cyber security Crossword Puzzles
Bullying 2022-11-15
Across
- True or False 1 in 5 people between the ages of 8 and 15 have been cyber bullied
- True or False does everyone realise they are bullying
- you should be an _____ if you see bullying occur
- when you bully someone with words
- why do people behave different online
Down
- when you bully online
- _____.com is a place where you can go to get help for bullying
- when you bully someone by touching them
- who do you talk to when you have a problem with bullying
9 Clues: when you bully online • when you bully someone with words • why do people behave different online • when you bully someone by touching them • you should be an _____ if you see bullying occur • True or False does everyone realise they are bullying • who do you talk to when you have a problem with bullying • _____.com is a place where you can go to get help for bullying • ...
e-commerce 2020-12-03
Across
- Si dice lo sia il lavoro agile
- software progettato per simulare una conversazione con un essere umano
- parola che serve per identificare un documento o per compiere ricerche in un database
Down
- Applicativo web più utilizzato per le videoconference
- vendere un prodotto senza possederlo materialmente in magazzino
- attività per migliorare il posizionamento di contenuti
- Lo è la sicurezza online
- Page utilizzata come destinazione di link o pubblicità
- paradigma di erogazione di servizi offerti su richiesta da un fornitore a un cliente finale
9 Clues: Lo è la sicurezza online • Si dice lo sia il lavoro agile • Applicativo web più utilizzato per le videoconference • attività per migliorare il posizionamento di contenuti • Page utilizzata come destinazione di link o pubblicità • vendere un prodotto senza possederlo materialmente in magazzino • software progettato per simulare una conversazione con un essere umano • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Human Rights 2020-12-14
GDHSRJHS 2019-08-10
Spelling 34 2020-06-14
16 Clues: but • save • simple • how loud • finished • flat land • ____ a sound • keeping safe • straight ahead • how you respond • angry dog sounds • knocking over pins • the lesson learned • where it should be • the people in the world • what you do with a question
Dog Breeds 2019-02-20
16 Clues: Speed King • PA State Dog • Snoopy is One • Pampered Pooch • Lassie Lineage • Sled Propeller • Security Guard • Yellow Go Getter • Gives Directions • Ravishing Redhead • Peek-a-boo Hairdo • Firehouse Favorite • Deutschland Herder • A Crocheted Blanket • Sniffs out Bad Guys • The Most Famous is Uga
Credit Card 2023-11-02
Across
- - Common use
- - Cost of borrowing
- - Cost of purchases
- - Financial institution
- - Spending cap
- - Card material
- - Buying goods or services
- - Where charges are recorded
Down
- - Use now, pay later
- - Key benefit
- - First credit card company
- - Financial trust
- - Money owed
- - Protection against theft
- - Card provider
- - Transaction method
16 Clues: - Common use • - Money owed • - Key benefit • - Spending cap • - Card provider • - Card material • - Financial trust • - Cost of borrowing • - Cost of purchases • - Use now, pay later • - Transaction method • - Financial institution • - Protection against theft • - Buying goods or services • - First credit card company • - Where charges are recorded
Gunsss 2024-11-19
16 Clues: A gun • Weapons • US lawmakers • Citizen army • Long firearm • Interest group • Safety measures • Change to a law • Fundamental laws • Tool for defense • Lawmaking process • A problem or topic • To control something • Causing disagreement • Someone who lives through hardship • control Regulation of firearms
UNICEF Crossword 2024-04-11
16 Clues: School • Security • To defend • Look after • Misuse of power • For every child • Future builders • Make a difference • No one left behind • Keeps out the storm • Wishful expectation • Kind heart's reward • Cheerful expression • Good to be together • Should be a priority • An eradicated disease
Bullying 2020-06-07
Across
- they bully you with a screen.
- its bad otherwise the person you hurt will become
- This bullying is very bad because it makes people sad,scared.
Down
- This bullying makes people sad and depressed
- can not only mentally hurt someone but get people physically hurt.
- This bullying makes people lonely and sad and depressed.
- you.
7 Clues: you. • they bully you with a screen. • This bullying makes people sad and depressed • its bad otherwise the person you hurt will become • This bullying makes people lonely and sad and depressed. • This bullying is very bad because it makes people sad,scared. • can not only mentally hurt someone but get people physically hurt.
cyber safety 2013-11-07
6 Clues: mail sent electronically • some on that bullies others electronically • something people give your computer to harm it • someone that steals your details electronically • something used to keep your details safe and private • something on your computer that protects you from hackers and viruses
Orion's Gauntlet (Symbolism) 2026-03-18
6 Clues: is indicative of ammunition • denotes the formation’s reach • represents their offensive capability • is a color associated with Field Artillery units • signify the five domains: cyber, space, air, ground, and sea • shape device refers to the defensive role of the 3D Multi-Domain Task Force
Computer Science 07 2020-01-22
Across
- xxx controls, methods to stop children accessing inappropriate content on the internet.
- xxx seeking and self obsession, negative things could we say the use of selfies and social media have brought?
- act helps to protect intellectual property, copyright, designs and patents, written and recorded content
- xxx commons attribution, Work can be shared, copied or modified. Credit to copyright holder given --- share a like, Modified works can only be distributed with the same licence terms as the original - none commercial, Nobody can use the copyrighted work for profit -- no derivative works, The work can be copied and distributed but can be modified or built on
- xxx of Information Act, Allows members of the public to access information held on computer systems by public organisations, Government departments parliament councils armed forces NHS police schools and universities,
- if computer hardware is not recycled properly it can lead to
- xxx divide, Some people have greater access to technology than others
- xxx the sending of sexually explicit messages or images to other people. This is now illegal and can lead to prosecution.
Down
- possible result of impact of cyberbullying.
- unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop
- xxx xxxxxx Prolonged exposure to display screens. Reduced by regular breaks correct lighting and distance away from monitor
- Causing public arguments or distress with other online users by posting aggressive or inflammatory comments.
- xxx National security or harmful information or for future publication, the Freedom of information act is xxx for these types of information
- xxx misuse act is the legislation that can be used to prosecute hackers
- Protection Act, xxxx xxxxxxxxxx xxx Data need only be used in a fair and lawful way - Data must only be used for the specified purpose - Data should be adequate relevant and not excessive for the specified use - Data must be accurate and kept up to date - Data should not be kept longer than is necessary - The right of the data subject must be observed - Data should be kept safe and secure - Data should not be transferred abroad without adequate protection
15 Clues: possible result of impact of cyberbullying. • if computer hardware is not recycled properly it can lead to • xxx divide, Some people have greater access to technology than others • xxx misuse act is the legislation that can be used to prosecute hackers • unauthorized access to computer files and cyber crime, Computer Misuse Act hope to stop • ...
Introduction Revision 2026-02-27
Across
- Poorly developed urban settlements lacking basic services.
- Rapid East Asian economic growth from the 1960s–1990s.
- The five main divisions of Asia-Pacific (South, Southeast, etc.).
- Reducing economic dependence between major economies.
- Ability to read and write; improved across the region.
- The diplomatic recognition that there is only one Chinese government, led by the PRC.
Down
- Southeast Asian regional organisation.
- The increasing movement of people from rural to city areas.
- Uneven distribution of income and wealth.
- Security dialogue between US, India, Japan and Australia.
- China’s global infrastructure strategy (abbreviation).
- Dominance of one state over others.
- A major issue affecting millions living on less than one dollar per day.
- 2021 security pact between Australia, UK and US.
14 Clues: Dominance of one state over others. • Southeast Asian regional organisation. • Uneven distribution of income and wealth. • 2021 security pact between Australia, UK and US. • Reducing economic dependence between major economies. • Rapid East Asian economic growth from the 1960s–1990s. • China’s global infrastructure strategy (abbreviation). • ...
Applying for Jobs and Housing 2023-02-01
Across
- Federal and state aid for limited income
- Unable to work and has enough work credits
- Supplemental security income
- unable to work at least 12 months due to disability
- Prohibits discrimination against disabilities
Down
- Makes fair to person with proven need
- An individual who can do essential requirements
- Action requiring difficulty or expense
- For people 65 and older or listed disabilities
- Social security disability insurance
- Americans with Disabilities Act
11 Clues: Supplemental security income • Americans with Disabilities Act • Social security disability insurance • Makes fair to person with proven need • Action requiring difficulty or expense • Federal and state aid for limited income • Unable to work and has enough work credits • Prohibits discrimination against disabilities • For people 65 and older or listed disabilities • ...
