cyber security Crossword Puzzles
Black History Month Puzzle By EL - Black Inventors 2022-02-16
14 Clues: Hot Comb • Laserphaco • Traffic Light • Feeding Device • Peanut products • Street Letter Box • Induction Telegraph • Home security system • Automatic Transmission • Automatic Elevator Doors • Improved the ironing board • Evaporative Air Conditioner • Automatic Lubricating Device • Automatic Railroad Car Coupler
Last 2022-10-20
15 Clues: cub • camera • abroad • lodging • Baggage • to tell • two meals • not allowed • to discorve/visit • clouds in the sky • to expect something • No clouds in the sky • off from going into a space • to look at something carefully • camera - A machine that records pepople
Safer Internet 2022-03-02
3 Clues: Mobbing , • ,Verbales Mobbing Verspotten ,Physisches Mobbing • Stalking ,Cyber Mobbing ,Apps, soziale Netzwerke Facebook, Instagram ,E-Mail-Adressen ,Installation Daten,
Current issues 2023-10-26
Across
- Israeli defense force
- Godot famous person
- dome missile defense system
- a treaty alliance
- terrorist organization
- someone in inflict fear
- country in the middle east
- ethnic people
- killing of ethnic population
- religious belief
Down
- money
- strip contested area
- security council
- East place in the world
- Arabic
- explosive device
- musk rich guy
- taking over a country
- a city
- states a country
20 Clues: money • Arabic • a city • musk rich guy • ethnic people • security council • explosive device • states a country • religious belief • a treaty alliance • Godot famous person • Israeli defense force • taking over a country • terrorist organization • strip contested area • East place in the world • someone in inflict fear • country in the middle east • killing of ethnic population • ...
cashless society 2024-09-03
Across
- used for electronic transaction
- goods for sale
- digital
- can easy withdraw
- payment
- its own advantages and weakness
- big sums
- are conducted without the usage of cash
- with cashless
- digital
Down
- the usage of cash
- cash safely
- make life easier
- cash
- transactions
- money cost more
- rates are lower
- internet
- devices or codes for security
- makes people high value
20 Clues: cash • digital • payment • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easy withdraw • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
cashless society 2024-09-03
Across
- transactions
- internet
- to do
- cash safely
- makes people high value
- digital
- make life easier
- rates are lower
- the usage of cash
- goods for sale
- with cashless
Down
- payment
- can easy withdraw
- big sums
- used for electronic transaction
- money cost more
- devices or codes for security
- are conducted without the usage of cash
- its own advantages and weakness
- digital
20 Clues: to do • payment • digital • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • can easy withdraw • the usage of cash • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
Star Wars Characters (Phantom Menace) 2015-05-09
Across
- yousa in deep doo doo this time
- naboo security head
- loyal astromech
- jedi padawan
- anakins mother
- mentor of obi-wan kenobi
- bombad general
- protoyype protocol
- toydarian junk dealer
- trade federation viceroy
- dathomir apprentice, 'the experience'
Down
- the chosen one
- naboo queen
- gungan leader
- podracing dug
- neimoidian advisor
- trade federation army
17 Clues: naboo queen • jedi padawan • gungan leader • podracing dug • the chosen one • anakins mother • bombad general • loyal astromech • neimoidian advisor • protoyype protocol • naboo security head • trade federation army • toydarian junk dealer • mentor of obi-wan kenobi • trade federation viceroy • yousa in deep doo doo this time • dathomir apprentice, 'the experience'
glossary terms 2024-05-03
Across
- scarcity lack of deficiency
- towns,cities
- unequal
- Surroundings
- Eg: Afghanistan,Bangladesh
- reason for extreme hunger
- reliable access of food
- growth
Down
- variation difference on earth
- measure of achievement
- suitable living
- measurement value
- number people
- good or bad stranded
- travels
- Help
- Eg: Australia,Canada japan
17 Clues: Help • growth • unequal • travels • towns,cities • Surroundings • number people • suitable living • measurement value • good or bad stranded • measure of achievement • reliable access of food • reason for extreme hunger • Eg: Afghanistan,Bangladesh • Eg: Australia,Canada japan • variation difference on earth • scarcity lack of deficiency
Abraham Maslow - Hierarchy of Needs: Crossword Puzzle 2021-05-30
Across
- period of life when self actualization occurs
- period of life where biological needs are of the utmost importance
- this age has a need for recognition by their social group
- the way the needs are structured visually
- this is an extremely basic and essential need
- this need occurs during adolescence
- tier of hierarchy that includes air, water, food, shelter and sleep
Down
- living to your full potential
- period of life where safety and security become the focal point
- tier of hierarchy that includes personal security, employment, resources and health
- tier of hierarchy that includes friendship, intimacy, family and sense of connection
- this age group need affection and to be part of a group
- tier of hierarchy that includes respect, status, strength
- the tiers _____ come into an individual's life
14 Clues: living to your full potential • this need occurs during adolescence • the way the needs are structured visually • period of life when self actualization occurs • this is an extremely basic and essential need • the tiers _____ come into an individual's life • this age group need affection and to be part of a group • ...
synonyms 2013-06-15
Across
- necklace bracelet
- Feast rich celebration magnificient gorgeous
- stone mud
- beautiful elegant luxurious
- association companionship relationship
- marriage partner mate other half
- tie
- meeting conference get-together
- welcome receive
Down
- guarantee promise security
- religious song
- Malay Asia East Malaysia
- promising propitious favorable prosperous fortunate
- almost hardley just
- honeymooner bride groom
- joke
- incantation chorus
- flower arrangement bouquet
18 Clues: tie • joke • stone mud • religious song • welcome receive • necklace bracelet • incantation chorus • almost hardley just • honeymooner bride groom • Malay Asia East Malaysia • guarantee promise security • flower arrangement bouquet • beautiful elegant luxurious • meeting conference get-together • marriage partner mate other half • association companionship relationship • ...
Cashless society 2024-09-03
Across
- digital
- payment
- makes people high value
- are conducted without the usage of cash
- cash safely
- money cost more
- can easily withdraw
- its own advantages and weakness
- transactions
Down
- make life easier
- internet
- big sums
- the usage of cash
- digital
- used for electronic transactions
- rates are lower
- divices or codes for security
- with cashless
- to do
19 Clues: to do • digital • digital • payment • internet • big sums • cash safely • transactions • with cashless • rates are lower • money cost more • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
Cashless society 2024-09-03
Across
- digital
- payment
- makes people high value
- are conducted without the usage of cash
- cash safely
- money cost more
- can easily withdraw
- its own advantages and weakness
- transactions
Down
- make life easier
- internet
- big sums
- the usage of cash
- digital
- used for electronic transactions
- rates are lower
- divices or codes for security
- with cashless
- to do
19 Clues: to do • digital • digital • payment • internet • big sums • cash safely • transactions • with cashless • rates are lower • money cost more • make life easier • the usage of cash • can easily withdraw • makes people high value • divices or codes for security • its own advantages and weakness • used for electronic transactions • are conducted without the usage of cash
Merrill's 75th Birthday 2025-09-13
Across
- Synagogue in Ventnor
- real name
- Security Advisor to...
- high school graduation year
- Love of his life
- mother's name
- Condo Board Position
- Atlantic City Job
Down
- his father's name
- Family Deli's name
- favorite sandwich
- his nick name
- philly neighborhood
- his nick name
- winter home
- Favorite food to cook
- Steiner's nick name
- resturant critique
- summer home
19 Clues: real name • winter home • summer home • his nick name • his nick name • mother's name • Love of his life • his father's name • favorite sandwich • Atlantic City Job • Family Deli's name • resturant critique • philly neighborhood • Steiner's nick name • Synagogue in Ventnor • Condo Board Position • Favorite food to cook • Security Advisor to... • high school graduation year
Advanced 2024-12-27
Across
- A system of interconnected computers.
- A cryptographic key shared openly for secure communication.
- Malware disguised as legitimate software.
- Something that could harm a computer system.
Down
- Verifying the identity of a user or system.
- A cryptographic key kept confidential.
- A security flaw discovered before a patch is available.
- A system that can be exploited due to weak security.
- A system that monitors and controls incoming and outgoing traffic.
- A tool or script used to take advantage of a vulnerability.
10 Clues: A system of interconnected computers. • A cryptographic key kept confidential. • Malware disguised as legitimate software. • Verifying the identity of a user or system. • Something that could harm a computer system. • A system that can be exploited due to weak security. • A security flaw discovered before a patch is available. • ...
Puzzle #11 – “Social Security Statement” 2025-06-29
Across
- - Online portal to access your statement
- - What you should do to make sure your statement is accurate
- - One type of benefit shown on the statement
- - The statement shows how many of these you've earned
- - Document that shows your earnings and estimated benefits
Down
- - How often you can check your Social Security statement online
- - The statement gives this for your future benefits
- - Another type of benefit listed in the statement
- - The statement includes benefits your family may receive
- - Your past income listed on your Social Security statement
10 Clues: - Online portal to access your statement • - One type of benefit shown on the statement • - Another type of benefit listed in the statement • - The statement gives this for your future benefits • - The statement shows how many of these you've earned • - The statement includes benefits your family may receive • ...
Crossword 2023-08-01
Across
- process of identifying analyzing and controlling critical information indicating friendly actions associated with military actions
- (SCG) release of information/ identifies classified information etc.
