cyber security Crossword Puzzles
Income Tax Vocabulary 2023-11-26
Across
- When you overpay the government, you receive a refund
- Expenses the government has
- gross income Total income
- withholding Money an employer holds from your paycheck
- status Married/single/head of household
- Income from stocks and bonds
- Income the government receives from taxpayers, etc.
- Dependents you are claiming
- Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
- Set $ amount not taxed for each dependent
- Money you earn from employment
- income Money earned before deductions
- Husband/Wife
Down
- care expenses Money you pay for someone else to care for a child or elder dependent
- tax Taxes on income
- deduction $ amount non itemizers may subtract from income based upon filing status
- security Your personal identification number
- income Income received from interest, dividends, social security & pentions
- Money received from saving account
- A person who relies on someone for living expenses
- Your banks identification number
- of household Single person who has dependents
- No withholding
- pay Money you earn to take home
24 Clues: Husband/Wife • No withholding • tax Taxes on income • gross income Total income • Expenses the government has • Dependents you are claiming • Income from stocks and bonds • Money you earn from employment • pay Money you earn to take home • Your banks identification number • Money received from saving account • income Money earned before deductions • ...
Security and Privacy in Clinical Research 2023-11-22
Across
- Adherence to laws, regulations, and guidelines in healthcare
- HIPAA-compliant method to remove identifiable information (two words, remove space)
- Assurance of the accuracy and consistency of data over its lifecycle
- Legislation that protects personal health information in the U.S.
- Right to control the disclosure of personal health information
- Secure connection method for remote access to a network
- Access control based on permissions and roles
- Security system that controls incoming and outgoing network traffic
- Keeping patient information private and secure
- Desire to keep one's identity unknown
- Verification of identity using passwords, tokens, or keys
Down
- Removing or altering personal information from data sets to protect privacy
- Measures to protect data from unauthorized access
- Ensuring reliable access to healthcare services and data systems
- Scrambling data to prevent unauthorized interception
- Incident involving unauthorized release or exposure of private data
- Fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
- Removing identifiers from data to preserve privacy
- Agreement by patients to participate in research and share data
- Tool funded by NIH for data analysis and patient cohort identification
20 Clues: Desire to keep one's identity unknown • Access control based on permissions and roles • Keeping patient information private and secure • Measures to protect data from unauthorized access • Removing identifiers from data to preserve privacy • Scrambling data to prevent unauthorized interception • Secure connection method for remote access to a network • ...
Asleep On A Plane 2023-06-29
Across
- it's pressurized
- where declarations are made
- the brothers who got us here
- an alaskan island NOT served by many airlines
- everyone's waiting for the light to go off
- he'll bring you snacks
- where the plane goes from ground to sky
- despite the inflatable slide, no one wants to go to this pool party
- popular western airline
- famous German airline
- fluffy clouds
- what the plane's doing at 30,000 feet
- dispensed by a dangling mask
- where your carry-on is stored
- what you gotta pay to check
- stop in-between
- fills the tank
Down
- classic inflight drink
- additional security layer for some international travel
- domain of TSA
- at the helm
- seat position upon landing
- seatback furniture
- sign of baby's distress
- puke vessel
- classic inflight snack
- precedes arrival
- bumpy ride
- chocolate, liquor, electronics found here
- where the VIPs hang
- where one waits for one's plane
- badly behaved
- the state of most flights these days
- what condors and vultures do
34 Clues: bumpy ride • at the helm • puke vessel • domain of TSA • fluffy clouds • badly behaved • fills the tank • stop in-between • it's pressurized • precedes arrival • seatback furniture • where the VIPs hang • famous German airline • classic inflight drink • he'll bring you snacks • classic inflight snack • sign of baby's distress • popular western airline • seat position upon landing • ...
Per 1 Chapter 11 - Ali, Mohammad 2023-02-23
Across
- The Disk is operating with no issues.
- Allows you to control parts of the computer.
- Bit depth
- Delete Browsing History
- A regular disk is being converted to a dynamic disk.
- A volume is operating properly.
- Already open file with no security
- The SSH host receives credentials.
- Icons flying everywhere.
- has the same start button as Windows 7
- The disk is unavailable or corrupted
- Set of rules and procedures
- Identified with Dollar Signs in the name
- A command that is used to query a DNS Server.
- Private network connects to other remote networks through their own network.
Down
- Vertical or Horizontal
- Used to open or delete a file using higher permissions.
- Tile Startup
- Nothing is left on
- Virtual app folder
- Power is saved by saving power through turning off ?
- Garbage OS
- A command that tests basic connectivity between devices.
- Choose a power plan.
- A display can be specified.
- Windows before Windows 7
- Opens remote desktop utility.
- Numbers of times the screen is redrawn.
- A disk is turn off or disconnected.
- Very weak security
30 Clues: Bit depth • Garbage OS • Tile Startup • Nothing is left on • Virtual app folder • Very weak security • Choose a power plan. • Vertical or Horizontal • Delete Browsing History • Icons flying everywhere. • Windows before Windows 7 • A display can be specified. • Set of rules and procedures • Opens remote desktop utility. • A volume is operating properly. • Already open file with no security • ...
unit 6 2023-05-19
Across
- monitors product safety nationwide
- the government controls all of the means of production
- ______ resources; humans with skills used to produce goods and services
- social _____; Medicare for people 65 or older
- investigates violations of federals law
- choices for production are made by people based on there life
- regulates the trading of stocks and bonds
- choices are made in markets through buyers and sellers
- protect from poorly made food
- health insurce for low income Americans
- all choices are made by the government
- to prevent false advertising
Down
- ______ cost; 2 choices and you have to give one
- works to control the spread of diseases
- protect workers from hazardous conditions
- developing countries
- ensures safety in flying
- _____ resources; any asset used in the productions of goods and services
- government controls some part of the economy to promote equality in reasources
- government gets involved to protect there people
- protect the environment
- regulates communications over the air
- looks into trafficking drugs
- health added to the social security program
24 Clues: developing countries • protect the environment • ensures safety in flying • looks into trafficking drugs • to prevent false advertising • protect from poorly made food • monitors product safety nationwide • regulates communications over the air • all choices are made by the government • works to control the spread of diseases • investigates violations of federals law • ...
Marigolds Crossword 2023-08-21
Across
- of, relating to, or in the nature of an illusion; lacking reality
- a state of abstracted musing; daydreaming
- a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
- difficult or impossible to explain or account for.
- very cautious; wary; not giving or expending freely
- punishment administered in return for a wrong committed.
- to evade or escape from, as by daring, cleverness, or skill
- to provoke and urge on
- a filthy and wretched condition or quality.
Down
- a state of reduced sensibility or consciousness
- represented or appearing as such
- to interrupt or cut off
- lacking physical form or shape; lacking organization; formless
- lacking physical strength or vigor; weak.
- a show of bravery or defiance, often in order to make a false impression or mislead someone.
- indifference to pleasure or pain; impassiveness.
- having no useful result; ineffectual
- a security hole or an instance of taking advantage of a security hole
- arousing deep emotion, especially pity or sorrow; touching
- a difference between one thing and another, between one writing and another; a variance.
20 Clues: to provoke and urge on • to interrupt or cut off • represented or appearing as such • having no useful result; ineffectual • a state of abstracted musing; daydreaming • lacking physical strength or vigor; weak. • a filthy and wretched condition or quality. • a state of reduced sensibility or consciousness • indifference to pleasure or pain; impassiveness. • ...
