cyber security Crossword Puzzles
Crossword - Voltedge 2019-09-05
Across
- What is the SOX Compliant application under EHS
- Tool replacing Oracle HR
- Measure based on the deviations of individual scores from the mean
- One of the focus areas of EHS
- CDA application is hosted here
Down
- Tool used for Rewards and Recognitions
- What protocal is used to authenticate OnGuard end user's SSO
- Python library for machine learning
- Portal to view security emergency contact and other security info
- TCT supports export control for which country?
10 Clues: Tool replacing Oracle HR • One of the focus areas of EHS • CDA application is hosted here • Python library for machine learning • Tool used for Rewards and Recognitions • TCT supports export control for which country? • What is the SOX Compliant application under EHS • What protocal is used to authenticate OnGuard end user's SSO • ...
SC crossword - v2 2025-12-22
Across
- The area where bags and passengers are screened
- The building where passengers wait for flights
- The path planes use to get to the runway
- Where the pilot sits to fly the plane
Down
- Where you board your plane
- Where planes take off and land
- When a plane touches back down
- What you do with your ticket and bags before security
- The person who flies the plane
- When a plane leaves the ground
10 Clues: Where you board your plane • Where planes take off and land • When a plane touches back down • The person who flies the plane • When a plane leaves the ground • Where the pilot sits to fly the plane • The path planes use to get to the runway • The building where passengers wait for flights • The area where bags and passengers are screened • ...
Bradley 2025-11-07
Across
- A card that lets you borrow money up to a limit to buy things, and pay it back later with interest if unpaid
- The percentage charged by a lender for borrowing money, or earned when saving money.
- Something valuable (like a house or car) that a lender can take if the borrower doesn’t repay a loan.
- An interest rate that can change over time, depending on the market.
- A loan used to buy a house, where the house is the security for the loan.
- Replacing an old loan with a new one, usually to get a better interest rate or lower payments.
- A person or company (like a bank) that lends money to someone.
- The length of time you have to repay a loan.
Down
- A card that takes money directly from your bank account when you buy something.
- An asset (like a car or house) a borrower gives as security for a loan.
- A set period of time a loan or deposit lasts (e.g. a 3-year loan).
- The original amount of money borrowed or invested, not including interest.
- An interest rate that stays the same for the whole loan term.
- Money borrowed that must be paid back, usually with interest.
- The person who takes money from a lender and promises to pay it back.
- The maximum amount you can borrow or spend (for example, on a credit card).
- The chance of losing money or something valuable when making a financial decision
17 Clues: The length of time you have to repay a loan. • An interest rate that stays the same for the whole loan term. • Money borrowed that must be paid back, usually with interest. • A person or company (like a bank) that lends money to someone. • A set period of time a loan or deposit lasts (e.g. a 3-year loan). • ...
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- A hostile and insulting interaction between internet users.
- An image that is captured of what is shown on a phone, tablet, or computer screen
- Rules or manners for interacting courteously with others online
- unwanted emails
Down
- Online communities, also known as social networks
- Sharing someone’s secrets or embarrassing information online
- Setting up a fake online profile
- malware,cyber-destroyer, break your technology
- A technology that allows us to access our files through the internet from anywhere in the world.
- Someone who posts rude or off-topic messages in an online community
10 Clues: unwanted emails • Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
Text Bullying 2019-05-22
Across
- its never too late to do / make the _____ thing / choice
- when someone is mean to someone else on purpose
- everyone is unique and ______ in their own way
- having _____ can give you the courage to help and stop bullying
- bystanders are equally evolved if they don't ____
- bully is identified not by their looks, but rather by their ____
Down
- bullying can be done by an individual or by a _____
- bullies often have problems with ________ and have their own way to deal with it
- bullying online is called ______ bullying
- bullying is unfair and one-______
10 Clues: bullying is unfair and one-______ • bullying online is called ______ bullying • everyone is unique and ______ in their own way • when someone is mean to someone else on purpose • bystanders are equally evolved if they don't ____ • bullying can be done by an individual or by a _____ • its never too late to do / make the _____ thing / choice • ...
Safety Crossword 2023-05-05
Across
- Cyber-attack that is sent via SMS/Text messaging
- Known as scam phone calls
- Program to identify and assist those who may require assistance during an evacuation
- How many life-saving rules are there
- Location of buried utilities prior to a mechanical excavation cover which life-saving rule
Down
- Someone enters behind you without your knowledge
- Malicious or threatening emails sent
- What is the 4th value recently added to Enbridge's values
- Type of training to ensure our workstations are setup properly
- What type of alarm system does Enbridge Centre and Manulife have
10 Clues: Known as scam phone calls • Malicious or threatening emails sent • How many life-saving rules are there • Someone enters behind you without your knowledge • Cyber-attack that is sent via SMS/Text messaging • What is the 4th value recently added to Enbridge's values • Type of training to ensure our workstations are setup properly • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Anti-Bullying 2023-11-28
Across
- Showing that you listen to them
- Doing something to someone over and over again and it annoys them or hurts them
- Being unkind or hurtful
- someone who watches a fight and doesn't help stop it
- This can stop fights and resolve issues.
- An online type of bullying via messages or social media
Down
- Something is angry or frustrated and they let it out on other people
- someone who watches a fight and tries to stop it
- a person you can trust or somebody you are friends with
- A disagrement with somebody
10 Clues: Being unkind or hurtful • A disagrement with somebody • Showing that you listen to them • This can stop fights and resolve issues. • someone who watches a fight and tries to stop it • someone who watches a fight and doesn't help stop it • a person you can trust or somebody you are friends with • An online type of bullying via messages or social media • ...
Bullying and Decision Making 2023-09-01
Across
- Something you think and contemplate about everyday
- different types are racial, cyber, and physical
- a synonym of abuse
- a person who supports a person that’s is doing through bullying
- a mean person who physically, mentally, socially abuses for their own personal gain
Down
- a person who is experiencing abuse from a bully
- a person who teaches and gets reports about bullying
- of bully- a person who supports the bully and close friend
- a person who usually gives a bully silent approval or doesn’t want to get involved
- when someone gets bullied through technology
10 Clues: a synonym of abuse • when someone gets bullied through technology • a person who is experiencing abuse from a bully • different types are racial, cyber, and physical • Something you think and contemplate about everyday • a person who teaches and gets reports about bullying • of bully- a person who supports the bully and close friend • ...
Trefoil Guild Website Crossword 2026-03-06
Across
- International project acronym for adventure with Zest (5)
- Minimum age to to join the Trefoil Guild (8)
- The STARS theme involving a physical or community project (6)
- The"S" in STARS that focusses on personal well-being (4)
- One of four key messages "Find______" (10)
Down
- The personal award with Bronze. Silver, and Gold Levels (6)
- Location of Trefoil Guild HQ (6)
- News The quarterly magazine sent to all members (11)
- A specialized type of guild often for 18-30s or online (5)
- The colour of the Trefoil Guild promise badge (3)
10 Clues: Location of Trefoil Guild HQ (6) • One of four key messages "Find______" (10) • Minimum age to to join the Trefoil Guild (8) • The colour of the Trefoil Guild promise badge (3) • News The quarterly magazine sent to all members (11) • The"S" in STARS that focusses on personal well-being (4) • International project acronym for adventure with Zest (5) • ...
Compliance 3 2023-03-28
Across
- ________ email sending shall be prohibited. (Information Security Policy)
- The ________ gifts should NOT be given to vendor/supplier China Mobile subsidiaries, government institutions and HQ of PRC state-owned enterprises. (Gift policy)
- Access log records in site access control and surveillance systems shall be kept for a minimum of ____ days. (Information Security Policy)
- ________ units have the responsibility to monitor public sentiment within the scope of business. (Public Sentiment Management Policy)
- ______ refers to a situation in which a person decides to report serious concerns about any suspected misconduct, malpractice or irregularity within the Company. (internal control policy)
Down
- _______ committee conducts the meeting which is responsible for sourcing, and make the approval in accordance with the relevant provisions of the ______ policy. (conference management policy)
- The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy)
- All units can provide their preferred gift suggestions. __________ Division will evaluate and add the executable gifts to the list prepared in the middle and end of the year. (Gift policy)
- Three types of _________ Sponsorships are available to staff: team nomination, professional membership and professional certification examination sponsorship. (Education Sponsorships Policy)
- Passwords shall be ____ or more characters. (Information Security Policy)
10 Clues: ________ email sending shall be prohibited. (Information Security Policy) • Passwords shall be ____ or more characters. (Information Security Policy) • The stored ______ information shall be properly erased after use or before being disposed. (Information Security Policy) • ...
Financial Jargons 2022-10-26
Across
- a fixed income investment which is issued by the government or a company to its buyers
- a market where the prices of the stocks are increasing over a prolonged period of time
- It shows the average number of stocks which are traded during a particular time
- It relates to the amount of money or the value in cash that the holder of a security will obtain from the issuer of the security when the security matures at the specific date
- It shows how much a company or firm pays out in every year as compared to the stock price Income Stock
Down
- It is a form of fixed-income instrument which is not backed by security of any physical assets or collateral of the issuer
- An entity who purchases or sells investments/stocks on behalf of the investor/trader in return for a commission
- These are equity shares of companies which are well-established and financially stable
- It refers to a period in which the prices of equity shares fall consistently
- It is the final price on a specific trading day at which the equity shares of a company are sold or traded
10 Clues: It refers to a period in which the prices of equity shares fall consistently • It shows the average number of stocks which are traded during a particular time • a fixed income investment which is issued by the government or a company to its buyers • These are equity shares of companies which are well-established and financially stable • ...