HIPAA Compliance 2023-10-05
Across
- Health _________ ________ ________ ________
- Ensuring the security, privacy, and protection of patients' healthcare data
- Text messages are not ___________ and should never be used to discuss PHI
- __________ of _________ __________
- The act of adhering to federal healthcare laws and regulations
Down
- MEDICAL RECORDS RELEASE FORM This must be signed by the patient in order to obtain a copy of their medical records
- Never share your _________ with anyone
- OF CONDUCT
- _______ is your right to decide when, how, and to what extent others may access your health information
- An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information
- The digital version of medical records
- _________ Health ____________
12 Clues: OF CONDUCT • _________ Health ____________ • __________ of _________ __________ • Never share your _________ with anyone • The digital version of medical records • Health _________ ________ ________ ________ • The act of adhering to federal healthcare laws and regulations • Text messages are not ___________ and should never be used to discuss PHI • ...
Supranationalism 2021-01-04
Across
- mediates disputes among its member states and supports their political, cultural, economic, and social pursuits
- promotes unity and solidarity and spurs economic development in Africa
- organization governing common economic, social, and security issues in its European member states
- trading bloc between the countries of North America
- military alliance of countries in Western Europe and North America
Down
- high-level intergovernmental organization that manages issues such as sustainable development in the Arctic region
- integrates economies among its 4 member states (Argentina, Brazil, Paraguay, Uruguay) and create a larger economic market
- global international organization that maintains peace and security and promotes economic and social development
- maintains peace and security and accelerates economic growth in Southeast Asia
9 Clues: trading bloc between the countries of North America • military alliance of countries in Western Europe and North America • promotes unity and solidarity and spurs economic development in Africa • maintains peace and security and accelerates economic growth in Southeast Asia • ...
Sambas Riot 1999 2020-11-23
Only specific people can solve this 2025-11-03
11 Clues: Chef • Soldier • Gunsmith • Gardener • Leader/Boss • Security/Sniper • Pilot Apprentice • Technician/Pilot • Chef's Apprentice • Gunsmith Apprentice • Gunsmith Apprentice x2
Imagined Universes Exploration 2022-11-30
18 Clues: fam! • ..... • green. • release • Marvel. • impartial • intentional • not Feng Shui. • somewhat united. • free from danger. • what we're doing. • it's enlightening. • related to fingers. • once upon many times. • believed to exist or be so. • where everything is perfect. • addictive song for some people. • we mean authentic, not powerful.
Hollywood Bowl 2023-07-28
18 Clues: Ops Boss • P90 Cook • Boston P90 • Ex PAAS Ops • Russian Ops • Ops Magician • Before Dreima • House Manager • Bowl Security • Human Resources • Before Angelina • Before "X" Gate • Burgundy Uniform • Graphic Designer ops • The bowl sister venue • 91 year old conductor • Venezuelan LA Phil Conductor • Who can get me a wheelchair?
CMPC Puzzle 2013-11-25
Across
- The abbreviation, CMC , stands for Classified Matter __________.
- Classification level must be marked on the __________ and bottom of all pages of a classified document.
- Cover sheets are required on a document when __________ from a GSA-approved security container.
- The __________ is responsible for applying appropriate classification markings on a printed e-mail message.
- A classified working paper must be finalized or __________ after a 180 day retention period.
- You must have a Q-Clearance and assigned authorities to review classified matter with a _________ caveat.
- Using an inner and outer envelope to transmit a classified document is considered __________ __________. (2 words)
- Individual responsible for reviewing a document prior to dissemination outside the laboratory is called a __________ classifier.
- A classified __________ receipt must be used when mailing/transferring accountable and secret information outside the Laboratory.
- Classifier information for parts is maintained on the __________.
- In addition to proper clearance, sigma authorities, and required training, what does an individual require for accessing/view classified matter? (3 words, no spaces).
- Classified mail must be delivered to a primary/alternate CMC or other __________ individual at a designated classified mail stop.
- FedEx service cannot be used on __________ or day before a holiday.
- Addresses for recipients of classified matter shipped outside the laboratory must be verified by accessing the Mail __________ Directory.
- Workers must obtain originator approval before reproducing classified matter marked with ORCON, Sigma 14, or __________ caveats. (1 word+number – no space)
- You should never leave a security container _____.
- __________ identify special handling instructions and dissemination requirements.
- The only form you are allowed to write down the combination to a security container is the SF700 __________. (1 word+number – no space)
- Top Secret, Secret, and Confidential are classification __________.
Down
- The retention period for the SF70 is __________ months past the last date of entry.
- Protection methods used for classified matter are referred to as physical, visual, and __________ protection.
- All accountable matter must be assigned a __________ identifier, such as a document number, barcode, or serial number.
- Receipts must be retained for 2 years for Secret and __________ matter.
- RD, FRD, and NSI are abbreviations for classification __________.
- Shredders to be used for destruction of classified matter must be __________ before destroying classified matter.
- Secret level documents can be sent outside the laboratory using __________ mail or FedEx.
- Highest level and category of information and “L” cleared worker can access. __________ (abbreviation)
- The caveat ORCON identifies what type of classified matter? (2 words, no space)
- When do you report a security event or incident?
- You get approval of the destruction method from __________ when preparing to destroy classified parts. (1 word+number – no space)
- What category of classified document does not require a category admonishment marking? __________ (abbreviation)
- If a __________ copier has an image overwrite security feature and is clearly marked, you do not need to power down the machine for 30 seconds.
- All classified matter must be __________ and brought up to current marking standards when released from LANL or a multi-site work group.
- __________ copiers are cleared by running three blank pages using same process for copying.
- __________ are not a type of classified matter.
35 Clues: __________ are not a type of classified matter. • When do you report a security event or incident? • You should never leave a security container _____. • The abbreviation, CMC , stands for Classified Matter __________. • RD, FRD, and NSI are abbreviations for classification __________. • Classifier information for parts is maintained on the __________. • ...
AI in Cyberspace: Beyond the Hype 2025-03-07
Across
- A term often paired with "learning" in AI advancements.
- The practice of protecting computer systems from threats.
- A type of network modeled after the human brain.
- AI systems designed to operate without human intervention.
Down
- Related to intelligence that mimics human decision-making.
- The use of AI to protect cyberspace from cyber threats.
- A step-by-step procedure used in AI for decision-making.
- The process AI systems undergo to improve performance.
8 Clues: A type of network modeled after the human brain. • The process AI systems undergo to improve performance. • The use of AI to protect cyberspace from cyber threats. • A term often paired with "learning" in AI advancements. • A step-by-step procedure used in AI for decision-making. • The practice of protecting computer systems from threats. • ...
CYBERCRIME INVESTIGATION (PUZZEL) 2021-07-12
Across
- a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
- Internet Auctions online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
- and thefts stealing( money, property), e.g. credit card fraud, intellectual property violations ( a.k.a piracy)
- The Salami Slice an employee sets up a dummy account in the company’s computerized records. A small amount-even a few pennies- is subtracted from customers’ account and added to the account of the thief.
- visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- or Cartridges these can be used to store copies of files from the computer for use in his investigation
- market economic activity undertaken via the internet or similar electronic communication networks.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- Internet Securities Fraud some criminals make use of internet chat rooms in their fraudulent schemes.
- The Logic Bomb a program is secretly attached to the company’s computer system. The new program monitors the company’s work and wait for a sign of error to appear, some illogic that was designed for the computer to follow. Illogic causes the logic bomb to kick into an action and exploit the weakness.
- Property property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- Screwdrivers and other tools used to dismantle the hardware for seizure.
- terrorism terrorist activity that targets computer networks and information systems for attack.
- any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- Horses malicious software programs which are infiltrated into computers disguised as benign applications or data.
- leakage a person illegally obtains data from a computer system by leaking it out in small amounts.
- Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- stalking stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- of Service an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
Down
- crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
- doing psychological harm to, or inciting physical harm against others, thereby breaching laws relating to the protection of the person, e.g. hate speech, stalking.
- political activism and social protest that uses hacking tools and techniques
- a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- most computer programs used in business have built-in anti-theft safeguards. However employees can use a repair or maintenance program to supersede the antitheft program. Some tinkering with the program is required, But the “super-zapper” is soon able to order the system to issue checks to his or her private account.
- Software or malware a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- pornography breaching laws on obscenity and decency
- those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
- Defacement the activity of altering the code organizing a website so as to alter the visible screen content.
- The Trojan Horseone computer is used to reprogram another for illicit purposes.