Investing-Ray 2025-03-24
Across
- You dont pay social security tax when you have this
- conceived in 1935 to address the permanent problem of economic security for the elderly
- Put up $7000 pre tax
- What you can dip into after retirement
- Government medical healthy plan
- $176,100
- What you live off of on a monthly basis
- The thing your doing right now
- Retirement age
- When you move your savings from one company to another
- What you look forward to when your too old to work
Down
- An account where you invest your money
- Put up $7000 post tax
- Old age, survivors, disability, investments
- U.S. Federal payroll tax
- Employer sponsored retirement savings plan
- Someone you hire to talk to about your money
- A collection of stocks, bonds or other assets that trades on stock exchange
- Retirement bonus age
- Someone you work for
- A place where people can invest their money
- Who created retirement?
- Secured in the possession of, or assigned to a person
- A sum of money saved or made available for a particular purpose
- The abbreviation for Required Minimum Distribution
25 Clues: $176,100 • Retirement age • Put up $7000 pre tax • Retirement bonus age • Someone you work for • Put up $7000 post tax • Who created retirement? • U.S. Federal payroll tax • The thing your doing right now • Government medical healthy plan • An account where you invest your money • What you can dip into after retirement • What you live off of on a monthly basis • ...
HSE Crossword 2025-05-07
Across
- Cipher component modifiable for crypto agility
- Self-test comparing output to expected results
- Legacy protocol surpassed by HSE performance
- Security feature to zeroize keys upon intrusion
- Quantum-resistant encryption initiative
- Protocol for secure management via CM7
- Key used for deriving encryption keys
- Diagnostic tool for encrypted Ethernet links
- Encryption algorithm used in CN Series
- Vendor of CN Series encryptors
- Time delay minimized by cut-through architecture
- Competitor protocol with hop-by-hop limitations
- Compact encryptor ideal for remote sites
Down
- Traffic handling policy besides encrypt or discard
- Mode for point-to-point encryption over Ethernet
- Capability to support new algorithms
- Software used to manage Senetas encryptors
- Transport Independent Mode acronym
- Kit for developing custom ciphers
- Self-test for manual verification of output
- Certification for cryptographic module security
- Command to zeroize keys and CSPs
- Mode for point-to-multipoint Ethernet encryption
- Encryption solution for secure data in motion
- Erasing all sensitive keys and data
- Management interface for configuring HSE devices
- High-performance encryptor for 100Gbps
- Mid-range encryptor for 10Gbps networks
28 Clues: Vendor of CN Series encryptors • Command to zeroize keys and CSPs • Kit for developing custom ciphers • Transport Independent Mode acronym • Erasing all sensitive keys and data • Capability to support new algorithms • Key used for deriving encryption keys • Protocol for secure management via CM7 • Encryption algorithm used in CN Series • ...
To boldly go 2026-01-20
Across
- Locutus by another name
- The most bored engineer
- Swordsman and navigator
- Engineer who should have cleared his holodeck history
- Doc played by Picardo
- More miracle worker than engineer
- Asked about the nuclear wessels
- Doctor played by Spiner
- Honorable security officer
- Often told to be quiet
- Your birthday gift
- A skilled painter and violinist
- Centuries-old advisor to Picard
- Weirdly short first name of he who plays Wesley
- The original Soong-type android
- First human to warp
- If Q bothered ponies instead of explorers
Down
- Married Worf
- Where Worf lays his head
- Picard's first ship
- One Borg to keep an eye out for
- Earth’s sector
- First human to speak to the prophets of Bajor
- Deck where the Enterprise’s forward lounge is located
- A daring seat maneuver
- Where Data’s head was found
- Security officer with data entry experience
- James Tiberius
- Organization with a logo based on the United Nations
- Borg on a voyage
- First Soong-type daughter
- Also your birthday gift
32 Clues: Married Worf • Earth’s sector • James Tiberius • Borg on a voyage • Your birthday gift • Picard's first ship • First human to warp • Doc played by Picardo • A daring seat maneuver • Often told to be quiet • Locutus by another name • The most bored engineer • Swordsman and navigator • Doctor played by Spiner • Also your birthday gift • Where Worf lays his head • First Soong-type daughter • ...
Week 4 2025-09-18
Across
- what kind of light source did they use above the Vatican for pope leo's birthday
- what natural disaster destroys 3 houses in utah
- how old did pope Leo turn
- what professional sport is having playoffs
- what popular figure in today's world says fight back in London's protest
- what are we patrolling the seas around Venezuela for
- where does trump want troops to stop crime
- charlie kirks shooter
- what is trump threatening with russia
- what foreign country is drilling military with Belarus
- what did a delta flight hit and have to turn around for
- How much money trump is requesting for increased security
Down
- what state did a teenager shoot up his school in
- last name of the fugitive that turned himself in for the shooting of charlie kirk
- what is charlie kirks roommate-lover
- how much did the world record sunflower grow a day
- what foreign country has rising tensions training their public for war
- what country is planning their biggest security operation
- how tall is the new world record sunflower
- what happened between a train and a semi
20 Clues: charlie kirks shooter • how old did pope Leo turn • what is charlie kirks roommate-lover • what is trump threatening with russia • what happened between a train and a semi • what professional sport is having playoffs • how tall is the new world record sunflower • where does trump want troops to stop crime • what natural disaster destroys 3 houses in utah • ...
Federal Agencies 2025-05-05
11 Clues: 7.65 • Finances • Bank Buddy • Stock Fraud • Banking Success • Social Security • Treasury monument • Excessive Spending • Optimal Retirement • Unemployment benefit • Stock Disclosure Statement
Executive Branch 2023 2023-10-17
Across
- declaration of forgiveness and freedom from punishment
- an official representative of a country's government
- agreement among a group of nations to prohibit them from trading with a target nation
- more presidents have been this profession than any other profession
- this article of the Constitution discusses the Executive Branch
- The Presidential ___ Act deals with the line of succession after the Vice President
- This amendment deals with presidential succession
- Executive ___ is a rule of command that has the force of law
- Current President (last name)
Down
- The Department of ___ Security was created in 2002
- the President's plan for dealing with other countries is referred to as his ___ policy
- a group of presidential advisors
- a pardon toward a group of people
- an order to delay a person's punishment
- The United States ___ Service is an example of a government corporation
- the primary goal of American foreign policy
- Current Vice President (last name)
- formal agreements between the governments of two or more countries
18 Clues: Current President (last name) • a group of presidential advisors • a pardon toward a group of people • Current Vice President (last name) • an order to delay a person's punishment • the primary goal of American foreign policy • This amendment deals with presidential succession • The Department of ___ Security was created in 2002 • ...
Escalation Line Black Inventors Puzzle 2022-02-16
14 Clues: Hot Comb • Potato Chip • Traffic Light • Peanut Products • Folding Cabinet • Street Letter Box • Induction Telegraph • Home Security System • Improved Boiler System • Improved Ironing Board • Automatic Transmisison • Automatic Elevator Doors • Evaporative Air COnditioner • Automatic Lubricating Device
E-Commerce Security and Payments 2025-05-01
Across
- - Scam using fake links (e.g., "Pos Laju" fraud).
- - Harmful software (e.g., viruses, ransomware).
- - Security principle ensuring data confidentiality.
- - Text files tracking user activity on websites.
- - Guarantees timely access to avoid delays.
Down
- - Security tool blocking unauthorized network access.
- - Prevents unauthorized data modification.
- - Malicious actor who illegally accesses computer systems.