Human Rights 2020-12-14
Human Rights 2020-12-14
At the airport 2025-10-22
PPB 0035.14 - Mobile Computing 2020-11-13
Across
- Internet standard that has security vulnerabilities.
- Security __________ must be in place prior to its implementation.
- Health information stored or captured by clinicians or if it is communicated to a healthcare provider who uses it to deliver care is governed by what law (i.e. PHIPA)?
- To support a facility’s functional needs for staying connected to a network, __________ points are created.
- Other than tracking health records, what is the other challenge for HIM professionals when these information are residing on mobile devices?
- Applications used in mobile devices allow healthcare providers and patients to access to __________ test results, medical records, and reference materials.
- What are used for storing addresses, organizing tasks, and scheduling functions?
- __________ or Wi_Fi is the technology used to connect devices and computers together.
- These devices, known as mobile healthcare computing devices or abbreviated __________, range from the size of a cell phone with a tiny screen to tablets.
- This must be required to access a mobile device.
- Evolution in mobile technology and the use of wireless networks has opened many doors to support mHealth, however, mobile devices may also provide challenges such as ___________ and data loss.
- mhealth refers to the use of mobile and __________ devices to improve healthcare.
- Wifi access provides clinicians with more mobility and what?
- The use of mobile devices is an important ___________ that Infoway believes can address several of the key challenges facing the healthcare system.
- Health information generated by a mobile device that uses medical records for situations such as audits, health research, and information reporting are what type of applications?
- Typically, clinicians use cellular phones and __________ for communication.
- A study found that approximately __________ of physicians had increased productivity with the use of this technology in the hospital setting.
- Healthcare organizations would need to outline the ____________ and acceptable uses of mobile devices that capture and store clinical information.
- If a healthcare organization is implementing mHealth into their system, they must take ownership and the possibility of device loss or ___________ into consideration.
- According to Canada Health Infoway (Infoway), Clinicians want portable, __________, and useful tools to assist them in their practice.
- In order to evolve to address their privacy and security considerations, healthcare organizations must put out ___________ and regulation.
Down
- mHealth can be downloaded by consumers from provider portals or by health providers to collect, record and report information either manually or via interfaces with what devices?
- What must clinicians search for to achieve the most effective application(s) for their myriad of needs?
- What will be harmonized with mHealth’s initiatives and directions in the short and long-term once policies are implemented?
- Policies would need to address mobile device ____________.
- The most popular connection is __________ that allows high speed transfer.
- Remotely monitoring hospital patients or the elderly can free up much needed what in hospitals and nursing homes?
- mHealth has the potential to benefit society in a number of ways, such as cutting the costs of providing healthcare, maintaining and improving __________ of care, and reaching patients in remote locations.
- Intermittently connected MHCD’s pose what great risk?
- __________ can also be used as a tool for patients to manage appointments, renew prescriptions, or view medical records.
- With this implementation, practitioners can access the hospital’s internet guidelines in what way?
- The term __________ health has become visible as a new capability of information management within health delivery organizations (HDOs).
- Where should policy makers and program managers need to be aware of privacy security issues to ensure appropriate policies and strategies are developed and implemented?
- Studies predict mHealth has the potential to reduce the __________ burden of healthcare delivery for clinicians by 20 to 30 percent.
- The functional categories of MHCDs each have different requirements for __________, security, communication, and systems integration.
- mHealth is also part of an organization’s ___________ health record and is subject to requests for disclosures, subpoenas, and e-discovery.
- It is also empowering the elderly by providing them with __________involvement in their treatment.
- What type of devices do practitioners use in order to access databases, drug details, or drug reactions?
- What must be replaced in order for information updates to be done?
- Message ___________ security and data storage security can put citizen information at risk if the necessary precautions are not taken.
- The use of these technologies can __________ healthcare costs by supporting care delivery, promoting healthy behavior changes in patients, and transforming the caregiver-to-patient and care-giver-to caregiver relationships.
- Many functions that can be performed and being ported to mobile platforms are using what kind of clinical information system?
- To avoid problems, assessing the validity of the quality of mHealth applications should include privacy, security, ___________, and content features.
- Many challenges include preventing unauthorized access to, ensuring that it is not stored on a mobile device, and particularly dealing with what kind of sensitive patient information?
- Physicians are increasingly using smartphones which allows them to access medical resources in order to support __________ based decision making.
- mHealth implementers must pay attention to storage issues and the concept of the extensive amount of health data being generated is called?
- mHealth also has the potential to reduce the per __________ cost of healthcare, while simultaneously maintaining or improving care quality.
- What control concerns are related to these mobile devices that must be dealt with and resolved?
- Policies may be involved in how mobile devices are handled when the information they contain may become involved in what potential legal action?
49 Clues: This must be required to access a mobile device. • Internet standard that has security vulnerabilities. • Intermittently connected MHCD’s pose what great risk? • Policies would need to address mobile device ____________. • Wifi access provides clinicians with more mobility and what? • Security __________ must be in place prior to its implementation. • ...
WatchGuard Dictionary Day 2022-10-11
7 Clues: WatchGuard Cloud • security simplified • An easy-to-use MFA product • proactive defense strategy • WatchGuard's signature red box • WatchGuard's Security Platform • XDR based threat detection and remediation platform
System Securiy 2018-07-12
Across
- The most effective way to achieve data security
- a code which unlocks personal accounts
- An attack which requires trial and error.
- and theft Act of stealing computer information.
- A category of manipulating in order to reveal personal information.
- Its also known as antivirus
- faking to be someone else in order to acquire information.
- Its an computer attack which has a code embedded in a badly designed application.
- A set of rules that limit computer network access
Down
- A type of viruses.
- monitoring computer network trafficking to gather information
- is an attempt to check the security of facilities
- A type of attack which prevents users from accessing servers.
- Higher accessed people have a wider set of information in comparison to lower level users
- To protect a network or system
15 Clues: A type of viruses. • Its also known as antivirus • To protect a network or system • a code which unlocks personal accounts • An attack which requires trial and error. • The most effective way to achieve data security • and theft Act of stealing computer information. • is an attempt to check the security of facilities • A set of rules that limit computer network access • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
great depression 2023-10-16
Across
- a long period without precipitation
- bowl was the sand storm in the mid west
- security program that help security of elderly
- people that dont have a job
- a law passed after the civil war
- a series of speeches over the radio
- where people went to steal their foods
Down
- was an upwards movement of price for goods
- a person who moves from place to place to search for work
- a series of program intended to help the citizen
- the place where people were encamping at in the 1930s
- to remove people against their will
- failure was when the bank turns bankrupt and has to shut down
- works is a program that helps clean up the cities.
- is a little machine that has a person talking in it giving information
15 Clues: people that dont have a job • a law passed after the civil war • a long period without precipitation • to remove people against their will • a series of speeches over the radio • where people went to steal their foods • bowl was the sand storm in the mid west • was an upwards movement of price for goods • security program that help security of elderly • ...
Vocabulary Assingment 2024-03-07
Across
- a type of phone used by criminals
- the act of willful killing for any reason
- a person who arranges deals and work between two people or groups
- the act of getting away quickly, usually from a crime scene
- a person accompanying another for security purposes
- the practice of a person doing business or shoring assets overseas to avoid taxes
- a secret plan to do something unlawful
Down
- a killer for hire
- protection against and from any potential harm
- an account of a person's life written as such by that person
- a long range rifle usually equipped with a scope
- an outfit used in order to not get recognised
- a building where criminal trials take place
- just behavior or treatment
- someone who writes a book
15 Clues: a killer for hire • someone who writes a book • just behavior or treatment • a type of phone used by criminals • a secret plan to do something unlawful • the act of willful killing for any reason • a building where criminal trials take place • an outfit used in order to not get recognised • protection against and from any potential harm • ...
Competency 5, Information Security 2020-10-10
Across
- A method for confirming users' identities.
- A virus and worm are two types.
- Right to choose the conditions and the extent to which information and beliefs are shared with others. Informed consent for the release of medical records represents the application of information privacy.
- The protection of physical items, objects, or areas from unauthorized access and misuse.
- US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
- Electronic tool that can track system access by individual user, by user class, or by all persons who viewed a specific client record.
- Unspoken understanding that private information shared in a situation in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
- Freedom to do things without other people watching you or knowing what you are doing. Privacy includes the right to determine what information is collected, how it is used, and the ability to access collected information to review its security and accuracy.
- Acronym for the exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies.
- Acronym for Health Insurance Portability and Accountability Act.
Down
- Protection of information systems and the information housed on them from unauthorized use or threats to integrity.
- The exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies
- The protection of non-tangible items such as software and data integrity from unauthorized access and misuse.
- Programs written for the purpose of stealing information, causing annoyance or performing covert actions.
- Data that has been interpreted.
- Type of gateway designed to protect private network resources from outside hackers, network damage, and theft or misuse of information.
16 Clues: A virus and worm are two types. • Data that has been interpreted. • A method for confirming users' identities. • Acronym for Health Insurance Portability and Accountability Act. • The protection of physical items, objects, or areas from unauthorized access and misuse. • ...
Security awareness month 2021 2021-10-04
Across
- Tide's bug bounty program
- This is commonly assigned to bank customers for use with ATMs and for use with debit cards.
- Security is the job of __________.
- A service that both encrypts your data and hides your IP address
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Tide's Information classification procedure has four colours. Green, Amber, Red and _________.