- remember that often, latent prints can be taken from disks or other storage media or hardware.
- Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- Camera equipment to videotape and photograph the scene.
- Society a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- Crime criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
- the act of copying digital material posted online into the storage medium on one’s computer.
- materials rubber bands, tape, boxes, bubble wrap, and if he does not have access to anti-static wrap, paper bags should be used, because they have less static charge than plastic bags.
- Rights legally institutionalized rights to own and control goods.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- Impersonationan unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- Sharing the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
- the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- Privacy the right to be left alone; freedom from observation and interference from others.
- the interactional space or environment created by linking computers together into a communication net5work.
- to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
50 Clues: pornography breaching laws on obscenity and decency • Camera equipment to videotape and photograph the scene. • Rights legally institutionalized rights to own and control goods. • Screwdrivers and other tools used to dismantle the hardware for seizure. • political activism and social protest that uses hacking tools and techniques • ...
Ashley and Jen 2024-12-08
17 Clues: artsy girl • crazy kitty • furry Buddha • your hangout • where we met • favorite boy • kitty comfort • I love you time • month we met f2f • your happy place • Ms. Independence • anniversary month • not jens favorite • furry favorite boy • your birth day date • our favorite flowers • home security system
Its a money thing 2026-01-06
17 Clues: Home loan • Money owed • Loan length • Having a job • No collateral • Loan security • Rate benchmark • Loan time units • Amount borrowed • Changeable rate • Day you get paid • Backed by assets • Cost of borrowing • loans Car financing • score Borrower rating • rate Unchanging interest • business loans Business funding
The London life 2015-11-11
36 Clues: bus • loud • fine • bell • gate • mean • keep • safe • king • throw • train • queen • tower • youth • plane • fight • fähre • begin • point • stand • square • ticket • flight • travel • palace • danger • famous • traffic • respect • airport • arrival • security • detective • escalator • departure • pickpockets
DO YOU KNOW NWACC? 2017-04-27
Across
- 1989 accredited by
- BH street address
- 1st NWACC president
- Inspire _____
- 1st DIR NWACC Homeland Security
- Place for Kudos
- Shipping/Receiving address
- Adult Ed Bldg
Down
- NWACC mascot
- Springdale hub
- school without _____
- empower _____
- Shewmaker Global CTR
- BOT chair
- Current president
- New CTR Food Study
- Minimart in SC
- Strengthen _____
- August 21, 2017
- Year of first NWACC hires 19--
20 Clues: BOT chair • NWACC mascot • empower _____ • Inspire _____ • Adult Ed Bldg • Springdale hub • Minimart in SC • August 21, 2017 • Place for Kudos • Strengthen _____ • BH street address • Current president • 1989 accredited by • New CTR Food Study • 1st NWACC president • school without _____ • Shewmaker Global CTR • Shipping/Receiving address • Year of first NWACC hires 19-- • 1st DIR NWACC Homeland Security
P.J. MacLayne 2017-11-19
Across
- Dog
- neutral territory
- enemy pack
- The ____ Flamingo
- red convertible
- security chief
- found in empty book
- Harmony's last name
- blue Pinto
- number of steps to the library
- Dot's transportation
- Gavin's pack
Down
- wolves kryptonite
- chief librarian
- The Marquesa's _______
- gentleman jewel thief
- Harmony's landlord
- police detective
- Where Tasha trained
- type of home
- FBI agent
- Florida businessman
22 Clues: Dog • FBI agent • enemy pack • blue Pinto • type of home • Gavin's pack • security chief • chief librarian • red convertible • police detective • wolves kryptonite • neutral territory • The ____ Flamingo • Harmony's landlord • Where Tasha trained • found in empty book • Harmony's last name • Florida businessman • Dot's transportation • gentleman jewel thief • The Marquesa's _______ • ...
Dog Breeds 2019-02-20
Across
- Mexican Mut
- Security Guard
- A Crocheted Blanket
- Deutschland Herder
- Speed King
- Firehouse Favorite
- Sniffs out Bad Guys
- Sled Propeller
- Peek-a-boo Hairdo
- Gives Directions
- Ravishing Redhead
- Hot Dog Dog
Down
- Rescues Skiers
- Yellow Go Getter
- PA State Dog
- The Most Famous is Uga
- Short Legs Long Ears
- Snoopy is One
- Pampered Pooch
- Lassie Lineage
20 Clues: Speed King • Mexican Mut • Hot Dog Dog • PA State Dog • Snoopy is One • Rescues Skiers • Security Guard • Sled Propeller • Pampered Pooch • Lassie Lineage • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Crocheted Blanket • Sniffs out Bad Guys • Short Legs Long Ears • The Most Famous is Uga
OS types 2024-04-30
Across
- turvalisus
- arendama
- ennustus
- määrama (mälu, ressurssi)
- arve
- sisend
- viivitus
- väljund
- konto, arve
- tabeliprogramm, arvutustabel
- pakk (töötlusüksuste (nt töödete) kogum)
- arvutama
- eemaldama
- talletama
- salasõna, parool
- liides
Down
- majanduslik, tulus
- laiendus, pikendus
- tuum
- luba
- korras hoidma, hooldama, teenindama
- lubama, võimaldama
- multitegumtöö
- saadaval, kättesadav
- looma
- vahnd, võimalus, funktsioon
- ligipääs
- suurarvuti
28 Clues: tuum • luba • arve • looma • sisend • liides • väljund • arendama • ennustus • viivitus • ligipääs • arvutama • eemaldama • talletama • turvalisus • suurarvuti • konto, arve • multitegumtöö • salasõna, parool • majanduslik, tulus • laiendus, pikendus • lubama, võimaldama • saadaval, kättesadav • määrama (mälu, ressurssi) • vahnd, võimalus, funktsioon • tabeliprogramm, arvutustabel • korras hoidma, hooldama, teenindama • ...
Robo Cap. 2 Vocabulario 2023-02-20
Across
- to shout, yell, shriek
- drives
- nickname for Costa Ricans
- security
- earthquake
- gardener
- to explain
- Pure life
- capital de Costa Rica
- rivers
- building
- doctors
- bamboo
- they get off (the plane)
- estate,ranch
Down
- toward
- chauffeur
- dictator
- trees
- seismic activity
- golf cart
- shouts, yells, shrieks
- to get off a mode of transportation
23 Clues: trees • toward • drives • rivers • bamboo • doctors • dictator • security • gardener • building • chauffeur • golf cart • Pure life • earthquake • to explain • estate,ranch • seismic activity • to shout, yell, shriek • shouts, yells, shrieks • capital de Costa Rica • they get off (the plane) • nickname for Costa Ricans • to get off a mode of transportation
Dog Breeds 2023-03-25
Across
- He’s a Fighter
- Ears are longer then legs
- Georgia's Uga
- Firehouse Favorite
- Gives Directions
- Lassie Lineage
- Little Rascal Petey
- PA State Dog
- Sled Propeller
- Ravishing Redhead
Down
- Peek-a-boo Hairdo
- Deutschland Herder
- Yellow Go Getter
- Snoopy is One
- The Crime Dog
- Security Guard
- Has an ugly Mug
- Speed King
- A Footlong Hot Dog
- Pampered Pooch
20 Clues: Speed King • PA State Dog • Snoopy is One • Georgia's Uga • The Crime Dog • He’s a Fighter • Security Guard • Lassie Lineage • Pampered Pooch • Sled Propeller • Has an ugly Mug • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Footlong Hot Dog • Little Rascal Petey • Ears are longer then legs
Travel vocab with accents Sp 2 2021-05-12
29 Clues: seat • coach • aisle • window • luggage • layover • on time • delayed • arrival • customs • seatbelt • passport • suitcase • train car • passenger • departure • controller • connection • ticket (2) • ticket (1) • first class • second class • trip, travel • event ticket • waiting room • security agent • in the airport • carry-on luggage • International airport
HATCHET VOCABULARY 2024-03-13
Across
- hence indistinct
- amount
- amount of fuel entering an engine
- caught on fire
- rounded hills
- travel on water and land
- engrossing completely
- height
- very careful way
Down
- burning sulfur in odor
- without knowledge
- make steady
- lessen
- violent twisting
- sorrowful way
- hindquarters
- shrinking back involuntarily
- crime or attack
- rejoice greatly
- existing in the earlies time
20 Clues: lessen • amount • height • make steady • hindquarters • sorrowful way • rounded hills • caught on fire • crime or attack • rejoice greatly • violent twisting • hence indistinct • very careful way • without knowledge • engrossing completely • burning sulfur in odor • travel on water and land • shrinking back involuntarily • existing in the earlies time • amount of fuel entering an engine
Crime and safety 2025-07-10
Across
- – xavfsizlik
- – xodim (politsiya yoki rasmiy)
- – adolat
- – xavf
- – politsiya
- – guvoh
- – xavfsizlik (umumiy)
- – xabar bermoq / hisobot
- – zo‘ravonlik
- – qoidalar
- – o‘g‘irlik
- – himoya qilmoq
- – turmada (qamoqda)
- – talonchilik
- – jamoa / aholi
Down
- – favqulodda holat
- – oldini olish
- – jarima
- – sud
- – qamoqxona
- – jazo
- – qonun
- – gumon qilinuvchi
- – jinoyat
- – kuzatuv kamerasi
- – hibsga olish
- – qo‘riqchi
- – qonuniy
- – tahdid
- – jabrlanuvchi / qurbon
30 Clues: – sud • – xavf • – jazo • – qonun • – guvoh • – jarima • – adolat • – tahdid • – jinoyat • – qonuniy • – qoidalar • – qamoqxona • – politsiya • – qo‘riqchi • – o‘g‘irlik • – xavfsizlik • – zo‘ravonlik • – talonchilik • – oldini olish • – hibsga olish • – himoya qilmoq • – jamoa / aholi • – favqulodda holat • – gumon qilinuvchi • – kuzatuv kamerasi • – turmada (qamoqda) • – xavfsizlik (umumiy) • – jabrlanuvchi / qurbon • ...