- (AFTO 781A) unknown condition symbol
- the measure taken to physically protect sensitive information or material
- OPSEC is a ____ step process
- (emergency destruction) confidential information is destroyed ____
- form used to keep track of parts removed from an aircraft
- its unauthorized disclosure could be expected to cause SERIOUS DAMAGE to national security
- (SCG) ground support equipment section
- is used as a dispatch form during the collection process
- (AFTO 781A) grounding condition symbol of an aircraft
- used by personnel to easily determine the classification of all information, components and associated equipment of the system
- a common second form of physical security especially for top secret classification
- its unauthorized disclosure could be expected to cause EXCEPTIONALLY GRAVE DAMAGE to national seecurity
- (SCG) general descriptions of operating characteristics of a system
- (SCG) unique and specific performance and capability of the system
- organization tasked with decentralizing the supply system
- (SCG) general instructions or guidelines
- its unauthorized disclosure could be expected to cause DAMAGE to national security
Down
- to identify unclassified information that could be potentially compromising, usually created by SME's and approved by a commander
- investegation study and control of compromising emanations from telecommunications
- (SCG) operational data section
- running out of time for proper procedure in handling or relaying classified information
- where would you find the TM, WUC, AT, WD, and How Mal codes
- the Aircraft Parts Store is typically located __ __ ____ the flight line
- (SCG) Hardware section
- (SF) used anytime the secure room/container is opened, closed and checked by.
- pertains to what happens to the part after it is removed from the aircraft
- (SCG) funding
- allows supply to keep track of parts that need to be turned in
- (AFTO 781A) problem that does not affect safety of flight, symbol
- (AFTO 781A) entered in the serial number box
- protective security such as changing you passwords every 90 days and encrypting emails with PII
- (SCG) abbreviations and/or jargon used within the SCG
- (SF) end of day checklist to ensure all areas have been stored properly
- (emergency destruction) top secret information is destroyed ______
- element of comsec results in the protection of transmissions from interception and exploitation
- (SCG) Distribution section
38 Clues: (SCG) funding • (SCG) Hardware section • (SCG) Distribution section • OPSEC is a ____ step process • (SCG) operational data section • (AFTO 781A) unknown condition symbol • (SCG) ground support equipment section • (SCG) general instructions or guidelines • (AFTO 781A) entered in the serial number box • (AFTO 781A) grounding condition symbol of an aircraft • ...
9.3 Keywords 2024-02-15
Across
- unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place.
- a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- A hacker is a person skilled in information technology who achieves goals by non-standard means.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- facts and statistics collected together for reference or analysis.
- occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
- the action of obtaining something by using persuasion or guile.
- situation where the attacker can physically view the device screen and keypad to obtain personal information.
- individuals that break the computing code of ethics, regulations, and laws for a malicious purpose.
- all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- any information that relates to an identified or identifiable living individual
- The process of proving the claimed identity of an individual user, machine, software component or any other entity.
- the process in which your software applies critical updates without seeking confirmation from a user.
- when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.
- The authorization given to users that enables them to access specific resources on the network
- facts provided or learned about something or someone.
- an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
22 Clues: facts provided or learned about something or someone. • the action of obtaining something by using persuasion or guile. • facts and statistics collected together for reference or analysis. • any information that relates to an identified or identifiable living individual • ...
Testing Open Day Crossword 2023-02-14
Across
- Name of an open source Performance testing tool from Apache
- Tool for .NET that integrates with Visual Studio and can be used for BDD automation testing
- The unauthorized access to or control over computer network security systems for some illicit purpose.
- Term defining the number of transactions per second an application can handle
- Type of testing where software modules are tested as a group
- Is used by a server when the server needs to know exactly who is accessing their information or site
- Involves ethical hackers scaling planned attacks against a company's security infrastructure to hunt down security vulnerabilities
Down
- The action of handling dynamic values coming from the application while running in a script
- Type of performance testing that verifies how the system behaves over its expected limits
- Software testing technique which is used to check defects in software application without executing the code
- An incorrect step, process or data definition in a computer program that causes the program to perform in an unintended or unanticipated manner
- A method by which information is converted into secret code that hides the information's true meaning
- Type of testing that focuses on the server-side of an application
- An error in a program or a malfunction in a program's code
- A small piece of code developed to correct a major software bug or fault and released as quickly as possible
- How is called a testing environment for conducting rigorous, transparent, and replicable testing
- The "D" from the acronym "DRE" stands for
17 Clues: The "D" from the acronym "DRE" stands for • An error in a program or a malfunction in a program's code • Name of an open source Performance testing tool from Apache • Type of testing where software modules are tested as a group • Type of testing that focuses on the server-side of an application • ...
JOBS 2013-05-02
15 Clues: cuts hair • serves food • flies planes • plays soccer • goes to school • sells products • teaches English • plays intruments • helps the doctor • controls security • helps sick people • works in the house • doesn't work anymore • participates in movies • informs about the news
Five Nights at Freddy's 2024-03-04
15 Clues: rock • dog? • location • likes head • lean colored • the exotic kind • chihuahua-esque • is kinda rockin • breached by bugs • bunny off the fent • the FINEST white man • thickest animatronic • the acoustic blue one • evan's bohemian rhapsody • said food sold by perpatrator
The United Nations 2015-07-14
Across
- Educational, Scientific and cultural Organization.
- An agency which reports both to Security Council and General Assembly.
- The International Court of Justice is based here.
- Abbreviated form of a programme of General Assembly.
- Functional Commissions of Economic and Social Council.
- Number of years for which the judges of International Court Of Justice are elected.
- Rights provided to permanent members of Security Council.
Down
- An entity to General Assembly.
- The relief and works agency helps the refugees of this area.
- A last UN trust territory suspended on 1 November 1994.
- Conference on trade and development. This an example of programmes and funds.
- Research and Training institute which reports to the General Assembly.
- Abbreviated form of entity related to general assembly.
- Country which got independence in 1994.
- International staff servicing the other principal organs.
15 Clues: An entity to General Assembly. • Country which got independence in 1994. • The International Court of Justice is based here. • Educational, Scientific and cultural Organization. • Abbreviated form of a programme of General Assembly. • Functional Commissions of Economic and Social Council. • A last UN trust territory suspended on 1 November 1994. • ...
Chapter 18 Layers of Defense Againist Malware 2021-09-30
Across
- otherwise known as Apps or Programs
- _________ software functions kind of like a guard dog
- The layer of Defense between your computer and the Internet this layer is called a _____.
- ________ cover the known weaknesses in a program so that attackers can't exploit them.
Down
- The person is known as the _______.
- Layer 1
- Arm yourself with ___________
- None of these layers is very effective on its own. But taken together they constitute a strong ______ defense strategy.
8 Clues: Layer 1 • Arm yourself with ___________ • The person is known as the _______. • otherwise known as Apps or Programs • _________ software functions kind of like a guard dog • ________ cover the known weaknesses in a program so that attackers can't exploit them. • The layer of Defense between your computer and the Internet this layer is called a _____. • ...
Cyberbullying 2016-12-08
Across
- Sharing someones secrets and embarrassing information online.
- Intentionally excluding someone from an online group.
- Breaking into someones account, posing as that person.
- Intentionally posting provocative messages about sensitive subjects to create conflict.
Down
- repeatedly sending message that include threats of harm or are highly intimidating.
- "Dissing' someone online. Sending or posting cruel gossip about someone to ruin reputation.
- Repeatedly sending offensive, rude and insulting messages.
- Online fights using electronic messages with angry and vulgar language.
8 Clues: Intentionally excluding someone from an online group. • Breaking into someones account, posing as that person. • Repeatedly sending offensive, rude and insulting messages. • Sharing someones secrets and embarrassing information online. • Online fights using electronic messages with angry and vulgar language. • ...
E-safety 2019-03-01
Across
- Safety on the internet
- The actual components to a computer
- Something parents can do control their children on the internet.
- Your past searches on the internet are stored here.
Down
- To copy a file onto a computer system
- A record of all the things you have done on the internet
- Repeated harm or abuse to someone.
- Lots of emails of no use that could infect your software with viruses.
8 Clues: Safety on the internet • Repeated harm or abuse to someone. • The actual components to a computer • To copy a file onto a computer system • Your past searches on the internet are stored here. • A record of all the things you have done on the internet • Something parents can do control their children on the internet. • ...
Mengatasi Kecanduan Gadget, Media Sosial, dan Game Online 2025-09-04
Across
- Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp.
- Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget.
- Salah satu langkah mengatasi kecanduan gadget adalah membatasi ____ penggunaan.
- Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari
Down
- Sikap malas beraktivitas fisik akibat terlalu sering main game
- Permainan yang dimainkan lewat internet
- Salah satu dampak negatif kecanduan gadget yang berhubungan dengan kurang tidur.
- Penyakit yang bisa muncul karena terlalu sering menerima ejekan di internet (____ bullying).
8 Clues: Permainan yang dimainkan lewat internet • Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp. • Sikap malas beraktivitas fisik akibat terlalu sering main game • Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari • Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget. • ...
Mengatasi Kecanduan Gadget, Media Sosial, dan Game Online 2025-09-04
Across
- Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp.
- Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget.
- Salah satu langkah mengatasi kecanduan gadget adalah membatasi ____ penggunaan.
- Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari
Down
- Sikap malas beraktivitas fisik akibat terlalu sering main game
- Permainan yang dimainkan lewat internet
- Salah satu dampak negatif kecanduan gadget yang berhubungan dengan kurang tidur.
- Penyakit yang bisa muncul karena terlalu sering menerima ejekan di internet (____ bullying).
8 Clues: Permainan yang dimainkan lewat internet • Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp. • Sikap malas beraktivitas fisik akibat terlalu sering main game • Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari • Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget. • ...