- Unauthorised person follows an authorised individual to enter a typically secured area.
- Any data that could potentially be used to identify a particular person.
Down
- You should _____ a device before stepping away from it.
- Where is Tide's Information Security Management System kept
- You message in this channel if an incident occurs.
- For a password to be secure, it should contain upper and lower case letters, numbers, and ________
- You should never share your __________.
- Who is Tide's Ciso?
- A type of online scam where criminals impersonate legitimate organisations via email
- A malicious code that can infect your system.
16 Clues: Who is Tide's Ciso? • Tide's bug bounty program • Security is the job of __________. • You should never share your __________. • A malicious code that can infect your system. • You message in this channel if an incident occurs. • You should _____ a device before stepping away from it. • Where is Tide's Information Security Management System kept • ...
Infant Safety and Security 2016-11-19
Across
- Function allowing caregivers to adjust/change banding material
- Code name for infant abduction
- Allows caregiver to automatically enroll infant in the Safe Place system 60 seconds after the infant in banded with transmitter
- Never assume an alarm is ________
- In case of a code pink, use Vocera to "__________ to Everyone Everywhere"
- Allows caregiver to pre-assign a transmitter to a specific infant before banding the infant
- Information alarm color (auto-enroll, transfer complete, expired alarms)
- Color for check band, device fault and client missing alarms
- Function allowing movement between monitored units
Down
- Function allowing movement to unmonitored areas (MRI, CT, etc)
- On employee badges letting families know who is authorized to transport the baby
- Staff should ALWAYS respond __________ to all alarms
- The number to call to report a Code Pink can be found on most unit
- Function to remove the infant from the system
- Infant safety and security is the responsibility of _________ in the healthcare facility.
- Color for cut band, door alarm, no signal and 'band off" alarms
16 Clues: Code name for infant abduction • Never assume an alarm is ________ • Function to remove the infant from the system • Function allowing movement between monitored units • Staff should ALWAYS respond __________ to all alarms • Color for check band, device fault and client missing alarms • Function allowing movement to unmonitored areas (MRI, CT, etc) • ...
Security Awareness Month 2025 2025-09-25
Across
- Locks files and demands you pay money
- Pressing on something with your mouse. Think before you do this
- A formal rule set by the company to govern behavior
- A saved copy of your files
- What you should do if you spot a phishing email
- Watches what you do on your computer
- A secret word used to log in
- What you click to open a webpage
Down
- Bad software that harms your computer
- People who break into computer systems
- A warning about something important
- A message sent over the internet
- Adds new features and fixes security problems on devices
- Keeping personal info safe
- Fake emails that try to trick you
- We do this every month via Terranova
16 Clues: A saved copy of your files • Keeping personal info safe • A secret word used to log in • A message sent over the internet • What you click to open a webpage • Fake emails that try to trick you • A warning about something important • Watches what you do on your computer • We do this every month via Terranova • Bad software that harms your computer • ...
CSAM 2022 - Be Cyber Smart 2022-10-02
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause distraction.
- THe A in the C-I-A Triad. It ensures authorized users have access.
- A fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- Verifying identity
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnal information.
Down
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Facebook, Twitter, Instagram, etc. (two words)
- Hardware or software designed to prevent unauthorized access to or from private network.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
- A wireless technology standard used over short distances using short-wavelenghth UHF radio waves.
- Threatening behavior facilitated through electronic means such as texting.
- The process of taking plain text and scrambling it into an unreadable format.
- Unauthorize access to a network, information systems, or application.
- The I in the C-I-A Triad; protection from unauthorized changes.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A fraudalent email purportedly from a reputable company attempting to get personal information.
20 Clues: Verifying identity • Facebook, Twitter, Instagram, etc. (two words) • The I in the C-I-A Triad; protection from unauthorized changes. • THe A in the C-I-A Triad. It ensures authorized users have access. • Unauthorize access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Super Cryptic Cyber Crossword 9000 2022-02-02
Across
- Password 2.0.
- Spoofing, at the very top of the company’s hierarchy.
- Protecting your door with a lock made of Cheetos
- Online advertising used to spread malware.
- Much stronger than SMS, but weaker than U2F.
- A Wi-Fi access point that wants to hurt you, bad…
- Oh you wanted access to your system? NOPE.
- Everyone needs protection… even Wi-Fi connections in hotel lobbies!
- Reason #999 not to use SMS as an MFA mechanism.
- Isolates an application, a web browser, or a piece of code inside a safe environment for testing or processing.
- registering or using a domain that's similar to, but not typographically identical with, another domain to direct Internet users who carelessly type a url.
- Pay us money… or else have fun having no access to your files!
- Don’t get (personally) hooked!
- A system within organizations, people, activities, information, and resources involved in supplying a product or service to a consumer.
- An item of value and/or importance to our business operations.
Down
- Hide this to have a (minor) edge over your Wi-Fi attackers!
- Lets you authenticate by the way you sign your name or walk the walk!
- An orchestrated marketing or PR campaign in the guise of unsolicited comments from members of the public.
- This is how I prove who I claim to be to a system.
- You swipe your card into the reader, I will blindly follow.
- The risk posture of our company is situated somewhere between a bank and this.
- Ninja IT’s meaner and nastier cousin.
- A security model which assumes that there is always at least one person on every team that is compromised or coerced.
- The internet’s telephone directory.
- A vendor assessment a day keeps external audits away.
- Phishing for those partial to phone calls.
- Don’t get hooked to this social “experiment”!
- Finding private and usually sensitive information about a person or an organization, and then publishing that information without authorization.
- The practice and study of methods for hiding information.
- I will execute independently and self-replicate through your network connections. Sounds cool, eh?
- Defines and manages controls that an organization needs to implement.
31 Clues: Password 2.0. • Don’t get (personally) hooked! • The internet’s telephone directory. • Ninja IT’s meaner and nastier cousin. • Online advertising used to spread malware. • Phishing for those partial to phone calls. • Oh you wanted access to your system? NOPE. • Much stronger than SMS, but weaker than U2F. • Don’t get hooked to this social “experiment”! • ...
Networking Concepts and Cyber Ethics 2025-06-04
Across
- Local Area Network
- Information about a person that exists on the internet because of their online activities
- Bulk Emails
- Distributing copied software illigaly
- this topology forms a circle
- Safety Rules and regulations on the internet
- It is requires the cheapest topology setup
- Does not broadcast the message on the entire internet
- Metropolitan Area Network
Down
- Used in wireless networking
- One of the most common type of topology
- Presenting someone else's work as your own
- Combination of two terms 'net' and 'etiquette'
- Enables you to connect to the available internet
- Illegally using someone else's identity
- Illigal activities done online
- This topology uses a single communication line
- Connect two internets together,LAN and WAN
- A network device used to connect all computers
- World Area Network
20 Clues: Bulk Emails • Local Area Network • World Area Network • Metropolitan Area Network • Used in wireless networking • this topology forms a circle • Illigal activities done online • Distributing copied software illigaly • One of the most common type of topology • Illegally using someone else's identity • Presenting someone else's work as your own • ...
IT: Networking and Cyber Ethics 2025-05-27
Across
- Device that connects devices in a network
- Online manners and rules
- Copying work without giving credit
- Security system that controls network traffic
- Protecting data by converting it into code
- Wide Area Network
- Fraud attempt to obtain sensitive data
- Unauthorized access to data
- Device that forwards data packets between networks
- Local Area Network
Down
- Common wired networking technology
- Malicious software
- Online harassment or bullying
- Set of rules for data transmission
- Converts signals for internet access
- Data transfer capacity of a network
- Address: Unique string identifying a device on a network
- Legal right to protect creative work
- Footprint: Online trail of user activity
- Right to control personal data
20 Clues: Wide Area Network • Malicious software • Local Area Network • Online manners and rules • Unauthorized access to data • Online harassment or bullying • Right to control personal data • Common wired networking technology • Set of rules for data transmission • Copying work without giving credit • Data transfer capacity of a network • Converts signals for internet access • ...
Cyber Awareness Passwords and MFAs 2025-08-14
Across
- The process of verifying a user's identity.
- These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
- This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
- This type of attack uses a predefined list of common words and phrases to guess passwords.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Changing this immediately is recommended on accounts you suspect may have been compromised.
- Avoid using easily __________ information like names or birthdays in your passwords.
- This type of attack tries out countless password combinations until the correct one is found.
Down
- A strong password should be at least ______ characters long, according to NIST recommendations.
- A method of authentication using unique patterns on an individual's fingertip.
- An unauthorized user who attempts to gain access to an information system.
- A common bad habit where users employ the same credentials across different websites and services.
- The process of converting data into a format unreadable to anyone except those possessing a "key".
- Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
- A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
- This type of authentication adds an extra layer of security beyond just a password.
- Should be at least 16 characters long and combine random words to be strong.
- A specific form of phishing that targets high-profile business executives.
- A sequence of words or text used to control access to a computer; similar to a password.
- and Clues (Word TAB Clue)
- Passkeys often rely on this type of factor, like a fingerprint or facial scan.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
22 Clues: and Clues (Word TAB Clue) • The process of verifying a user's identity. • An unauthorized user who attempts to gain access to an information system. • A specific form of phishing that targets high-profile business executives. • Should be at least 16 characters long and combine random words to be strong. • ...