TẬP SỰ - DAY 6 - POSITIONS & DEPARTMENTS 2022-07-28
20 Clues: lễ tân • trợ lý • thư ký • cổ đông • quản lý • kế toán • giám đốc • phòng kho • phó chủ tịch • phòng bảo trì • phòng nhân sự • phòng an ninh • phòng kế toán • phòng sản xuất • người giám sát • phòng mua hàng • phòng kế hoạch • phòng tiếp thị • phòng kinh doanh • phòng quản lý chất lượng
Autumn 2022-12-14
26 Clues: Lee • Bob • Mae • Pond • Dory • Cronk • Mooska • Barbie • the Jr • The Rose • MeatHead • Lil Hulk • lil Rickey • The Senior • married in • Older Sister • Master Hunter • Expiriment 626 • Younger Sister • Old Blues Owner • Sister in heart • Spoke "Nataleese" • Hulks big brother • Same as her Gramma • Presidential Security • the family hairdresser
MMHC 2025-08-30
23 Clues: Fund • Blaine • Thomss • Claire • Blanche • ____ Roy • Tall Mike • Restrains • MSW Sykes • Fig or Greg • Eddie&Eddie • Beland & Ames • Joan on Quine • Next to Annex • CPS Secretary • Drove a Porche • Health Care Unit • Not so marvelous • Transpotation Boss • Coffee Break place • Head Social Worker • Old Lady Social Worker • Building for sewing, cooking,
Cyber safety- Alyssa Di-campli 2016-05-24
Across
- connected to a computer
- when an adult tries to start a relationship with young children by pretending to be a child
- stores information you need
- a electronic device used to keep a record of something
- make the screen smaller and save it for later
- an anonymous person who makes you upset or angry by what they say
- a secret word that gains admission to a place
- a program used to monitor what you do
- small file that gets stored on your computer
- a fraud scheme
- rooms network that lets you communicate with others
Down
- searching for information
- lets you see things you searched up before
- a thing that pops up on your screen
- computer network providing information
- message from one electronic to another
- software something that helps prevent getting viruses
- not connected to Internet
- a person who uses computers to gain important data
- explore Internet by going from link to line
- trying to find a particular thing
- can mess up your computer
- how you get in to your computer
- to publish something on to a electronic
- instructions for a app that make it work
25 Clues: a fraud scheme • connected to a computer • searching for information • not connected to Internet • can mess up your computer • stores information you need • how you get in to your computer • trying to find a particular thing • a thing that pops up on your screen • a program used to monitor what you do • computer network providing information • ...
Cyber Ethics Puzzle by Arush 2025-05-20
Across
- Footprint: The trail of data you leave behind online
- The right to keep your personal information secure
- Unwanted or junk messages, often email
- A malicious program that spreads from device to device
- Converting data into a secret code
- Moral principles governing behavior
- Permission to use or access something
- Legal protection for original creative works
- Breach: Unauthorized access to private or confidential data
- A barrier that protects a network from threats
- A mutual understanding or contract between parties
Down
- Theft: Using someone else’s personal data without permission
- Software designed to harm or damage a device
- A secret word or phrase used to access accounts
- Trick to steal personal data through fake websites or emails
- Unauthorized access to computer systems or networks
- Media: Websites and apps for sharing and interacting online
- A person who posts offensive or annoying messages online
- A dishonest scheme to trick someone for personal gain
- Online harassment or bullying using digital platforms
20 Clues: Converting data into a secret code • Moral principles governing behavior • Permission to use or access something • Unwanted or junk messages, often email • Software designed to harm or damage a device • Legal protection for original creative works • A barrier that protects a network from threats • A secret word or phrase used to access accounts • ...
Stop Bullying 2021-11-19
Across
- a person who sees bullying and does the right thing
- a person who sees bullying and does nothing or helps the bully
- the kind of bullying involving words
- the kind of bullying when a person is left out
Down
- the kind of bullying when someone's body is hurt
- words that hurt feelings, but may not be bullying
- unkind behavior that may not be bullying
- when two people or groups are mean to each other
- the kind of bullying that happens on line
9 Clues: the kind of bullying involving words • unkind behavior that may not be bullying • the kind of bullying that happens on line • the kind of bullying when a person is left out • the kind of bullying when someone's body is hurt • when two people or groups are mean to each other • words that hurt feelings, but may not be bullying • ...
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : The practice of protecting devices and data from cyber threats
- : Bullying someone online through messages or social media
- : A system that blocks unauthorized access to or from a private network
- : Fake messages that try to steal passwords or bank info
Down
- : People who use the internet or computers to commit crimes
- : A harmful program that can damage files and software
- : Breaking into someone’s computer or account without permission
- : Criminal activities done using computers or the internet
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
TC Team 2021/22 2021-11-19
Across
- The sponsor for the Space & Environment stream.
- The number of formal sessions in the Program.
- The sponsor for the Space & Security stream.
- This person studies Aeronautical Engineering and Science at USYD.
- This person studies Law and International Security at ANU.
Down
- The main deliverable in the Astra Program.
- The name of the formal sessions of the Astra Program.
- The sponsor for the Space & Industry stream.
- This person currently works as a Compliance and Administration officer.
- This person studies Aerospace Engineering and Commerce at Monash University.
- The speakers and presenters in the Astra Program. An acronym.
- This person studies Mechatronics Engineering and Computer Science at USYD.
- This person studies Law and Arts at Monash University.
13 Clues: The main deliverable in the Astra Program. • The sponsor for the Space & Industry stream. • The sponsor for the Space & Security stream. • The number of formal sessions in the Program. • The sponsor for the Space & Environment stream. • The name of the formal sessions of the Astra Program. • This person studies Law and Arts at Monash University. • ...
Data Privacy 2026-01-28
Across
- Major EU privacy regulation introduced in 2018
- Process of safely destroying data that is no longer needed
- Organization that processes data on behalf of a controller
- Data that directly identifies a person, like name or ID number
- Security method requiring more than one form of authentication.
- Person whose data is being collected and processed
- Permission given by a person for their data to be processed.
Down
- Organization that determines why and how data is processed
- Jamaica’s key legislation governing personal data protection.
- Restricting who can view or use certain information
- Unauthorized access or exposure of sensitive data.
- Fraudulent attempt to steal information via deceptive communication
- Process of converting information into unreadable code for security.
13 Clues: Major EU privacy regulation introduced in 2018 • Unauthorized access or exposure of sensitive data. • Person whose data is being collected and processed • Restricting who can view or use certain information • Organization that determines why and how data is processed • Process of safely destroying data that is no longer needed • ...
U03 CH4 Key Terms 2024-02-27
Across
- Authentication (11,14) uses at least two methods of verification. A security key fob is a good example. The two factors are something you know, such as a password, and something you have, such as a security key fob.
- traces an action back to a person or process making the change to a system, collects this information, and reports the usage data.
- (7,6,8) hardware and software solutions used to manage access to resources and systems. These technology-based solutions include tools and protocols that computer systems use for identification, authentication, authorization, and accountability.
