Recovery ActConservation Corps (CCC)Jones Industrial AverageCivil Liberties Union (ACLU)Progress Administration (WPA)Adjustment Administration (AAA)of Industrial Organizations (CIO...

Spa 2 Unit 3 Vocab Translation 2020-12-11

Spa 2 Unit 3 Vocab Translation crossword puzzle
Across
  1. to confirm the flight
  2. to pack a suitcase
  3. security
  4. To board the plane
  5. to get out money
  6. arrival
  7. customs
  8. to make a reservation
Down
  1. to check luggage
  2. bathing suit
  3. to arrive
  4. boarding pass
  5. to get in line
  6. to look at the screen
  7. to exchange money
  8. departure
  9. gate
  10. to go through
  11. to pick up

19 Clues: gatearrivalcustomssecurityto arrivedepartureto pick upbathing suitboarding passto go throughto get in lineto check luggageto get out moneyto exchange moneyto pack a suitcaseTo board the planeto confirm the flightto look at the screento make a reservation

Stock Market Game Crossword 2024-12-10

Stock Market Game Crossword crossword puzzle
Across
  1. Ownership share
  2. Gross domestic product
  3. Financial marketplace
  4. Return on investments
  5. Real state investment fund
  6. Valuable property
  7. Rising prices
  8. Profit distribution
  9. Pooled investment vehicle
Down
  1. Employee retirement plan
  2. Debt security
  3. Investment collection
  4. Cost of borrowing
  5. Mutual fund
  6. Exchange-traded fund
  7. Return on investment
  8. Potential loss
  9. Profit or loss
  10. Individual retirement account

19 Clues: Mutual fundDebt securityRising pricesPotential lossProfit or lossOwnership shareCost of borrowingValuable propertyProfit distributionExchange-traded fundReturn on investmentInvestment collectionFinancial marketplaceReturn on investmentsGross domestic productEmployee retirement planPooled investment vehicleReal state investment fund...

¡Vamos de vacaciones! (Parte I) 2024-02-28

¡Vamos de vacaciones! (Parte I) crossword puzzle
Across
  1. to go by plane
  2. flight attendant (feminine)
  3. the gate
  4. to take the subway
  5. arrivals
  6. to check the luggage
  7. to take the train
  8. airport
  9. departures
Down
  1. flight
  2. to go shopping
  3. passport
  4. traveler (masculine)
  5. to board
  6. to go through customs
  7. to go through security
  8. traveler
  9. pilot
  10. to take a trip
  11. to take a boat

20 Clues: pilotflightairportpassportthe gateto boardarrivalstravelerdeparturesto go by planeto go shoppingto take a tripto take a boatto take the trainto take the subwaytraveler (masculine)to check the luggageto go through customsto go through securityflight attendant (feminine)

Types of bulling 2022-10-24

Types of bulling crossword puzzle
Across
  1. harassment is to touch someone inappropriate to make them fell uncomfortable
  2. bullying is to hurt someone intentionally
  3. pressure is to force people to do some thing even if they don’t want to
  4. when someone give off suicidal signs
Down
  1. bulling it to tease someone
  2. making to make a decision to do good
  3. bulling is to make fun of someone online

7 Clues: bulling it to tease someonemaking to make a decision to do goodwhen someone give off suicidal signsbulling is to make fun of someone onlinebullying is to hurt someone intentionallypressure is to force people to do some thing even if they don’t want toharassment is to touch someone inappropriate to make them fell uncomfortable

Tinkerers Lab + Kludge 2023-03-27

Tinkerers Lab + Kludge crossword puzzle
Across
  1. What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
  2. Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
  3. What animal could a firefox be called
  4. What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
  5. What does the T in reCAPTCHA stand for
  6. A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
  7. WinVru was the virus first made for which OS
  8. According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
  9. The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
  1. What does the first "D" stand for in the common cybercrime known as a DDoS attack?
  2. A makeshift solution to a problem, especially a computer or programming problem.
  3. A computer connected to a network that a hacker has compromised
  4. The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
  5. What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
  6. A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
  7. Hacking for a cause
  8. A person who enjoys fixing and experimenting with machines and their parts.
  9. What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt

18 Clues: Hacking for a causeWhat animal could a firefox be calledWhat does the T in reCAPTCHA stand forWinVru was the virus first made for which OSA computer connected to a network that a hacker has compromisedA person who enjoys fixing and experimenting with machines and their parts....

