cyber security Crossword Puzzles
FPEC Crossword July 2024 - I&C Abbreviations! 2023-06-14
7 Clues: Resettlement Agencies • Follow-to-Join Refugees • PRM Refugee Coordinator • Reception and Placement • Fraud Prevention and Integrity • Department of Homeland Security • Fraud Detection and National Security Directorate
Explanation and Development of the Teachings of Rerum Novarum 2022-11-14
Across
- valuable work in adapting the economic and social order everywhere to the norm of justice and humanity is shown by the __ __ __.
- ________ ____________ is rooted in the right of private property.
- Pope John XXII wants there to be a correlation between the ___ in the growth of the economy and an ____ in social development.
Down
- encyclical letter that explores the role of the church in efforts to achieve social progress and social justice.
- private property is a valid right according to the private property is a valid right according to _______.
- known as mother and teacher of nations.
- private ownership should _________.
- more modern ___ has lead to an increase in demand in education of workers.
- financial security and status is now rooted in programs like __________ and social security instead of ownership of private property.
- public property is necessary for state to exercise security greater power for the ____________ ______.
10 Clues: private ownership should _________. • known as mother and teacher of nations. • ________ ____________ is rooted in the right of private property. • more modern ___ has lead to an increase in demand in education of workers. • public property is necessary for state to exercise security greater power for the ____________ ______. • ...
Unit 11 2023-05-10
12 Clues: Wise • Peril • Catalog • Operate • Petition • Endanger • Settle down • Impractical • Discriminating • large mass of snow • Sharp in manner or tone • Tell from right to wrong
Global Issues 2024-11-12
Loan Crossword 2024-11-01
12 Clues: Non-payment • Loan charge • Initial sum • No collateral • Loan provider • Loan recipient • Security assets • Unchanging cost • Financial score • Financial ratio • Gradual Payment • Collateral Backed
Investing 2024-05-29
Across
- fixed point of time in the future
- portfolio of stocks or bonds designed to mimic
- type of security where issuer owes holder debt
- income that you earn and recieve
- the ownership certificates of any company
Down
- a good sold for production or consumption
- payments made into or out of a business,project,etc.
- action of diversifying something
- direction given to a broker to buy or sell security
- statement of assets, liabilities, and cap. of a business
10 Clues: action of diversifying something • income that you earn and recieve • fixed point of time in the future • a good sold for production or consumption • the ownership certificates of any company • portfolio of stocks or bonds designed to mimic • type of security where issuer owes holder debt • direction given to a broker to buy or sell security • ...
CW Sample 2024-05-16
Across
- A popular DEX platform on the Binance Smart Chain.
- The ability of a blockchain to handle increased transactions.
- The ability of different blockchains to communicate.
- A community-governed organization on the blockchain.
Down
- A virtual world with a digital economy.
- Financial contracts derived from the value of other assets.
- Self-executing code that powers DEX functionality.
- Program that rewards hackers for finding security bugs.
- Ethical hacker who identifies security vulnerabilities.
- Digital version of a fiat currency.
10 Clues: Digital version of a fiat currency. • A virtual world with a digital economy. • A popular DEX platform on the Binance Smart Chain. • Self-executing code that powers DEX functionality. • The ability of different blockchains to communicate. • A community-governed organization on the blockchain. • Program that rewards hackers for finding security bugs. • ...
infosec terms 2024-07-23
Across
- the method of authentication that requires 2 methods of verification
- which policy requires you to secure your workstation
- the B1 team responsible for overall network security
- an email that attempts to solicit information
Down
- the process of verifying a users identity
- a computer infection
- the process of email security requiring verification before access
- which button in outlook that allows you to report an email as phishing
- unwanted email
- an unauthorized person attempting to access the network
10 Clues: unwanted email • a computer infection • the process of verifying a users identity • an email that attempts to solicit information • which policy requires you to secure your workstation • the B1 team responsible for overall network security • an unauthorized person attempting to access the network • the process of email security requiring verification before access • ...
Chapter 9. Conner & Aaron 2025-05-29
Across
- Form to report income and taxes owed.
- Tax on property passed on after someone dies.
- People with more income should pay more taxes.
- on goods and services bought.
Down
- Profit from selling assets like stocks.
- Tax that takes more from low incomes.
- Payroll tax for Social Security and Medicare.
- Tax taken from wages for Social Security and Medicare.
- Tax on value added at each stage of production.
- Tax on specific goods like gas or alcohol.
10 Clues: on goods and services bought. • Tax that takes more from low incomes. • Form to report income and taxes owed. • Profit from selling assets like stocks. • Tax on specific goods like gas or alcohol. • Payroll tax for Social Security and Medicare. • Tax on property passed on after someone dies. • People with more income should pay more taxes. • ...
Puzzle #49 – “SSI vs SSDI (Deep Dive)” 2025-06-30
Across
- - Supplemental Security Income for people with low income and resources
- - These are counted for SSDI but limited for SSI
- - SSI is this type of program
- - SSI recipients often receive this state program
Down
- - Required to qualify for SSDI
- - SSI has strict limits on these
- - Social Security Disability Insurance for workers with enough credits
- - SSDI recipients qualify for this after 24 months
- - You must do this through SSA for either program
- - Taxes that fund SSDI, not SSI
10 Clues: - SSI is this type of program • - Required to qualify for SSDI • - Taxes that fund SSDI, not SSI • - SSI has strict limits on these • - These are counted for SSDI but limited for SSI • - You must do this through SSA for either program • - SSI recipients often receive this state program • - SSDI recipients qualify for this after 24 months • ...
Bullying 2020-06-07
Across
- This bullying makes people lonely and sad and depressed.
- its bad otherwise the person you hurt will become
- you.
Down
- This bullying is very bad because it makes people sad,scared.
- This bullying makes people sad and depressed
- can not only mentally hurt someone but get people physically hurt.
- they bully you with a screen.
7 Clues: you. • they bully you with a screen. • This bullying makes people sad and depressed • its bad otherwise the person you hurt will become • This bullying makes people lonely and sad and depressed. • This bullying is very bad because it makes people sad,scared. • can not only mentally hurt someone but get people physically hurt.
UW Social 2025-09-10
Across
- we're adversaries but we can work on this together
- amount between "ouch" and "thank goodness for coverage"
- proof you wave around to prove you're covered
- the "I survived insurance school" badge
- most likely to Irish goodbye
- the "winter is coming" magnitude loss
- online oopsie insurance
- coverage that only works if it's on the guest list
Down
- extra protection not only in the rain
- when an UW says "thanks but no thanks"
- you may check out at any time you like (with CL) but you may never leave (me)
- no crystal ball but we try to predict with Excel
- pays the bills when your shop is closed but rent is still due
- loves wood houses more than concrete blocks
- your friendly neighbourhood task distributor
- promise to make you whole again but not richer
16 Clues: online oopsie insurance • most likely to Irish goodbye • extra protection not only in the rain • the "winter is coming" magnitude loss • when an UW says "thanks but no thanks" • the "I survived insurance school" badge • loves wood houses more than concrete blocks • your friendly neighbourhood task distributor • proof you wave around to prove you're covered • ...