- (4,11) is the use and practice of making the message confusing, ambiguous, or harder to understand.
- (8,6,8) actual barriers deployed to prevent direct contact with systems. The goal is to prevent unauthorized users from gaining physical access to facilities, equipment, and other organizational assets.
- conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage over cryptography is that the secret message does not attract any special attention.
- methods include Passwords, passphrases, or PINs. Smart cards and security key fobs. A unique physical characteristic, biometrics.
Down
- (10, 9) encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private.
- (4,3,4) Passwords, passphrases, or PINs are all examples
- (4,3,4) Smart cards and security key fobs are both examples
- (3,3,3) A unique physical characteristic, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- controls what a user can and cannot do on the network after successful authentication.
- (9,9) use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
- Technologies primarily based on maths and computer science for protecting information so that it is only accessible to authorised recipients.
- replaces data with authentic looking values to apply anonymity to the data records.
15 Clues: (4,3,4) Passwords, passphrases, or PINs are all examples • (4,3,4) Smart cards and security key fobs are both examples • replaces data with authentic looking values to apply anonymity to the data records. • controls what a user can and cannot do on the network after successful authentication. • ...
Logistics 2021-11-29
8 Clues: Any person • Least expensive dock • Free and Secure trade • Most commonly used dock • Container Security Initiative • Customs-Trade Partnership against terrorism • A substance or material that the USDOT says is unsafe • Provides the most security and protection from weather
Read articles to solve 2023-04-17
8 Clues: Morning runners • say how to fix it • Something that you cant buy • Data security and Encryption • Fiona's journey to Technical writing • security information and event management • instructions on how to use a product (Two words) • Does it explain clearly what went wrong? (Two words)
Gramm Leach Bliley 2021-11-09
La Crisis del Hambre en Africa 2019-10-10
Teachers at School 2025-04-08
Across
- ELPT
- Third grade teacher
- Language teacher in room 208
- Lunchroom worker
- Office clerk
- Interventionist
- Kindergarten teacher
Down
- Clinician
- Teaches middle school social studies
- Teaches driver's Ed
- Security guard
- PK SECA
- Cheer Coach and SECA
- Speech therapist
- Middle school science teacher
- Art teacher
- Common sub at LaSalle
17 Clues: ELPT • PK SECA • Clinician • Art teacher • Office clerk • Security guard • Interventionist • Speech therapist • Lunchroom worker • Teaches driver's Ed • Third grade teacher • Cheer Coach and SECA • Kindergarten teacher • Common sub at LaSalle • Language teacher in room 208 • Middle school science teacher • Teaches middle school social studies
Computer Language 2025-06-01
Across
- Data storage unit
- Internet safety term
- Computer type
- Computer input device
- Computer security term
- Computer operating system
- Computer graphics term
- Computer coding term
- Computer software
- Computer hardware part
Down
- Computer term
- Computer input device
- Webpage address
- Computer software term
- Programming language
- Computer graphics term
- Computer programming term
- Computer network term
- Computer network
- Computer coding term
20 Clues: Computer term • Computer type • Webpage address • Computer network • Data storage unit • Computer software • Internet safety term • Programming language • Computer coding term • Computer coding term • Computer input device • Computer input device • Computer network term • Computer software term • Computer security term • Computer graphics term • Computer graphics term • Computer hardware part • ...
SID 3b Hass im Netz 2021-04-30
Across
- Unwahre Nachrichten/Informationen im Internet
- Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun?
- Wenn jemand wegen seiner Herkunft oder Hautfarbe beleidigt wird, heißt das .......
Down
- Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden.
- Man sollte wegen ... -accounts im Internet vorsichtig sein.
- Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der...
- erfundene „Tatsachen“.
7 Clues: erfundene „Tatsachen“. • Unwahre Nachrichten/Informationen im Internet • Man sollte wegen ... -accounts im Internet vorsichtig sein. • Wenn man jemanden wegen Spam oder Hassreden sperren will- was tun? • Wenn jemand andere Leute im Netz beleidigt, sollte ......... werden. • Gesetze, wie Cyber-Mobbing, gelten nicht nur im Internet sondern auch in der... • ...
Terrorism Case Study - 9/11 2014-05-10
Across
- The Federal Aviation Administration, _____, ordered airlines to install bars on cockpit doors
- Hijackers aboard Flight 77 crash the plane into the western front of the
- The use of force or threats to frighten people and the government
- Agents that move to a country, blend into a community, and then carry out terrorist attacks Patriot / USA ______ Act was an anti-terrorism bill that strengthened the government's rights to detain foreigners suspected of terrorism
- Letters containing bacteria that cause _____ were sent to members of Congress
- The ________ and Transportation Security Act Law made airport security the responsibility of the federal government
- Terrorist group responsible for September 11th attacks.
Down
- _____ bin Laden was responsible for coordinating the attacks
- The fourth plane crashed in an empty field in ______ due to heroic passengers
- The Department of _______ Security was created to coordinate national efforts against terrorism
10 Clues: Terrorist group responsible for September 11th attacks. • _____ bin Laden was responsible for coordinating the attacks • The use of force or threats to frighten people and the government • Hijackers aboard Flight 77 crash the plane into the western front of the • The fourth plane crashed in an empty field in ______ due to heroic passengers • ...
Location & Venues 2018-11-18
Across
- Who played at the Cavern Club?
- What is a large venue likely to make more of?
- What sort of venue is a nightclub?
- Who was the lead singer for Queen?
- What does every venue need to make audiences safe?
- What is the missing word? The Royal ___ Hall?
Down
- What sort of venue is Manchester Arena?
- Who is the world's richest musician?
- What is the UK's largest music venue?
- What is another name for security guards?
10 Clues: Who played at the Cavern Club? • What sort of venue is a nightclub? • Who was the lead singer for Queen? • Who is the world's richest musician? • What is the UK's largest music venue? • What sort of venue is Manchester Arena? • What is another name for security guards? • What is a large venue likely to make more of? • What is the missing word? The Royal ___ Hall? • ...
Compliance Corner Crossword 2024-04-11
Across
- Alternate to filling out the Privacy security incident form
- Data Loss Prevention
- Health Insurance Portability and Accountability Act
- Personal Identifiable Information
- Provide this when reporting a privacy incident
- This type of incident has resulted in (or could result in) unauthorized use or disclosure of PII/PHI.
Down
- Website where you can find the privacy and security incident form
- Protected Health Information
- Who is responsible for reporting privacy incidents
- First action to recognizing a privacy incident
10 Clues: Data Loss Prevention • Protected Health Information • Personal Identifiable Information • First action to recognizing a privacy incident • Provide this when reporting a privacy incident • Who is responsible for reporting privacy incidents • Health Insurance Portability and Accountability Act • Alternate to filling out the Privacy security incident form • ...
Latin Crossword 2024-02-15
5-3a Rev 2023-04-21
Across
- Will forgo testing when directed by the 616 OC to implement an emergency remediation tasking.
- 616 OC will task _____ with Priority and Emergency vulnerability remediation actions.
- Organization that verifies compliance percentages via vulnerability scans provided by the organization responsible for the applicable assets.
- Are responsible for populating the AFIN 3% test group.
- Which RMF step is associated with formally authorizing the systems for operations.
- One of two types of VRO deployments.
- A process that is automated by the use of an application called eMASS.
- Which RMF step involves identifying org’s essential activities, mission, and security levels?
- Three overall IA areas or Contributing Factors (with Culture and Conduct).
- Is responsible for adding the ARAD and MECM Current Branch agents as permanent elements of all SDC/SSC baselines.
- PMOs may utilize _______ groups to isolate systems from AFIN-wide patches and updates.
Down
- responsible for remediating the remaining 5% of systems that are considered non-compliant.
- Implements a goal of 95% compliance of vulnerability remediation actions using enterprise remediation tools.
- A flaw or weakness in system security procedures, design, implementation, or internal controls that could be utilized by an adversary to breach the AFIN.
- Which RMF step is associated with verifying sec controls are implemented/operating correctly and producing desired outcome.
- The goal of the vulnerability remediation/mitigation process is to mitigate the risks associated with vulnerabilities through the implementation of ____.
- A DISA-led formal inspection designed to increase accountability and the security posture of DoD Information Networks according to DoD standards.
- Which RMF step is associated with maintaining ongoing S/A.
- One of two types of VRO deployments.
- Will alert the NOS when non-cliented systems rises to 10% or higher.