ICS/OT Cyber Cryptic Crossword 2026-01-23
Across
- Roman wares looted digital extortion (10)
- Knightly honorific with no time or energy in vote rotating (5)
- Rare minerals opt for Caribbean spirits (8)
- Mother confused teams with pair sensing heat (12)
- Automaton formed from Dragos CEO and operational technology (5)
- Initially, some cyber alerts disrupt automation control system (5)
- Stage 2 pivot pie ordered, Ken Burns? (9)
- Mickey overheard whole OPC-UA component (9)
Down
- Throttles as wolf inverts, trapped in rival vendor (9)
- Safety-critical broadcasts enter Scottish lake (9)
- Industrial routine scrambled in DoD grid call (12)
- Factory efficiency — TV award announced down south (3)
- Energy exchanged hour after spilling tea (4)
- RIP! Victor over Romeo (7)
- Industrial middleware confused cop and initially District Attorney (5)
- Crude plant fiery nurse germinates (8)
- Noisy attempt joins sibling malware (6)
- Individual broke IDS before largest Greek island (8)
- Package installer adds final code including strangely armed hallucination (9)
- Evil Scholar’s voice from leaders of fraudulent insidious new scripture (4)
20 Clues: RIP! Victor over Romeo (7) • Crude plant fiery nurse germinates (8) • Noisy attempt joins sibling malware (6) • Roman wares looted digital extortion (10) • Stage 2 pivot pie ordered, Ken Burns? (9) • Rare minerals opt for Caribbean spirits (8) • Mickey overheard whole OPC-UA component (9) • Energy exchanged hour after spilling tea (4) • ...
Crossword 2021-02-14
15 Clues: luggage • airport • monitor • bus stop • passport • to travel • passenger • boarding pass • to get in line • to take a taxi • flight attendant • round trip ticket • to go on vacation • to pack a suitcase • to go through security
Virtual Learning 2024-08-11
15 Clues: - Typing tool. • - Post a file. • - Video device. • - Security code. • - Saved webpage. • - Internet tool. • - Access account. • - Web connection. • - Short assessment. • - Silence your mic. • - Video call platform. • - Online conversation. • - Small discussion group. • - Online course platform. • - Live video transmission.
PKN Group kevin, akio, nelson, daniel 2023-03-15
Across
- sebuah contoh dari integrasi nasional adalah pembangunan ______ oleh pemerintahan R.I,
- apa kata benda dari integritas?
- kampanye yang berbau ______ bisa menjadi ancaman terbangunnya integrasi nasional
- Dunia maya disebut juga dengan ______
- integrasi nilai indonesia ada dalam ______
- Sikap percaya diri merupakan khas nasionalisme Indonesia menurut _______
- _______ menjadi ciri khas bangsa indonesia
- salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah
- penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI
Down
- kita harus menghadapi bersama ancaman supaya _______ nasional dapat terwujud
- budaya beragam seharusnya menjadi ______ bukan untuk merendahkan budaya lain
- mencintai produk lokal dan budaya bangsa sendiri merupakan implementasi dari ______
- untuk mencegah terjadinya disintegrasi di masa depan, perlu ada ________ kebudayaan yang menyeluruh & berkesinambungan
- memelihara lingkungan hidup merupakan bentuk partisipasi warga negara dilingkungan ______ dan negara
- ________ menyediakan segala macam bentuk kekuatan manusia melalui berbagai proses
- dalam uud 1945 dinyatakan 4 tujuan ______
16 Clues: apa kata benda dari integritas? • Dunia maya disebut juga dengan ______ • dalam uud 1945 dinyatakan 4 tujuan ______ • integrasi nilai indonesia ada dalam ______ • _______ menjadi ciri khas bangsa indonesia • penguatan ______ perlu ditempuh untuk menjaga wilayah NKRI • salah satu tradisi di NTB yang merupakan keunikan budaya bangsa adalah • ...
PROTECTING YOUR COMPUTER 2016-04-24
Across
- Security __________ offer a wide range of protection.
- These type of evaluations are a great way to check it out.
- This OS has built in protections.
- These products offer advanced users a pick-and-mix approach.
- Do this often to keep the best protection.
- These should be installed regularly.
- These also have built in security settings.
Down
- These reviews are better than the manufacturer review.
- One of the three components protection should contain.
- Official looking notices that warn of viruses and a fix.
- Best software against Internet threats.
- System _________ takes you back to a time before the problem.
- This should be done to your computer at least once per week.
- Never forget to reverse this action when done.
14 Clues: This OS has built in protections. • These should be installed regularly. • Best software against Internet threats. • Do this often to keep the best protection. • These also have built in security settings. • Never forget to reverse this action when done. • Security __________ offer a wide range of protection. • These reviews are better than the manufacturer review. • ...
CyberSmart Crossword 2025-09-26
Across
- What to do when walking a visitor through secure areas
- A dishonest scheme or trick
- Malicious software that locks files until money is paid
- Type of information that must be carefully guarded
- What you should do with a suspicious email
- Fraudulent emails that trick people into revealing personal info
- – What you should do to your workstation when you leave your desk
Down
- A secret code used to access systems or accounts
- Software patches that fix bugs and security flaws
- Malicious code that spreads from one computer to another
- Software that secretly collects your information
- Worn to identify you as an employee
- Watching over somebody's shoulder to see what they are typing
- What good security habits do for your data
14 Clues: A dishonest scheme or trick • Worn to identify you as an employee • What you should do with a suspicious email • What good security habits do for your data • A secret code used to access systems or accounts • Software that secretly collects your information • Software patches that fix bugs and security flaws • Type of information that must be carefully guarded • ...
3.4 Crossword 2024-10-19
14 Clues: жол, дорога • жұмыс, работа • ақылды, умный • оғаш, странный • сағыну, скучать • туған, рожденный • әкелу, приносить • кейбір, несколько • кәмпиттер, конфеты • қауіпсіздік, охрана • тауық, курица, цыпленок • жылы шырайлы, дружелюбный • қол бұлғау, махать (рукой) • үйрету, учить, преподавать
GSPR Knowledge 2022-12-04
14 Clues: who signs • PR Hospital • PR gatecheck • not football • procure to.. • legal matters • regulated div • security impact • supplier control • first step to six • engagement metric • inflationary pain • kick-off governance • personal development framework
digital media 2023-10-10
PLACES AT ASCHOOL 2025-03-18
18 Clues: Kantin • Bermain • Olahraga • Ruang Kelas • Room^Mushola • Perpustakaan • Area^Area Loker • Room^Ruang Seni • Room^Ruang Guru • Area^Area Parkir • Room^Ruang Musik • Post^Pos Keamanan • Hall^Aula Sekolah • Room^Ruang Komputer • Room^Ruang Kesehatan • Field^Lapangan Olahraga • Yard Halaman Sekolah • Office^Ruang Kepala Sekolah
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer Term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer Term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
Unit 11 2023-02-27
CROSSWORD 9th APRIL 2018-04-03
12 Clues: ERA • LABEL • COMBAT • SALARY • INFERIOR • SECURITY • A MOINS QUE • CANDID/DIRECT • MORE AND MORE • ACT DISHONESTLY • REMAINS OF A FIRE • WOMAN RECENTLY MARRIED
Noah's crossword for bullying 2023-03-21
Across
- a person the watches someone get bullied.
- a person that gets picked on continuously.
- a type of bullying that happens on social media.
- a person that picks on people continuously.
- something that happens continuously.
Down
- a type of bullying that is physical.
- a type of bullying that you are rejected from your friend group or not invited into a group.
- bullying you don't get physically hurt but emotionally and mentally
8 Clues: a type of bullying that is physical. • something that happens continuously. • a person the watches someone get bullied. • a person that gets picked on continuously. • a person that picks on people continuously. • a type of bullying that happens on social media. • bullying you don't get physically hurt but emotionally and mentally • ...
Safe, ethical and responsible use of social media for teenagers 2024-04-25
Across
- plagiarism What is the unattributed use of information from the web?
- What is understood as the process of boundary management and control of information sharing and access
- When someone receives unwanted sexual communications
- What does the N mean in SNS?
Down
- The Internet presents special challenges to behaving how?
- When someone provides sexually explicit images
- When someone is being cruel to others sending or posting harmful material
- An example of a SNS
8 Clues: An example of a SNS • What does the N mean in SNS? • When someone provides sexually explicit images • When someone receives unwanted sexual communications • The Internet presents special challenges to behaving how? • plagiarism What is the unattributed use of information from the web? • When someone is being cruel to others sending or posting harmful material • ...
words often confused 2022-04-07
19 Clues: glowed • hurled • detail • a place • revealed • they + are • comparisons • form of they • at that time • writing paper • simple, common • a flying object • to a great extent • a rule of conduct • still and peaceful • a part of something • in a fixed position • the head of a school • quiet order and security
Erica 2025-12-16
Across
- Painting acquired
- Georigan Adventure
- Canoe Camping 2025
- Atlanta School
- Fastest Runners in Person
- Tall active activity
- Elias Tatiana First
- _ challenge
- New Haven "Her"
- Wakeup Beverage
Down
- No Security Red Bull
- Heatsource
- First African Nation
- Travel Goal, 50
- Ferdi & Tamara Present
- Snowpants Feature
- Best Bike
- Animal seen from tent
- Backyard Structure
19 Clues: Best Bike • Heatsource • _ challenge • Atlanta School • Travel Goal, 50 • New Haven "Her" • Wakeup Beverage • Painting acquired • Snowpants Feature • Georigan Adventure • Canoe Camping 2025 • Backyard Structure • Elias Tatiana First • No Security Red Bull • First African Nation • Tall active activity • Animal seen from tent • Ferdi & Tamara Present • Fastest Runners in Person
MEXICAN FEMINISTS CHALLENGE STATE AUTHORITY 2025-04-21
Across
- It is recognized as a significant social and political endeavor that promotes gender equality and addresses violence against women.