AMONG US 2021-03-05
Across
- Hallway To Reactor and Laboratory
- Room, To Decontamination
- Fix Lights
- Contact Other ships
- Water Plants
- Organize Specimen
- Scan
Down
- Spawnpoint
- Chart Course
- Check Door Log
- Shoot Asteroids
- Fix Impurities
- Grab Watering Can
- Fix Meltdown
- Check Vitals
- Engine, Refuel
- Use weather Balloons To scan Weather
- Clear Air Valve
- Check Cams
- Engine, Convert Power
- Grab a drink
21 Clues: Scan • Spawnpoint • Fix Lights • Check Cams • Chart Course • Fix Meltdown • Check Vitals • Water Plants • Grab a drink • Check Door Log • Fix Impurities • Engine, Refuel • Shoot Asteroids • Clear Air Valve • Grab Watering Can • Organize Specimen • Contact Other ships • Engine, Convert Power • Room, To Decontamination • Hallway To Reactor and Laboratory • Use weather Balloons To scan Weather
Voyager 2021-04-12
26 Clues: bus • form • rain • keys • line • movie • price • pilot • plane • ticket • to eat • driver • flight • airport • customs • city map • passport • security • suitcase • to travel • to download • train station • customes agent • flight attendant • big white church in Montmartre • church with lots of stained glass that was on fire
Dilimizdeki Yabancı Kelimeler-1 2021-11-07
33 Clues: cv • maç • skor • exit • jüri • link • demo • star • full • aidat • final • online • selfie • spiker • center • puzzle • aktüel • finish • ekstra • e-mail • ice tea • asistan • spontane • objektif • security • orijinal • nick name • okeylemek • full time • part-time • alternatif • oryantasyon • start vermek
VIAJAR: VOCABULARIO 2021-11-18
20 Clues: I.D • bus • stop • Train • plane • a trip • flight • ticket • station • tourism • security • passport • roundtrip • Door or gate • TSA or Customs • taking a vacation • claiming (your baggage) • the place where planes take off from • the schedule you make when you plan a trip • the bags you use to carry your clothes and items
Jobs 2022-04-21
Across
- study at school
- set the road
- singing song on stage
- put out the fire
- correcting electricity
- dancing on stage
- heal sick people
- making bread
- flies plane
- guarding the library
- lead a school
- helping doctor
Down
- seller selling vegetables
- guard the country
- catch fish
- guard place
- design music
- shaving hair
- teaching students
- selling flowers
- heals teeth
21 Clues: catch fish • guard place • flies plane • heals teeth • set the road • design music • shaving hair • making bread • lead a school • helping doctor • study at school • selling flowers • put out the fire • dancing on stage • heal sick people • guard the country • teaching students • guarding the library • singing song on stage • correcting electricity • seller selling vegetables
values 2015-07-28
32 Clues: win • heal • fair • like • area • true • trust • group • Truth • enjoy • friend • accept • honest • create • pretty • esteem • command • popular • judgment • relatives • abundance • capability • allegiance • appreciation • surveillance • self-choices • understanding • reconciliation • skills,qualities • good-sportsmanship • accomplish-on-your-own • serving-another-person
Fixed Income Basics 2024-10-07
Across
- Inquiry
- Insurance
- Loan recipient
- Fix a trade
- Annualized percent of interest
- Not in inventory
- Compounding Interest
- Get Security
- Worst Yield
- Percentage of Face Value
Down
- Repay principal
- EDJ credit the client
- Inventory
- Par Discount
- Back at maturity
- Financial trouble
- All things equal
- Date Accrued interest starts
- CD day count
- Before maturity
- Get Account
21 Clues: Inquiry • Inventory • Insurance • Fix a trade • Get Account • Worst Yield • CD day count • Get Security • Par Discount • Loan recipient • Repay principal • Before maturity • Back at maturity • All things equal • Not in inventory • Financial trouble • Compounding Interest • EDJ credit the client • Percentage of Face Value • Date Accrued interest starts • Annualized percent of interest
Contexto 2: Las redes sociales 2025-10-08
29 Clues: link • tool • joke • ally • tweet • gossip • profile • comment • keyword • to post • network • message • to track • bullying • to block • the post • follower • to guard • security • to upload • protected • extremely • vigilance • to collect • restricted • to download • internet user • controversial • to highlight (as in to feature)
Ethics & Compliance 2019-05-28
Across
- Attention, concern
- Care and security
- Beliefs, Integrity
- Battles, struggles
- Observance
- Nimbleness
- Honesty, honour
- Safeguard, shield
Down
- Who we are and how we strive to be everyday
- Wellbeing
- and hospitality Presents and generosity
- Behaviour
- Bravery
- Teamwork, cooperation
- Up Confidential reporting tool
- Provision, supply
16 Clues: Bravery • Wellbeing • Behaviour • Observance • Nimbleness • Honesty, honour • Care and security • Provision, supply • Safeguard, shield • Attention, concern • Beliefs, Integrity • Battles, struggles • Teamwork, cooperation • Up Confidential reporting tool • and hospitality Presents and generosity • Who we are and how we strive to be everyday
NCSC LIII 2025-03-23
Across
- Metro line color that takes you to DuPont
- DC river flowing into the Potomac
- ______, Realistic, and Security-Focused
- Iconic DC hotel hosting NCSC LIII
Down
- Institution operating DC's 17 free museums and zoo
- Cherry _______ Trees
- National Collegiate ________ Conference
- Last name of the USG of Councils (check ncsc.modelun.org)
8 Clues: Cherry _______ Trees • DC river flowing into the Potomac • Iconic DC hotel hosting NCSC LIII • National Collegiate ________ Conference • ______, Realistic, and Security-Focused • Metro line color that takes you to DuPont • Institution operating DC's 17 free museums and zoo • Last name of the USG of Councils (check ncsc.modelun.org)
SPHE Crossword 2021-11-03
Across
- How you might feel if you were being bullied
- when you spread fake news about someone
- what you might get if you hold in things for to long
- what you tell the bully when they are bullying you
- to leave someone out
- practices to maintaining health
- what you are if you post on social media for your job
- to say you are going to do something dangerous to someone
- False or untrue
- who you tell if you are being bullied in school
Down
- what could happen if bullying escalates
- To constantly annoy or hurt someone
- talking behind somebody’s back
- treat people with .....
- best place to find fake news
- how you make people feel when you point out their flaws
- where bullying often happens the most
- What you are if you are being bullied
- the type of bullying when you use your words to hurt someone
- the type of bullying that happens online
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • what could happen if bullying escalates • when you spread fake news about someone • ...
DM literacy crossword 2021-11-03
Across
- DM’s
- people who invade devises
- black app icon
- bird
- apps and platforms where we can play games and socialise
- you send people messages using photos
- when people swap their belongings for someone else’s
- Dilemma we watched it on Netflix
- the amount of time you spend on a certain device
- all of your apps are on here
Down
- mainly older people use it
- the online server usually through google where we gather a lot of information daily
- our own information that contains our recent searches and things we’ve looked at
- the word that tells us to be careful on the internet
- how people often communicate using words
- you can watch music video, tutorials etc on this
- folders displayed on our home screens that contain different social media’and games.
- an app that we use to message people that comes from the phrase “what’s up”
- bullying when people get bullied online
- short recording often used to capture a moment
20 Clues: DM’s • bird • black app icon • people who invade devises • mainly older people use it • all of your apps are on here • Dilemma we watched it on Netflix • you send people messages using photos • bullying when people get bullied online • how people often communicate using words • short recording often used to capture a moment • you can watch music video, tutorials etc on this • ...
Doctor Who Crossword 2014-12-27
Across
- War
- Captain
- Police Box
- Vegetable
- The Tenth Planet
- Baker Sixth
- Weeping
- Billie
- Lost Home
- Loves Amy
- Peg
- Teselecta
- Twelfth
- Ten's Shoes
- Season Specials
- Doctor Number
- 11's hat
- ...Sphere
- Fifth
- Droids
- Fat
- Ten
- Third
- Eighth
- Gogh Artist
- Pond Red head
- Skaro
- Fans
- Cyber
- Lambert
- Dog
- Dalek
- Mister
- Flood
Down
- Seventh
- First
- Ten says it
- You Will Be...
- 1 & 2
- Lords Doctor's People
- Tree Of...
- Girl Clara
- Sixth's first
- You are the weakest link.
- 11's Attire
- 50th
- Baker Fourth
- Where it all began
- Ninth
- He who takes the________, takes the universe!
- Time And ____ Dimension In Space.
- Don't...
- Second
- Sto
- The Doctor's...
- Screwdriver Doctor's Toy
- Three Beginning Year
- Arch Enemy
- Come Along...
- The Celestial
- Religious Order
- Eleven
- Daughter
- Granddaughter
64 Clues: War • Peg • Sto • Fat • Ten • Dog • 50th • Fans • First • 1 & 2 • Ninth • Fifth • Third • Skaro • Cyber • Dalek • Flood • Billie • Second • Droids • Eighth • Eleven • Mister • Seventh • Captain • Weeping • Twelfth • Lambert • Don't... • 11's hat • Daughter • Vegetable • Lost Home • Loves Amy • Teselecta • ...Sphere • Police Box • Tree Of... • Girl Clara • Arch Enemy • Ten says it • Baker Sixth • 11's Attire • Ten's Shoes • Gogh Artist • Baker Fourth • Sixth's first • Doctor Number • ...
People and Property Crimes 2016-02-01
Across
- Tricking someone to in order to gain something
- Essentially blackmail
- Another word for theft
- Someone breaks in and steals stuff committed a
- Physically assaulting someone
- Trying to keep people from committing crimes is_______
- A process to better criminals
- Crime committed against one or more people due to their race,beliefs, or anything else that the criminal may dislike about them.
- Setting things on fire on purpose
Down
- Lying while under oath
- Threatening someone with an attack
- Secluding a criminal to a small space (form of imprisonment.
- The lady who stole money from the booster club
- Lisa shot Ron. Ron is the victim of_______
- A crime committed with the use of technology
- I have a gun and want your money
- Criminal being forced to either serve the community or pay people they have harmed
- When somebody dies by the actions of another. Has varying degrees.
- Destruction of property
- Seeking revenge on a criminal often very cruel
20 Clues: Essentially blackmail • Lying while under oath • Another word for theft • Destruction of property • Physically assaulting someone • A process to better criminals • I have a gun and want your money • Setting things on fire on purpose • Threatening someone with an attack • Lisa shot Ron. Ron is the victim of_______ • A crime committed with the use of technology • ...
Doug's Great, No Doug's Amazing Crossword 2023-09-02
Across
- Bass booster
- Super without the S
- Friend who enjoys the action-packed MMO RPG
- Buddy with a Hellenic surname
- You only live once
- Surname of a naval officer who led underwater vessels
- Canine companion of a close buddy
- Dave’s upcoming addition to his household
- Surname of a common Michael
- What Doug does to video games
- Legendary dwarf who is saluted by his comrades
- His favorite playthings have wheels and engines
Down
- Pressing this letter triggers a slogan in a mining game
- Furry animal that Jane keeps as companions
- Cyber buddy who likes to dress as an anthropomorphic animal
- Spit rhymes
- Gem-stuffed grub that is slain by spelunkers in a sci-fi game
- Popular chinese video sharing app
- ROFL’s cousin
- Online communication platform
- Video conferencing platform
- Slim Shady's alter ego
- Viral internet joke
- A dwarf class that can grapple and light up caves
- Childhood pal with an edible moniker
25 Clues: Spit rhymes • Bass booster • ROFL’s cousin • You only live once • Super without the S • Viral internet joke • Slim Shady's alter ego • Video conferencing platform • Surname of a common Michael • Buddy with a Hellenic surname • Online communication platform • What Doug does to video games • Popular chinese video sharing app • Canine companion of a close buddy • ...