Family Quest for the Best 2013-03-08
Across
- security
- searing inferno
- safegaurd from harm
- comfortable abode
- distructive funnel
- cataclysmic misfortune
- adequate insurance
- refreshing aquatic
- bring back/make new
Down
- unforeseen occurance
- safegaurding advocate
- area suseptible to be inundated with water
- multiline insurance company
- Notoriously Fabulous Irreplaceable Protection
- level of exposure to peril
- sheild of coverage
- positive funding incentive
- deluge of H2O
- casualty
19 Clues: security • casualty • deluge of H2O • searing inferno • comfortable abode • distructive funnel • sheild of coverage • adequate insurance • refreshing aquatic • safegaurd from harm • bring back/make new • unforeseen occurance • safegaurding advocate • cataclysmic misfortune • level of exposure to peril • positive funding incentive • multiline insurance company • ...
cashless society 2024-09-03
Across
- with cashless
- used for electronic transaction
- big sums
- to do
- goods for sale
- digital
- money cost more
- makes people high value
- internet
- payment
- devices or codes for security
Down
- are conducted without the usage of cash
- digital
- rates are lower
- can easy withdraw
- the usage of cash
- make life easier
- transactions
- cash safely
- its own advantages and weakness
20 Clues: to do • digital • digital • payment • big sums • internet • cash safely • transactions • with cashless • goods for sale • rates are lower • money cost more • make life easier • can easy withdraw • the usage of cash • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
Looking for words 2024-02-05
Gillian's Financial Puzzle 2022-07-12
Gillian's Financial Puzzle 2022-07-12
iACE Crossword Puzzle 5 2021-11-09
Across
- Don’t write these down at the places where the people can see.
- Keeping Wi-Fi and __________ functionalities activated all the time can cause threat to the security of your mobile phone.
- Risk ____________ is the process of finding, recognizing and describing risks.
- All potential conflict of interest must be ____________.
- Process of identifying the risks to an institution, assessing the critical functions necessary for an institution to continue its business operations, defining the controls in place to reduce organisation exposure and evaluating the cost for such controls.
Down
- The first step in Security Awareness is being able to __________ a security threat.
- Failure to pay the required renewal premium will lead to _______ policy.
- Unacceptable or improper behaviour by an employee.
- Arrangement refers to an arrangement in which a service provider performs an activity on behalf of AIA on a continuing basis, where the activity would otherwise be undertaken by AIA.
- You should always ______ your computer when you are away.
10 Clues: Unacceptable or improper behaviour by an employee. • All potential conflict of interest must be ____________. • You should always ______ your computer when you are away. • Don’t write these down at the places where the people can see. • Failure to pay the required renewal premium will lead to _______ policy. • ...
How well do you know MUN. 2017-11-26
Across
- These are used if you believe there was a mistake made in the rules of procedure.
- A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
- At the very beginning, it was called ...
- Refers to the UN Security Council's five permanent members.
- A change to a draft resolution that is on the floor.
Down
- A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
- The head of the MUN.
- A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
- An organization of independent states formed in 1945 to promote international peace and security.
- What is the oldest Polish MUN?
10 Clues: The head of the MUN. • What is the oldest Polish MUN? • At the very beginning, it was called ... • A change to a draft resolution that is on the floor. • Refers to the UN Security Council's five permanent members. • These are used if you believe there was a mistake made in the rules of procedure. • ...
THE ROLE OF STEVE BIKO 2024-01-29
Across
- Biko was the ................ of Black Consciousness in South Africa in the 1960s and 70s.
- For his continued .................. Biko was detained and interrogated four times between 1975 and 1977.
- Steve Biko was ............... and confined to King Williams Town.
- urged the emancipation of black people by their own efforts which required discarding the inferiority complex imposed by apartheid and white racism.
- The Black People's Convention, aimed at uniting various BCM organisations under one umbrella, elected .............. as its first president in 1977.
- One of the BCM organisations focusing on social upliftment, general literacy, and black economic self-reliance.
- What did Biko's death highlight about the South African security system.
- Where was Biko transported naked, without medical escort, for 12 hours in the back of a police van.
Down
- Black Consciousness was ideologically inspired by the .......................... freedom movement.
- His brutal murder in police custody made him a ..................
- Where did Biko enroll to study medicine after matriculation in 1965 in
- Where was born?
- sought to cultivate ................. and unity amongst all the oppressed people of South Africa.
- Became active NUSAS but resigned in 1969 with a substantial body of black students who felt that NUSAS did not represent the needs of............
- Led directly to the decision by Western governments to support the United Nations Security Council's ban on ........... to apartheid South Africa.
- What happaned to Biko during his last detention at the headquarters of the Security Police in Port Elizabeth.
- Biko was a speaker whose perception and energy urged people to take their .............. into their own hands.
17 Clues: Where was born? • His brutal murder in police custody made him a .................. • Steve Biko was ............... and confined to King Williams Town. • Where did Biko enroll to study medicine after matriculation in 1965 in • What did Biko's death highlight about the South African security system. • ...
Crossword#1 2015-12-03
Across
- These mutual funds, once issued can be brought from the secondary market only
- Book-building is used in _____
- A settlement system
- Golden source of APTP and its clients for securities’ information
- Security that represents ownership in a company
Down
- Date when trade is expected to be settled
- Type of reconciliation
- ________ agrees to purchase any unplaced shares and charges a commission for undertaking the risk of under subscription
- Strategy used to reduce the risk exposure in an investment
- A security identifier
10 Clues: A settlement system • A security identifier • Type of reconciliation • Book-building is used in _____ • Date when trade is expected to be settled • Security that represents ownership in a company • Strategy used to reduce the risk exposure in an investment • Golden source of APTP and its clients for securities’ information • ...
HIPAA TRAINING CROSSWORD PUZZLE 2022-12-15
Across
- When PHI is released to the public
- By law the Dialysis Center must train annually on HIPAA ____________.
- What is the federal law that provides for the protection of health information.
- All information regarding patients must stay confidential. I can not even tell my friends or __________.
- A safe security practice using your computer. Assign a ______________.
- HIPAA was created with _____________standards for all patients.
- Protected Health Information
Down
- I may not post any identifiable information on _______________.
- HIPAA is governed by __________ and Human Services.
- A sanction under HIPAA. _____________ Penalty.
10 Clues: Protected Health Information • When PHI is released to the public • A sanction under HIPAA. _____________ Penalty. • HIPAA is governed by __________ and Human Services. • I may not post any identifiable information on _______________. • HIPAA was created with _____________standards for all patients. • ...
IBA Lesson 1 - IT Careers 2022-09-14
Across
- manages a web development team
- responsible for the organization and appearance of a website
- manages and maintains a network infrastructure
- individual who analyzes website statistics to determine the site's effectiveness
Down
- individual who develops primarily server-side web applications
- manages and maintains network servers
- responsible for the maintenance and security of database resources and data
- develops and implements plans to exploit the internet for marketing and sales
- examines an organization's security requirements and determines the necessary infrastructure
- creates the overview plan of a website's development
10 Clues: manages a web development team • manages and maintains network servers • manages and maintains a network infrastructure • creates the overview plan of a website's development • responsible for the organization and appearance of a website • individual who develops primarily server-side web applications • ...
Nutrition & Food Security: Crossword Puzzle 2024-12-18
Across
- Pigment in carrots that supports vision health
- Mineral in bananas that supports muscle function
- Security Ensures consistent access to nutritious food for everyone
- Leafy green vegetable high in iron
Down
- Diet Foods that support good health and provide essential nutrients
- C Found in citrus fruits like oranges and lemons
- Starchy vegetable, a staple in many diets worldwide
- Vegetable high in vitamin K, often eaten in salads
- Food Day Observed on October 16 to promote food security
- Lack of access to sufficient and nutritious food
10 Clues: Leafy green vegetable high in iron • Pigment in carrots that supports vision health • Mineral in bananas that supports muscle function • Lack of access to sufficient and nutritious food • Vegetable high in vitamin K, often eaten in salads • Starchy vegetable, a staple in many diets worldwide • C Found in citrus fruits like oranges and lemons • ...
CROSSWORD 2024-08-21
Across
- Robbery or other serious acts of violence committed at sea.
- Officer designated by a company would be responsible for one or more one-ship security matters
- Authority for inspection of foreign ships in national ports to verify that the condition of the ship and its equipment comply with the requirements of international regulations
- International Convention for the Prevention of Pollution from Ships
- The jurisdiction under whose laws the vessel is registered or licensed, and is deemed the nationality of the vessel
- Methods of practicing how a team or individuals should behave in case of an emergency on board a ship such as fire, explosion, pirates' attacks, ship sinking, ship grounding, capsizing etc.
- A process that occurs often in global shipping and trade and as the name implies, this happens when goods are sold in transit when it is en route from the port of loading to the port of discharge.
- An experienced and skilled seaman certified to be competent to command a merchant ship
- A set of measures to enhance the security of ships and port facilities
- Record book in which the officer responsible will record all oil or sludge transfers and discharges within the vessel.
Down
- The assignment of sailors to specific roles on a ship to operate it continuously.
- A piece of equipment used to separate oil and water mixtures into their separate components
- An onboard record of the history of the vessel with respect to its flag, owner, operator, charterer, classification society, safety management, and security activities.
- International Maritime Law and 'bill of rights' for the seafarers provides them not only their fundamental rights as workers, but also provide minimum international standards for living and working conditions.
- Person designated as responsible for maintenance of the port facility security plan
- A coating, paint, surface treatment, surface or device that is used on a ship to control or prevent attachment of unwanted organisms
- A navigation information system which, with adequate backup arrangements, can be accepted as complying with the up-to-date charts
- Machinery spaces are controlled from the bridge rather than from a control room located within the engine room compartment.
- A pressure-activated mechanism designed to automatically deploy a life raft under a certain pressure in case a vessel sinks.
- One of the three most important pillars of international instruments regulating matters relating to maritime safety
- A small electronic device that can help search and rescue authorities find people in distress.
21 Clues: Robbery or other serious acts of violence committed at sea. • International Convention for the Prevention of Pollution from Ships • A set of measures to enhance the security of ships and port facilities • The assignment of sailors to specific roles on a ship to operate it continuously. • ...