Crossword 2019-07-17

Crossword crossword puzzle
Across
  1. Internet Fraud
  2. Violation of SLA or Security rule
  3. A common term used both in hospitals and in IT.
  4. Combination of practices, and tools that increases ability to deliver services at high velocity.
  5. Process that ensures and confirms a user’s identity
  6. Title of current Week.
  7. A network security device that monitors traffic to or from your network
Down
  1. A set period of time during which specific work has to be completed.
  2. What does 'FI' stands for in WI-FI.
  3. This you should never share with anyone.
  4. A task or process should always be________.
  5. A collection of rules that determine the way of communication between computers.
  6. An Agile way to manage a project.
  7. The 'R' in RIO stands for

14 Clues: Internet FraudTitle of current Week.The 'R' in RIO stands forViolation of SLA or Security ruleAn Agile way to manage a project.What does 'FI' stands for in WI-FI.This you should never share with anyone.A task or process should always be________.A common term used both in hospitals and in IT.Process that ensures and confirms a user’s identity...

cc 2025-02-18

cc crossword puzzle
Across
  1. A security update that must be applied immediately
  2. If you observe a security breach, where should you report it ?
  3. A security principle that ensures data is available when needed
Down
  1. A security principle that ensures that data is not accessed by unauthorized parties
  2. A digital wall that prevents unauthorized users from accessing a network
  3. A lock that needs a fingerprint

6 Clues: A lock that needs a fingerprintA security update that must be applied immediatelyIf you observe a security breach, where should you report it ?A security principle that ensures data is available when neededA digital wall that prevents unauthorized users from accessing a network...

U03 CH4 Key Terms 2024-02-27

U03 CH4 Key Terms crossword puzzle
Across
  1. Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
  2. traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
  3. (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
  4. (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
  5. (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
  6. conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
  7. methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
  1. (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
  2. (4,3,4) Passwords, passphrases, or PINs are all examples
  3. (4,3,4) Smart cards and security key fobs are both examples
  4. (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  5. controls what a user can and cannot do on the network after successful authentication.
  6. (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
  7. Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
  8. replaces data with authentic looking values to apply anonymity to the data records.

15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples(4,3,4) Smart cards and security key fobs are both examplesreplaces data with authentic looking values to apply anonymity to the data records.controls what a user can and cannot do on the network after successful authentication....

May 2021 Newsletter Crossword Puzzle 2021-05-07

May 2021 Newsletter Crossword Puzzle crossword puzzle
Across
  1. The name of the Wi-Fi network that is being set up.
  2. An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
  3. Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
  4. An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
  1. Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
  2. A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
  3. Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
  4. The speed at which data is transmitted and received among the devices on your wireless network.
  5. Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
  6. A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.

10 Clues: The name of the Wi-Fi network that is being set up.The speed at which data is transmitted and received among the devices on your wireless network.A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data....

It words 2024-12-17

It words crossword puzzle
Across
  1. The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
  2. An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
  3. The maximum rate of data transfer across a given path, measured in bits per second (bps).
  4. A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
  5. A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
  1. The practice of dividing a network into two or more smaller networks, improving performance and security.
  2. A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
  3. The creation of a virtual version of something, such as a server, a storage device, or network resources.
  4. The delay before a transfer of data begins following an instruction for its transfer.

10 Clues: The delay before a transfer of data begins following an instruction for its transfer.The maximum rate of data transfer across a given path, measured in bits per second (bps).The practice of dividing a network into two or more smaller networks, improving performance and security....

Coding 2022-06-10

Coding crossword puzzle
Across
  1. relating to or characteristic of the culture of computers, information technology, and virtual reality
  2. the process or activity of writing computer programs
  3. Lines of code
  4. involving or relating to the use of computer technology
  5. A type of code
Down
  1. The creator of a computer program
  2. relating to, using, or denoting a system of numerical notation that has 2 rather than 10 as a base.
  3. the set of instructions, or a system of rules, written in a particular programming language
  4. the state of being free from public attention

9 Clues: Lines of codeA type of codeThe creator of a computer programthe state of being free from public attentionthe process or activity of writing computer programsinvolving or relating to the use of computer technologythe set of instructions, or a system of rules, written in a particular programming language...