Working with children and adolescents 2024-08-20
Across
- type of bullying done through the internet
- type of play counselling which is structured
- level of 2 in moral development
- Zone of ______ development
- type of abuse that could include ridiculing
- Freud's psychosexual stage
- child not wanting to open up or be in counselling
- type of trauma from hearing about others trauma
Down
- balanced parenting style
- guidance on cases from someone with more experience/training
- the ethical principle of keeping information safe
- factor that minimises someones risk
- integrative model for play therapy
- ability to overcome/bounce back
- Bronfenbrenner's systemic theory
- what do we teach children about
- liked by many but also disliked by many
- metaphor to explain anger
- ending of counselling
- ____ vs guilt
- causing physical harm to oneself
- respecting everyones right to make their own decisions
- type of sibling relationship
- when a case is out of scope
- skills we teach children to handle their feelings and problems
- factor that puts someone at risk
26 Clues: ____ vs guilt • ending of counselling • balanced parenting style • metaphor to explain anger • Zone of ______ development • Freud's psychosexual stage • when a case is out of scope • type of sibling relationship • ability to overcome/bounce back • what do we teach children about • level of 2 in moral development • Bronfenbrenner's systemic theory • causing physical harm to oneself • ...
Cyber Law (Component 1 Crossword) 2021-09-07
Across
- Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
- The process where companies, industries, countries increase the use of digital or computer technology.
- The approach of these set of people is the the cyber space is a distinct space and it cannot be regulated.(no space in the answer)
Down
- _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- The act of sending unsolicited email which are especially commercial messages.
- _____ was the first type of media to be digitized and has been around for more than 5000 years.
- ________V_______is the case in which the Supreme Court of America unanimously held that the provisions of Communications decency act (CDA), 1996 as unconstitutional as it restricted free speech with respect to the First Amendment.(Answer is a short for and it contains V (versus))
- ________ is a proven technology that lets anyone place phone calls over an internet connection. Eg: Skype and Facebook.
- Lawrence Lessig claims that the Internet behaviour can be regulated by four constraints namely the law, architecture, social norms and __________.
- ___________ ____ theory put forward by Lawrence Lessig in regards with constraints as a means of regulation.(no space in the answer)
10 Clues: The act of sending unsolicited email which are especially commercial messages. • _____ was the first type of media to be digitized and has been around for more than 5000 years. • _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity. • ...
Social Security Act: Retirement Benefits 2017-01-22
Across
- When do you get a social security number?
- What is the abbreviation of this New Deal?
- Up to how many years can the disposal of a financial resource prevent a person from receiving SSI benefits?
- What are your retirement benefits based of off?
- Who is eligible to apply? (except undocumented)
Down
- What month did it become a law?
- Depression Enacted during the ____________.
- Who created the social security act?
- Who is the vice president of the time?
- The program was funded by taxes on ___________.
- York Where is Roosevelt from?
11 Clues: York Where is Roosevelt from? • What month did it become a law? • Who created the social security act? • Who is the vice president of the time? • When do you get a social security number? • What is the abbreviation of this New Deal? • Depression Enacted during the ____________. • What are your retirement benefits based of off? • ...
Service Desk Puzzle 2021-01-21
Across
- Application used for e-prescribing
- System used for online learning/compliance videos
- Used by Pharmacy for workflow management and drug/dose documentation
- Image management system for OB/GYN ultrasound
- Software used by Food Services for patient diet orders
Down
- System used by Physical Security for badging, door access control, and intrusion alerts
- Cisco System that allows phone calls and work to be routed to individuals
- System used to manage schedules, call recordings, and QA processes
- Abbreviation for the Stanley Healthcare infant protection system
- Security camera monitoring software
- Medication dispensing system
11 Clues: Medication dispensing system • Application used for e-prescribing • Security camera monitoring software • Image management system for OB/GYN ultrasound • System used for online learning/compliance videos • Software used by Food Services for patient diet orders • Abbreviation for the Stanley Healthcare infant protection system • ...
Gated communities by LUDOVIC, ELIE and VADIM 2023-10-10
Across
- a rock face next to the sea
- an intermediate social class
- a people who go in the Gated community without autorisation
- do the same things everyday
Down
- a place where you can play golf
- a person who lives close to your house
- a person who assure the security in the gated commuity
- place with poor persons who lives under tin shacks
- something which divide two places, things, sides
- the verb which defined the fact to cut the grass
- it is a place for do sport
11 Clues: it is a place for do sport • a rock face next to the sea • do the same things everyday • an intermediate social class • a place where you can play golf • a person who lives close to your house • something which divide two places, things, sides • the verb which defined the fact to cut the grass • place with poor persons who lives under tin shacks • ...
Digital Literacy - zara 2024-06-17
Across
- A group of computers all being controlled by a remote hacker to perform illegal activity. Get it by hackers exploiting security holes especially if you don’t do windows updates and antivirus software.
- Usually in an email. Tries to trick you into telling your passwords or credit card info. Can link you to fake sites that look like real sites and ask you to log in, but steals your info. Comes by email or phone. Just don’t trust people.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it. Almost anyone can be targeted.
- If you think any of these are suspicious, delete them and do not open them
- It is forever
- Make sure these are strong and different for every site
- Keeps track of every key you type and sends it to the hacker. You’re vulnerable to it any time you use a public computer. Also same way as getting other malware, it could be installed on your own computer.
- Displays ads on your computer. May slow down your computer, use internet bandwidth, make you exceed data caps. Usually get it by clicking on ads online. May come bundled with other software.
Down
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files.
- Be careful when installing this when you have this downloaded. Pre-scan it. If it is a hacked version, remember that if they could hack the security of that software, they can probably also add code to hack the security of your computer.
- Make sure your computer has the latest one of these
- When someone gets your personal info (like username/pwd/bank info etc) and then does things pretending to be you. (ex. access your files/friends/bank, steal your stuff, do illegal activities as you).
- Blocks you from accessing your files until you pay a ransom. Get it by hackers exploiting weaknesses in your security, especially if you don’t have windows updates and antivirus software.
- Is the use of technology to harass, threaten, embarrass, or target another person
- Reads everyone’s data that is passing through a network. Usually on public WiFi. Can steal your passwords. You’re mostly vulnerable when using public wifi.
- Like the Trojan Horse. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer. Get it from downloading things you think are good.
- Spreads through networks and emails infecting as many computers as possible. Can carry a virus, trojan or other malware. Get it through email.
- Spies on you, stealing information like passwords and credit card numbers. It sometimes comes bundled with other software or freeware. Or get it from opening links and email attachments from questionable sources. Can also infect computers without the latest updates.
18 Clues: It is forever • Make sure your computer has the latest one of these • Make sure these are strong and different for every site • If you think any of these are suspicious, delete them and do not open them • Is the use of technology to harass, threaten, embarrass, or target another person • ...
BAC 2025-09-09
12 Clues: ticket • mid-year • Security • Rule of 60 • recognition • OFS transfer • starts October • HR directed LOA • closed timesheet • your ___ account • end of employment • Virtual Assistant
24 2026-01-17
12 Clues: – Race goal • – Race prize • – Crowd action • – Event helper • – Public safety • – Marathon trait • – Law enforcement • – Marathon watchers • – Sports competitors • – Emergency response • – Athletic preparation • – Marathon participants
xmas 2023-12-15
17 Security 2022-08-22
Across
- Digital ........ – an electronic document used to prove the identity of a website or individual.
- When opening a TLS session, it requires considerable computer time (due mainly to complex cryptographic processes taking place). The use of session ........ can avoid the need to utilise as much computer time for each connection.
- This type of encryption uses a secret key; the same key is used to encrypt and decrypt the encoded message.
Down
- It is the need to identify who sent the data and verify that the source is legitimate.
- This type of cryptography utilises the physics of photons (light energy according to the formula E = hf)
- Another name for a hacker
- a fixed-size numeric representation of the contents of a message produced from a hashing algorithm.
7 Clues: Another name for a hacker • It is the need to identify who sent the data and verify that the source is legitimate. • Digital ........ – an electronic document used to prove the identity of a website or individual. • a fixed-size numeric representation of the contents of a message produced from a hashing algorithm. • ...
Network Security 2021-04-18
Across
- A document most organisations have to minimise security risks.
- Way of checking to see how secure a network is by employing legitimate hackers.
- A way of turning data into an unreadable form, requiring a key before it can be read.
- A method used to restrict access based upon the person using the computer system.
Down
- Describes the process of investigating a hack to find the culprit.
- A simple way of restricting access to a network or files.
- Type of software used to guard against malware attacks.
7 Clues: Type of software used to guard against malware attacks. • A simple way of restricting access to a network or files. • A document most organisations have to minimise security risks. • Describes the process of investigating a hack to find the culprit. • Way of checking to see how secure a network is by employing legitimate hackers. • ...
network security 2022-09-27
7 Clues: networks resistance • removes malware from system • encrypted files, secret code • permission to access facilities • prevents unauthorized connections • protection of personal data, physical • collections characters, authentication
Ciber security 2020-08-20
Across
- es un software que copia información del ordenador y después transmite esa información sin que el dueño del dispositivo se entere.
- es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo.
Down
- son archivos que algunos sitios web guardan en tu dispositivo con información tuya como por ejemplo nombre del usuario, pero no te espían.
- es un sistema para que usuarios de Internet no autorizados accedan a redes privadas.
- es una estafa que tiene como objetivo obtener datos privados de los usuarios, a través de Internet. Normalmente es para acceder a tu cuanta bancaria.
- son unos programas que lo que hacen es alterar el funcionamiento del ordenador. Por lo general infectan otros archivos para destruirlos.
7 Clues: es un sistema para que usuarios de Internet no autorizados accedan a redes privadas. • es un programa diseñado para detectar y eliminar a los virus y a otros programas que perjudican el sistema. • es el correo electrónico no solicitado que recibe una persona. Dichos mensajes suelen ser publicidades de todo tipo. • ...
Food security 2024-10-01
Across
- Change – A key challenge impacting global food security through extreme weather conditions.
- – The main sector that contributes to food production.
- Aid – Emergency relief programs that provide food to those in need.
- – A condition caused by an imbalanced diet, either lacking nutrients or excessive intake.
Down
- – Farming in a way that meets current needs without compromising future generations.
- – Ensuring adequate intake of essential vitamins and minerals.