8 Clues: - Prevents unauthorized data modification. • - Guarantees timely access to avoid delays. • - Harmful software (e.g., viruses, ransomware). • - Text files tracking user activity on websites. • - Scam using fake links (e.g., "Pos Laju" fraud). • - Security principle ensuring data confidentiality. • - Security tool blocking unauthorized network access. • ...
Geografiya 2023-10-22
Across
- a wireless technology that allows data transmission using radio waves
- software that detects and removes viruses from a computer
- a measure of the maximum number of bits that can be transmitted over a network or cable in a specified amount of time
- a type of network that communicates over a small geographical area, such as a single building
- a type of cyber-attack that uses a dictionary to try to discover passwords automatically
- software that detects and removes spyware from a computer
- a computer that offers a service to other devices on a network, such as file-sharing services and printer-sharing services
- an application that uses rows and columns to organise data and carry out calculations using that data
- computer hardware and complex Al software working together to solve a problem without any human interaction
- the collective name for all types of attacks on a computer or computer network
Down
- the software that users access to carry out tasks
- not allowed
- the study of machines and algorithms designed to carry out tasks in a way that is similar to humans
- software or hardware that prevents unauthorised access to a network
- the physical parts of a computer that you can touch and see, e.g. the processor, storage devices, input devices, output devices
- what happens when something interrupts the transmission of a signal; this could be a physical obstruction such as a wall, or other radio waves
- raw facts and figures
- connected to the internet
- the programs or set of instructions that tell a computer what to do to complete a task; aspects of a device you cannot touch
- carrying out an operation on data, e.g. querying a database or doing a calculation using data in a spreadsheet
- a collection of computing devices connected to each other, either wired or wirelessly
- the instructions that tell a computer system how to complete a task
- enables devices to connect to a network using Wi-Fi
- step-by-step instructions to solve a particular problem
- a network device that forwards data from one device to another
- a simulation that superimposes digital images on the user's real- world environment and allows the user to interact with those images
- a type of network that communicates over a large geographical area, such as across a city or country.
- a popular type of copper cable used to transmit data between devices
28 Clues: not allowed • raw facts and figures • connected to the internet • the software that users access to carry out tasks • enables devices to connect to a network using Wi-Fi • step-by-step instructions to solve a particular problem • software that detects and removes viruses from a computer • software that detects and removes spyware from a computer • ...
Surfers Paradise Safety Action Project 2024-09-01
Across
- Security personnel received this in order to effectively manage venues
- Street where majority of the nightclubs are concentrated
- Crime problem
Down
- This was implemented by all night clubs with the exception of one
- The project sought to implement this between police and security personnel
- Surfers Paradise is famous for this
- Where the project took place
- 22 of these were under observation during the project
- State of intoxication
9 Clues: Crime problem • State of intoxication • Where the project took place • Surfers Paradise is famous for this • 22 of these were under observation during the project • Street where majority of the nightclubs are concentrated • This was implemented by all night clubs with the exception of one • Security personnel received this in order to effectively manage venues • ...
Ipo rossword puzzle 2021-09-13
Across
- a security that represents the ownership of a fraction of a corporation.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- a service charge assessed by a broker or investment advisor.
- Mark Zuckerberg
- , Capital stock is the amount of common and preferred shares that a company is authorized to issue
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- Electronic Data Gathering, Analysis, and Retrieval system
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- a sales pitch or promotion made by the underwriting firm, usually on the road
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- , A derivative is a complex type of financial security that is set between two or more parties.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
IC3 Module 3 Lesson 30 2015-05-22
Across
- Encrypts the information in an SSL Certificate.
- Security feature used for larger networks that controls computers from one point.
- A malicious program that records keystrokes.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Deciphers the information in an SSL Certificate.
- Hackers using spyware to control your browser.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
Down
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
IC3 Lesson 30 2015-05-15
Across
- Security feature used for larger networks that controls computers from one point
- A malicious program that records keystrokes
- Hackers using spyware to control your browser
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Encrypts the information in an SSL Certificate
- Invading Someone else's computer, usually for personal gain or the satisfaction of defeating a security system
Down
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
lesson 30 vocab words 2015-05-18
Across
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- hackers using spyware to control your browser
- Deciphers the information in an SSL Certificate
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
Down
- A malicious program that records keystrokes
- Encrypts the information in an SSL Certificate
- Security feature used for larger networks that controls computers from one point
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Quality Crossword 2023-07-17
Across
- If the customer fails to answer the first security question correctly, ask the second question and gather one recent _______ detail
- When speaking with a customer you MUST acknowledge your _______ and NEED to help with a full and complete sentence.
- Account ____ Authorization Forms must be completed at an Umpqua location.
- ____ complaints and compliments must be submitted ONLY if a caller requests that their feedback be filed or documented.
- Reading the full and complete _____ will ensure you do not miss important steps.
Down
- When customer is fully verified and there are no OOW or security questions on file, it is recommended that you collect answers to ___ security questions and add them to the core system.
- This must be done for Qa's within 7 days of receipt.
- ____ Courtesy and Professionalism takes us to the next level in Customer Service.
- Customers requesting to close CD, HSA, IRA, trust, estate or custodial accounts may either visit an Umpqua Bank location or speak with the ______ store.
- It’s very important to acknowledge customer’s ____, when they call us
- Recently updated procedures can be found in _______
- _____ is required to be verified once in a 6-month period.
12 Clues: This must be done for Qa's within 7 days of receipt. • Recently updated procedures can be found in _______ • _____ is required to be verified once in a 6-month period. • It’s very important to acknowledge customer’s ____, when they call us • Account ____ Authorization Forms must be completed at an Umpqua location. • ...
IPO Process 2023-01-03
Across
- the first issuance of stock from a private company for public sale.
- Price price at which a new security will be distributed to the public prior to the new issue trading on the secondary market; commonly referred to as offering price
- date on which an executed trade of securities must be paid for
- the amount of stock in an initial public offering (IPO) that is sold to a customer
- when an investor sells their shares to the public on the secondary market after an initial public offering (IPO).
Down
- characteristic of a security which rises or falls sharply in price within a short time period
- ____Herring a preliminary prospectus filed with the SEC
- date the day a newly registered security can be offered for sale
- brokerage firm that raises money for companies using public equity and debt markets
- process by which a privately held company first offers shares of stock to the public; this is done via an initial public offering (IPO)
- privately held company offers its shares to the public—an initial public offering (IPO)
- a federal government agency that regulates and supervises the securities industry
12 Clues: ____Herring a preliminary prospectus filed with the SEC • date on which an executed trade of securities must be paid for • date the day a newly registered security can be offered for sale • the first issuance of stock from a private company for public sale. • a federal government agency that regulates and supervises the securities industry • ...
HOW WELL DO YOU KNOW YOUR RHYTHMITES? 2021-07-21
UNIT 1 2023-05-03
IT Aisle Stories 2020-08-06
Across
- The Information Security Office host Security ________ meetings to battle cybercrime
- Hear ye, Hear ye, virtually
- From RBS IT Cloud services to RBS IT____ Services Group
- Powered by ServiceNow
- Secure Code Warrior being sponsored by this Team (abbreviation)
- I need training
- PDL hosted a day of educational programming for this, also known as Freedom Day.
- The act of getting employees involved and interacting with one another.
- Tool that allows customers to check out groceries (while bagging) as they shop the aisles
Down
- Technology driven program to drive change and represent those of different gender identities; _____ in Tech+
- The team that creates the IT Aisle is known as the IT Communications & ______ Team.
- Microsoft program that was launched this year to create a better platform for communication.
- Breaking Down Silos at RBS
- Click & Collect
- The act of sending fraudulent texts with the intent to steal personal or financial data.