May 2024 Gk 2 2025-05-18
Across
- Name of the operation carried out by India in response to Pahalgam Terror Attacks
- Which Institution is opening its first international campus in Japan
- 100th member country of International Solar Alliance
- Anthony Albanese has been re-elected as prime minister of which country?
- Which System is an advanced Air Defence Control and Reporting System developed by Bharat Electronics Limited (BEL) for the Indian Army.This System significantly enhances the Army’s capability to safeguard Indian airspace across diverse terrains.
- S-400 is a modern long-range surface-to-air missile (MLR SAM) system developed by which country?
- India's first beggar-free city
- 23rd chairman of the Law Commission of India is( Use 1st name)
- Md.Bin Salman is the crown prince of which country
- Which Netflix drama has sparked a debate over the influence of misogynistic online material, male rage and the pervasive problem of cyberbullying.
- PM Modi visited which Air Base to greet and thank the soldiers
- Which cricketer was honored by Mumbai Cricket Association by naming a cricket stand in his name
- Bhakra Dam is constructed across which river?
- Name of the opeation carried out by Indian security forces which was a massive military operation against Naxalite insurgents in areas located between the states of Chhattisgarh and Telangana
- Which economy is an evolving concept based on the contribution and potential of creative assets to economic growth and development
- Capital of Qatar
Down
- What is the name of the operation launched by Indian Security Forces to guard the Amarnath Yatra?
- Which Legendary Cricketer retired from Test Cricket
- State with highest GSDP in India
- Which Indian Athlete won Silver medal at Doha Diamond League
- headquarters of International Monetary Fund (IMF)
- Indian Government revoked security clearance of which country's firm Celebi Airport Services in the interest of National Security
- Which country was removed from Sanctions by USA
- Pulitzer Prize is associated with which field?
- As per International Monetary Fund’s (IMF) report, which country has the highest debt-to-GDP ratio in 2025?
- Capital of Azerbaijan
- Which MP led a nine-member delegation to the US, Panama, Guyana, Brazil, and Colombia for diplomatic outreach on Operation Sindoor
- Name of the summit inagurated in Munbai to highlight Indias creative economy ( Use abbreviation
- 52nd CJI of India ( Use last name)
- The Indian government has approved including _____ enumeration in the delayed 2021 census, reviving the practice discontinued after independence
- World Bank president
31 Clues: Capital of Qatar • World Bank president • Capital of Azerbaijan • India's first beggar-free city • State with highest GSDP in India • 52nd CJI of India ( Use last name) • Bhakra Dam is constructed across which river? • Pulitzer Prize is associated with which field? • Which country was removed from Sanctions by USA • headquarters of International Monetary Fund (IMF) • ...
AI & IoT 2024-08-07
Across
- / AI tidak hanya meningkatkan pemahaman terhadap kondisi saat ini tetapi juga memberikan kemampuan
- / pengumpulan dan pertukaran data yang luas oleh perangkat LOT meningkatkan risiko serangan
- rumah pintar / konker yang menggambarkan hubungan erat antara LOT dan AI
- time / algoritma AI dapat menganalisis data ini secara
- / pemegang peran utama dalam mengelola data mentah yang dikumpulkan oleh sensor-sensor
- / tidak hanya tentang pengumpulan data tetapi juga tentang memberikan konteks dan makna pada data tersebut
Down
- Spanyol / salah satu implementasi kota pintar yang signifikan terletak di
- / antara perangkat lot yang beragam
- / untuk mengatasi serangan perlu diterapkan tindakan keamanan yang
- / AI dan IOT digabungkan terbentuk
10 Clues: / AI dan IOT digabungkan terbentuk • / antara perangkat lot yang beragam • time / algoritma AI dapat menganalisis data ini secara • / untuk mengatasi serangan perlu diterapkan tindakan keamanan yang • rumah pintar / konker yang menggambarkan hubungan erat antara LOT dan AI • Spanyol / salah satu implementasi kota pintar yang signifikan terletak di • ...
Cybersecurity Crossword Puzzle 2023-05-25
Across
- Term for sexually explicit material available on the internet
- Software designs to damage or gain unauthorized access to a computer system
- Act of sending deceptive emails to trick individuals
- Every aspect of protecting an organization and its employees and assets against cyber threats
- Process of gaining unauthorized access to computer systems
Down
- One of the internet abuse effects for teenagers
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
- Practice of protecting information by converting it into a secret code
- A secret word or phrase that must be used to gain admission
10 Clues: One of the internet abuse effects for teenagers • Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • ...
The Bully-Busters 2021-11-17
Across
- This type of bullying is used by spreading rumours about some one.
- People stay at ___ because they are scared of getting bulled.
- This type of bullying is used with social media.
- We need to stop ____ now.
- Can stop bulling but we gust don't try hard enough.
Down
- This type of bullying is used by kicking, hitting, and fighting.
- Bullying mostly goes on at ____.
- This type of bullying is used by saying something mean to some one and making them feel bad.
- People have bin getting bulled for a ___ time.
- An adult is "never gonna ___ you up"(rick astley) when you need help.
10 Clues: We need to stop ____ now. • Bullying mostly goes on at ____. • People have bin getting bulled for a ___ time. • This type of bullying is used with social media. • Can stop bulling but we gust don't try hard enough. • People stay at ___ because they are scared of getting bulled. • This type of bullying is used by kicking, hitting, and fighting. • ...
BK 2024-02-05
Across
- memukul, mendorong, dll termasuk bully…
- Gangguan yang di dapatkan oleh korban bullying ada gangguan…
- Pihak yang mampu membela dirinya karena lemah ketika mendapatkan tindakan agresif dan manipulatif disebut…
- Tindakan mengganggu atau menyakiti orang lain secara fisik atau psikis disebut....
- intimidasi yang melibatkan kata kata bauk secara tertulis/ terucap merupakan bully…
Down
- dapat meniru niru bullying adalah dampak negatif bagi…
- Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…
- Gangguan emosi, sulit mendapatkan pekerjaan ketika sudah dewasa adalah dampak negatif bagi…
- memposting foto memalukan/ menyebarkan aib, termasuk ke bully…
- Jenis Tindakan Bully di dunia maya yang ditunjukkan untuk mengucilkan seseorang adalah…
10 Clues: memukul, mendorong, dll termasuk bully… • dapat meniru niru bullying adalah dampak negatif bagi… • Gangguan yang di dapatkan oleh korban bullying ada gangguan… • memposting foto memalukan/ menyebarkan aib, termasuk ke bully… • Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying… • ...
Internet 2025-07-17
Across
- – a set of pages of information on the internet about a particular subject, published by a single person or organization.
- – a person who is enthusiastic about new technology.
- – not in use any more, having been replaced by something better.
- – involving or causing a complete or dramatic change and improvement.
- – to suddenly stop working.
Down
- – important development or discovery.
- the development and use of a new idea or method.
- – the programmes and other operating information used by a computer and related devices.
- – involving, using, or relating to computers, especially the internet.
- – the right to keep personal information secret.
10 Clues: – to suddenly stop working. • – important development or discovery. • the development and use of a new idea or method. • – the right to keep personal information secret. • – a person who is enthusiastic about new technology. • – not in use any more, having been replaced by something better. • – involving or causing a complete or dramatic change and improvement. • ...
HAPPY EARTH QUIZ 2022-09-11
Across
- How many UNITs are there in Happy Earth?
- How many coloured squares are there on page 80?
- How do you say “obsah” in English?
- On which page can you find revision of MONTHS (January, February..)?
- What is page 77 about?
- Who is the last Bulldog’s friend: Eagle, Moose, Kiwi, Zebra and ...?
- Look at page 40 and find out “who came happily”.
Down
- Which page gives information on Tyrannosaurus and Allosaurus?
- Which Unit is about cyber world and computers?
- Complete the title of the story you can find in every Unit at the end:Where on ...?
10 Clues: What is page 77 about? • How do you say “obsah” in English? • How many UNITs are there in Happy Earth? • Which Unit is about cyber world and computers? • How many coloured squares are there on page 80? • Look at page 40 and find out “who came happily”. • Which page gives information on Tyrannosaurus and Allosaurus? • ...
Vocabulary Cycle 2 Week 1 2025-08-27
Across
- a mathematical statement that has not yet been rigorously proved
- a policy of expansion, as of territory or currency
- military branch that includes ground operations
- can be used both as a standalone sentence or with another clause to make a compound or complex sentence
Down
- military branch that includes space-based defense
- consists of the bones, their associated cartilages, and the joints
- military branch that includes expeditionary and amphibious warfare
- military branch that includes maritime dominance
- military branch that includes maritime law enforcement and water border
- military branch that includes air, space and cyber operations
10 Clues: military branch that includes ground operations • military branch that includes maritime dominance • military branch that includes space-based defense • a policy of expansion, as of territory or currency • military branch that includes air, space and cyber operations • a mathematical statement that has not yet been rigorously proved • ...