- Chain – The system involved in getting food from farm to table.
- Waste – Edible food discarded or not consumed, which could help feed people.
8 Clues: – The main sector that contributes to food production. • – Ensuring adequate intake of essential vitamins and minerals. • Chain – The system involved in getting food from farm to table. • Aid – Emergency relief programs that provide food to those in need. • Waste – Edible food discarded or not consumed, which could help feed people. • ...
Network Security 2023-06-05
Across
- A method used to encode data during storage or transmission (10)
- It refers to the right of individuals to determine what information is stored about them and how that information will be used.
- The unauthorised accessing of a computer system.
Down
- A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
- A small piece of software that uses computer networks and security holes to replicate itself. (5)
- A type of software used to protect computer systems from viruses.
- Another name for electronic junk mail.
7 Clues: Another name for electronic junk mail. • The unauthorised accessing of a computer system. • A method used to encode data during storage or transmission (10) • A type of software used to protect computer systems from viruses. • A small piece of software that uses computer networks and security holes to replicate itself. (5) • ...
Physical Security 2023-04-24
Across
- Never leave important documents behind an unlocked ____.
- Takes pictures and videos to ensure compliance and safety.
- Physical and electronic ________ should be stored in a locked cabinet or room
Down
- What do you scan to get into the building?
- _____ protectors help keep prying eyes from seeing what is on your computer display.
- Always ____ your computer when you leave it unattended.
- This type of sensor detects physical movement.
7 Clues: What do you scan to get into the building? • This type of sensor detects physical movement. • Always ____ your computer when you leave it unattended. • Never leave important documents behind an unlocked ____. • Takes pictures and videos to ensure compliance and safety. • Physical and electronic ________ should be stored in a locked cabinet or room • ...
Anti-Bullying 2013-11-07
Across
- Someone who you should talk to when getting bullied
- Someone that continuously is mean to someone else
- A type of bullying when the victim is punched by the bully
- someone who see bullying but does nothing about it
- Is the target of a bully
Down
- the conscience of being bullied
- A type of bullying when the bully is saying mean things to the victim
- The type of bullying that is over the internet
- someone who can help the bullying stop
9 Clues: Is the target of a bully • the conscience of being bullied • someone who can help the bullying stop • The type of bullying that is over the internet • Someone that continuously is mean to someone else • someone who see bullying but does nothing about it • Someone who you should talk to when getting bullied • A type of bullying when the victim is punched by the bully • ...
Network 2015-05-11
Across
- is a computer circuit board or card that is installed in a computer so that it can be connected to a network
- What passes on all the data to all the computers?
- what can you use to protect yourself from cyber crime?
- What is topology cheap to install and doesn't require terminators?
Down
- What does LAN stand for?
- What is another word for Network interface card?
- What does WAN stand for?
- What topology is cheap to install and require terminators?
- what topology that requires the most cables?
9 Clues: What does LAN stand for? • What does WAN stand for? • what topology that requires the most cables? • What is another word for Network interface card? • What passes on all the data to all the computers? • what can you use to protect yourself from cyber crime? • What topology is cheap to install and require terminators? • ...
Le projet de Mariam et Leila 2023-04-29
Across
- Le harcèlement en utilisant les différentes formes de communication électronique.
- Le harcèlement qui se trouve au travail, les magasins...
- Violence qui se répète constamment
- Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement
Down
- Façon pour lutter contre le harcèlement
- Le harcèlement ou un membre de famille développe un comportement violent envers le reste de la famille.
- Le harcèlement qui se trouve à l'école, l'université...
- Le harcèlement à travers des gestes, paroles, comportements, attitudes répétés.
- Façon pour sensibiliser à un sujet
9 Clues: Violence qui se répète constamment • Façon pour sensibiliser à un sujet • Façon pour lutter contre le harcèlement • Le harcèlement qui se trouve à l'école, l'université... • Le harcèlement qui se trouve au travail, les magasins... • Façon qu'on doit agir si on est témoin ou victime d'une scène de harcèlement • ...
Digital Footprint 2019-11-06
Across
- Someone who has the power to report and stop bad behavior, but does not.
- to create an unpleasant or hostile situation
- The process of adding geographical identification to various media.
Down
- Of the culture of computers, information technology, and VR.
- People who intervene and stop inappropriate behavior
- Mass e-mail messages you are forced to read (ads)
- Rule/ One way to tell if a post is appropriate to post.
- To prevent someone from accessing your profile
- Footprint/ Everything on the internet that is about you.
9 Clues: to create an unpleasant or hostile situation • To prevent someone from accessing your profile • Mass e-mail messages you are forced to read (ads) • People who intervene and stop inappropriate behavior • Rule/ One way to tell if a post is appropriate to post. • Footprint/ Everything on the internet that is about you. • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
THE GETAWAY 2018-06-13
Across
- TRAVEL GEAR
- MAKE MILLIONS
- DISABLED
- WHAT THE PLANE IS LISTED AS
- WORK STATION
- NOT FULLY DRY
- WHERE TO CATCH YOUR FLIGHT
- HEAD OF
- COST EFFECTIVE
- TV SHOW DEATH IN ______
- WHEN YOU STAY OVER FRIENDS HOUSE
Down
- TRANSPORT
- STREAM OF MANY VEHICLES
- BAD DREAM
- SECRETARY
- WHAT TO WEAR
- NOT ON TIME
- RELATIVES
- OPPOSITE OF DOWNGRADED
- SUMMER GETAWAY
20 Clues: HEAD OF • DISABLED • TRANSPORT • BAD DREAM • SECRETARY • RELATIVES • TRAVEL GEAR • NOT ON TIME • WHAT TO WEAR • WORK STATION • MAKE MILLIONS • NOT FULLY DRY • COST EFFECTIVE • SUMMER GETAWAY • OPPOSITE OF DOWNGRADED • STREAM OF MANY VEHICLES • TV SHOW DEATH IN ______ • WHERE TO CATCH YOUR FLIGHT • WHAT THE PLANE IS LISTED AS • WHEN YOU STAY OVER FRIENDS HOUSE
Aeropuerto Vocabulario 2013-05-01
26 Clues: ID • bag • door • agent • plane • wallet • ticket • arrival • to wait • counter • costoms • to leave • passport • passenger • departure • suitcases • restrooms • to sit down • boarding pass • baggage claim • to take a trip • to begin a trip • to meet up with • to change money • to check luggage • security control
Gryffindor 2022-08-07
Across
- House founder
- friend to the twins
- Huge family
- strict animagus
- famous singer
- How many HOH
- Annoying knight
- tricksters
- main communication to family
- Security to commonroom
Down
- Primary house color
- brother of Colin
- grandpa of Harry
- house ghost
- scared but brave person
- element the house aligns
- animal
- Secondary house color
- wizard chess painting
- first female HOH
20 Clues: animal • tricksters • house ghost • Huge family • How many HOH • House founder • famous singer • strict animagus • Annoying knight • brother of Colin • grandpa of Harry • first female HOH • Primary house color • friend to the twins • Secondary house color • wizard chess painting • Security to commonroom • scared but brave person • element the house aligns • main communication to family
Dog Breeds 2024-07-16
Across
- He’s a Fighter
- Ears are longer then legs
- Georgia's Uga
- Firehouse Favorite
- Gives Directions
- Lassie Lineage
- Little Rascal Petey
- PA State Dog
- Sled Propeller
- Ravishing Redhead
Down
- Peek-a-boo Hairdo
- Deutschland Herder
- Yellow Go Getter
- Snoopy is One
- The Crime Dog
- Security Guard
- Has an ugly Mug
- Speed King
- A Footlong Hot Dog
- Pampered Pooch
20 Clues: Speed King • PA State Dog • Snoopy is One • Georgia's Uga • The Crime Dog • He’s a Fighter • Security Guard • Lassie Lineage • Pampered Pooch • Sled Propeller • Has an ugly Mug • Yellow Go Getter • Gives Directions • Peek-a-boo Hairdo • Ravishing Redhead • Deutschland Herder • Firehouse Favorite • A Footlong Hot Dog • Little Rascal Petey • Ears are longer then legs
10.1 vocabulary 2023-03-14
23 Clues: ATM • gate • plane • flight • customs • arrival • to lose • counter • suitcase • to pick up • to wait for • don't worry • waiting room • boarding pass • pass by/go by • baggage claim • to take a trip • to change money • to leave behind • to stand in line • to pack your bags • around the corner • security checkpoint
Supreme: 17강 2024-10-31
28 Clues: 기관 • 저주 • 평등 • 들다 • 실업 • 인기 • 지역 • 보안 • 전문가 • 공식적인 • 다가오는 • 제출하다 • 유래하다 • 사라지다 • 참가하다 • 확인하다 • 선언하다 • 참석하다 • 작업하다 • 재검토하다 • 현지의, 지역의 • 굴욕감을 느끼는 • 기준에 부합하는 • 물리치다, 이기다 • 고약한 냄새가 나다 • 관습, 연습/훈련하다 • ~으로부터 고통을 겪다 • 궤도, (궤도를) 돌다
Mostrador Vocabulary 2026 2026-01-29
30 Clues: sign • trip • here • seat • clerk • pilot • plane • aisle • flight • I left • to fly • ticket • I went • window • excess • arrival • customs • he flys • security • to board • suitcase • backpack • to travel • I arrived • to change • departure • passanger • put formal • put informal • check in counter
The Financial Vault Quiz 2018-02-26
Across
- An omnibus account is normally overseen by a ____ manager
- When deciding whether to issue a loan or invest in a debt security, lenders and investors must carefully consider the chance of
- It’s a savings platform that helps employees save a fraction of their salary every month that can be used in the event that you are rendered unable to work, or upon retirement
- The _____ the volatility, the riskier the security.