- Eric Braun is lead Team kickoff month
- Our New Journey
- Thank You
18 Clues: Thank You • Click & Collect • I need training • Our New Journey • Powered by ServiceNow • Breaking Down Silos at RBS • Hear ye, Hear ye, virtually • Eric Braun is lead Team kickoff month • From RBS IT Cloud services to RBS IT____ Services Group • Secure Code Warrior being sponsored by this Team (abbreviation) • ...
AI and Privacy Crossword 2025-01-13
Across
- What robots do in school (2 words)
- Not a starter; held in reserve in case the start is lost
- Rhymes with preach, often accompanied by prayer
- Inclination to prejudice or fabric cut on the diagonal
- Golf Delta Papa Romeo to Nato members
- One way to secure data in transit; not a burial ritual
- Describes private company information that, notably, might not be privacy-related
- Might apply to a blanket, a guard, or a phishing alert
Down
- Better than defiance
- Complex equations computers use
- Classic strategy board game
- Quality of clean windows and good business
- Party that is empowered by data subject to process her or his data
- Entity that processes data at the direction of an authorized party, or a computer's CPU
- Like munitions, often stored in a base
- Change one letter to create a nation of cars (without manual transmissions)
- Synonym of creative; describes a specific attribute of some AI systems
- Heat producers when burned or security measures that track data access
18 Clues: Better than defiance • Classic strategy board game • Complex equations computers use • What robots do in school (2 words) • Golf Delta Papa Romeo to Nato members • Like munitions, often stored in a base • Quality of clean windows and good business • Rhymes with preach, often accompanied by prayer • Inclination to prejudice or fabric cut on the diagonal • ...
Airport Vocabulary 2025-07-03
Across
- When a flight is not going to take place.
- A stop between connecting flights
- Where officials verify your travel documents
- Stamp placed in your passport showing when you entered a country
- Permission to enter/stay in a country
- A journey made by air
- Device that checks for metal items during security screening
- A place to register before boarding and leave large luggage
- The process of entering a country legally
- Place where your luggage is inspected for prohibited items
Down
- Small bag allowed in the cabin area
- Where your bags and body are scanned
- When the airline has sold more tickets than seats
- When your bags don’t arrive or go missing
- Place where you board the plane, usually in the airports there are many
- Place where you collect your luggage
- When your flight leaves later than expected
- Document needed to enter the airplane
18 Clues: A journey made by air • A stop between connecting flights • Small bag allowed in the cabin area • Where your bags and body are scanned • Place where you collect your luggage • Permission to enter/stay in a country • Document needed to enter the airplane • When a flight is not going to take place. • When your bags don’t arrive or go missing • ...
Homework 2022-09-22
14 Clues: tiny • share • hated • menacing • burning hot • determination • a strong dislike • a second thought • a beautiful sound • a place of security • attracting attention • likely going to happen • pleasurable expectation • pretend to have feelings or beliefs
Military Acronyms 2025-10-09
14 Clues: CMD • CIV • AI, _____ Item • XO, _____ Officer • PT, _____ Training • Army National Guard • CAC, _____ Access Card • OPSEC, Operations _____ • ACU, Army _____ Uniform • DOD, Department of _____ • MOS, Military _____ Specialty • OCP, _____ Camouflage Pattern • UCP, _____ Camouflage Pattern • FMSU, _____ Management Support Unit
the silver eyes crossword 2022-02-08
15 Clues: setting • horse toy • blue bunny • life metal • book author • security guard • foxy right arm • robot designer • antagonist suit • main band member • first seen robot • closed restaurant • first-ever stage robot • main character/protagonist • main 1/5 at missing children's incident
Espanol 2024-04-24
15 Clues: boots • shirt • socks • to ski • to pack • to ride • to relax • to sunbathe • to have fun • to go hiking • to check luggage • to take a day trip • to make a reservation • to bargain, negotiate price • to go through (security, customs)
2018 Security Fair Puzzle 2018-05-17
Across
- _____ travel increases the risk of Foreign Intelligence Targeting.
- All non-Lockheed Martin visitors must be entered into _____ by host prior to visit.
- Always inform your security office if you plan to move _____ equipment.
- Bankruptcy is one form of reportable _____ information.
- Only employees on the access list to a closed area can wear _____ lab coats.
- Security is everybody’s _____.
- All unauthorized (not on access list) _____ must sign the closed area log.
Down
- Always use our Blue Light Policy while escorting _____ personnel in closed areas.
- _____ is the emergency notification system LM uses to alert employees and contractors.
- The _____ Suitcase provides everything international travelers need to prepare for their trip.
- _____ e-mails should be sent to the CIRT and your local FSO.
- Transferring, downloading and/or storing LM data on personally owned IT assets is _____.
- _____ should be complex combinations of numbers, symbols, and upper and lowercase letters.
- If released outside of the facility, _____ papers must be marked as finished documents.
- Many public Wi-Fi hotspots—like libraries, coffee shops, and airports—aren’t _____.
15 Clues: Security is everybody’s _____. • Bankruptcy is one form of reportable _____ information. • _____ e-mails should be sent to the CIRT and your local FSO. • _____ travel increases the risk of Foreign Intelligence Targeting. • Always inform your security office if you plan to move _____ equipment. • ...
Home Fundraising - Data Security 2013-09-23
Across
- You should keep your computers _____ during breaks
- You should not allow _______ access to your computer or workplace
- All computers for Data Entry Executive MUST have this installed
- Donor's data is stored here
- All outdated documents should be _________
- We should never share database ______ with others
- When you come across a security breach, you should immediately inform people in the __ department
- Breach in Data Security could lead to _______ of contract
- Frequency at which passwords should be changed on the database
- You should never send ______ emails from your official email address
Down
- You should never include ______ details in emails
- ______ documents should be locked inside cabins at the end of the day
- We should only keep the data we need due to?
- Always verify the _________ of the email before sending it
- These should never be written down anywhere
15 Clues: Donor's data is stored here • All outdated documents should be _________ • These should never be written down anywhere • We should only keep the data we need due to? • You should never include ______ details in emails • We should never share database ______ with others • You should keep your computers _____ during breaks • ...
At the security check! 2021-01-18
Computer Threats and Security 2019-04-26
Across
- / a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- / the process of encoding a message so that it can be read only by the sender and the intended recipient
- / zombie network-is a group of infected computers that are under the control of one or more individuals.
- / the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- / a destructive self replicating program containing code capable of gaining access to computers or networks.
- Espionage / an occasion when one company steals secrets from another company with which it is competing.
- / a software utility designed to protect your computer or network against computer viruses.
- / a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- guard / a person whose job is to guard a place
Down
- theft / act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- / the identification of a person by the measurement of their biological features.
- monitors / a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- camera / a video camera that is used to observe a location.
- / malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- Horse/ a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
15 Clues: guard / a person whose job is to guard a place • camera / a video camera that is used to observe a location. • / the identification of a person by the measurement of their biological features. • / a software utility designed to protect your computer or network against computer viruses. • ...
Computer Threats and Security 2019-04-26
Across
- malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
- a software utility designed to protect your computer or network against computer viruses.
- a program that appears to be something safe but is performing tasks such as giving access to your computer or sending personal information to other computers.
- an occasion when one company steals secrets from another company with which it is competing.
- a system that continuously monitors a network and notifies a network administrator though messaging systems when a device fails or an outage occurs.
- the identification of a person by the measurement of their biological features.
Down
- act of illegally obtaining someone’s personal information. The thief can then use this information to gain access to bank accounts, e-mail, cell phones, identify themselves as you, or sells your information.