20 Clues: One of two types of VRO deployments. • One of two types of VRO deployments. • Are responsible for populating the AFIN 3% test group. • Which RMF step is associated with maintaining ongoing S/A. • Will alert the NOS when non-cliented systems rises to 10% or higher. • A process that is automated by the use of an application called eMASS. • ...
CNN Student News 11/4/13 2013-11-04
Across
- Continent where Iraq is located
- Largest religion in India
- World series champs home city
- Government group in charge of airport security
Down
- Annual Hindu festival in India
- Reason there was no NYC Marathon last year
- Nickname for the Affordable Care Act
- Mascot for all of the "Roll Call" schools on todays CNN Student News
- major concern for NYC Marathon organizers
9 Clues: Largest religion in India • World series champs home city • Annual Hindu festival in India • Continent where Iraq is located • Nickname for the Affordable Care Act • major concern for NYC Marathon organizers • Reason there was no NYC Marathon last year • Government group in charge of airport security • Mascot for all of the "Roll Call" schools on todays CNN Student News
SEC Crossword 2024-12-13
Across
- was a program intended for ______
- the SEC helped prevent _______ trading
- the SEC protects _________
- first chairman of the SEC (last name)
Down
- president that established the program (last name)
- the SEC has adapted to technological advancements like ______currency
- the SEC enforces ________ laws (singular)
- abbreviation for the main security exchange that was regulated
- number of divisions of the SEC as of 2024
9 Clues: the SEC protects _________ • was a program intended for ______ • first chairman of the SEC (last name) • the SEC helped prevent _______ trading • the SEC enforces ________ laws (singular) • number of divisions of the SEC as of 2024 • president that established the program (last name) • abbreviation for the main security exchange that was regulated • ...
EMR Teams 2022-09-14
Across
- Outpatient Facilities
- Laboratory(blood)
- Medical Records, OnBase, Rightfax
- charges generated in an outpatient setting
- Inpatient charges
- registration and scheduling
- baby delivery
- Dorothy
- all things surgery
Down
- Account provisioning
- Reports
- Cancer(oncology)
- I dont know how to do something
- Radiology
- Pharmacy
- Heart(cardiology)
- admitting discharges and transfers
- Emergency Department
- Admitted to a hospital floor
19 Clues: Reports • Dorothy • Pharmacy • Radiology • baby delivery • Cancer(oncology) • Laboratory(blood) • Heart(cardiology) • Inpatient charges • all things surgery • Account provisioning • Emergency Department • Outpatient Facilities • registration and scheduling • Admitted to a hospital floor • I dont know how to do something • Medical Records, OnBase, Rightfax • admitting discharges and transfers • ...
InfoSec Awareness Crossword Puzzle 2019-10-05
Across
- A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
- A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- A computer program that keeps a log of your keystrokes on your keyboard.
- A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
- A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
- A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- Protocol that is meant for uploading and downloading files.
- A bundle of programs that is designed to bombard users with advertisements.
- Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Down
- The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- The process by which two information systems establish a communication channel.
- The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- A bridge between two networks that connects using different protocols.
- Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- A firewall setting that separates LAN of an organization from the external network.
18 Clues: Protocol that is meant for uploading and downloading files. • A bridge between two networks that connects using different protocols. • A computer program that keeps a log of your keystrokes on your keyboard. • A bundle of programs that is designed to bombard users with advertisements. • ...
Safety Day Challenge 2024-05-29
16 Clues: PPE • GMP, ISO • Help desk • Gate Keeper • spare parts • Quality Process • Fall Protection • industrial truck • Lock out Tag out • To rid or remove • Product ready to ship • to perform maintenance • Emergency Response Team • Site communication Meeting • vessel to transport product • Personal Proctective Equipment
Teka Teki Silang 2026-02-10
Across
- – Subjek yang memanfaatkan layanan digital.
- – Aplikasi untuk membuka dan menjelajahi informasi di internet.
- – Proses membuktikan apakah suatu konten itu asli atau palsu.
- – Alamat unik yang digunakan untuk mengakses sebuah halaman web.
- – Sifat teknologi digital masa kini yang serba cepat.
- – Hak seseorang untuk melindungi data pribadinya di platform digital.
- – Jenis layanan digital untuk menyimpan uang elektronik.
- – Sifat data yang benar, tepat, dan dapat dipertanggungjawabkan
Down
- – Cara mengamankan data dengan mengubahnya menjadi kode rahasia.
- – Contoh mesin pencari yang paling populer di dunia.
- – Sebutan untuk dunia maya atau ruang digital.
- – Pesan massal yang tidak diinginkan dan seringkali berisi konten tidak valid.
- – Teknik menyaring informasi yang tidak diinginkan di mesin pencari.
- – (Data Set) Sekumpulan data mentah yang akan diolah.
- – Kecenderungan arah data yang naik atau turun dalam periode tertentu.
- – Dasar berpikir dalam melakukan analisis data.
16 Clues: – Subjek yang memanfaatkan layanan digital. • – Sebutan untuk dunia maya atau ruang digital. • – Dasar berpikir dalam melakukan analisis data. • – Contoh mesin pencari yang paling populer di dunia. • – (Data Set) Sekumpulan data mentah yang akan diolah. • – Sifat teknologi digital masa kini yang serba cepat. • – Jenis layanan digital untuk menyimpan uang elektronik. • ...
Module 1.1 2016-09-12
17 Clues: атлет • предок • крадій • вітчим • коріння • охорона • втікати • падчерка • покидати • збити куш • бути схожим • сторона сім'ї • історія сім'ї • розширенна сім'я • колишній чоловік • бути засудженим до в'язниці • бути родичем до (бути пов'язаним з)
Cellular Shenanigans 2025-10-15
17 Clues: a+b=c • antenna • no energy • watergate • stabilizer • water entry • energy needed • glucose entry • NA+ K and ions • no help needed • amount per area • almost always water • entry with security • any water substance • handicapped entrypoint • difference between areas • equal substance between area
Sambas Riot 1999 2020-11-23
AIRPORT VOCABULARY 2023-11-24
11 Clues: luggage • passport • suitcases • departure • planeticket • securitybelt • boardingpass • checkin counter • seat(on the plane) • gate(for boarding) • security checkpoint
Global Issues 2024-11-12
CPI New Hire 2020-10-20
Across
- Enables homeowners to answer the door and speak to visitors via two-way audio. (2 Words)
- Core Value - We will always deliver high-grade, superior products, services and communication with team members and internal and external customers. (2 Words)
- Our touchscreen all-in-one security system manufactured by2Gig.
- Provides security coverage for large windows in the home. (2 Words)
- Methods and procedures recommended by law enforcement and alarm industry professionals to reduce false alarms.
- Loud noise to alert occupants, intruders, and other nearby people that the alarm has been activated.
- The standard form of interior protection.
- Level of Protection - Window Decals and Yard Signs give an automatic warning that a potentially armed system is in the home.
- Core Value - We are truthful, sincere and forthright.
- Core Value - We agree to help others develop personally and professionally. (2 Words)
- Level of Protection - Video cameras in the home can help identify the intruder and give the police visual evidence to catch the intruder. (2 Words)
- Can tie in with other devices like the Fire Communicator and shut off the HVAC system in the event of fire to stop the spread of smoke throughout the home.
- This unit powers the app as well real-time communication during an alarm without the need for a telephone.
- Core Value - We will enjoy our work and will find ways to make everyone’s workday pleasant. (2 Words)
- The year CPI Security was founded.
Down
- Can be used throughout the home to activate a police, medical, or auxiliary alarm. (2 Words)
- Core Value - We are generous corporately and individually with our resources, time and money.
- Controls all of the components of the alarm system and communicates signals to a signal receiver such as one a central monitoring station.
- Our traditional hard-wired security system manufactured by Interlogix. This system is no longer actively installed.
- Core Value - We are free from bias, dishonesty and injustice.
- Core Value - We cooperate and coordinate efforts acting together in the interest of a common cause.
- Built in delay after the siren is activated before a signal is transmitted from the control panel. (2 Words)
- Electronic transmission of information from a control panel to a Central Monitoring Station.
- The location of our regional office in Tennessee.
- A professional emergency response center where emergency alarm signals are processed. (2 Words)
- Detects smoke and offers integrated fixed temperature monitoring and rate-of-rise heat sensor (2 Words)
- Level of Protection - door and window contacts, as well as glass breaks
- Core Value - We will hold ourselves to high ethical standards and will hold others accountable with respect to the rightness and wrongness of certain actions.