- A minimum of ___ persons are required to create an omnibus account
- The sale of a security that is not owned by the seller or that the seller has borrowed
- It refers to the amount of uncertainty or risk about the size of changes in a security's value.
Down
- Short selling is motivated by the belief that a security's price will ____
- The efficient frontier is the set of optimal portfolios that offers the highest expected return for a defined level of risk or the lowest risk for a given level of expected return
- Portfolios that lie below the efficient frontier are
- Account Is an account between two futures merchants (brokers)
- Employee’s Provident Fund is maintained and overseen by the ___
- One measure of the relative volatility of a particular stock to the market is its
13 Clues: The _____ the volatility, the riskier the security. • Portfolios that lie below the efficient frontier are • An omnibus account is normally overseen by a ____ manager • Account Is an account between two futures merchants (brokers) • Employee’s Provident Fund is maintained and overseen by the ___ • A minimum of ___ persons are required to create an omnibus account • ...
border security 2020-12-10
Across
- people and dogs that make sure nothing bad gets in to new Zealand!
- the illegal movement of good in to or out of our country!
Down
- alive things that we don't want in our bushes but some are ok!
- animals that have an amazing nose to find bad and good things!
- animas that are bad for the environment and eat other animals.
- living things that grow that are not bugs or humans or animals!
- creepy things that crawl into our bags!
7 Clues: creepy things that crawl into our bags! • the illegal movement of good in to or out of our country! • alive things that we don't want in our bushes but some are ok! • animals that have an amazing nose to find bad and good things! • animas that are bad for the environment and eat other animals. • living things that grow that are not bugs or humans or animals! • ...
Security protocols 2022-01-10
Across
- What does the second S in SSL stand for?
- Security ... - a sequence of operations that ensures protection of data
- The negotiation between two parties on a network before they begin a secured connection. Starts with TLS ...
Down
- Security ... - a digital document that authenticates certain websites
- ... attack - one of the attacks against SSL
- A type of encryption
- It can be public or private
7 Clues: A type of encryption • It can be public or private • What does the second S in SSL stand for? • ... attack - one of the attacks against SSL • Security ... - a digital document that authenticates certain websites • Security ... - a sequence of operations that ensures protection of data • ...
Social Security 2024-04-23
Across
- you recieve this from Social Security
- having a physical or mental condition that limits movements, senses, or activities.
- a severe global economic downturn that affected many countries across the world.
- a situation where a person actively searches for employment but is unable to find work.
Down
- a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
- a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
- the action or fact of leaving one's job and ceasing to work.
7 Clues: you recieve this from Social Security • the action or fact of leaving one's job and ceasing to work. • a severe global economic downturn that affected many countries across the world. • having a physical or mental condition that limits movements, senses, or activities. • a situation where a person actively searches for employment but is unable to find work. • ...
Security issues 2025-01-25
Across
- A barrier protecting a network from unauthorized access (
- A duplicate copy of data for recovery purposes
- The process of converting data into a secure, unreadable format
- Software designed to detect and block harmful programs
- someone who gains unauthorized access to systems
Down
- Measures taken to protect data and systems
- Harmful software like viruses or ransomware
7 Clues: Measures taken to protect data and systems • Harmful software like viruses or ransomware • A duplicate copy of data for recovery purposes • someone who gains unauthorized access to systems • Software designed to detect and block harmful programs • A barrier protecting a network from unauthorized access ( • ...
Food Security 2025-01-14
Across
- Singapore relies heavily on _______, with 90% of its food resource coming from more than 170 countries.
- Lack of proper nutrition.
Down
- Beyond farming, food processing, storage, and distribution sectors also generate __________.
- Region that has the most hungry people.
- The community grows a wide variety of edible plant species to promote food __________.
- Country that is facing food insecurity mentioned in the slides.
- _______ farming is embraced by Singapore as a solution to limited land availability.
7 Clues: Lack of proper nutrition. • Region that has the most hungry people. • Country that is facing food insecurity mentioned in the slides. • _______ farming is embraced by Singapore as a solution to limited land availability. • The community grows a wide variety of edible plant species to promote food __________. • ...
Employment Acronynms 2024-03-21
15 Clues: Q • HQ • Control QC • To Date YTD • Resources HR • Relations PR • Technology IT • Be Determined TBD • Education Unit CEU • Revenue Service IRS • Security Number SSN • Your Information FYI • Executive Officer CEO • Operating Procedure SOP • Employment Opportunity EEO
JAXIE #4 3-6-25 2025-03-06
15 Clues: a fruit • a place • a savior • old music • two parts • an animal • a vegetable • a big ledge • an instrument • by yourselves • a repeated sound • a security guard • place to put books • clothing around neck • a mountain that explodes
Cybersecurity 2025-08-22
Across
- collecting a user's private information.
- A collection of organized data.
- uses information illegally to harm and gain personal info
- Protecting computer systems.
- A weakness in a system that can be made use of by a threat actor.
- Someone who uses advanced computer skills to gain access to computer systems.
- uses information with permission for good reasons such as improving security.
Down
- a collection of connected computers that can share resources
- Any data that can identify a person directly or by collecting other data.
- The process to manage, maintain and secure computer.
- A security event where sensitive info is being stolen.
- discover vulnerabilities in systems without the person's permission.
- information processed by a computer.
13 Clues: Protecting computer systems. • A collection of organized data. • information processed by a computer. • collecting a user's private information. • The process to manage, maintain and secure computer. • A security event where sensitive info is being stolen. • uses information illegally to harm and gain personal info • ...
the best goated awesome cross word 2023-01-25
Across
- occurs when there are insufficient authorization checks for sensitive request handlers.
- The act of contaminating with dust particles solar_activity The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity.
- Any malware that misleads users of its true intent.
- A message warning the recipients of a non-existent computer virus threat.
- 2 words, is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown.
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- when an organization unknowingly exposes sensitive data or when a security incident leads to the accidental or unlawful destruction
- a type of access control vulnerability in digital security.
- A security misconfiguration arises when essential security settings are either not implemented or implemented with errors.
- Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal phishing The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a type of security vulnerability that can be found in some web applications.
- The sun is a magnetic variable star that fluctuates on times scales ranging from a fraction of a second to billions of years. Solar flares, coronal mass ejections, high-speed solar wind, and solar energetic particles are all forms of solar activity. advanced-fee_fraud Advance fee fraud, also called upfront fee fraud, is any scam that, in exchange for a fee, Promises to send you money, products, or services; Offers you the opportunity to participate in a special deal
- Software with malicious behavior that’s goal is to gather information about a person and send it to another entity in a way that harms the user.
- A type of malware that is programmed to repeatedly mutate its appearance or signature files through new decryption routines.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
15 Clues: Any malware that misleads users of its true intent. • a type of access control vulnerability in digital security. • A message warning the recipients of a non-existent computer virus threat. • a type of security vulnerability that can be found in some web applications. • occurs when there are insufficient authorization checks for sensitive request handlers. • ...
TEACHERS OIS 03/05/2024 2024-05-03
13 Clues: Moroko • sciencia • dratutse • Mukhidino • bombaclap • modelister • left alone • magical spanio • little commander • buddy GET LOST!!! • admin in the server • can work in security • guy with a lot of guys
CMSC 125: Operating Systems LE04 pt 1 2017-05-17
Across
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid
- Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers
- Bypasses CPU to transfer data directly between I/O device and memory.
- Storage structure consisting of information about a file.
- The time to move disk arm to the desired cylinder and tiem for desired sector to rotate under the disk head.
- A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules
- the art of decrypting or obtaining plain text from hidden messages over an insecure channel.
- Holding/Queueing of output for a device if the device is capable of serving only one request at a time.
Down
- Provides an object oriented way of implementing file systems.
- Is a storage made available over a network rather than over a local connection.
- Results from disk head making contact with the disk surface.
- Same key used to encrypt and decrypt.
- Uses the same page cache to cache both memory mapped pages and ordinary file system I/O to avoid double caching.
- A destructive program that masquerades as a benign application.
- Pretending to be an authorized user to escalate privileges.
- The study of codes, or the art of writing and solving them.
- Program that initates a security incident under certain circumstances.
- Intercepting an already established session to bypass authentication.
- The art of hiding messages by converting them into hidden texts.
19 Clues: Same key used to encrypt and decrypt. • Storage structure consisting of information about a file. • Pretending to be an authorized user to escalate privileges. • The study of codes, or the art of writing and solving them. • Results from disk head making contact with the disk surface. • Provides an object oriented way of implementing file systems. • ...
RDC Shows 2020-03-27
Across
- Shakespeare play which includes 3 witches
- RDC Musical Theatre Workshops 2020 production
- RDC's theatre festival in 2014
- Tale of a woman who loses her glass slipper
- Cyber Bully in rock musical Out Of My Comfort Zone
- The West End Tenors who performed at RDC in 2019
- Poem written by Lewis Carroll (Hunting of The ---)
- one-man comedy show mixing martial arts & cards(Card--)
- RDC Young Theatre Workshop's 2019 production
- regular comedy show for parents (Bring Your Own ---)
- Magical nanny in a book written by P.L. Travers(Mary--)
Down
- Regular night which showcases new work and new writing
- Kai's best friend in The Snow Queen
- Story of The Nutbrown Hares (Guess How Much I --- You)
- Complete the title - Boyface and the ---- ponies
- RYTW's 2016 Show, Performed at the National Theatre
- RDC and RMS collaboration performed at Hawkey Hall
- RDC's 2018 Christmas production (--- Christmas Dream)
- Julia Donaldson book - The Scarecrow's ---
- Crazy Chef who visited RDC last year (Signor ---)
20 Clues: RDC's theatre festival in 2014 • Kai's best friend in The Snow Queen • Shakespeare play which includes 3 witches • Julia Donaldson book - The Scarecrow's --- • Tale of a woman who loses her glass slipper • RDC Young Theatre Workshop's 2019 production • RDC Musical Theatre Workshops 2020 production • Complete the title - Boyface and the ---- ponies • ...