- the process of encoding a message so that it can be read only by the sender and the intended recipient
- a video camera that is used to observe a location.
- a malicious individual/s who scam users. By sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.
- a person whose job is to guard a place
- a software utility or hardware device that acts as a filter for data entering or leaving a network or computer.
- a destructive self replicating program containing code capable of gaining access to computers or networks.
- the use of electronic messaging systems to send out unrequested or unwanted messages (emails) in bulk.
- zombie network-is a group of infected computers that are under the control of one or more individuals.
15 Clues: a person whose job is to guard a place • a video camera that is used to observe a location. • the identification of a person by the measurement of their biological features. • a software utility designed to protect your computer or network against computer viruses. • an occasion when one company steals secrets from another company with which it is competing. • ...
Technology, security and transparency 2023-03-08
Across
- which tech buzzword is closely related to Artificial intelligence (AI)?
- Asymmetric key encryption.?
- The transformer that develops the high voltage in a home television is commonly called a...?
- Which company has unveiled a breakthrough in semiconductor design and process with the development of the world's first chip announced with 2 nanometer nanosheet technology?
- The electromagnetic coils on the neck of the picture tube or tubes which pull the electron beam from side to side and up and down are called a...?
- A network site that appears to have a valuable information but is isolated and monitored is what kind of security measure?
- what information do you need to setup a wireless access point?
- First computer virus is known as....
Down
- TMP' extension refers usually to what kind of file?
- What technology is used to make telephone calls over the internet possible?
- Gives little to no information about the system to the penetrate tester?
- Strongest single encryption?
- Which one is the first search engine in internet?
- What technology is used to record cryptocurrency transactions?
- The DOGE-1 Mission to the Moon will be launched by which company in 2022?
15 Clues: Asymmetric key encryption.? • Strongest single encryption? • First computer virus is known as.... • Which one is the first search engine in internet? • TMP' extension refers usually to what kind of file? • What technology is used to record cryptocurrency transactions? • what information do you need to setup a wireless access point? • ...
All Things BankCard Security 2023-03-10
Across
- TSYS screen where hard posted trans end up
- buying a gift card and giving number from the back
- card that functions as both credit and debit
- authorizing a transaction; merchant makes error
- type of card that cannot be instant issued
- Application to look up Prepaid cards
- System used to delete tokens when necessary
- TSYS screen where you can edit an address
Down
- unknown unauthorized activity on an account
- 4U is an indication of this type of card
- Security system otherwise known as Verified By Visa
- person who may authorize overnight a corporate card
- TSYS screen code to activate a card
- Application to enter a dispute
- TSYS screen to read notes on an account
15 Clues: Application to enter a dispute • TSYS screen code to activate a card • Application to look up Prepaid cards • TSYS screen to read notes on an account • 4U is an indication of this type of card • TSYS screen where you can edit an address • TSYS screen where hard posted trans end up • type of card that cannot be instant issued • unknown unauthorized activity on an account • ...
Network and Information Security 2026-02-18
Across
- Hiding data inside image/audio
- Uses public and private keys
- Access control decided by system rules
- Cloud model offering software as service
- Attack that inserts malicious SQL queries
- Attackthat monitors data without altering it
- Original readable message
Down
- Verification of user identity
- Malware that locks data and demands payment
- Ticket-based authentication protocol
- Password attack using trash data
- Caesar cipher is a type of this technique
- Relationship between threat, vulnerability, and damage
- Decoy system to trap attackers
- System that detects intrusions
15 Clues: Original readable message • Uses public and private keys • Verification of user identity • Hiding data inside image/audio • Decoy system to trap attackers • System that detects intrusions • Password attack using trash data • Ticket-based authentication protocol • Access control decided by system rules • Cloud model offering software as service • ...
IC3 Lesson 30 2015-05-18
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Deciphers the information in an SSL Certificate.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- Security feature used for larger networks that controls computers from one point.
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Encrypts the information in an SSL Certificate.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- A malicious program that records keystrokes.
- A program that hackers use to capture IDs and passwords on a network.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
Ipo rossword puzzle 2021-09-13
Across
- a speculative bubble of stock prices of mainly American Internet companies during the time from 1995 until 2000
- process by which an underwriter attempts to determine the price at which an initial public offering (IPO) will be offered.
- a group of investment banks and broker-dealers formed temporarily to sell new issues of a company's equity or debt to investors
- a service charge assessed by a broker or investment advisor.
- An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance.
Down
- an investment bank or another financial organization that has the primary directive for organizing a security offering for public companies.
- a sales pitch or promotion made by the underwriting firm, usually on the road
- Electronic Data Gathering, Analysis, and Retrieval system
- Capital stock is the amount of common and preferred shares that a company is authorized to issue
- Mark Zuckerberg
- a security that represents the ownership of a fraction of a corporation.
- A derivative is a complex type of financial security that is set between two or more parties.
12 Clues: Mark Zuckerberg • Electronic Data Gathering, Analysis, and Retrieval system • a service charge assessed by a broker or investment advisor. • a security that represents the ownership of a fraction of a corporation. • a sales pitch or promotion made by the underwriting firm, usually on the road • ...
Crack the code 2024-04-30
Across
- A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
- A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- A program designed to prevent, detect, and remove malware (10 letters)
- The process of verifying the identity of a user or device (10 letters)
- A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
Down
- The exploitation of security vulnerabilities in a computer system or network (9 letters)
- Protects a computer system from unauthorized access (9 letters)
- Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- The practice of disguising malicious files to make them appear harmless (7 letters)
- A set of rules or guidelines designed to enhance computer security (9 letters)
- A type of attack where an attacker intercepts communication between two parties (6 letters)
- The unauthorized copying of data from a computer system (6 letters)
12 Clues: Protects a computer system from unauthorized access (9 letters) • The unauthorized copying of data from a computer system (6 letters) • A program designed to prevent, detect, and remove malware (10 letters) • The process of verifying the identity of a user or device (10 letters) • A set of rules or guidelines designed to enhance computer security (9 letters) • ...
ServiceNow Knowledge 2024-11-07
Across
- Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
- personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
- automates and enhances IT operations through strategic use of machine learning and data science
- effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
- Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
- Procure ServiceNow in the Azure or AWS Marketplace
- Best Enterprise Architect in the business; Utilities Expert
- Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
Down
- provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
- generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
- Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
- Build apps at scale with a low-code development environment and prebuilt templates
- ServiceNow Solutions Consultant
- Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
- links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
- high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
16 Clues: ServiceNow Solutions Consultant • Procure ServiceNow in the Azure or AWS Marketplace • Best Enterprise Architect in the business; Utilities Expert • Build apps at scale with a low-code development environment and prebuilt templates • Strengthen cloud security, protect sensitive data, and ensure regulatory compliance • ...
The Ark 2022-05-31
12 Clues: - deadly • - not wet • - low cost • - assurance • - to enroll • - three feet • - communication • - group of trees • - different kinds • - move around or avoid • - bend over upon itself • - imaginative narration
The Ark 2022-05-31
12 Clues: deadly • not wet • low cost • assurance • to enroll • three feet • communication • group of trees • different kinds • move around or avoid • bend over upon itself • imaginative narration
Animal Farm Crossword Puzzle 2025-04-08
12 Clues: seven • Comrade • selfish • farm name • alcoholic • two legs bad • Lebron james • strongest animal • windmill destroyer • Napoleons security • animals favourite tune • some are more equal than others
history crossword 2021-04-06
Across
- government spending
- appointed by the United States President
- Roosevelt’s policies for ending the Depression
- organize opposition to the New Deal and “teach the necessity of respect for the rights of person and property
- provide government insurance for bank deposits up to a certain amount
- Security Act provides some security for the elderly and for unemployed workers.