- Analyzes state politics, economics, and nationalism, noting that feminist movements may disrupt national unity or economic progress if viewed against government policies.
- Explores how governments use force to maintain control and suppress dissent, with activists becoming targets if viewed as inciting unrest or challenging state authority.
- Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors.
- Accentuate the socialconstruction of reality and the critical role of identity and societal norms.
- Focuses on individual empowerment over state security; feminist movements expose issues like gender violence, risking state backlash.
- National Commission to Prevent and Eradicate Violence
Down
- Explores how gender power dynamics shape security. Feminists can be seen as threats when they challenge patriarchal systems supporting national security
- Argues that state sovereignty and security can lead to groups such as feminist movements being perceived as challenging established norms.
- Analyzes the motivations, beliefs, and actions of influential leaders in feminist movements. Governments often perceive feminists as threats, influenced by specific individuals who embody larger challenges to authority.
10 Clues: National Commission to Prevent and Eradicate Violence • Accentuate the socialconstruction of reality and the critical role of identity and societal norms. • Emphasizes the importance of international norms and human rights, as well as the contributions of non-state actors. • ...
TMA Behavior Styles 2026-02-07
Across
- may take more time to think over their options as they prefer security
- As opposed to being introverted, talkers are
- may not be as interested in all the details
- would focus on results and need security
Down
- Talkers and Doers both prioritize this over security
- Supporters tend to keep their business with one company, making them
- are very direct and to the point
7 Clues: are very direct and to the point • would focus on results and need security • may not be as interested in all the details • As opposed to being introverted, talkers are • Talkers and Doers both prioritize this over security • Supporters tend to keep their business with one company, making them • may take more time to think over their options as they prefer security
King of Tokyo Crossword 2022-08-15
Across
- The oldest King of Tokyo robot that is still around today
- Which monster is an Egyptian God?
- This monster's name rhymes
- Which monster is based on King Kong?
- This monster was the same colour and food type as the promo monster 'Orange Death'
- The monster from the latest Monster Pack
Down
- Which monster is based on Godzilla?
- Who replaced 'Kraken' in the 2nd edition game?
- This monster was in a famous 1933 movie
- This monster was a 'Target' exclusive
- Which monster was in the Power Up expansion?
- The name of the game all of these monsters belong to
- The monster who replaced 'Cyber Bunny' in the 2nd edition game
- Which monster is first alphabetically?
- The monster who 'Kraken' from the original game was based on
15 Clues: This monster's name rhymes • Which monster is an Egyptian God? • Which monster is based on Godzilla? • Which monster is based on King Kong? • This monster was a 'Target' exclusive • Which monster is first alphabetically? • This monster was in a famous 1933 movie • The monster from the latest Monster Pack • Which monster was in the Power Up expansion? • ...
Crime vocabulary 2017-03-13
Across
- / A type of punishment whereby the offender has to pay money
- / To intentionally set fire to property
- / To attack someone
- / Repeatedly watching or following another person without them knowing
- / Criminal activity carried out online
- / Dishonest actions by those who hold power or authority
- / The consequences of committing a crime
- / Taking or receiving something to gain something more
Down
- / To betray one's own country
- / The action of taking someone else's property from them, without their consent
- / Assault or threatening of a partner, spouse or family member
- / A criminal offense of using threats or intimidation to make a gain
- / Treatment that is considered fair and equal
- / To fake or copy an important piece of document
- / A place where people are held for a crime they have committed
15 Clues: / To attack someone • / To betray one's own country • / Criminal activity carried out online • / To intentionally set fire to property • / The consequences of committing a crime • / Treatment that is considered fair and equal • / To fake or copy an important piece of document • / Taking or receiving something to gain something more • ...
CAB 2021-05-04
Across
- A mean moment is what kind of event?
- By the age of 25 , 1/4 who have bullied will spend time where?
- The what of power is unequal when it is bullying?
- what kind of bullying is online?
- what is the C in ABCD of bullying?
- excluding, spreading rumors is what king of bullying?
- An action that does not happen regularly is a mean what?
Down
- The D in ABCD of bullying is what?
- Name calling, threatening is what type of bullying?
- teasing is when everyone is having what?
- punching, kicking is what type of bullying?
- what is repeatitive, aggressive unwanted behavior?
- What is the A in ABCD of bullying?
- There's a solution to the problem..
- when everyone is having fun it is?
15 Clues: what kind of bullying is online? • The D in ABCD of bullying is what? • What is the A in ABCD of bullying? • when everyone is having fun it is? • what is the C in ABCD of bullying? • There's a solution to the problem.. • A mean moment is what kind of event? • teasing is when everyone is having what? • punching, kicking is what type of bullying? • ...
Tech terms 2019-08-23
Across
- A method of giving a false appearances of a helpful program when in reality it is a virus
- A physical device and anything attached to the physical computer
- Permeant storage inside of the computer
- A type of zip file
- A picture that jumps you to a new document
- Programs you add to the existing comp
- Bad software made to change settings without permission
Down
- The address of your tech assigned through the roughter
- The max amount of data transfer
- Joint photographic expert
- Cyber ethics, unwritten rules of the internet
- Graphic interface format
- A graphic on screen interface that represents a program
- A function used on twitter and other services that signs a post word used to sort post
- Allows you to send and receive over the telephone lines
15 Clues: A type of zip file • Graphic interface format • Joint photographic expert • The max amount of data transfer • Programs you add to the existing comp • Permeant storage inside of the computer • A picture that jumps you to a new document • Cyber ethics, unwritten rules of the internet • The address of your tech assigned through the roughter • ...
Business Law 123 2014-01-23
Across
- Another word for a law.
- Law for offenses against society.
- Method of settling a dispute when a third party's advice is sought, but is not legally binding
- Court that reviews the decisions of lower courts.
- Laws that govern the use of computers and the Internet.
- Term used to add provisions to the constitution
- Method of settling a dispute when a third party's decision is legally binding.
- Decision of a court.
- Method of settling a dispute when both parties reach an agreement by themselves
- Settling a dispute through the courts.
- Court of original jurisdiction.
- Court for individuals under the age of 18.
Down
- Court responsible for handling wills and estates.
- Branch of government that may rule laws unconstitutional.
- Law based on current standards or customs.
- A law passed at the city level.
- Verbatim (word-for-word) record of court proceedings.
- Branch of government that can veto laws.
- Authority of a court to decide a case
- Law used to provide remedy for wrongs against individuals.
20 Clues: Decision of a court. • Another word for a law. • A law passed at the city level. • Court of original jurisdiction. • Law for offenses against society. • Authority of a court to decide a case • Settling a dispute through the courts. • Branch of government that can veto laws. • Law based on current standards or customs. • Court for individuals under the age of 18. • ...
Code 2016-02-08
Across
- When something bad gets into your computer
- A block to a puzzle for games or programs
- When you add something onto your computer
- A place where power or information leaves a system
- A programming language is formal constructed language that is programmed in the computer
- block A block that repeats how many times in coding
- to identify or remove errors from the computer
- A conditional clause or conjunction
- When you are working on a website and it needs to be ___
- Get mail from the computer, phone, tablet, and computers
Down
- A system
- A folder that items
- A part of a puzzle for coding
- The use of parallel in computers
- A virus on the computer
- A site that you visit or when you install a game on a software
- bully Bullies that are online
- citizenship Behaviors online
- A logic gate is an elementary building block on a digital circuit
- When something repeats it self
20 Clues: A system • A folder that items • A virus on the computer • citizenship Behaviors online • A part of a puzzle for coding • bully Bullies that are online • When something repeats it self • The use of parallel in computers • A conditional clause or conjunction • A block to a puzzle for games or programs • When you add something onto your computer • ...
Health Period 2 2023-04-24
Across
- natural sweet tasting substance found in most foods
- most popular sport at Malden High
- nutrient found in meat, dairy, eggs, nuts
- a chronic relapsing disorder often associated with drugs and alcohol
- structured conversation with questions to evaluate qualifications
- type of health related to a persons psychological and emotional well-being
- group of people united by blood or experience
- my sisters son Asher is my
- Michelle Conrad was convicted of this
- state of complete physical, mental, and social well-being
- "some people are worth melting for"
Down
- online bullying
- unwanted aggressive behavior that involves a real or perceived power imbalance
- family value based on right or wrong behavior
- unit of energy in a food or drink item
- second leading cause of death amongst teens
- custom passed down from previous generations
- parking between two cars aligned with the street
- most commonly the highest fixed expense
- how the body converts nutrients to energy
20 Clues: online bullying • my sisters son Asher is my • most popular sport at Malden High • "some people are worth melting for" • Michelle Conrad was convicted of this • unit of energy in a food or drink item • most commonly the highest fixed expense • nutrient found in meat, dairy, eggs, nuts • how the body converts nutrients to energy • second leading cause of death amongst teens • ...