Words Commenly Confused- Cischke 2022-04-06
Across
- possessive form of they
- quiet order and security
- contraction of they are
- wholly or entirely
- revealed
- a flat surface, an airplane
- still and peaceful
- a place
- in a fixed position
- detail
- a part of something
Down
- at that time
- the head of the school
- a flat area of land
- gleamed, glowed
- writing paper
- hurled
- a rule of conduct
- beyond
- comparisons
20 Clues: hurled • beyond • detail • a place • revealed • comparisons • at that time • writing paper • gleamed, glowed • a rule of conduct • wholly or entirely • still and peaceful • a flat area of land • in a fixed position • a part of something • the head of the school • possessive form of they • quiet order and security • contraction of they are • a flat surface, an airplane
Spanish IV vocab viajes futuro y condicional 2 2016-02-28
29 Clues: row • seat • line • mask • oxygen • to land • counter • airport • copilot • luggage • boarding • carry-on • business • door/gate • seat belt • fortnight • to fasten • to cancel • departures • turbulence • to confirm • to reserve • compartment • to check-in • waiting list • customs duty • season, period of time • to go through security • stewardess/female flight attendant
Vocabulary - Antes de Viajar 2021-05-25
20 Clues: To fly • To find • To board • A ticket • To travel • To arrive • The plane • The flight • To look for • The airport • The passport • The suitcase • To plan a trip • To stand in line • To go on vacation • To leave (a place) • To pack a suitcase • To make a reservation • To go through customs • To go through security
International Travel 2024-03-21
Across
- how you get across borders
- enclosed area
- near sand
- amount
- how you see places
- how you touch floor
- type of flight
- to hold a spot
- served at morning
Down
- type of security
- how you travel
- where to leave
- goes under the plane
- who cleans
- place of travel
- entry saying
- pack your clothes
- where you swim
- reception
- goes up and down
20 Clues: amount • near sand • reception • who cleans • entry saying • enclosed area • how you travel • where to leave • where you swim • type of flight • to hold a spot • place of travel • type of security • goes up and down • pack your clothes • served at morning • how you see places • how you touch floor • goes under the plane • how you get across borders
Kleingruppen Nr. 16: Schlüsselbegriffe 2024-03-30
Across
- surroundings
- transportation
- in summary
- climate
- because of
- furthermore
- affordable
- get
- successful
- used to
- activity
- opportunity
- to think
- position
- security
- going to, will, become
- public
Down
- free (for nothing)
- sure
- advantage
- customer
- fitting
- vehicle
- conclusion
- local transportation
- consequence
- to go on a walk
- disadvantage
- office
- pedestrian
- business
- to be
32 Clues: get • sure • to be • office • public • fitting • vehicle • climate • used to • customer • activity • business • to think • position • security • advantage • in summary • conclusion • because of • affordable • successful • pedestrian • consequence • furthermore • opportunity • surroundings • disadvantage • transportation • to go on a walk • free (for nothing) • local transportation • going to, will, become
47a 2024-07-11
Across
- Video game player
- Writing software
- Problem-solving code
- Twitter repost
- Online diary
- Sending data
- Audio show
- Online reply
- Online networking
- Social tag
- Social approval
Down
- Data protection
- Login ID
- Follow online
- Fixing code
- Digital icon
- Social media fan
- Online media
- Security key
- Data transfer
- Online identity
- Data collection
- Data copy
- Video blog
- Social media repost
25 Clues: Login ID • Data copy • Audio show • Video blog • Social tag • Fixing code • Digital icon • Online media • Security key • Online diary • Sending data • Online reply • Follow online • Data transfer • Twitter repost • Data protection • Online identity • Data collection • Social approval • Writing software • Social media fan • Video game player • Online networking • Social media repost • Problem-solving code
Spanish 2 2024-09-20
32 Clues: bus • stop • suit • claim • agent • train • agency • flight • ticket • tourism • airport • customs • monitor • station • luggage • suitcase • vacation • security • passport • to check • airplane • pass/card • to arrive • to travel • itinerary • passenger • depart/exit • identification • to pass through • to depart/to exit • boarding/shipment • assistant/attendant
14 2025-03-01
Across
- Outdoor adventure
- Wrapped delivery
- Electronic format
- Discount coupon
- Entry point
- Live music event
- Something new
- Seeking answers
- Land surface
- Physical training
- Trendy clothing
- Delivers letters
- Document producer
- Vision aid
Down
- Personal security
- Language structure
- Risky business
- Financial system
- Workplace eatery
- Mental strength
- Business income
- Book activity
- Pedal transport
- Sports venue
- Play area
25 Clues: Play area • Vision aid • Entry point • Land surface • Sports venue • Something new • Book activity • Risky business • Discount coupon • Mental strength • Business income • Seeking answers • Pedal transport • Trendy clothing • Wrapped delivery • Financial system • Workplace eatery • Live music event • Delivers letters • Outdoor adventure • Personal security • Electronic format • Physical training • Document producer • ...
50 2025-02-19
Across
- Chase Scene
- Present Element
- Adventure Setting
- Action Genre
- Claus Role
- Wonderland Backdrop
- Liu Actress
- Villain
- Helpers Assistants
- Claus Support Character
- Mission Theme
- List Important Item
- Pole Security
- Kasdan Director
Down
- Combat Unique Concept
- Johnson Lead Actor
- Omalley Bounty Hunter
- Evans Star
- Drift Hero
- Spirit Theme
- Theft Plot Twist
- Code Key Clue
- Ride Transport
- Claus Missing
- Mythical Creature
25 Clues: Villain • Evans Star • Claus Role • Drift Hero • Chase Scene • Liu Actress • Action Genre • Spirit Theme • Code Key Clue • Claus Missing • Mission Theme • Pole Security • Ride Transport • Present Element • Kasdan Director • Theft Plot Twist • Adventure Setting • Mythical Creature • Johnson Lead Actor • Helpers Assistants • Wonderland Backdrop • List Important Item • Combat Unique Concept • Omalley Bounty Hunter • ...
Travel 2025-03-25
Across
- seat
- plane
- arrival
- gate
- overhead compartment= el___superior
- layover
- round trip
- boarding
- canceled
- tourist
- seatbelt= el___de seguridad
- delayed
- boarding pass= la___de embarque
- security
- schedule
- key
Down
- lobby
- elevator
- suitcase
- ticket
- room
- exit
- luggage
- to land
- passport
- train
- gas station
- flight number= el___de vuelo
- intinerary
- flight
- departure
- baggage claim= la___de equipaje
32 Clues: key • seat • room • exit • gate • lobby • plane • train • ticket • flight • luggage • arrival • to land • layover • tourist • delayed • elevator • suitcase • passport • boarding • canceled • security • schedule • departure • intinerary • round trip • gas station • seatbelt= el___de seguridad • flight number= el___de vuelo • baggage claim= la___de equipaje • boarding pass= la___de embarque • overhead compartment= el___superior
JOBS & OCCUPATIONS 2025-08-06
Across
- Joins metal parts
- Grows crops
- Builds with bricks
- driver Drives long distances
- Greets visitors
- Flies airplanes
- Builds houses and roads
- Treats animals
- Paints walls and surfaces
- Organizes papers
- Oversees a team
Down
- Designs structures or machines
- Keeps places safe
- Repairs tech equipment
- Supervises workers
- Studies how things work
- Sews clothing
- Digs for minerals
- Alters clothes
- Works on ships
20 Clues: Grows crops • Sews clothing • Alters clothes • Works on ships • Treats animals • Greets visitors • Flies airplanes • Oversees a team • Organizes papers • Keeps places safe • Joins metal parts • Digs for minerals • Supervises workers • Builds with bricks • Repairs tech equipment • Studies how things work • Builds houses and roads • Paints walls and surfaces • Designs structures or machines • ...
Descubre 3 Vocabulario 5B 2025-11-11
33 Clues: room • port • tour • guide • notice • island • border • hostel • cruise • jungle • to stay • to stay • lodging • to land • compass • distant • security • included • seatbelt • to cancel • campgroun • touristic • insurance • dangerous • to reserve • front desk • prohibited • to be full • traffic jam • to take off • high quality • room service • recommendable
Mobile Device Security Crossword 2012-10-25
Across
- When such kind of email are opened it will lead to malware infection, stealing of personal/corporate data or losing your identity
- Connecting to unsecured source using this has potential security impact on your mobile device and data
- You need to perform this operation periodically in order to get back your lost or corrupt data
- This malicious software will information about you without your knowledge
- This tool will help to detect and clean the mobile malware
- You need to perform this immediately when you detect a security incident or when you lost your mobile device
Down
- Never do this with anyone when it comes to your password
- This method will ensure the security of your data during the storage and transit by encoding them in such a way that unauthorized people cannot read it by an authorized person can read.
- Always protect your system by using this
- Never connect to the wireless network in this mode
10 Clues: Always protect your system by using this • Never connect to the wireless network in this mode • Never do this with anyone when it comes to your password • This tool will help to detect and clean the mobile malware • This malicious software will information about you without your knowledge • ...
Roots of the cold war vocabulary 2024-05-24
Across
- Curtain Is a way of referring to a barrier to understanding and information
- Is a country ruled by another nation
- Shop Is a workplace in which only union members can be hired
- Security Council The Security Council has far more power, Its decisions are supposed to be followed by all UN nations, The Security Council Has 15 members
- Berlin Wall A wall between east and west germany for 28 years, the wall stood as a symbol
Down
- Alliance Soviet Union and the satellite nation of eastern Europe formed their own alliance in 1955
- Sending cargo planes to deliver tons of supplies to the people
- The goal of containment was to contain, or limit, soviet expansion
- The North Atlantic treaty organization (NATO), a formal military alliance to guard a soviet attack
- Berry Is often called the father of Rock-And-Roll he invented driving guitar riffs that are still being imitated by today's bands
10 Clues: Is a country ruled by another nation • Sending cargo planes to deliver tons of supplies to the people • Shop Is a workplace in which only union members can be hired • The goal of containment was to contain, or limit, soviet expansion • Curtain Is a way of referring to a barrier to understanding and information • ...
IPO Crossword 2022-01-28
Across
- a sales pitch or promotion made by the underwriting firm and a company's management team to potential investors before going public.
- rapid rise in U.S. technology stock equity valuations fueled by investments in Internet-based companies in the late 1990s.
- a financial contract whose value is derived from the performance of underlying market factors
- a group of investment banks that work together to sell new security offerings to investors. The Underwriting Syndicate is lead by the lead Underwriter.
- the Electronic Data Gathering, Analysis, and Retrieval system
Down
- the security price discovery process
- a security that represents the ownership of a fraction of a corporation.