- Congress passed 15 major acts to meet the economic crisis
- which consists of five
- combined Roosevelt’s love of nature and commitment to conservation with the need to help the unemployed
Down
- money has a value directly linked to gold
- assigned many women to lower-level jobs in the federal bureaucracy
- closing the remaining banks before bank runs could put them out of business
- resolving a dispute that is private
- Works Progress Administration
- regulate the stock market
- Workers at other plants followed suit or carried out traditional strikes
- evening radio addresses given by Franklin D. Roosevelt,
- government would pay farmers not to raise certain livestock,
18 Clues: government spending • which consists of five • regulate the stock market • Works Progress Administration • resolving a dispute that is private • appointed by the United States President • money has a value directly linked to gold • Roosevelt’s policies for ending the Depression • evening radio addresses given by Franklin D. Roosevelt, • ...
Direct Group - Macmillan Crossword 25/09/20 2020-09-18
Across
- Formally demand an amount owing in law
- The organisation responsible for regulating the private security industry in the UK
- Amount of money owing
- Abbreviation for cameras worn by field agents and security guards
- Head office is based here
- Fine for parking on private land
- Find or discover by investigation or search
- Commonly known initials of the legislation governing personal data
- An individual, company, or institution sued or accused in a court of law
- A person or company making a claim in law
Down
- Process of taking legal action
- Decision of the courts
- A person employed to protect a building against intruders or damage
- A person in need of special care, support, or protection because of age, disability, or risk of abuse or neglect
- Execution of a judgments terms
- Certificated individual to enforce writ's
- Judgment of the high court
- A person or company) declared in law as unable to pay their debts
18 Clues: Amount of money owing • Decision of the courts • Head office is based here • Judgment of the high court • Process of taking legal action • Execution of a judgments terms • Fine for parking on private land • Formally demand an amount owing in law • Certificated individual to enforce writ's • A person or company making a claim in law • Find or discover by investigation or search • ...
Create Crossword puzzle 2024-12-09
Spanish Crossword 2024-11-07
BULLYING 2017-09-23
Across
- Spoken, not written.
- Worried and frightened
- A person who is standing near but not taking part in what is happening.
- To laugh at or make fun of someone in an unkind way.
- A person who has been attacked or hurt by someone.
- An act that is meant to trick or deceive people.
- Someone who frightens, hurts, or threatens smaller or weaker people.
Down
- Suicide caused by cyber bullying.
- To make someone afraid.
- A person at which an attack is aimed.
- A trick that is done to someone usually as a joke.
- A person who hates and opposes another person.
- To do or say something that is offensive to someone (that shows lack of respect).
- To annoy or bother someone in a constant or repeated way.
14 Clues: Spoken, not written. • Worried and frightened • To make someone afraid. • Suicide caused by cyber bullying. • A person at which an attack is aimed. • A person who hates and opposes another person. • An act that is meant to trick or deceive people. • A trick that is done to someone usually as a joke. • A person who has been attacked or hurt by someone. • ...
TTS INFORMATIKA 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
Chapter 18 Quiz 2012-11-26
Across
- certain government benefits entilted to certain individuals by law
- a tax in which the government takes more income from the wealthy
- the "bank account" into Social Security contributions are deposited and used to pay recipients
- a negative income tax that provide income to very poor individuals
- paymets given by government to those such a social security and retirement plans
- welfare reform law of 1996
- increasing concentration of property among women
- a tax that falls more heavily on low income groups
- shares of the national income of many groups
- policies that provide benefits to individual through testing or entitlements
Down
- name of public assistance for families in need
- a method used to count the number of impoverished
- programs available only to those with very specific needs
- a tax in which the governments takes income equally from all taxpayers
- amount of funds collected between to points in time
- value of assets owned
16 Clues: value of assets owned • welfare reform law of 1996 • shares of the national income of many groups • name of public assistance for families in need • increasing concentration of property among women • a method used to count the number of impoverished • a tax that falls more heavily on low income groups • amount of funds collected between to points in time • ...
The Role of Internet in our Life. 2024-11-10
Across
- The practice of using remote servers to store and manage data.
- A software application for accessing information on the Internet.
- A service that provides privacy and security online.
- A decentralized ledger technology used for secure transactions.
- An organized collection of data that can be accessed electronically.
- A search engine used to find information online.
- What do we use to connect to the Internet?
Down
- Programs that run on a computer or device.
- The act of browsing the web.
- Devices that can be easily carried and used on the go.
- MEDIA Websites that allow users to create and share content.
- A security system that monitors and controls incoming and outgoing network traffic.
- A digital audio file available for streaming or download.
- A small electronic device with a specific function.
- The physical components of a computer system.
- An online discussion platform where people can exchange ideas.
16 Clues: The act of browsing the web. • Programs that run on a computer or device. • What do we use to connect to the Internet? • The physical components of a computer system. • A search engine used to find information online. • A small electronic device with a specific function. • A service that provides privacy and security online. • ...
Networking concept 2025-05-18
Across
- A computer that requests services from a server.
- A security device that protects a network from unauthorized access.
- (Local Area Network): A network within a small geographic area.
- & Privacy:
- A group of interconnected devices that can communicate with each other.
- (Virtual Private Network): A secure connection that encrypts data and can be used to access a network remotely.
- A computer that provides services to other computers on the network.
Down
- A common wired network connection.
- A device that connects different networks together.
- A type of connection that uses radio waves to transmit data.
- (Wide Area Network): A network that spans a large geographic area.
- A device that forwards data between devices on a network.
- of Connections:
- A set of rules that govern communication on a network.
- Address: A unique numerical address assigned to each device on a network.
- Any device connected to a network.
16 Clues: & Privacy: • of Connections: • A common wired network connection. • Any device connected to a network. • A computer that requests services from a server. • A device that connects different networks together. • A set of rules that govern communication on a network. • A device that forwards data between devices on a network. • ...
Flourish 2014-03-24
Across
- freedom from danger and anxiety
- experiencing the thoughts, feelings and attitudes of another
- state of satisfaction
- state of mutual harmony
- state of rest or balance of opposing forces
- bringing together incomplete parts into a whole
- state of pleasure and contentment
- the condition of being oneself not another
Down
- general condition of body and mind with reference to sound and vigour
- health care facility for terminally ill
- pertaining to the mind
- state of attentiveness and being aware
- state of equilibrium and satisfaction at both a physical and mental level
- to assist unconditionally
- place of domestic security
- feeling of deep sympathy
- pertaining to or involving sentiment
- practice of extended or continued thought or reflection
- the state of being an individual
- care given to comfort not to cure
- pertaining to the body
- the state of recognising ones’ self
- of life/ general wellbeing of an individual defined in terms of health and happiness over wealth
- an integrated system designed to facilitate information exchange and support
24 Clues: state of satisfaction • pertaining to the mind • pertaining to the body • state of mutual harmony • feeling of deep sympathy • to assist unconditionally • place of domestic security • freedom from danger and anxiety • the state of being an individual • care given to comfort not to cure • state of pleasure and contentment • the state of recognising ones’ self • ...