Digital Media Literacy 2021-11-03
Across
- place where you can see all the content from a creator
- documentary about social media apps
- videos or images selling a product
- social media app owned by Facebook
- owner of Facebook
- if someone wants to say something about a video they do this
- a person who gives away secrets
- red pin to car
- harassment or bullying on the internet
Down
- Owner of YouTube
- a messaging app owned by Facebook
- social media which name sounds like what noise a bird makes
- if someone wants to let their friends see a video they do this
- if someone doesn’t enjoy a video they click this
- popular social media app that sounds like a clock
- massive social media company
- users that have subscribed to certain content
- online conspiracy to do with pizzerias
- The recording, reproducing, or broadcasting of moving visual images
- if someone enjoys a video they click this
20 Clues: red pin to car • Owner of YouTube • owner of Facebook • massive social media company • a person who gives away secrets • a messaging app owned by Facebook • videos or images selling a product • social media app owned by Facebook • documentary about social media apps • online conspiracy to do with pizzerias • harassment or bullying on the internet • ...
Digital Media Literacy 2021-11-03
Across
- place where you can see all the content from a creator
- documentary about social media apps
- videos or images selling a product
- social media app owned by Facebook
- owner of Facebook
- if someone wants to say something about a video they do this
- a person who gives away secrets
- red pin to car
- harassment or bullying on the internet
Down
- Owner of YouTube
- a messaging app owned by Facebook
- social media which name sounds like what noise a bird makes
- if someone wants to let their friends see a video they do this
- if someone doesn’t enjoy a video they click this
- popular social media app that sounds like a clock
- massive social media company
- users that have subscribed to certain content
- online conspiracy to do with pizzerias
- The recording, reproducing, or broadcasting of moving visual images
- if someone enjoys a video they click this
20 Clues: red pin to car • Owner of YouTube • owner of Facebook • massive social media company • a person who gives away secrets • a messaging app owned by Facebook • videos or images selling a product • social media app owned by Facebook • documentary about social media apps • online conspiracy to do with pizzerias • harassment or bullying on the internet • ...
TTS informatika 2024-03-23
Across
- kegiatan jual beli dengan media elektronik
- perintah untuk mematikan komputer
- Rumus ms.word untuk menampilkan nilai pada kumpulan data yang bersumber dari suatu tabel dengan format susunan vertikal
- sebuah kejahatan cyber yang bertujuan untuk merusak atau memanipulasi data
- layanan mobile perbankan melalui jaringan Short Message Services atau SMS
- aplikasi untuk membuat sebuah games dan simulasi pembelajan tanpa harus berkutat dengan bahasa pemrograman
- layanan perbankan yang menggunakan media telepon
- nama fitur pada google collab untuk mengganti nama file
- rumus untuk menghitung rata rata pada ms.excel
Down
- rumus untuk menjumlahkan angka pada ms.excel
- aplikasi pengolah kata
- persimpangan baris dan kolom
- aktivitas yang dibatasi dalam google collab
- Central Processing Unit
- berita atau informasi yang tidak benar
- bahasa pemrograman yang digunakan pada google collab
- kejahatan yang ada dalam media sosial
- aktivitas yang berusaha menyusupi,mengakses,atau memodifikasi sistem atau jaringan tanpa izin
- "CTRL+S" merupakan perintah untuk
- lembar kerja yang ada dalam ms.excel
- aplikasi pengolah angka
21 Clues: aplikasi pengolah kata • Central Processing Unit • aplikasi pengolah angka • persimpangan baris dan kolom • perintah untuk mematikan komputer • "CTRL+S" merupakan perintah untuk • lembar kerja yang ada dalam ms.excel • kejahatan yang ada dalam media sosial • berita atau informasi yang tidak benar • kegiatan jual beli dengan media elektronik • ...
Kesehatan mental 2026-02-24
Across
- Perasaan sedih, marah, atau senang yang dirasakan seseorang disebut
- Orang yang melihat bullying tetapi diam saja disebut ..... pasif
- Jenis bullying yang dilakukan melalui media sosial atau internet
- Perasaan terkejut mendadak
- Sifat asli seseorang yang membedakannya dengan orang lain
- Perasaan sangat senang karena mendapatkan sesuatu yang diinginkan.
- Tindakan mengucilkan atau menjauhi teman dari pergaulan
- Tindakan menyakiti orang lain secara berulang melalui kata-kata atau fisik yaitu
- Keadaan emosi yang tidak stabil
- Sikap tidak memihak dan memberikan hak kepada yang seharusnya
Down
- Sikap jujur dan memiliki prinsip moral yang kuat.
- Istilah untuk orang yang menjadi sasaran perundungan
- Perasaan tidak senang melihat keberhasilan orang lain
- Perasaan menyesal setelah melakukan kesalahan
- Bullying yang dilakukan dengan kontak tubuh seperti memukul atau menendang.
- Perasaan takut atau khawatir yang berlebihan.
- Kata lain dari perilaku mengejek atau menghina nama orang tua
- Sifat selalu berkata apa adanya
- Sikap menghargai perbedaan dan pendapat orang lain
- Kemampuan untuk merasakan atau memahami apa yang dirasakan orang lain.
20 Clues: Perasaan terkejut mendadak • Sifat selalu berkata apa adanya • Keadaan emosi yang tidak stabil • Perasaan menyesal setelah melakukan kesalahan • Perasaan takut atau khawatir yang berlebihan. • Sikap jujur dan memiliki prinsip moral yang kuat. • Sikap menghargai perbedaan dan pendapat orang lain • Istilah untuk orang yang menjadi sasaran perundungan • ...
Remaja Muslim 2026-03-01
Across
- Sifat jujur yang harus dimiliki remaja muslim
- Remaja yang memiliki akhlak baik disebut ….
- Media untuk berdakwah secara online
- Membersihkan hati dari iri dan dengki
- Menyaring informasi sebelum membagika
- Menahan diri dari konten negatif
- Ibadah utama di bulan Ramadhan
- Membaca Al-Qur’an secara rutin
- Perilaku sopan dalam berkomunikasi online
- Perkembangan teknologi informasi saat ini disebut era ….
- Menghindari perundungan di internet (cyber…)
- Perilaku mencerminkan kepribadian seseorang
- Menghargai perbedaan pendapat
- Menjaga diri dari pengaruh buruk media sosial
- Sikap bertanggung jawab atas perbuatan sendiri
- Tidak sombong dalam pergaulan
Down
- Saling menghargai sesama teman
- Bersungguh-sungguh dalam kebaikan
- Menggunakan waktu secara efektif
- Menjaga rahasia pribadi di interne
- Menjaga niat hanya karena Allah
- Menggunakan internet secara bijak disebut literasi ….
- Menghormati orang tua adalah bentuk ….
- Menuntut ilmu dengan sungguh-sungguh
- Tidak menyebarkan berita bohong
- Rasa takut kepada Allah
- Platform komunikasi remaja secara daring
- Menjaga kehormatan diri di dunia maya
- Menjaga perkataan di media sosial
- Tidak mudah terpengaruh ajakan negatif
- Perbuatan baik yang berpahala
- Menyampaikan kebaikan melalui media
32 Clues: Rasa takut kepada Allah • Menghargai perbedaan pendapat • Perbuatan baik yang berpahala • Tidak sombong dalam pergaulan • Saling menghargai sesama teman • Ibadah utama di bulan Ramadhan • Membaca Al-Qur’an secara rutin • Menjaga niat hanya karena Allah • Tidak menyebarkan berita bohong • Menggunakan waktu secara efektif • Menahan diri dari konten negatif • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
SID 3b Hass im Netz 2021-04-30
Across
- Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
- Unwahre Nachrichten/Informationen im Internet
- Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
Down
- Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
- Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
- Man sollte wegen ... -accounts im Internet vorsichtig sein.
- erfundene „Tatsachen“.
7 Clues: erfundene „Tatsachen“. • Unwahre Nachrichten/Informationen im Internet • Man sollte wegen ... -accounts im Internet vorsichtig sein. • Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun? • Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden. • Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der... • ...
Global Unrest & Conflict 2025-09-13
Across
- Volunteer group that helped Ukraine during cyberattacks
- Middle Eastern region central to ongoing conflict with Israel
- One of the superpowers in the Cold War
- Type of warfare heavily used in Russia–Ukraine conflict
Down
- Peninsula annexed by Russia in 2014
- Indian state affected by ethnic unrest in 2023
- City claimed as the capital by both Israel and Palestine
7 Clues: Peninsula annexed by Russia in 2014 • One of the superpowers in the Cold War • Indian state affected by ethnic unrest in 2023 • Volunteer group that helped Ukraine during cyberattacks • Type of warfare heavily used in Russia–Ukraine conflict • City claimed as the capital by both Israel and Palestine • Middle Eastern region central to ongoing conflict with Israel
Supranationalism 2021-01-04
Across
- mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
- promotes unity and solidarity and spurs economic development in Africa
- organization governing common economic, social, and security issues in its European member states
- trading bloc between the countries of North America
- military alliance of countries in Western Europe and North America
Down
- high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
- integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
- global international organization that maintains peace and security and promotes economic and social development
- maintains peace and security and accelerates economic growth in Southeast Asia
9 Clues: trading bloc between the countries of North America • military alliance of countries in Western Europe and North America • promotes unity and solidarity and spurs economic development in Africa • maintains peace and security and accelerates economic growth in Southeast Asia • ...