- The investment bank that coordinates the stock issuance with other investment banks
- a service charge assessed by a broker or investment advisor for providing investment advice or handling purchases and sales of securities for a client.
- cash or liquid assets being held or obtained for expenditures.
10 Clues: the security price discovery process • the Electronic Data Gathering, Analysis, and Retrieval system • cash or liquid assets being held or obtained for expenditures. • a security that represents the ownership of a fraction of a corporation. • The investment bank that coordinates the stock issuance with other investment banks • ...
Security Crossword - August 2015 2015-08-13
Across
- If something is lost, it might be here
- A fire on site may cause this
- I am red and will call the SCC when picked up
- Something broken? Fill me out
- Call me to put the Fire Panel in test mode
- Problem in the Main Lobby, pull this
- The sharing of pertinent information between shifts
- The SCCO does this every hour
Down
- This can happen if I am lost or stolen
- All of our logs are kept here
- Someone gets hurt on site, this needs to be filled out
- I can save a life
- An employee needs to solder on a temperature chamber? This needs to be filled out first
- This box is leaking and has too much postage
- Observe and...
15 Clues: Observe and... • I can save a life • All of our logs are kept here • A fire on site may cause this • Something broken? Fill me out • The SCCO does this every hour • Problem in the Main Lobby, pull this • This can happen if I am lost or stolen • If something is lost, it might be here • Call me to put the Fire Panel in test mode • This box is leaking and has too much postage • ...
Managing User Security Vocan 2021-09-28
Across
- sets strict level pf access to resources
- ability to perfrom a type of action on computer
- physical token inserted into computer's usb
- potion where FAR and FRR are equal
- deals with specific abilities within a right
- users forced to take vacations
- biometric credentials invalid
- measures patterns of rhythm
- user can be granted additional right to data
Down
- process of validating a user
- password that is valid for only 1 login
- dening an unauthorized biometric credential
- authentication method pattern in human act.
- rights are assigned to a role instead of indvidual
- analysis of a biological feature
15 Clues: measures patterns of rhythm • process of validating a user • biometric credentials invalid • users forced to take vacations • analysis of a biological feature • potion where FAR and FRR are equal • password that is valid for only 1 login • sets strict level pf access to resources • physical token inserted into computer's usb • dening an unauthorized biometric credential • ...
COMM 205 IS Security 2024-08-27
Across
- A harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs.
- ____ engineering Involves conning your way into acquiring information that you have no right to.
- The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
- Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
- Software that is written with malicious intent to cause annoyance or damage.
- The process of making computer and network systems more resistant to tampering or malicious software.
- A software program or hardware device that is used to increase security on its network by blocking unwanted data.
Down
- A type of virus that replicates and spreads itself.
- A string of characters used to verify or “authenticate” a person’s identity.
- An illegal activity that is committed with the use of a computer.
- The procedure for making extra copies of data in case the original is lost or damaged.
- A name used in conjunction with a password to gain access to a computer system or a network service.
- When someone accesses a computer without permission.
- Occurs when a user receives an e-mail that looks as if it is from a trusted source, asking them to click a link and log in to a website that mimics the genuine website.
- A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.
15 Clues: A type of virus that replicates and spreads itself. • When someone accesses a computer without permission. • An illegal activity that is committed with the use of a computer. • A string of characters used to verify or “authenticate” a person’s identity. • Software that is written with malicious intent to cause annoyance or damage. • ...
Digital Security Crossword Puzzle 2025-03-01
Across
- What is a network security device that monitors and filters incoming and outgoing traffic
- What is a short code sent to confirm your identity when logging in
- What is the unique address of a device on the internet
- What type of software is designed to detect and remove malicious programs
- What is a malicious software that locks users out of their data until a ransom is paid
- What is a secret combination of characters used to access a system
- What is a program that secretly records what you type
- What is a small file that websites store on your computer to remember information
- What is a security flaw that hackers use before it gets fixed
Down
- What is the practice of verifying a user’s identity before granting access
- What is the act of attempting to gain sensitive information by pretending to be a trustworthy entity
- What is the process of converting data into a coded format to prevent unauthorized access
- What is a password system that protects Wi-Fi
- What is an attack where hackers overload a website with too much traffic
- What is the process of making regular copies of data to prevent loss
15 Clues: What is a password system that protects Wi-Fi • What is a program that secretly records what you type • What is the unique address of a device on the internet • What is a security flaw that hackers use before it gets fixed • What is a short code sent to confirm your identity when logging in • What is a secret combination of characters used to access a system • ...
Online Safety and Security 2025-02-18
Across
- Money borrowed from a bank
- Important and private information
- A secret code to log in
- What you look at on phones or computers
- Used to keep things safe and closed
- Keeping information secret
- Something that seems wrong or unsafe
Down
- Broken into a computer or account
- Information on computers
- Tricks to steal money or information
- Protection from danger
- Free from danger
- Online letters
- Online crimes
- Extra copies of files
15 Clues: Online crimes • Online letters • Free from danger • Protection from danger • Extra copies of files • A secret code to log in • Information on computers • Money borrowed from a bank • Keeping information secret • Broken into a computer or account • Important and private information • Used to keep things safe and closed • Tricks to steal money or information • ...
Thanksgiving Security Crossword Puzzle 2025-11-25
Across
- A sneaky “recipe” email that isn’t from Grandma.
- Two keys: one is the front door and the other is Grandma’s secret password.
- Like the kitchen wall that keeps the turkey smoke from spreading.
- Showing your invite before you enter the home.
- A swarm of “helpers” that take over the kitchen only to ruin it.
- The bad stuffing that ruins the whole meal.
Down
- Pretending to be Uncle Joe to get extra dessert.
- Wrapping your data tighter than foil on leftovers.
- Keeping the secret pie recipe safe from prying eyes.
- Your official nametag at the Thanksgiving table.
- When someone sneaks a slice before dinner.
- Holding the pumpkin pie hostage until you get Grandma’s real recipe.
- Fixing the hole in your pie crust before baking.
- Your secret and private dinner invitation.
- Making sure the mashed potatoes aren’t secretly cauliflower.
15 Clues: When someone sneaks a slice before dinner. • Your secret and private dinner invitation. • The bad stuffing that ruins the whole meal. • Showing your invite before you enter the home. • Pretending to be Uncle Joe to get extra dessert. • A sneaky “recipe” email that isn’t from Grandma. • Your official nametag at the Thanksgiving table. • ...
Holiday Travel Security Crossword 2025-11-25
Across
- The type of crime that crowded areas, like airports and shopping centers, are prime targets for. (18 letters, no space)
- Where you should store gifts and luggage in your car to deter thieves. (5 letters)
- The name of the government system where foreign travel must be recorded. (4 letters)
- The security risk where public USB charging stations can be used to compromise your device (two words, no space). (11 letters)
- The mandatory government directive (acronym) requiring all foreign travel reporting. (5 letters)
- The term for the mandatory meeting with your FSO/SSO immediately after returning from travel. (10 letters)
- This type of sensitive information should have a "zero" policy for travel. (12 letters)
Down
- A type of suspicious individual you might encounter who takes an unusual interest in your job. (15 letters)
- The security principle stating you should avoid wearing company logos or badges to draw less attention. (9 letters)
- What you should use instead of public Wi-Fi for sensitive tasks while traveling. (3 letters)
- What you should always assume will happen to electronic devices taken to adversarial foreign countries. (12 letters)
- The most common type of travel that cleared personnel are required to report (two words, no space).(14 letters)
- What you should avoid doing with your phone in unfamiliar areas to remain vigilant (two words, no space). (16 letters)
- The type of device you should use OCONUS that is stripped of sensitive data. (5 letters)
- The report you must update to assist in personnel recovery, if necessary. (7 letters)
15 Clues: Where you should store gifts and luggage in your car to deter thieves. (5 letters) • The name of the government system where foreign travel must be recorded. (4 letters) • The report you must update to assist in personnel recovery, if necessary. (7 letters) • This type of sensitive information should have a "zero" policy for travel. (12 letters) • ...
Global Nutrition & Food Security 2025-11-16
Across
- UN agency that plays a primary role in maternal and child nutrition, especially in emergencies.
- A dimension of food security referring to safe food preparation and adequate water, sanitation, and healthcare.
- An FAO-defined concept describing diets with low environmental impact that support present and future generations.
- The type of malnutrition characterized by excess nutrient intake leading to obesity and NCDs.
- Term describing diets high in processed foods, sugars, and fats as countries undergo economic development.
Down
- A form of undernutrition affecting linear growth in children.
- The coexistence of undernutrition, overnutrition, and micronutrient deficiencies within a population.
- New food security dimension emphasizing people’s ability to shape their food systems and make autonomous choices.
- Micronutrient known for reducing infection risk and preventing blindness.
- The climate phenomenon that reduces crop yields and livestock productivity and increases food insecurity.
- A global framework that replaced the MDGs and includes Zero Hunger as Goal 2.
- The micronutrient deficiency responsible for impaired thyroid function and brain development.
- The FAO-UNICEF-WHO statistic notes that about 40% of pregnant women experience this condition.
- A system that includes environments, inputs, processes, and activities related to food production and consumption.
- Global health organization responsible for nutrition standards and monitoring.
15 Clues: A form of undernutrition affecting linear growth in children. • Micronutrient known for reducing infection risk and preventing blindness. • A global framework that replaced the MDGs and includes Zero Hunger as Goal 2. • Global health organization responsible for nutrition standards and monitoring. • ...