Personal Dictionary 2022-01-13
Across
- Deceiving someone into making themselves vulnerable online
- Software that allows the user to search specific information online
- Storage accessible through various devices
- Software that acts as a foundation to the device
- Personal files saved to keep browsing information on websites
- electronic device that manipulates information
- secondary device connected to computers, typically used to control it (i.e mouse or keyboard)
- The understanding of using online tools
Down
- Tactic where someone takes on the identity of someone for personal gain
- A laptop ran off of google
- A certain date or time associated with digital records or files
- The address to a webpage
- Computer that can fit on or under a typical desk
- A screen that displays information generated by a computer
- A port to connect hardware
- The physical components to a computer
- Virtual instructions, data, or programs used to complete tasks
- A built-in security system that filters online traffic
- A portable computer with a keyboard and a screen
- Additional security process to ensure privacy
- temporary memory used for active programs
21 Clues: The address to a webpage • A laptop ran off of google • A port to connect hardware • The physical components to a computer • The understanding of using online tools • temporary memory used for active programs • Storage accessible through various devices • Additional security process to ensure privacy • electronic device that manipulates information • ...
Marigolds Crossword 2023-08-21
Across
- lacking physical form or shape; lacking organization; formless
- a state of reduced sensibility or consciousness
- to provoke and urge on
- a filthy and wretched condition or quality.
- difficult or impossible to explain or account for.
- to evade or escape from, as by daring, cleverness, or skill
- indifference to pleasure or pain; impassiveness.
- a bittersweet longing for things, persons, or situations of the past; the condition of being homesick; homesickness.
- very cautious; wary; not giving or expending freely
- a security hole or an instance of taking advantage of a security hole
- represented or appearing as such
Down
- lacking physical strength or vigor; weak.
- a state of abstracted musing; daydreaming
- to interrupt or cut off
- punishment administered in return for a wrong committed.
- having no useful result; ineffectual
- of, relating to, or in the nature of an illusion; lacking reality
- a difference between one thing and another, between one writing and another; a variance.
- arousing deep emotion, especially pity or sorrow; touching
- a show of bravery or defiance, often in order to make a false impression or mislead someone.
20 Clues: to provoke and urge on • to interrupt or cut off • represented or appearing as such • having no useful result; ineffectual • lacking physical strength or vigor; weak. • a state of abstracted musing; daydreaming • a filthy and wretched condition or quality. • a state of reduced sensibility or consciousness • indifference to pleasure or pain; impassiveness. • ...
Unit 2 Vocab 2023-10-09
Across
- legal
- Approach, point of view, focus
- federation
- we will have (future tense of tener)
- to immigrate(enter a country)
- worldwide
- to travel, journey
- from the south
- flow
- foreigner, alien
- to track down
- analyze, examine
- reason
- will exist
- to attain/to be able to
- I believe that
- movement, motion
- population
- to work, have a job
- Immigrants within one's own country
- ignition, on
- working day; day's journey
- inside, in
- immigration
- to link, to connect
Down
- African Studies Group
- to brake, stop
- citizenship/the citizens
- restart
- country, nation
- knowledge, understanding
- to exchange, to trade
- terrorist
- famous
- to reach, achieve
- Displaced
- world population
- ignorance, lack of awareness
- to tackle, to board
- management, administration
- countries of the world
- development, growth, progress
- (in)security; (lack of) security
- to try, attempt
- continent, mainland
- phenomenon
- to emigrate(leave a country)
- immigrants
- visa(travel document)
49 Clues: flow • legal • famous • reason • restart • terrorist • Displaced • worldwide • federation • will exist • phenomenon • population • immigrants • inside, in • immigration • ignition, on • to track down • to brake, stop • from the south • I believe that • country, nation • to try, attempt • world population • foreigner, alien • analyze, examine • movement, motion • to reach, achieve • to travel, journey • to tackle, to board • ...
investing-Abby 2025-03-25
Across
- age you have to be to invest in crypto
- A security that represents the ownership of a fraction of a corporation
- initial public offering
- takes cash from investors and invests in stocks
- markets rising
- Ceo of berkshire hathaway
- exchange traded funds
- sum of money available for a particular purchase
- a pension is managed by
- measures the price performance of a basket of securities
- the distribution of some of a company's earnings to shareholders
- markets failing
- currencies that are created and backed by the government
- fund for unexpected expenses
Down
- they represent a loan from a buyer
- the biggest financial fraud in U.S history
- best for aggressive risk tolerance investors
- dca provides some safety at the cost of?
- pulls money from a large group of investors
- makes it impossible to change, hack, or cheat the system
- age to receive full social security benefits
- warren buffetts #1 rule
- availability of cash or which a asset can be converted into cash
- the total value of a company's stock
- individual retirement account
25 Clues: markets rising • markets failing • exchange traded funds • initial public offering • a pension is managed by • warren buffetts #1 rule • Ceo of berkshire hathaway • fund for unexpected expenses • individual retirement account • they represent a loan from a buyer • the total value of a company's stock • age you have to be to invest in crypto • dca provides some safety at the cost of? • ...
investing- addy 2025-03-25
Across
- age you receive full social security benefits
- ceo of berkshire hathaway
- sum of money made available for a particular purpose
- small cap stocks, penny stocks
- a crypto currency
- age you can invest in crypto
- a company offers its shares to the public for the first time
- large cap stocks, blue chip companies
- a place where people buy and sell pieces of companies
- investing in equal amounts at regular intervals
- ownership of a fraction of a share
- investing all money at a given time
- is a collection of stocks, bonds, and other assets
- rule number one
Down
- the total value of a company’s stock
- a type of investment fund
- someone who holds stocks for the long term
- social security and medicare taxes
- payments made by companies to shareholders
- is a digital record of transactions and duplicated across a network
- a crypto currency
- buying and selling mutual funds
- rule number two
- have a fixed interest rate
- created and backed ny governments, not tied to any physical commodity
25 Clues: rule number two • rule number one • a crypto currency • a crypto currency • a type of investment fund • ceo of berkshire hathaway • have a fixed interest rate • age you can invest in crypto • small cap stocks, penny stocks • buying and selling mutual funds • social security and medicare taxes • ownership of a fraction of a share • investing all money at a given time • ...
Cyber Ethics Puzzle, Chapter 7 2024-11-22
Across
- A type of medicine that is performed at long distance using technological assistance.
- A way of simulating a process through software so that one may predict the results of a course of action.
- This company is known for maintaining strict controls over their software ecosystem.
- A worldwide network of connected devices that facilitate the sharing of information.
- A computer program designed to search the internet for websites matching a user's query.
- An online encyclopedia who's easily editable nature has been abused by many organizations over the years.
- Forms of remote communication made possible through the use of technology.
- A group of farmers concerned that technology would render them obsolete.
- A compendium of information, either in general or on a specific topic.
- Being responsible for something, such as the results of an action.
- Textual data that is received over the internet and formatted via HTML and CSS.
Down
- A prominent writer espousing Neo-luddism and associated ideologies.
- A group similar to Luddites, but with a view that most forms of technology are evil, and do more harm than good.
- This company is, among other things, the primary maintainer of the android operating system, and got into controversy after removing applications from the mobile phones of users.
- Sensors and other devices that are networked together and communicate via wirelessly
- This company stirred up controversy by removing books from the digital reading devices of customers.
- This company is known for its extremely popular computer operating system.
- A term used to refer to field of producing and using computers.
- Commerce that takes place over the internet instead of at physical stores
19 Clues: A term used to refer to field of producing and using computers. • Being responsible for something, such as the results of an action. • A prominent writer espousing Neo-luddism and associated ideologies. • A compendium of information, either in general or on a specific topic. • A group of farmers concerned that technology would render them obsolete. • ...
Improving Security 2021-04-22
Bank Security 2021-11-04
Across
- Placed on door after robbery.