Red Chair Report Q4 2022-09-28
16 Clues: CEO • Broncos • Morning ___ • Code storage • Time Tracker • ___ is coming • ___ Trail Road • AgilLink's App • A colorado view • Challenges & ___ • Security Training • NHL 2022 Champions • A favorite winter sport • Rick & Carl's alma mater • The color of the chair lift • City where Risclarity HQ is located
Amazing AKHLAK 2022-11-04
Across
- agen perubahan
- gas alam cair
- way of lives
- nilai-nilai utama
- bagian hulu
- bertindak proaktif
- memiliki kemampuan
- saling bekerjasama
Down
- menghargai perbedaan
- pekerja pertamina
- menjaga kepercayaan
- mengutamakan perusahaan
- bagian dari holding
- health safety security environment
- cara meraih tujuan
- pertamina reference level
16 Clues: bagian hulu • way of lives • gas alam cair • agen perubahan • pekerja pertamina • nilai-nilai utama • cara meraih tujuan • bertindak proaktif • memiliki kemampuan • saling bekerjasama • menjaga kepercayaan • bagian dari holding • menghargai perbedaan • mengutamakan perusahaan • pertamina reference level • health safety security environment
16 Career Clusters 2024-04-11
Across
- _____ technology, engineering and mathematics
- ______ accountant
- ______ and construction
- ______ science
- ______ services
- Aircraft Assembler
- ______ technology
- ______ food and natural resources
- _______ public safety, corrections and security
Down
- ______ and public administration
- ______ management and administration
- ______ distribution and logistics
- advertising manager
- ______ and training
- ______ A/V technology and communications
- ______ and tourism
16 Clues: ______ science • ______ services • ______ accountant • ______ technology • Aircraft Assembler • ______ and tourism • advertising manager • ______ and training • ______ and construction • ______ and public administration • ______ distribution and logistics • ______ food and natural resources • ______ management and administration • ______ A/V technology and communications • ...
Service Desk Puzzle 2021-01-21
Across
- Medication dispensing system
- Software used by Food Services for patient diet orders
- System used to manage schedules, call recordings, and QA processes
- Cisco System that allows phone calls and work to be routed to individuals
- Abbreviation for the Stanley Healthcare infant protection system
- Image management system for OB/GYN ultrasound
- System used by Physical Security for badging, door access control, and intrusion alerts
Down
- Security camera monitoring software
- Application used for e-prescribing
- Used by Pharmacy for workflow management and drug/dose documentation
- System used for online learning/compliance videos
11 Clues: Medication dispensing system • Application used for e-prescribing • Security camera monitoring software • Image management system for OB/GYN ultrasound • System used for online learning/compliance videos • Software used by Food Services for patient diet orders • Abbreviation for the Stanley Healthcare infant protection system • ...
LPSCS: Operational Strategies 2024-11-12
Across
- law that established minimum wage
- responsibility of LPSCS employees to act in accordance with laws and regulations, promoting transparency and trust.
- Activities aimed at enhancing community safety.
- procedure
- federal law that protects employee safety in the workplace
Down
- Services that provide immediate medical care during emergencies.
- The entry-level position in law enforcement.
- geographical area that someone has power within
- The highest-ranking officer in a law enforcement agency, responsible for overall operations.
- type of security is when a company hires an outside security company to provide specific services.
- personal protective equipment
11 Clues: procedure • personal protective equipment • law that established minimum wage • The entry-level position in law enforcement. • geographical area that someone has power within • Activities aimed at enhancing community safety. • federal law that protects employee safety in the workplace • Services that provide immediate medical care during emergencies. • ...
Ready for Takeoff: The Mobility Crossword 2026-01-26
Across
- System required for international travel requests, people mobility gateway
- Project code used to charge travel and expenses
- Where all Accenture business travel must be booked
- Mindset encouraged to reduce the carbon impact of travel
- Accenture’s corporate card for business expenses
Down
- Approval required for Song production shoots and events
- Tool that provides travel risk and security guidance
- Accenture’s top priority when employees are traveling
- Daily allowance for meals and incidentals while traveling
- Accenture’s global security team that supports employees worldwide
- Tool used to submit expenses and get reimbursed
11 Clues: Project code used to charge travel and expenses • Tool used to submit expenses and get reimbursed • Accenture’s corporate card for business expenses • Where all Accenture business travel must be booked • Tool that provides travel risk and security guidance • Accenture’s top priority when employees are traveling • ...
Cyberbullying, Miss Audrey's Class 2022-11-03
5 Clues: relating to computers • mean and hurtful behavior • a telephone service providing help • a person who stands up for something • used to prove something is true or not true
Know your Products 2016-01-29
Across
- 140+ channels
- Two Services
- Communities with contracted services
- Our Guarantee
- 240+ Channels
- Ultimate video package
- 25 Mbps Internet
- Home Security
- 75 Mbps Internet
Down
- Three Services
- Telephone
- Four Services
- High Speed Internet
- Customers not in Community Contract
- Keeping our customers
- 150 Mbps Internet
- Discounted Telephone
17 Clues: Telephone • Two Services • 140+ channels • Four Services • Our Guarantee • 240+ Channels • Home Security • Three Services • 25 Mbps Internet • 75 Mbps Internet • 150 Mbps Internet • High Speed Internet • Discounted Telephone • Keeping our customers • Ultimate video package • Customers not in Community Contract • Communities with contracted services
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer Term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer Term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
April Fools 2026-03-18
Across
- luxuriously smooth fabric
- casual way to refer to your sibling, Natalie
- casual way to refer to your insect sibling
- if one were to use poor past-tense grammar not to stand
- potential result of sitting on a can
- opposite of "as isn't tmr"
Down
- left on dirty clothes
- what to say in caveman language if Stanley just got back from Florida
- response to "what is the abbreviation of the National Security Agency?"
- what to say in caveman language to ask about your friend Stanley
- Mascot of our humble university
- opposite of "as is"
- what to say in caveman language if your sister, Natalie, just got back from Florida
- telling the National Security Agency not to stand
14 Clues: opposite of "as is" • left on dirty clothes • luxuriously smooth fabric • opposite of "as isn't tmr" • Mascot of our humble university • potential result of sitting on a can • casual way to refer to your insect sibling • casual way to refer to your sibling, Natalie • telling the National Security Agency not to stand • if one were to use poor past-tense grammar not to stand • ...
Crossword 2023-07-19
6 Clues: A type of health insurance • Insurance which provides protection to farmer • An amount to be paid for a contract of insurance • A type of policy offered under property insurance • Supervises the functioning of insurance business in India • An insurance company providing business and cyber insurance
Computer Science 07 2020-01-22
Across
- xxx controls, methods to stop children accessing inappropriate content on the internet.
- xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
- act helps to protect intellectual property, copyright, designs and patents, written and recorded content
- xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
- xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
- if computer hardware is not recycled properly it can lead to
- xxx divide, Some people have greater access to technology than others
- xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
- possible result of impact of cyberbullying.
- unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
- xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
- Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
- xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
- xxx misuse act is the legislation that can be used to prosecute hackers
- Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection
15 Clues: possible result of impact of cyberbullying. • if computer hardware is not recycled properly it can lead to • xxx divide, Some people have greater access to technology than others • xxx misuse act is the legislation that can be used to prosecute hackers • unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop • ...