- The location of our corporate headquarters.
- User interface for alarm systems, used for end user operation, installation and repair.
- The location of our regional office in Georgia.
- Our hybrid security system manufactured by DSC. This system is designed for high-end and larger installations.
32 Clues: The year CPI Security was founded. • The standard form of interior protection. • The location of our corporate headquarters. • The location of our regional office in Georgia. • The location of our regional office in Tennessee. • Core Value - We are truthful, sincere and forthright. • Core Value - We are free from bias, dishonesty and injustice. • ...
YN BIBLIOGRAPHIES 2020-01-31
Across
- M-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAM
- VOLUME 9 TRAVEL POLICY
- ADVANCEMENT MANUAL FOR ENLISTED PERSONNEL OF THE U.S. NAVY AND U.S. NAVY RESERVE
- NAVY AND MARINE CORPS AWARDS MANUAL
- DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM
- DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL
Down
- NAVAL MILITARY PERSONNEL MANUAL
- VOLUME 7A MILITARY PAY POLICY - ACTIVE DUTY AND RESERVE PAY
- SOCIAL USAGE AND PROTOCOL HANDBOOK
- CERTIFICATE OF RELEASE OR DISCHARGE FROM ACTIVE DUTY
- DEPARTMENT OF THE NAVY INFORMATION REQUIREMENTS (REPORTS) MANUAL
- DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM
- DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL
- DEPARTMENT OF THE NAVY NAVY RECORDS MANAGEMENT PROGRAM RECORDS MANAGEMENT MANUAL; PART I, II, III
14 Clues: VOLUME 9 TRAVEL POLICY • NAVAL MILITARY PERSONNEL MANUAL • SOCIAL USAGE AND PROTOCOL HANDBOOK • NAVY AND MARINE CORPS AWARDS MANUAL • DEPARTMENT OF THE NAVY CORRESPONDENCE MANUAL • DEPARTMENT OF THE NAVY FORMS MANAGEMENT MANUAL • M-5215.1 NAVY DIRECTIVES MANAGEMENT PROGRAM • DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM • ...
Know Your Customer 2020-05-14
Across
- This stands for National Insurance Number
- Security Level to make changes
- KYC information is first collected during this process
- It can be found in Sophia
- A KYC check is also this check at application
- Never use this with a customer
Down
- This is the DPA principle that states our customer's details must be kept accurate and up to date.
- This stands for Know Your Customer
- Remember to do this to the KYC Date
- This is the security level for checking
- Show this when the customer is annoyed you want to carry out a KYC check.
- This source is part of Savings KYC
- We act on these when required
13 Clues: It can be found in Sophia • We act on these when required • Security Level to make changes • Never use this with a customer • This stands for Know Your Customer • This source is part of Savings KYC • Remember to do this to the KYC Date • This is the security level for checking • This stands for National Insurance Number • A KYC check is also this check at application • ...
Lesson 9 Crossword Answers 2025-07-12
Across
- Returned from exile to restore correct observance of Law.
- Nation that conquered Babylon.
- People from the south first mentioned in this period.
- Prophet who predicted the number of years until Messiah
- Jews grouped years by _________.
- Returned from exile to ensure Jerusalem's security.
- Enemies of the Jews of mixed Israelite and Gentile blood.
Down
- Jewish official in the court of Persia with a beautiful niece. who
- Rebuilding these was the key to Jerusalem's security.
- Along with Zechariah, he urged completion of a second Temple.
- Led 50,000 Jews from exile back to Judea.
- She remained exile with her uncle and married a Persian king.
- Jerusalem's surrounding bulwark was completed in an amazing _______-two days!
13 Clues: Nation that conquered Babylon. • Jews grouped years by _________. • Led 50,000 Jews from exile back to Judea. • Returned from exile to ensure Jerusalem's security. • Rebuilding these was the key to Jerusalem's security. • People from the south first mentioned in this period. • Prophet who predicted the number of years until Messiah • ...
Vocabulary words 2020-04-12
Across
- - angering people on videos games by cheating or being destructive
- interaction - Talking to texting people to develop friendship
- bullying - using digital devices to upset someone
- video games - a video game played through the internet
Down
- -All the ways that large groups of people share information
- A duty you have to do
- - A group of people who share the same interest
7 Clues: A duty you have to do • - A group of people who share the same interest • bullying - using digital devices to upset someone • video games - a video game played through the internet • -All the ways that large groups of people share information • interaction - Talking to texting people to develop friendship • ...
stay safe online 2025-10-03
13 Clues: online trick • enter / reach • cheat / fraud • say / declare • careful / alert • set up / put in • false / not real • refuse / decline • worried / nervous • refresh / improve • safety / protection • importantly / gravely • carelessly / relaxedly
Alencar 20221103 2022-11-03
Across
- common
- improve
- exclude
- responsible for
- specially (adv)
- include
- 3 weeks ago
- power (n, fs)
- government (n, fs)
Down
- sprout, to mushroom
- non-disclosure obligation
- security
- project leader (n,ms)
- one "must"
- exaggerate
- NGO
- exaggerated (part, adj)
- sense (n, ms)
- disappear (part)
- replace
- money laundry
- to exploit
- to finish, to end something
23 Clues: NGO • common • improve • exclude • replace • include • security • one "must" • exaggerate • to exploit • 3 weeks ago • sense (n, ms) • money laundry • power (n, fs) • responsible for • specially (adv) • disappear (part) • government (n, fs) • sprout, to mushroom • project leader (n,ms) • exaggerated (part, adj) • non-disclosure obligation • to finish, to end something
Ristikko lukujen 3 ja 3.3. sanoista 2020-03-03
Across
- näky
- äärimmäinen
- saapuminen
- lähtevät lennot
- mahdollisuus,tilaisuus
- tiede
- käsimatkatavarat
- todella paljon
- varata
- laskeutuminen
- liftata
- luotettava
- suvaitsevaisuus
- turvatarkastus
- myöhässä
- tulli
Down
- verottaa
- kuljetus
- vaikutus
- viisumi
- majoitus
- matkalipun hinta
- varaus
- matkavakuutus
- kokoontuminen
- ottaa,aurinkoa
- ainutlaatuinen
- sinnikkyys, sitkeys
- etukäteen
- nousu
30 Clues: näky • tiede • nousu • tulli • varaus • varata • viisumi • liftata • verottaa • kuljetus • vaikutus • majoitus • myöhässä • etukäteen • saapuminen • luotettava • äärimmäinen • matkavakuutus • kokoontuminen • laskeutuminen • ottaa,aurinkoa • ainutlaatuinen • todella paljon • turvatarkastus • lähtevät lennot • suvaitsevaisuus • matkalipun hinta • käsimatkatavarat • sinnikkyys, sitkeys • mahdollisuus,tilaisuus
Lesson 3 spelling word activity (easy mode) 2020-04-28
20 Clues: Yummy • Pay back • LOOK OUT • not guilty • Appreciated • overwhelmed • crazy person • a safe place • Not convinced • down shut down • safe and secure • going to happen • about to happen • writing creation • already happened • scary, horrifying • imaginative story • another word for beat • cant take it very bad • tired and not mentally up to it
Dog Breeds 2023-03-25
Across
- Sled Propeller
- The Crime Dog
- Snoopy is One
- He’s a Fighter
- Peek-a-boo Hairdo
- A Footlong Hot Dog
- Firehouse Favorite
- Little Rascal Petey
- Deutschland Herder
Down
- Ears are longer then legs
- PA State Dog
- Georgia's Uga
- Lassie Lineage
- Yellow Go Getter
- Pampered Pooch
- Speed King
- Security Guard
- Ravishing Redhead
- Has an ugly Mug
- Gives Directions
20 Clues: Speed King • PA State Dog • Georgia's Uga • The Crime Dog • Snoopy is One • Sled Propeller • Lassie Lineage • Pampered Pooch • Security Guard • He’s a Fighter • Has an ugly Mug • Yellow Go Getter • Gives Directions • Ravishing Redhead • Peek-a-boo Hairdo • A Footlong Hot Dog • Firehouse Favorite • Deutschland Herder • Little Rascal Petey • Ears are longer then legs
Tobacco Tax Section 2017-06-09
Across
- cross-street
- administrative
- not tax, but
- put it in your blank and smoke it
- code to live by
- cross-border shopping
- exempt tobacco
- government project methodology
- EFR due date
- Gentax maker
Down
- V3
- common understanding
- you do this,too?