Vy´s second crossword 2020-05-11
Across
- to see someone in real life
- to write on paper and send it to your friends
- if someone is hurt or is missing
- if you are really bad
- if someone is bullying you on the internet
- if you are a drama queen
- a very beautiful place that you will never forget
- if you are like a mom
- 13-18 years old
- to do a phone number away if you hate them
Down
- to write a message to someone
- to send a teacher a message if you don´t have their phone number
- to answer on a text message
- the opposite of not understanding
- to look after your siblings or if someone is important to you
- the opposite of receive
- if you meet someone new you want to be friends with them then you have to ask them something
- the opposite of write
- If you want everyone to look at you all the time
- to have a job
20 Clues: to have a job • 13-18 years old • if you are really bad • the opposite of write • if you are like a mom • the opposite of receive • if you are a drama queen • to see someone in real life • to answer on a text message • to write a message to someone • if someone is hurt or is missing • the opposite of not understanding • if someone is bullying you on the internet • ...
Mortal Kombat 2021-08-31
Across
- Not Goro
- Servant of Chi
- Riots
- Moroi
- Bow
- Blind
- Wind
- Cleric
- Bodyguard
- Chill
- Come here!
- Alliance
- Monk
- Skinned
- Demon slaying demon
- No loyalty
- Scales
- Shokan Prince
- Villain
- Kai
- Fire
- Chop chop
- Red Dragon
- Speed
- Ketchup
- Ruler
- Brotherhood
- Mustard
- Hero
- Princess
- Sun
- Black Dragoness
- Drunken Master
- Queen
- Duo
- Cyber
- Champion
- Rainbow
Down
- Kiss
- Shake
- Deceived
- Fusion
- Brutality
- Grin
- Pretty
- Stripes
- Blood
- Grey Cloud
- Special Forces
- Elder Goddess
- Incect
- Oni
- Cold
- Motion
- Titan
- Cowboy
- Order
- Kenshi Jr.
- Club
- Sand
- Vanity
- Souls
- King
- Not Kano
- Clip clop
- Arms
- Hated
- Guide
- Fame
- Shadow
- Six
- Jade Enemy
- Not Liu Kang
- Rainbow
- Dreamer
- Mercenary
- Water
- Armageddon
78 Clues: Bow • Oni • Kai • Six • Sun • Duo • Kiss • Grin • Wind • Cold • Monk • Club • Sand • Fire • King • Arms • Fame • Hero • Shake • Riots • Moroi • Blind • Blood • Chill • Titan • Order • Souls • Speed • Ruler • Hated • Guide • Queen • Water • Cyber • Fusion • Pretty • Cleric • Incect • Motion • Cowboy • Scales • Vanity • Shadow • Stripes • Skinned • Villain • Ketchup • Mustard • Rainbow • Dreamer • Rainbow • Not Goro • Deceived • Alliance • Not Kano • Princess • Champion • Brutality • Bodyguard • Chop chop • Clip clop • Mercenary • ...
SPHE Crossword 2021-11-03
Across
- How you might feel if you were being bullied
- when you spread fake news about someone
- what you might get if you hold in things for to long
- what you tell the bully when they are bullying you
- to leave someone out
- practices to maintaining health
- what you are if you post on social media for your job
- to say you are going to do something dangerous to someone
- False or untrue
- who you tell if you are being bullied in school
Down
- what could happen if bullying escalates
- To constantly annoy or hurt someone
- talking behind somebody’s back
- treat people with .....
- best place to find fake news
- how you make people feel when you point out their flaws
- where bullying often happens the most
- What you are if you are being bullied
- the type of bullying when you use your words to hurt someone
- the type of bullying that happens online
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • where bullying often happens the most • What you are if you are being bullied • what could happen if bullying escalates • when you spread fake news about someone • ...
SPHE Crossword 2021-11-03
Across
- to say you are going to do something dangerous to someone
- What you are if you are being bullied
- what could happen if bullying escalates
- what you tell the bully when they are bullying you
- what you might get if you hold in things for to long
- best place to find fake news
- what you are if you post on social media for your job
- treat people with .....
- who you tell if you are being bullied in school
Down
- to leave someone out
- when you spread fake news about someone
- To constantly annoy or hurt someone
- How you might feel if you were being bullied
- the type of bullying when you use your words to hurt someone
- talking behind somebody’s back
- practices to maintaining health
- where bullying often happens the most
- the type of bullying that happens online
- how you make people feel when you point out their flaws
- False or untrue
20 Clues: False or untrue • to leave someone out • treat people with ..... • best place to find fake news • talking behind somebody’s back • practices to maintaining health • To constantly annoy or hurt someone • What you are if you are being bullied • where bullying often happens the most • when you spread fake news about someone • what could happen if bullying escalates • ...
Halloween 2017-11-04
Across
- / The Last...
- / He's been stuck in the matrix
- / versus Predator
- / Nocturnal creatures
- / A transgenic goat's milk had "-"silk qualities and could be turned into biosteel polymers
- Intelligence / Many believe this will take over the world
- / a common Sci-fi name for the Reanimated
- Edward Hyde / The good side of Dr Jekyll and Mr Hyde
- / The Famous and 'Shocking' Experiment
- / to do with Rebirth in Norse mythology
- / Where the Count lives
Down
- / This girl has grown up in a secret laboratory hidden deep in the Amazon rainforest.
- / Pig bladder cells where turned into "-" and scientists where able to grow a finger in it
- / Asimov of science fiction
- / The man who could eat anything
- / The Large Hadron Collider is situated in...
- / Famous Prison Experiment
- / When an aptitude test goes awry, Beatrice discovers she has a special quality.
- / In this society, people recruited as cyber warriors (like Tom) get computer chips in their brains.
- Ray / Nikola Tesla's famous...
20 Clues: / The Last... • / versus Predator • / Nocturnal creatures • / Where the Count lives • / Famous Prison Experiment • / Asimov of science fiction • / He's been stuck in the matrix • Ray / Nikola Tesla's famous... • / The man who could eat anything • / The Famous and 'Shocking' Experiment • / to do with Rebirth in Norse mythology • ...
The Ultimate EMC Crossword 2013-07-02
Across
- VCE partner
- scale-out storage
- Harddrive storing
- Chairman Tucci's Nickname
- NOVA, NOVAii, AViiON ...
- Your own cloud infrastructure
- analyzes big data
- VMware has 91% less Operational cost than this vendor
- EMC Headquarter State
- EMC's competition to Puredisk
- Avamars Encryption
- Management console
- Recommended storage for individual departments
- the remote control for storage
- The "P" in Paas
- The cloud from were cyber criminals act
- Fastest drives
Down
- A visible mass of liquid or frozen water
- Cloud Company owned by EMC and VMware
- remove identical data when merging two databases
- this bio-science project use ISILON IQ
- IHI wants to protect the worlds ... heritage
- Chad's (Chad's World) Twitter account
- VFCashes secret project name
- Isilon's Operating System
- Mass*speed of light ^2 =
- RSA Hacker-prevention
- The baby of Moshe Yanai
- Location of EMC's 15.000sq feet E-lab
- Engineer Mode Password
- Datacenter desktops
- Fully Automated Storage Tiering
32 Clues: VCE partner • Fastest drives • The "P" in Paas • scale-out storage • Harddrive storing • analyzes big data • Avamars Encryption • Management console • Datacenter desktops • EMC Headquarter State • RSA Hacker-prevention • Engineer Mode Password • The baby of Moshe Yanai • NOVA, NOVAii, AViiON ... • Mass*speed of light ^2 = • Chairman Tucci's Nickname • Isilon's Operating System • ...
charlotte's computer apps review 2022-05-02
Across
- Protects your computer from cyber attacks
- Where all of your stuff is stored.
- An app that you use functions in.
- The page at the very end of something to show where you got your information
- What app do you make a poster or card on?
- Teacher.
- What app do you use to communicate with teachers or other students during school time?
- Mean people that try to steal your information online
- An app used to make your works cited page.
- Copying other people's words is known as _____
Down
- This class.
- An app that makes it easy to present your ideas.
- Something that is really bad in Ms. Burghorns class
- You can make videos or podcasts on _____.
- Something supplied by the school so we can do all of this.
- An app used to make a survey.
- What is the default size margin?
- Format for English essays
- Quick access to websites or apps.
- What app can you write essays and papers in.
20 Clues: Teacher. • This class. • Format for English essays • An app used to make a survey. • What is the default size margin? • An app that you use functions in. • Quick access to websites or apps. • Where all of your stuff is stored. • Protects your computer from cyber attacks • You can make videos or podcasts on _____. • What app do you make a poster or card on? • ...
BAB 4 NKRI 2025-04-22
Across
- Contoh agresi dan nonagresi
- Loyalitas ganda
- Mendasari kehidupan berbangsa dan bernegara di Indonesia dilandasi oleh falsafah Pancasila.
- Usaha yang berasal dari luar, yang bersifat atau bertujuan melemahkan dan menghalangi
- Contoh ideologi, politik, ekonomi, dan sosial budaya
- Ancaman yang sering terjadi dan dihadapi setiap saat
- Contoh konvensional, asimetris, teroris, dan cyber warfare
- Mendasarkan diri pada kekuasaan.
- Ancaman terhadap ketahanan nasional yang berasal dari luar negri
Down
- Penggunaan kekuatan bersenjata oleh negara lain terhadap kedaulatan negara
- Sisi penting dari globalisasi
- Bersifat kebangsaan
- Hal atau objek yang perlu ditanggulangi
- Aktivitas pengumpulan informasi dan data yang dilakukan oleh suatu negara terhadap negara lain
- Ancaman terhadap ketahanan nasional yang berasal dari dalam negri
- Menciptakan kesepakatan bersama mengenai norma dan nilai nilai soaial
- Indonesia memiliki jumlah penduduk yang besar, tetapi penyebaran penduduknya tidak merata.