A Dog Day Afternoon 2019-02-20
Across
- A Crocheted Blanket
- Pampered Pooch
- Gives Directions
- PA State Dog
- Sniffs out Bad Guys
- Rescues Skiers
- The Most Famous is Uga
- Speed King
- Deutschland Herder
- Snoopy is One
Down
- Lassie Lineage
- Peek-a-boo Hairdo
- Short Legs Long Ears
- Mexican Mut
- Firehouse Favorite
- Yellow Go Getter
- Hot Dog Dog
- Sled Propeller
- Security Guard
- Ravishing Redhead
20 Clues: Speed King • Mexican Mut • Hot Dog Dog • PA State Dog • Snoopy is One • Lassie Lineage • Pampered Pooch • Rescues Skiers • Sled Propeller • Security Guard • Gives Directions • Yellow Go Getter • Peek-a-boo Hairdo • Ravishing Redhead • Firehouse Favorite • Deutschland Herder • A Crocheted Blanket • Sniffs out Bad Guys • Short Legs Long Ears • The Most Famous is Uga
The London life 2015-11-11
37 Clues: bus • bell • fine • loud • gate • keep • king • mean • safe • fähre • point • plane • youth • train • begin • stand • tower • queen • fight • throw • travel • square • flight • palace • danger • sights • ticket • famous • traffic • airport • respect • arrival • security • departure • escalator • detective • pickpockets
En avion! 2023-03-16
Across
- subway station
- airport
- boarding gate
- flight
- train station
- check in luggage
- abroad (in another country)
- world
- bus stop
- flight attendant (male)
- people
- ticket counter
Down
- country
- flight attendant
- exit
- plane ticket
- customs
- arrival
- round-trip ticket
- to take off (plane)
- to land (plane)
- to go through security
- capital
- countryside
- departure
25 Clues: exit • world • flight • people • country • customs • airport • arrival • capital • bus stop • departure • countryside • plane ticket • boarding gate • train station • subway station • ticket counter • to land (plane) • flight attendant • check in luggage • round-trip ticket • to take off (plane) • to go through security • flight attendant (male) • abroad (in another country)
Group 7 2018-03-18
20 Clues: 시골의 • 돈,화폐 • 감소하다 • 합의,일치 • 힘,정력,끈기 • 상상의,거짓의 • small,tiny • 눈에 띄는,두드러진 • make worse • skill,guile • 비겁한,비열한,소심한 • 자발적인 행위,의지,의도 • 얼룩이없는,아주 흠이없는 • 싸움을 좋아하는,도전적인 • group of five • 화해시키다,결말짓다,해결하다 • safety,protection • copy,reproduction • 사이에 끼다,사이에 있다,중재하다,간섭하다 • 두렵게 하여 비키게 하다,방해하다,단념하다
3EMES JOBS CROSSWORD PUZZLE 2023-09-17
Across
- marchand de poisson
- pharmacien
- keeper, commerçant
- grossiste
- couturière
- boulanger
- guard, agent de sécurité
- réparateur
- teinturier
- comptable
- traiteur
- sage-femme
- boucher
- chauffeur
Down
- kiné
- agent, agent immobilier
- officer, douanier
- chirurgien
- maire
- driver, chauffeur routier
- secouriste
- bijoutier
- peintre
- jardinier
- marin
- présentateur météo
- plombier
- attendant, hôtesse de l'air
28 Clues: kiné • maire • marin • peintre • boucher • traiteur • plombier • grossiste • boulanger • bijoutier • comptable • jardinier • chauffeur • pharmacien • chirurgien • couturière • secouriste • réparateur • teinturier • sage-femme • officer, douanier • présentateur météo • marchand de poisson • keeper, commerçant • agent, agent immobilier • guard, agent de sécurité • driver, chauffeur routier • attendant, hôtesse de l'air
Occupations and professions 2023-10-07
30 Clues: Guru • Sales • Supir • Kasir • Pilot • Polisi • Petani • Musisi • Dokter • Arsitek • Nelayan • Perawat • Tentara • Insinyur • Astronot • Penjahit • Pengacara • Pramusaji • Juru masak • Tukang kayu • Dokter gigi • Resepsionis • Dokter hewan • Tukang kebun • Pemandu wisata • Petugas keamanan • Pemadam Kebakaran • Pemain sepak bola • Pekerja konstruksi • Petugas kebersihan
Occupations and professions 2023-10-07
30 Clues: Guru • Kasir • Sales • Pilot • Supir • Dokter • Polisi • Musisi • Petani • Nelayan • Arsitek • Perawat • Tentara • Astronot • Penjahit • Insinyur • Pramusaji • Pengacara • Juru masak • Dokter gigi • Tukang kayu • Resepsionis • Tukang kebun • Dokter hewan • Pemandu wisata • Petugas keamanan • Pemadam Kebakaran • Pemain sepak bola • Petugas kebersihan • Pekerja konstruksi
Crossword History puzzle 2024-09-23
Across
- Renaissance
- Land Boom
- Security
- Age
- movement
- Civil Liberties Union (ACLU)
- Tuesday
- Naval ConferenEqual Rights Amendmentual rights amendment (ERA)
- Tariff Act
- on margin
Down
- League (ADL)
- Industrial Recovery Act
- of Women Voters
- Adjustment Administration (AAA)
- of Industrial Organizations (CIO
- WagnerAct
- Dome Scandal
- Conservation Corps (CCC)
- Progress Administration (WPA)
- Jones Industrial Average
20 Clues: Age • Tuesday • Security • movement • Land Boom • WagnerAct • on margin • Tariff Act • Renaissance • League (ADL) • Dome Scandal • of Women Voters • Industrial Recovery Act • Conservation Corps (CCC) • Jones Industrial Average • Civil Liberties Union (ACLU) • Progress Administration (WPA) • Adjustment Administration (AAA) • of Industrial Organizations (CIO • ...
Spa 2 Unit 3 Vocab Translation 2020-12-11
19 Clues: gate • arrival • customs • security • to arrive • departure • to pick up • bathing suit • boarding pass • to go through • to get in line • to check luggage • to get out money • to exchange money • to pack a suitcase • To board the plane • to confirm the flight • to look at the screen • to make a reservation
Stock Market Game Crossword 2024-12-10
Across
- Ownership share
- Gross domestic product
- Financial marketplace
- Return on investments
- Real state investment fund
- Valuable property
- Rising prices
- Profit distribution
- Pooled investment vehicle
Down
- Employee retirement plan
- Debt security
- Investment collection
- Cost of borrowing
- Mutual fund
- Exchange-traded fund
- Return on investment
- Potential loss
- Profit or loss
- Individual retirement account
19 Clues: Mutual fund • Debt security • Rising prices • Potential loss • Profit or loss • Ownership share • Cost of borrowing • Valuable property • Profit distribution • Exchange-traded fund • Return on investment • Investment collection • Financial marketplace • Return on investments • Gross domestic product • Employee retirement plan • Pooled investment vehicle • Real state investment fund • ...
¡Vamos de vacaciones! (Parte I) 2024-02-28
20 Clues: pilot • flight • airport • passport • the gate • to board • arrivals • traveler • departures • to go by plane • to go shopping • to take a trip • to take a boat • to take the train • to take the subway • traveler (masculine) • to check the luggage • to go through customs • to go through security • flight attendant (feminine)
Types of bulling 2022-10-24
Across
- harassment is to touch someone inappropriate to make them fell uncomfortable
- bullying is to hurt someone intentionally
- pressure is to force people to do some thing even if they don’t want to
- when someone give off suicidal signs
Down
- bulling it to tease someone
- making to make a decision to do good
- bulling is to make fun of someone online
7 Clues: bulling it to tease someone • making to make a decision to do good • when someone give off suicidal signs • bulling is to make fun of someone online • bullying is to hurt someone intentionally • pressure is to force people to do some thing even if they don’t want to • harassment is to touch someone inappropriate to make them fell uncomfortable
Tinkerers Lab + Kludge 2023-03-27
Across
- What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
- Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
- What animal could a firefox be called
- What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
- What does the T in reCAPTCHA stand for
- A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
- WinVru was the virus first made for which OS
- According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
- The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
- What does the first "D" stand for in the common cybercrime known as a DDoS attack?
- A makeshift solution to a problem, especially a computer or programming problem.
- A computer connected to a network that a hacker has compromised
- The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
- What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
- A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
- Hacking for a cause
- A person who enjoys fixing and experimenting with machines and their parts.
- What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt
18 Clues: Hacking for a cause • What animal could a firefox be called • What does the T in reCAPTCHA stand for • WinVru was the virus first made for which OS • A computer connected to a network that a hacker has compromised • A person who enjoys fixing and experimenting with machines and their parts. • ...
Crossword 2019-07-17
Across
- Internet Fraud
- Violation of SLA or Security rule
- A common term used both in hospitals and in IT.
- Combination of practices, and tools that increases ability to deliver services at high velocity.
- Process that ensures and confirms a user’s identity
- Title of current Week.
- A network security device that monitors traffic to or from your network
Down
- A set period of time during which specific work has to be completed.
- What does 'FI' stands for in WI-FI.
- This you should never share with anyone.
- A task or process should always be________.
- A collection of rules that determine the way of communication between computers.
- An Agile way to manage a project.
- The 'R' in RIO stands for
14 Clues: Internet Fraud • Title of current Week. • The 'R' in RIO stands for • Violation of SLA or Security rule • An Agile way to manage a project. • What does 'FI' stands for in WI-FI. • This you should never share with anyone. • A task or process should always be________. • A common term used both in hospitals and in IT. • Process that ensures and confirms a user’s identity • ...
cc 2025-02-18
Across
- A security update that must be applied immediately
- If you observe a security breach, where should you report it ?
- A security principle that ensures data is available when needed
Down
- A security principle that ensures that data is not accessed by unauthorized parties
- A digital wall that prevents unauthorized users from accessing a network
- A lock that needs a fingerprint
6 Clues: A lock that needs a fingerprint • A security update that must be applied immediately • If you observe a security breach, where should you report it ? • A security principle that ensures data is available when needed • A digital wall that prevents unauthorized users from accessing a network • ...
U03 CH4 Key Terms 2024-02-27
Across
- Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
- traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
- (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
- (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
- (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
- conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
- methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
- (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
- (4,3,4) Passwords, passphrases, or PINs are all examples
- (4,3,4) Smart cards and security key fobs are both examples
- (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- controls what a user can and cannot do on the network after successful authentication.
- (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
- Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
- replaces data with authentic looking values to apply anonymity to the data records.
15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are both examples • replaces data with authentic looking values to apply anonymity to the data records. • controls what a user can and cannot do on the network after successful authentication. • ...
May 2021 Newsletter Crossword Puzzle 2021-05-07
Across
- The name of the Wi-Fi network that is being set up.
- An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
- Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
- An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
- Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
- A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
- Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
- The speed at which data is transmitted and received among the devices on your wireless network.
- Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
- A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.
10 Clues: The name of the Wi-Fi network that is being set up. • The speed at which data is transmitted and received among the devices on your wireless network. • A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data. • ...
It words 2024-12-17
Across
- The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
- An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
- The maximum rate of data transfer across a given path, measured in bits per second (bps).
- A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
- A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- The practice of dividing a network into two or more smaller networks, improving performance and security.
- A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
- The creation of a virtual version of something, such as a server, a storage device, or network resources.
- The delay before a transfer of data begins following an instruction for its transfer.
10 Clues: The delay before a transfer of data begins following an instruction for its transfer. • The maximum rate of data transfer across a given path, measured in bits per second (bps). • The practice of dividing a network into two or more smaller networks, improving performance and security. • ...
Coding 2022-06-10
Across
- relating to or characteristic of the culture of computers, information technology, and virtual reality
- the process or activity of writing computer programs
- Lines of code
- involving or relating to the use of computer technology
- A type of code
Down
- The creator of a computer program
- relating to, using, or denoting a system of numerical notation that has 2 rather than 10 as a base.
- the set of instructions, or a system of rules, written in a particular programming language
- the state of being free from public attention
9 Clues: Lines of code • A type of code • The creator of a computer program • the state of being free from public attention • the process or activity of writing computer programs • involving or relating to the use of computer technology • the set of instructions, or a system of rules, written in a particular programming language • ...