- inspectors
- special retailer
- overarching service value
- stamp colour
- market supported
- newest member
- AKA authorization
20 Clues: V3 • inspectors • cross-street • not tax, but • stamp colour • EFR due date • Gentax maker • newest member • administrative • exempt tobacco • code to live by • you do this,too? • special retailer • market supported • AKA authorization • common understanding • cross-border shopping • overarching service value • government project methodology • put it in your blank and smoke it
2nd Dec 2023- Puzzle number 336 2023-11-19
Across
- bird or toy
- roman cat
- earth apple
- wet burglar
- vowelless tomb
- number I had for dinner
- total
- rouge underwater distraction
- measures moments
- more than slow
Down
- christmas circle
- continuous wool cutting
- spicy green pepper
- archaic Saturday
- polar solvent used to hydrate
- makes milk sweet
- smith, jack, bill, head
- absence of particles
- hydrated currants
- metallic security device
20 Clues: total • roman cat • bird or toy • earth apple • wet burglar • vowelless tomb • more than slow • christmas circle • archaic Saturday • makes milk sweet • measures moments • hydrated currants • spicy green pepper • absence of particles • continuous wool cutting • smith, jack, bill, head • number I had for dinner • metallic security device • rouge underwater distraction • polar solvent used to hydrate
¿Cómo afecta la tecnología la calidad de vida? 2024-01-30
Across
- Social isolation
- Privacy
- To improve
- Inequalities
- productivity
- Employment
- Sedentary lifestyle
- Emotional well-being
- Medical devices
- Electronic devices
- Available
- Entertainment
- Efficiency
- Data
- Recreational
- -Task completion
Down
- Mental health
- Quality of life
- Concerns, worries
- Medical advances
- Social media
- Connections
- Security
- Digital divide
- Balanced
- Anxiety
- The workplace
- learning
- Tools
29 Clues: Data • Tools • Privacy • Anxiety • Security • Balanced • learning • Available • To improve • Employment • Efficiency • Connections • Social media • Inequalities • productivity • Recreational • Mental health • The workplace • Entertainment • Digital divide • Quality of life • Medical devices • Social isolation • Medical advances • -Task completion • Concerns, worries • Electronic devices • Sedentary lifestyle • Emotional well-being
TT Episode 4 2024-01-30
20 Clues: get • show • nice • fire • open • proud • awful • destroy • disease • absolutely • nature part • feel nervous • silly, stupid • drink a little • security cameras • a person who did a crime • a person looks after a school • body part you can breath through • contest who shows the best person • to debate, give reeasons to support an idea
Accept Your Own and Be Yourself 2024-06-30
Across
- capacity, dominance
- ordinariness
- The reggae Island
- depict, show
- sense of security in friendship
- not enough
- religious
- Plan
- The best
- to give yourself grace
- aid, help
Down
- give-and-take
- rapper and singer
- aim
- impassioned feeling
- slip, stagger
- formed
- young people
- above, greater
- companionship
- the spreading out of a group of people
21 Clues: aim • Plan • formed • The best • religious • aid, help • not enough • ordinariness • depict, show • young people • give-and-take • slip, stagger • companionship • above, greater • rapper and singer • The reggae Island • capacity, dominance • impassioned feeling • to give yourself grace • sense of security in friendship • the spreading out of a group of people
PLACES AT SCHOOL 2025-03-18
Across
- Lab Laboratorium IPA
- Room Ruang seni
- Post Pos keamanan
- Ruang kelas
- Field Lapangan olahraga
- Office Ruang kepala sekolah
- Taman
- Gedung olahraga
- Room Ruang musik
- Perpustakaan
- Hall Aula sekolah
- Room Mushola
- Auditorium
Down
- Kantin
- Room Ruang guru
- Kantin
- Taman bermain
- Kamar mandi
- Lab Laboratorium komputer
- Tempat parkir
- Room Ruang staf
- Laboratorium
- Room Ruang bimbingan konseling
23 Clues: Taman • Kantin • Kantin • Auditorium • Kamar mandi • Ruang kelas • Laboratorium • Perpustakaan • Room Mushola • Taman bermain • Tempat parkir • Room Ruang guru • Room Ruang seni • Room Ruang staf • Gedung olahraga • Room Ruang musik • Post Pos keamanan • Hall Aula sekolah • Lab Laboratorium IPA • Field Lapangan olahraga • Lab Laboratorium komputer • Office Ruang kepala sekolah • Room Ruang bimbingan konseling
Home Sweet Home 2025-12-04
Across
- Shelter Garage
- Skating Location Hoot Owl Pond
- Liquid Storage Oil Tank
- 1.4 Acres
- burning Fireplace
- Hall Foyer
- complication Mold
- Gates Security
- scat chamber Septic Tank
- mound Sugar Hill
- System Sprinklers
Down
- Chambers Bedrooms
- well parameters Uranium
- lake club Smoke Rise
- snake Slytherin
- Element Baseboard
- results Unsatisfactory
- enclosure Screened Porch
- Individuals Family
- Getaway Office
- disapperance zone Laundry
21 Clues: 1.4 Acres • Hall Foyer • Shelter Garage • Gates Security • snake Slytherin • Getaway Office • mound Sugar Hill • Chambers Bedrooms • Element Baseboard • burning Fireplace • complication Mold • System Sprinklers • Individuals Family • lake club Smoke Rise • results Unsatisfactory • well parameters Uranium • Liquid Storage Oil Tank • enclosure Screened Porch • scat chamber Septic Tank • ...
Animals 2025-06-24
26 Clues: king • funny • a pet • haram • racing • fastest • jumping • colorful • security • fly high • poisonous • bad voice • big animal • human like • snake enemy • danger sting • smallest one • bird on land • mindful bird • talking bird • water's queen • water and land • black and white • reptile on wall • danger in water • largest water animal
STOP BULLYING 2024-09-29
Across
- Jenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemanan
- Jenis bullying yang menggunakan teknologi seperti media sosial
- Bentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain
Down
- Jenis bullying yang melalui lisan dan tulisan
- Seseorang yang mengalami tindakan bullying
- Jenis bullying berupa menendang dan memukul
6 Clues: Seseorang yang mengalami tindakan bullying • Jenis bullying berupa menendang dan memukul • Jenis bullying yang melalui lisan dan tulisan • Jenis bullying yang menggunakan teknologi seperti media sosial • Jenis bullying yang dilakukan dengan mengucilkan seseorang dari pertemanan • Bentuk penindasan yang dilakukan dengan sengaja bertujuan untuk menyakiti orang lain
CyberBullying 2022-10-27
6 Clues: we should be a _____, not a bully • A bullying that uses the internet. • A person who stands up against bullies. • An effect of cyberbullying(starts with D). • An example of cyberbullying(starts with H). • A place where a cyber bully can bully you(starts with C)
Bullying 2013-11-07
Across
- to make verbal or physical attacks on someone
- bullying that is spoken
- bullying it is a type of bullying that happens over the internet
- bullying it is a type of bullying that hurts someones feelings
Down
- someone who is harming or harassing another person
- bullying it is a type of bullying that harms another person.
- is a person who is being tormented or harassed by a bully or group of bullies
- to cause suffering to someone else
- a person who is a viewer of someone else's bullying.
9 Clues: bullying that is spoken • to cause suffering to someone else • to make verbal or physical attacks on someone • someone who is harming or harassing another person • a person who is a viewer of someone else's bullying. • bullying it is a type of bullying that harms another person. • bullying it is a type of bullying that hurts someones feelings • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : Criminal activities done using computers or the internet
- : Bullying someone online through messages or social media
- : People who use the internet or computers to commit crimes
- : Fake messages that try to steal passwords or bank info
Down
- : Breaking into someone’s computer or account without permission
- : A harmful program that can damage files and software
- : The practice of protecting devices and data from cyber threats
- : A system that blocks unauthorized access to or from a private network
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Online trust 2021-09-07
Across
- the real deal, not fake
- a person who you can trust
- Your private information that only you know
- password,key and lock, pin number
- people who share space online or in real life.
- protecting personal information
Down
- the permenant way you present yourself online
- saying who originaly created somthing
- knowing how to find information online that isn't fake
- information like your social security number that can put you at risk if the wrong people know it.
- a dihonest way to get strangers money or personal information
11 Clues: the real deal, not fake • a person who you can trust • protecting personal information • password,key and lock, pin number • saying who originaly created somthing • Your private information that only you know • the permenant way you present yourself online • people who share space online or in real life. • knowing how to find information online that isn't fake • ...