- Pembaruan hingga menjadi kesatuan yang utuh atau bulat
- (2 kata) Globalisasi berdampak pada kehidupan sosial budaya dari..
- Ancaman, tantangan, hambatan, dan gangguan
20 Clues: Loyalitas ganda • Bersifat kebangsaan • Contoh agresi dan nonagresi • Sisi penting dari globalisasi • Mendasarkan diri pada kekuasaan. • Hal atau objek yang perlu ditanggulangi • Ancaman, tantangan, hambatan, dan gangguan • Contoh ideologi, politik, ekonomi, dan sosial budaya • Ancaman yang sering terjadi dan dihadapi setiap saat • ...
ANALISIS DATA, ALGORITMA DAN PEMOGRAMAN, LITERASI DIGITAL (Maria Rachquel Aziziyah l 13 l VIII H) 2025-06-09
Across
- mendapatkan data tentang sesuatu
- merupakan ciri ciri opini kecuali
- proses memberi instruksi komputer untuk tugas tertentu
- kondisi benar dalam fungsi logika
- ciri ciri opini
- berpikir sebelum bertindak
- scratch dikembangkan oleh
- pesan teks isinya amarah atau frontal
- merupakan ciri ciri fakta kecuali
- alur logika dijalankan secara berurutan
- kesalahan tanpa niat buruk
Down
- fungsi Ms.excel digunakan untuk membaca tabel horizontal
- melakukan operasi matematika nilai atau membandingkan
- membujuk seseorang dengan tipe daya
- cara mengelola dan mengatur tampilan visual
- merupakan contoh pemrograman visual
- perundungan digital
- kata lain percabangan
- kondisi salah dalam logika
- pernyataan yang dapat dibuktikan kebenarannya
- Microsoft Exel disebut dengan nama aplikasi
- memahami perasaan orang lain
- mengontrol pergerakan spite
- hasil dari proses yang dilakukan terhadap data input
- yang bukan tipe data variabel
- alat untuk membuat tabel dan grafik
- informasi yang benar atau akurat
- ciri ciri fakta
- menyaring informasi palsu
- yang tidak merupakan ciri ciri cyber bullying
30 Clues: ciri ciri opini • ciri ciri fakta • perundungan digital • kata lain percabangan • scratch dikembangkan oleh • menyaring informasi palsu • kondisi salah dalam logika • berpikir sebelum bertindak • kesalahan tanpa niat buruk • mengontrol pergerakan spite • memahami perasaan orang lain • yang bukan tipe data variabel • mendapatkan data tentang sesuatu • informasi yang benar atau akurat • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-09
Across
- mendapatkan data tentang sesuatu
- merupakan ciri ciri opini kecuali
- proses memberi instruksi komputer untuk tugas tertentu
- kondisi benar dalam fungsi logika
- ciri ciri opini
- berpikir sebelum bertindak
- scratch dikembangkan oleh
- pesan teks isinya amarah atau frontal
- merupakan ciri ciri fakta kecuali
- alur logika dijalankan secara berurutan
- kesalahan tanpa niat buruk
Down
- fungsi Ms.excel digunakan untuk membaca tabel horizontal
- melakukan operasi matematika nilai atau membandingkan
- membujuk seseorang dengan tipe daya
- cara mengelola dan mengatur tampilan visual
- merupakan contoh pemrograman visual
- perundungan digital
- kata lain percabangan
- kondisi salah dalam logika
- pernyataan yang dapat dibuktikan kebenarannya
- Microsoft Exel disebut dengan nama aplikasi
- memahami perasaan orang lain
- mengontrol pergerakan spite
- hasil dari proses yang dilakukan terhadap data input
- yang bukan tipe data variabel
- alat untuk membuat tabel dan grafik
- informasi yang benar atau akurat
- ciri ciri fakta
- menyaring informasi palsu
- yang tidak merupakan ciri ciri cyber bullying
30 Clues: ciri ciri opini • ciri ciri fakta • perundungan digital • kata lain percabangan • scratch dikembangkan oleh • menyaring informasi palsu • kondisi salah dalam logika • berpikir sebelum bertindak • kesalahan tanpa niat buruk • mengontrol pergerakan spite • memahami perasaan orang lain • yang bukan tipe data variabel • mendapatkan data tentang sesuatu • informasi yang benar atau akurat • ...
Leadership 2024-12-19
Across
- A sophomore that is on the basketball team.
- A freshman with a great speaking voice.
- A senior that has a lot of family in Faridale.
- A sophomore whose Crew teacher is Ms. Jaggers.
- A junior who has a double letter in their first and last names.
- A sophomore who is on the wrestling team.
- A senior who is also a peer tutor.
- A sophomore that is bilingual.
- A sophomore in the teaching and learning program.
Down
- A senior who could've been a student aide instead of in this class.
- A sophomore in the cyber pathway.
- A sophomore that is also a student ambassador.
- A senior who is also on the yearbook staff.
- A a freshman that uses fun graphics in their presentations.
- A senior that is soft-spoken.
- A a freshman with a sister that is a senior.
- A junior that has to have Ms. Adams twice a day.
17 Clues: A senior that is soft-spoken. • A sophomore that is bilingual. • A sophomore in the cyber pathway. • A senior who is also a peer tutor. • A freshman with a great speaking voice. • A sophomore who is on the wrestling team. • A sophomore that is on the basketball team. • A senior who is also on the yearbook staff. • A a freshman with a sister that is a senior. • ...
Financial Math Extra credit 2021-09-17
Across
- taxes- Social security and medicare taxes are paid for by FCIA taxes
- Taxable income- a percentage of each worker's salary is taken out of each paycheck,up to a maximun amount per year
- They are paid by production rather then the length of time it takes them to do the job
- Security- insurance program available through U.S. government that provides retired, disabled, or who needs survivors benifits. Covers 90 percent of all american jobs
- Nations largest health insurance program for people 65 years or older and some disabled people under 65
Down
- rate- Pieceworkers are paid a certian amount of money called a.
- earns more money as more sales are made
- security number- a unique 9 digit number that belongs only to you
- A fee-based advisor charges a flat rate for managing a client's money.
- contribution insurance act- FCIA
10 Clues: contribution insurance act- FCIA • earns more money as more sales are made • rate- Pieceworkers are paid a certian amount of money called a. • security number- a unique 9 digit number that belongs only to you • taxes- Social security and medicare taxes are paid for by FCIA taxes • A fee-based advisor charges a flat rate for managing a client's money. • ...
Airport 2025-02-20
Across
- Essential skill for handling crises effectively
- What teams must solve quickly in high-pressure situations
- Essential document for international travel
- Ensures safety by screening passengers and luggage
- Process of checking baggage for security threats
Down
- Home to the world's tallest indoor waterfall at Changi
- The region where planes take off, fly, and land
- Making sure rules and safety measures are followed
- The study of crime and how to prevent it
- Enforce airport laws and maintain public order
10 Clues: The study of crime and how to prevent it • Essential document for international travel • Enforce airport laws and maintain public order • Essential skill for handling crises effectively • The region where planes take off, fly, and land • Process of checking baggage for security threats • Making sure rules and safety measures are followed • ...
SAPM 2025-08-07
Across
- The systematic risk of a security relative to the market
- Collection of assets held by an investor
- The risk that can be eliminated through diversification
- The measure of variability or dispersion of returns
Down
- Risk affecting all securities in the market
- The market where previously issued securities are traded
- A fixed income security
- Profit from investment
- Financial asset representing part ownership in a company
- Approach to estimate the required return using risk-free rate and beta
10 Clues: Profit from investment • A fixed income security • Collection of assets held by an investor • Risk affecting all securities in the market • The measure of variability or dispersion of returns • The risk that can be eliminated through diversification • The market where previously issued securities are traded • The systematic risk of a security relative to the market • ...
Internet Safety 2023-10-02
5 Clues: Virtual _______ network • it's the name of game literally • 80% of what don't feel safe internet • somebody who steals your personal information • There is an internet underscore every 39 seconds!!!
Safer Internet Day 2023-02-06
5 Clues: (who will help you ) • ( What you should never tell anyone ) • ( People might take your private file ) • ( Never talk to any Strangers ) on Omegle • bullying (What is the word for Online bullying)
Propelling Smart Growth 2021-04-08
ICS133: Computer Security Crossword Puzzle 2017-04-23
Across
- A Public-Key Cryptography that encrypt data readable only by the recipient and verify that particular sender encrypted a particular message.
- It is a running program.
- A type of error that fails to detect a match between a credential and the database.
- An Industry Security Standards from a family of international standards for security system quality improvement.
- A ____________ attack uses a list of likely passwords as the password space.
- A stronger secret key building blocks that use wrapping technique to protect keys carried in network messages.
- A level of motivation that applies effort, but avoids social stigma.
- A stronger secret key building blocks where the center distributes wrapped keys and authorized users to share a secret with it.
- A US Government standards for financial and accounting standards for public companies. (Acronym)
- It is the amount of lead time required to set up the attack.
- A transport layer security that was developed by netscape in 1994 and is a part of commercial client or server Web package. It is the first really successful public-key application.
- An Industry Security Standards that uses the banking industry to protect electronic funds transfers.
- The most secure type of token that stores a secret that generates a different credential for each login.
- An attack on DNS where the resolver receives a bogus response to a DNS request.
- A US Government security standards for certain types of personal health data. (Acronym)
- The most common type of token that stores an unchanging credential.
- A tailored policy where it share some blocked files.
- It is a group of instructions.