Phillips’ & Goodliff’s 2025-10-31
Across
- Oldest Mrs Phillips
- Security
- From the Maritimes
- Youngest Mrs Phillips
- Oldest Mr Phillips
- Youngest Goodliff
- Southern hemisphere Goodliff
- Oldest Miss Goodliff
Down
- Elizabeth
- Rory
- Would have been Jennifer Louise
- Delbert
- Middle Miss Goodliff of her generation
- Oldest Mr. Goodliff
- Youngest Mrs. Goodliff
- Soon to be Goodliff
16 Clues: Rory • Delbert • Security • Elizabeth • Youngest Goodliff • From the Maritimes • Oldest Mr Phillips • Oldest Mrs Phillips • Oldest Mr. Goodliff • Soon to be Goodliff • Oldest Miss Goodliff • Youngest Mrs Phillips • Youngest Mrs. Goodliff • Southern hemisphere Goodliff • Would have been Jennifer Louise • Middle Miss Goodliff of her generation
Border Lexics 2016-09-18
Across
- to take or bring (something) secretly
- guard is a national security agent who enforces the security of the country's national borders.
- love that people feel for their country
- the state of being complete or whole
- an official paper that gives information about something or that is used as proof of something
Down
- a place where people, cars, etc., are searched by someone (such as a officer) before being allowed to continue
- the state of being protected or safe from harm
- the use of violent acts to frighten the people in an area as a way of trying to achieve a political goal
8 Clues: the state of being complete or whole • to take or bring (something) secretly • love that people feel for their country • the state of being protected or safe from harm • an official paper that gives information about something or that is used as proof of something • guard is a national security agent who enforces the security of the country's national borders. • ...
Κονωνοικές-Ψυχολογικές έρευνες 2023-03-06
Across
- Τι περνάνε τα κορίτσια στα έτη 10-17 και τα αγόρια στα 11-17?
- Η εργασία που είδατε έχει σχέση με … και κοινωνικές έρευνες
- Στην εφηβεία ανακαλύπτουμε την … μας
- Ένας από τους παράγοντες της επιθετικότητας στους εφήβους είναι οι … αλλαγές
- Στην εφηβεία βιώνουμε πολλές σωματικές και ορμονικές…
Down
- Το cyber bullying στα ελληνικά λέγετε Διαδικτυακή…
- Μια διαφάνεια είχε θέμα την έλλειψη διαπροσωπικής… στους νέους
- Το πιο αγαπημένο είδος μουσικής για τους νέους είναι η …
8 Clues: Στην εφηβεία ανακαλύπτουμε την … μας • Το cyber bullying στα ελληνικά λέγετε Διαδικτυακή… • Στην εφηβεία βιώνουμε πολλές σωματικές και ορμονικές… • Το πιο αγαπημένο είδος μουσικής για τους νέους είναι η … • Η εργασία που είδατε έχει σχέση με … και κοινωνικές έρευνες • Τι περνάνε τα κορίτσια στα έτη 10-17 και τα αγόρια στα 11-17? • ...
Software Security Crossword 2024-07-03
7 Clues: Software security company • Sound associated with hawks • GitHub's cat-octopus mascot • Storage for code and project files • Protection against unauthorized access • Set of rules for software communication • Platform for hosting and collaborating on code
Final Word Review 2022-12-08
12 Clues: coach • check • training • coffee oil • rules of laws • business owner • cars computers • boxing baseball • smart and final • walmart target 7 eleven • principal vice principal • social security retirement
Unit 11 crossword 2023-03-01
12 Clues: choosy • a belief • to guide • to cuddle • protection • ridiculous • sharp/tangy • to guarantee • request for help • to group or label • large mass of snow • resembling real life
Fun Words 2014-02-09
Across
- unintelligible talk
- stated clearly
- bend down
- ruins
- without security
- open
- alone
- calamity
- main
- dive
- writer
- light vessel
- entice
- sully
Down
- add strength to
- lessen
- fear of something wrong
- accordingly
- encourage
- leaning
- trembling
- lithe
- not quenched
- Greek god of love
- restraint of liberty
- fastener
- indentation on the coast
- energy lassitude
- woman's headband
29 Clues: open • main • dive • ruins • alone • lithe • sully • lessen • writer • entice • leaning • calamity • fastener • encourage • bend down • trembling • accordingly • not quenched • light vessel • stated clearly • add strength to • without security • energy lassitude • woman's headband • Greek god of love • unintelligible talk • restraint of liberty • fear of something wrong • indentation on the coast
31 2024-08-23
Across
- Global network
- Display screen
- Web tool
- Wireless network
- Network connector
- Physical components
- Online storage
- Data copy
- Flying robot
- Data protection
- Automated machine
Down
- Step-by-step process
- Data processor
- Online page
- 0s and 1s system
- Output device
- Computer programs
- Electrical path
- Pointing device
- Network security
- Data storage
- Send data
- Data transfer
- Input device
- Network provider
25 Clues: Web tool • Send data • Data copy • Online page • Data storage • Input device • Flying robot • Output device • Data transfer • Data processor • Global network • Display screen • Online storage • Electrical path • Pointing device • Data protection • 0s and 1s system • Network security • Wireless network • Network provider • Computer programs • Network connector • Automated machine • Physical components • ...
Perhotelan 2023-08-23
Across
- sdm hotel
- sarapan
- asrama
- keramahan
- barang bawaaan tamu
- kumpulan dari berbagai pekerjaan yang terkait
- dinikmati oleh wisatawan
- relaksasi
- bagian penting kamar hotel
- area kerja publik area
- pekerjaan di hotel
- keamanan hotel
Down
- kantor depan
- tempat nyaman wisatawan tinggal sementara
- menjaga nama baik hotel
- pekerjaan hotel berhubungan dengan air
- fasilitas kamar
- divisi Pekerjaan bagian hotel
- dalam negeri
- Penginapan sementara
20 Clues: asrama • sarapan • sdm hotel • keramahan • relaksasi • kantor depan • dalam negeri • keamanan hotel • fasilitas kamar • pekerjaan di hotel • barang bawaaan tamu • Penginapan sementara • area kerja publik area • menjaga nama baik hotel • dinikmati oleh wisatawan • bagian penting kamar hotel • divisi Pekerjaan bagian hotel • pekerjaan hotel berhubungan dengan air • ...
Spanish Vocab 2021-09-23
Across
- to board
- suitcase
- to go through security
- passenger
- bathing suit
- to take a trip
- to go on vacation
- roundtrip ticket
- ticket
- luggage
- to get in line
- passport
- itinerary
- travel agency
Down
- flight attendant
- gate
- to travel
- screen
- departure
- boarding pass
- to pack a suitcase
- identification
- to confirm a flight
- flight
- travel agency
- to call someone
- airport
27 Clues: gate • screen • flight • ticket • airport • luggage • to board • suitcase • passport • to travel • departure • passenger • itinerary • bathing suit • boarding pass • travel agency • travel agency • identification • to take a trip • to get in line • to call someone • flight attendant • roundtrip ticket • to go on vacation • to pack a suitcase • to confirm a flight • to go through security
Words Chapter 4 2025-02-03
Across
- komend(e)
- reputatie
- gericht op
- wolkenkrabber
- onafhankelijk
- toegewijd
- hoogtepunt
- decennia, tientallen jaren
- nadeel
- goochelaar
- adviseur
- opgelucht
- onmiddelijk, meteen
Down
- bovendien, daarbij
- stemming, bui
- ketting
- wijsheid
- geweer
- uitslag(en)
- moeilijk, lastig
- betrokken
- enorm
- buitengewoon
- blij, verheugd
- schort
- vrije tijd
- gemeenschap
- beveiliging
- zichtbaar
- hectisch, erg druk
- groei
- spoor
32 Clues: enorm • groei • spoor • geweer • schort • nadeel • ketting • wijsheid • adviseur • komend(e) • reputatie • toegewijd • betrokken • zichtbaar • opgelucht • gericht op • hoogtepunt • vrije tijd • goochelaar • uitslag(en) • gemeenschap • beveiliging • buitengewoon • stemming, bui • wolkenkrabber • onafhankelijk • blij, verheugd • moeilijk, lastig • bovendien, daarbij • hectisch, erg druk • onmiddelijk, meteen • decennia, tientallen jaren
9 2025-03-01
Across
- Scenic view
- Small motor vehicle
- Digital applications
- Store visitor
- Physical training
- Time-saving route
- Property loan
- Style trend
- Buying spree
- Watching crowd
- Formal greeting
- Professional guidance
- Constructive opinion
Down
- Imaginative thinker
- Security access
- Travel industry
- News summary
- Public event
- Drinking enough water
- Travel luggage
- Emergency facility
- Plants caretaker
- Power refilling
- Space between points
- Official money
25 Clues: Scenic view • Style trend • News summary • Public event • Buying spree • Store visitor • Property loan • Travel luggage • Watching crowd • Official money • Security access • Travel industry • Power refilling • Formal greeting • Plants caretaker • Physical training • Time-saving route • Emergency facility • Imaginative thinker • Small motor vehicle • Digital applications • Space between points • ...
En el Aeropuerto: ¡A Buscar Palabras! 2024-11-30
32 Clues: crew • gate • shop • seat • delay • aisle • office • window • flight • ticket • takeoff • landing • arrival • airport • luggage • passport • transfer • check-in • suitcase • bathroom • airplane • departure • cafeteria • to-travel • restaurant • connection • information • boarding-area • early-morning • boarding-pass • security-check • police-station
Words Commenly Confused- Cischke 2022-04-06
Across
- possessive form of they
- quiet order and security
- contraction of they are
- wholly or entirely
- revealed
- a flat surface, an airplane
- still and peaceful
- a place
- in a fixed position
- detail
- a part of something
Down
- at that time
- the head of the school
- a flat area of land
- gleamed, glowed
- writing paper
- hurled
- a rule of conduct
- beyond
- comparisons
20 Clues: hurled • beyond • detail • a place • revealed • comparisons • at that time • writing paper • gleamed, glowed • a rule of conduct • wholly or entirely • still and peaceful • a flat area of land • in a fixed position • a part of something • the head of the school • possessive form of they • quiet order and security • contraction of they are • a flat surface, an airplane
Unit 8: Future Innovations 2025-10-19
Across
- modify, alter
- technology online meeting tool, virtual communication system
- show, illustrate
- guess, assume
- customize, tailor
- chip, processor
- electronic junk, discarded devices
- privacy information security, data protection
- highlight, stress
Down
- expand, widen
- intimidate, endanger
- input, type
- blame, judge
- power, energize
- virus malware, bug
- collaborate, work together
- inspire, encourage
- insert, embed
- up against face, encounter
- up with stay informed, catch up
20 Clues: input, type • blame, judge • expand, widen • modify, alter • guess, assume • insert, embed • power, energize • chip, processor • show, illustrate • customize, tailor • highlight, stress • virus malware, bug • inspire, encourage • intimidate, endanger • collaborate, work together • up against face, encounter • up with stay informed, catch up • electronic junk, discarded devices • ...