- A type of error that incorrectly detects a match with a credential and the database.
- The __________ procedure in the operating system (OS) switches running processes.
- "Data in motion", A basic state that is being moved from one place to another.
- A Public-Key Cryptography that constructs a shared secret from information shared in public.
- A tailored policy where it block some files from sharing.
- A US Government standards for protecting personal financial information. (Acronym)
- A modern malware where a botnet and spam package that used to produce 7 million messages a day.
Down
- A malicious software is called a _______.
- It is the number and types of people required for the attack.
- It summarizes the attack in the Attack Case Study.
- A modern malware that attacks control logic in industrial plants.
- A stronger secret key building blocks that generate a new key using a one-way hash.
- It is the first major Internet worm in 1988 that disabled about 10% of Internet computers.
- A tailored policy where it gives full rights for some users.
- A global policy that let users share their files
- "Data at rest", A basic state that stores data or information in a computer and is not being processed.
- A policy alternative that modify rights for specific sets of files.
- _______ ____________ are stored in a control section and executed by the CPU.
- It is the brief description of threat agent in the Attack Case Study.
- A level of motivation that will exploit minor vulnerabilities.
- A policy alternative that applied to all users by default.
- A modern malware that creates botnet focused on financial fraud.
- A global policy that keep users separate
- It uses a PRNG to transform the current key into a new one and separate endpoints that can apply the same PRNG to yield the same key.
- A US Government security standards for federal computer systems. (Acronym)
- A basic state that is being used by an active process and is usually stored in RAM.
- A ____ _______ prevents a sender from sending data transfer than the recipient can handle it.
- A modern malware that – spreads through email and creates a botnet that spreads spam and more malware.
- acceptance rate The likelihood of incorrectly authenticating someone as an authorized user.
- An Industry Security Standards that is used by “Payment Card Industry” to protect credit card transactions.
- A modern malware that spreads through the Internet via Windows vulnerabilities and created a botnet used for spam and malware distribution.
- _______ contain text interpreted by a programming language interpreter.
50 Clues: It is a running program. • It is a group of instructions. • A global policy that keep users separate • A malicious software is called a _______. • A global policy that let users share their files • It summarizes the attack in the Attack Case Study. • A tailored policy where it share some blocked files. • A tailored policy where it block some files from sharing. • ...
Ipo rossword puzzle 2021-09-13
Across
- A derivative is a complex type of financial security that is set between two or more parties.
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a service charge assessed by a broker or investment advisor.
- a security that represents the ownership of a fraction of a corporation.
- Electronic Data Gathering, Analysis, and Retrieval system
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
Down
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- Mark Zuckerberg
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Week 7 PASS AF208 Crossword 2024-03-28
Across
- value is used to determine the dollar value per share.
- is a price a trader is willing to accept to sell a security.
- shares that are hybrid securities that have features of both debt and equity
- is the price a trader is willing to pay for a security.
- value of a security is the PV of expected future cash flows discounted at the investor’s required rate of return.
- is the worth of an asset to an individual.
Down
- are tradable instruments that represent an ownership interest or the right to receive payment on a debt.
- is the stated rate of interest paid on the bond.
- is the amount of money needed to acquire an asset.
- normally pays a regular income stream (the coupon) and has a face value that is repaid to the holder at maturity.
10 Clues: is the worth of an asset to an individual. • is the stated rate of interest paid on the bond. • is the amount of money needed to acquire an asset. • value is used to determine the dollar value per share. • is the price a trader is willing to pay for a security. • is a price a trader is willing to accept to sell a security. • ...
Puzzle #8 – “COLA (Cost-of-Living Adjustment)” 2025-06-29
Across
- - Agency that announces the COLA each year
- - This grows when COLA is applied
- - Month when COLA changes typically take effect
- - What COLA causes to your Social Security payments
Down
- - A statistical measure used to determine COLA
- - What COLA is meant to adjust for
- - COLA is calculated as this type of number
- - COLA helps benefits match this rise in prices
- - COLA is based on this type of price index
- - Annual Social Security increase to keep up with inflation
10 Clues: - This grows when COLA is applied • - What COLA is meant to adjust for • - Agency that announces the COLA each year • - COLA is calculated as this type of number • - COLA is based on this type of price index • - A statistical measure used to determine COLA • - COLA helps benefits match this rise in prices • - Month when COLA changes typically take effect • ...
Expert 2024-12-27
Across
- A software fix that addresses a security vulnerability.
- Malware that encrypts your files and demands payment.
- An authentication method requiring two or more factors.
- A secure, isolated environment for testing code.
- A device that connects to a network.
- A security protocol that eliminates passwords.
Down
- A method where malicious code is inserted into a query.
- The person or group responsible for an attack.
- Measures taken to prevent or respond to threats.
- Unauthorized access into a system.
10 Clues: Unauthorized access into a system. • A device that connects to a network. • The person or group responsible for an attack. • A security protocol that eliminates passwords. • Measures taken to prevent or respond to threats. • A secure, isolated environment for testing code. • Malware that encrypts your files and demands payment. • ...
Nguyễn Vân Khôi - Trần Thị Ngọc Châu 2023-02-16
5 Clues: like a computer but flat • relating to the Internet • who has an interesting technology • owned by the richest man in the world. • electronic machine that can do everything you want
Technology 2023-02-16
5 Clues: like a computer but flat • relating to the Internet • who has an interesting technology • owned by the richest man in the world. • electronic machine that can do everything you want
cyber 2024-08-29
Panda Search 2018-04-12
15 Clues: taken • title • trade • author • to find • famous zoo • standing out • stolen panda • find an answer • law enforcement • owner of the zoo • zoo owner's rival • security guard at zoo • daughter of the zoo's owner • Main character, crime solver
46 2022-01-24
15 Clues: hate • Hexer • Bumped into • Vegan staple • Marvel villain • Yucatan native • Comedian Daniel • Music Genre (3) • Best of the bet • Kitchen Utensils • About Elton John • Ballerina's gear • "Rocks" at a bar • Waves overhead, maybe • U.N. Security Council permanent member
Levant 2024-11-19
15 Clues: Rent app • I fix it • Minimum age • Case Manager • Property name • I keep it fun • Building owner • Onsite Manager • Beautiful view • type of housing • Security System • I keep it clean • Medical Provider • style of housing • Management Company
After 9/11 what happened next 2021-05-25
Across
- How many phases did Operation Enduring Freedom have?
- Outlines the powers of the President and commander and chief.
- What was grounded after the attacks?
- Why was Iraq and Suddam Hussein a treat?
- What began on October 7th against Taliban and al Qaeda training camps in Afghanistan?
- What country offered bin Laden sanctuary?
- Who was the National Security Advisor?
- What Doctrine declared the War on Terror?
Down
- What terrorist organization was identified?
- What was Bush's first decision as wartime commander?
- Who was the leader of Al Qaeda?
- Where were war criminals held?interrogation Methods such as sleep deprivation, slapping, water boarding, and subjecting prisoners' to cold.
- Who was Security of Defense?
13 Clues: Who was Security of Defense? • Who was the leader of Al Qaeda? • What was grounded after the attacks? • Who was the National Security Advisor? • Why was Iraq and Suddam Hussein a treat? • What country offered bin Laden sanctuary? • What Doctrine declared the War on Terror? • What terrorist organization was identified? • How many phases did Operation Enduring Freedom have? • ...
US-China relations 2025-11-14
Across
- Popular video platform facing U.S. scrutiny over data security and ownership.
- a symbol of agricultural trade tensions between 2 countries
- to reduce risks in China-related supply chains
- A high-level meeting between leaders to manage tensions
- an action that is intended to cause anger
- Taxes on imports, used heavily during the U.S.–China trade war
- Chinese tech giant central in debates over 5G security and U.S. sanctions.
Down
- A major flashpoint in U.S.–China relations
- A strategy used to limit another nation’s power, influence, or expansion.
- Region that is the main focus of U.S. strategy to counter China
- A global project expanding China’s influence
- When relations worsen, they____ (verb)
- relations between 2 countries
13 Clues: relations between 2 countries • When relations worsen, they____ (verb) • A major flashpoint in U.S.–China relations • an action that is intended to cause anger • A global project expanding China’s influence • to reduce risks in China-related supply chains • A high-level meeting between leaders to manage tensions • ...
Forensic Disciplines Practice 2024-02-29
Across
- Small or microscopic pieces of evidence at a scene.
- Matching fur, wool, or follicle samples with suspects and victims.
- Studies human biological and physiological manners of death from autopsies.
- Analyzes poisons, drugs, toxins, and their transmission.
- Studies the general processes of the brain and mind.
- Dentistry and teeth analysis for forensic identification.
- Observing and collecting oily prints left at a scene.
- Using cyber or computer evidence in a case.
Down
- Analyzes behaviors of criminals and develops profiles of suspects.
- Observing clothing or fabric textiles from a crime scene.
- Uses information from diseases and illnesses in investigations.
- Studies insects and bugs relationship to decomposing bodies.
- Photographing and casting tracks left like tire tracks, shoe prints, and tool marks.
- Analysis of dead remains and the information derived from them.
- Analyzing the use of firearms.
- Analyzing patterns and presence of blood
- Analyzing and using the genetics in evidence
17 Clues: Analyzing the use of firearms. • Analyzing patterns and presence of blood • Using cyber or computer evidence in a case. • Analyzing and using the genetics in evidence • Small or microscopic pieces of evidence at a scene. • Studies the general processes of the brain and mind. • Observing and collecting oily prints left at a scene. • ...
Safety 2024-12-10
14 Clues: H2O • atlas • tissues • sheltered • warm wrap • cotton wrap • sulfurous light • sharp edged tool • computer security • power outage light • Olympic flame lighter • neither X-ray nor Gamma • hot chocolate container • construction tool a with claws