Toy Story 2025-11-25
20 Clues: bald • cowgirl • a clowm • lightyear • a penguin • smells bad • is married • stores money • security room • has a big head • spoon and fork • a blue dinosaur • has three animals • big and pink bear • right in the center • can stretch his body • are from outer space • looks like Darth Vader • has a snake in his boot • green with little hands
Cybersecurity Awareness Month 2024 Crossword Puzzle 2024-08-26
Across
- Although the keyboard shortcut for copying information is Ctrl + C, the shortcut for pasting information is not Ctrl + P (that's a shortcut for printing). Instead, the shortcut letter for pasting is closer to the shortcuts for copying and cutting. What letter is used to to paste information when clicked synchronously with Ctrl
- technology that enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy (acronym).
- Seven-letter branded software standard created by Apple that enables a car radio or touchscreen to be a display and a controller for an iOS device
- The name of the security company founded in 2006 by two Harvard Business School students who couldn't find a security company designed to help renters? The couple was interested in the field after multiple friends in Cambridge had experienced break-ins. By 2014, the company has raised more than $50 million in venture capital.
- 6-letter term for a group of computers that is networked together and used by hackers to steal information
- Contract Management process used to review and sign all Start Early
- A user identity and access management solution piloted in Start Early that allows users to seamlessly do Single Sign-On (SSO)
- Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID
- A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet
Down
- Most common delivery method for viruses
- In 1988, the Morris Worm was created (and released) just to see whether it could be pulled off. As it spread via the Internet, mayhem (and a criminal conviction) followed. It was the first major example of which “highly infectious” computer security threat
- What colorful apparel is also a two-word term for a computer security expert who engages in “ethical hacking” to help expose and fix security flaws within a company’s information system
- On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers
- Delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server
- If you have an iPhone and send a text to another iPhone user via iMessage, the bubbles look blue. If you send a text to an Android user, the bubble is green because it’s being sent as which kind of message?
- According to Michael Scott, there have been eight "IT guys," including Lozenge, Shorts, and Nick, at what fictional company on "The Office?"
16 Clues: Most common delivery method for viruses • Contract Management process used to review and sign all Start Early • 6-letter term for a group of computers that is networked together and used by hackers to steal information • Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID • ...
FINASTRA 2016-12-07
Across
- It is a measure of volatility or systematic risk, of security/ portfolio in comparison to the market. It is used in the capital asset pricing model to calculate the expected return of an asset
- The yield is the income return on an investment, such as the interest or dividends received from holding a particular security.
- Loss in the value of assets due to obsolescence or new technology
- Discounting is the process of determining the present value of a payment or a stream of payments that is to be received in the future.
- A long term security yielding a fixed rate of interest
- A debt instrument in which an investor loans money to an entity for a defined period at a fixed or variable interest rate
- Fixed sum of money paid to someone each year
Down
- Factoring is a financial transaction and a type of debtor finance in which a business sells its accounts receivable (i.e., invoices) to a third party (called a factor) at a discount.
- A security with a price that is dependent upon or derived from underlying asset(s). The derivative is a contract between two or more parties based upon the asset(s). It includes commodities, currencies, etc.
- Rate at which the central bank lends to the commercial banks
- Receiving something of value in exchange for an obligation to pay back
- With this method, assets are measured at their gross book value rather than at net book value to produce a higher return on equity (ROE). It is also known as DuPont identity
12 Clues: Fixed sum of money paid to someone each year • A long term security yielding a fixed rate of interest • Rate at which the central bank lends to the commercial banks • Loss in the value of assets due to obsolescence or new technology • Receiving something of value in exchange for an obligation to pay back • ...
Per 2 Chapter 12 - Tiemstra, G 2023-03-16
Across
- A__r__d is a linux based operating system used by Samsung and many other phone companies.
- Lo__M_de is an IOS tool you can use to remotely lock an apple device.
- i_ displays the files inside the directory.
- A Pa__c__eLoc_ is the most common way to protect a user's device from hacking, creating a password for that device.
- __ removes files and directories.
- J__lb___k is a way to remove restrictions and protections usually on IOS devices.
- s__o runs a command as another user.
- __ moves files or directories.
- a ___ is a private network that uses public networks, it's mostly used for privacy.
- G___e-Key____ is Linux's security credential manager.
- m_d_r creates a directory under the current directory.
- Patt______k is a way to use swiping in a specific pattern for security reasons.
- Pa__h_s are OS updates that are released periodically by OS vendors to address new vulnerabilities.
- A Sw___L__k is not a very secure way to protect a user's device from hackers.
- Fi__erp__nt____ is a way to use a persons specific fingerprint for security.
Down
- __ changes the current directory.
- _oo___g is a way to remove restrictions and protections from android devices.
- Sig____re contains samples of code used by viruses and malware.
- Ke_c___n is MacOS's security credential manager.
- ____Lock is a way to get a picture of someone's face and store it as a hash.
- iw_o__ig displays wireless network card related information.
- Fi_m__re is software providing low level functionality for a device.
- __ copies files from source to destination.
- _____ is an android tool to factory reset the device.
- Rem___B__k_p is the tool that stores your data in the cloud, making sure you can always get it back.
- ____ is an Android tool that you can use to ____ an android device using a passcode.
- ___ is a closed source operating system used by apple's devices, such as mac, iPhones, and iPads.
- _________ is a tool to check if certain programs, or apps that contain malware or other malicious tools.
- ___ displays the name of the directory.
- _r_n is a service that can be used to schedule tasks on Linux or macOS.
- L_c____A_p is an application that can be used to find a lost device that was lost or stolen.
- S__ee_L__ks are ways to protect a user's device from common hacking methods, such as FaceID from apple.
- i__ne_ is a way you can store IOS backups on a local PC.
- _____ is a family of free and open-source operating systems based on an operating system kennel.
34 Clues: __ moves files or directories. • __ changes the current directory. • __ removes files and directories. • s__o runs a command as another user. • ___ displays the name of the directory. • i_ displays the files inside the directory. • __ copies files from source to destination. • Ke_c___n is MacOS's security credential manager. • ...
Starfleet Crossword #3 2020-09-07
16 Clues: 370 • Shamrock • Engine force • Positive rate • Major air show • African carrier • Shoes off please • New York airport • Extendible walkway • Major A350 operator • Large cargo airline • Miracle on the Hudson • No passport necessary • Genuine typo or PR stunt? • Russian aircraft manufacturer • Large general aviation manufacturer
Tech Crossword 2025-01-28
Across
- Finger tapping input device
- Computer's heart
- Universal connector
- Code creator
- Digital window
- Invisible connector
- Energy saver
- Problem-solving recipe
- Paper output machine
- Point and click navigator
Down
- Internet traffic director
- Digital security guard
- Web page viewer
- Computer's short-term memory
- Portable computer
- Drive Data keeper
16 Clues: Code creator • Energy saver • Digital window • Web page viewer • Computer's heart • Portable computer • Universal connector • Invisible connector • Drive Data keeper • Paper output machine • Digital security guard • Problem-solving recipe • Internet traffic director • Point and click navigator • Finger tapping input device • Computer's short-term memory
HODs 2021-01-07
Humanities 2021-11-09
12 Clues: Theory • Theory • Effect • Anomaly • Security • resource • extraction • Water Scarcity • Climate Change • Water Scarcity • Greenhouse Effect • Capture and Storage
Gillian's Financial Puzzle 2022-07-12
Gillian's Financial Puzzle 2022-07-12
CELLS 2025-03-20
economic key terms 2021-04-26
Crossword#2 2015-12-04
Across
- Value of all fund assets (less liabilities) in a Mutual fund divided by the number of units outstanding
- Demand for the IPO > The total number of shares not issued
- Used for raising funds for an entity
- Example of an equity security
- Example of a debt security
Down
- Example of a Mandatory Corporate Action
- Amount a bondholder will receive as interest payment
- Date when trade terms are negotiated
- _______ ensures routing and transformation for internal and external interfaces of APTP components
- As price of bond increases, its ____ decreases
10 Clues: Example of a debt security • Example of an equity security • Date when trade terms are negotiated • Used for raising funds for an entity • Example of a Mandatory Corporate Action • As price of bond increases, its ____ decreases • Amount a bondholder will receive as interest payment • Demand for the IPO > The total number of shares not issued • ...
Crossword 2020-01-31
Across
- a type of backup
- a type of backup
- type of phising that attacks one person
- a compressed type of file]
- the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.
- software designed to help to analyze, configure, optimize or maintain a computer
Down
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- when you save all your files
- human–computer interaction,stands for "windows, icons, menus, pointer"
- optimizes disc space
- stops downloaded attacks
11 Clues: a type of backup • a type of backup • optimizes disc space • stops downloaded attacks • a compressed type of file] • when you save all your files • type of phising that attacks one person • human–computer interaction,stands for "windows, icons, menus, pointer" • software designed to help to analyze, configure, optimize or maintain a computer • ...