- This is most important for everyone during a robbery.
- What you should be when customers enter branch.
- Given to robber for tracking purposes.
Down
- We complete this form based upon what you actually saw or observed.
- Activate this if it can be accomplished without endangering others.
- Everyone needs to maintain this emotion for safety reasons.
7 Clues: Placed on door after robbery. • Given to robber for tracking purposes. • What you should be when customers enter branch. • This is most important for everyone during a robbery. • Everyone needs to maintain this emotion for safety reasons. • We complete this form based upon what you actually saw or observed. • ...
Airport Security 2021-11-06
7 Clues: f_______, • a__________ • Discovery of e__________, • Not stated clearly or exactly • Illegally damage/destroy computer data • Incite fear of explosives causing damage/danger • "Break through" a security restricted area (SRA)
Network Security 2022-04-27
Across
- uses duplication of critical components/devices, increasing the reliability of the system.
- protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
Down
- any program or code designed to do something on a system or network that you don’t want to have happen.
- a program that has two jobs: to replicate and to activate.
- Can sustain network operations for only a limited time in the event of an outage.
- Provides incremental trunk speeds by combining multiple Fast Ethernet links.
- Redundant ___ eliminates a single point of power failure.
7 Clues: Redundant ___ eliminates a single point of power failure. • a program that has two jobs: to replicate and to activate. • Provides incremental trunk speeds by combining multiple Fast Ethernet links. • Can sustain network operations for only a limited time in the event of an outage. • ...
Network security 2023-12-11
7 Clues: A piece of data • A wireless security protocol • An address used for LAN card • A network management approach • Used for intrusion prevention • A type of software used in network monitoring • utilized for collecting and managing log messages from network devices.
Password Security 2024-05-29
Across
- An attacker wants to ______ your password.
- Combining something you are, something you know, or something you have is an example of _________ authentication.
- Like a password, but is usually a saying or phrase.
- Shorter weaker passwords that are easy to guess can be easy for an attacker to ________.
Down
- your password if you suspect it is compromised.
- Avoid using the same password across _____ accounts, or else you risk all accounts being compromised.
- A strong password is hard to _______.
7 Clues: A strong password is hard to _______. • An attacker wants to ______ your password. • your password if you suspect it is compromised. • Like a password, but is usually a saying or phrase. • Shorter weaker passwords that are easy to guess can be easy for an attacker to ________. • ...
Social Security 2024-04-23
Across
- you recieve this from Social Security
- having a physical or mental condition that limits movements, senses, or activities.
- a severe global economic downturn that affected many countries across the world.
- a situation where a person actively searches for employment but is unable to find work.
Down
- a series of programs, public work projects, financial reforms, and regulations enacted by President Franklin D. Roosevelt
- a long history dating back to 13th-century Europe and became established in the U.S. during the 18th century.
- the action or fact of leaving one's job and ceasing to work.
7 Clues: you recieve this from Social Security • the action or fact of leaving one's job and ceasing to work. • a severe global economic downturn that affected many countries across the world. • having a physical or mental condition that limits movements, senses, or activities. • a situation where a person actively searches for employment but is unable to find work. • ...
Security Terms 2024-10-02
7 Clues: Protects children • Stops online theft. • Offers equalness to users. • Protects student's rights. • Protects your medical information. • Requires banks to protect your bank information. • Allows agencies to conduct surveillance on suspected enemies.
food security 2025-09-09
Across
- your allowed back there meaning you have...
- if someone if hiring it means they have...
- Security The adequate access to food to meet dietary needs for an active and healthy life.
- Your body needs adequate nourishment to grow and live.
Down
- the strength to stand or endure.
- How food is used by the body to meet dietary needs.
- A common physical manifestation of the sensation of needing food.
- Insecurity The state of lacking regular access to enough safe and nutritious food.
8 Clues: the strength to stand or endure. • if someone if hiring it means they have... • your allowed back there meaning you have... • How food is used by the body to meet dietary needs. • Your body needs adequate nourishment to grow and live. • A common physical manifestation of the sensation of needing food. • ...
It's inclusive 2021-10-01
Across
- It’s evident that we’ve all got to work proactively to safeguard XXXXX security to strengthen our company’s defenses and keep SAP secure.
- The Global XXXXXXXXXX Training Program offers all dual students, within SAP, to work towards their University degree while additionally gaining valuable business experiences at the same time.
- SAP is partnering with the Born This Way Foundation (BTWF) and invite you to participate in the #XXXXXXXX Pledge - centered around encouraging acts of kindness and compassion.
- Democratize Digital Literacy by taking the training in the hands of every student through the Code XXXXXX Mobile App.
- We, XXX want to help you win the right way, contributes to the company’s success by providing strong, trusted advice to SAP leaders, managers and employees across all areas of the business.
- SAP's stance on XXXXXXXXXXXX , We all play a part to “Stop it at the Start” and together, we create a culture where people feel welcome, belonging and are able to thrive.
Down
- XXX XXXX XXXXX is the second-largest R&D facility in SAP’s global network of Labs.
- The XXXXXX XX XXXX is, of course, not only about hybrid work models or working remotely. It is about a journey: how we work together, manage our work-life balance, and design our digital workplace in the future.
- Our Vision, Be that XXXXXXXXXX Product Company every Engineer aspires to be a part of.
- The XXXX is one of the most significant documents for all of us – a guiding light, designed to help us achieve the highest standards of ethical business while protecting our colleagues and our company.
- SAP’s strategic sustainability approach is two-pronged: “XXXXXXX” and “Exemplar”
- The Best Run XXXX programs are the execution engine for our strategy enablement – spanning all our board areas, have been refined to closely interlock with our Reinvent strategy to support timely and sustainable execution along the five strategic pillars.
12 Clues: SAP’s strategic sustainability approach is two-pronged: “XXXXXXX” and “Exemplar” • XXX XXXX XXXXX is the second-largest R&D facility in SAP’s global network of Labs. • Our Vision, Be that XXXXXXXXXX Product Company every Engineer aspires to be a part of. • ...
CROSSWORD 2022-02-14
Across
- serious cyber crime related to computer are ___
- ____ results in civil prosecution
Down
- punishment for identity theft is covered under ___
- ___ deals with failure to furnish information or report
- punishment for publishing sexually explicit content is imprisonment upto ___ years
- offence punishable with imprisonment of three years and above shall be ___
6 Clues: ____ results in civil prosecution • serious cyber crime related to computer are ___ • punishment for identity theft is covered under ___ • ___ deals with failure to furnish information or report • offence punishable with imprisonment of three years and above shall be ___ • punishment for publishing sexually explicit content is imprisonment upto ___ years
Security at UNRWA 2021-09-04
6 Clues: when your valuables are stolen • central hub for security information • the acronym for field security teams • harmful event that negatively impacts you, UNRWA • the type of awareness you have to avoid incidents • what DSRM sends to give security advice to personnel
NDS Crossword Puzzle 2024-01-03
Across
- Number (spelled out) of members on the Strategic Posture Commission
- Trusted advisor and partner
- Limiting of the production and spread of nuclear weapons
- Effort to prolong the life of weapons
- Tri-Lateral security partnership exploring acquisition of nuclear subs for Australia
- Space between new systems being fielded and the old systems aging out
- Sentinel will relieve these from duty
- Program to support and obtain supply chain surety from “critical suppliers”
- DoD sees this country as the “Pacing Challenge” to U.S. National Security
- Program responsible for refurbishing and modernizing the stockpile
- Weapon travels more than 5xs the speed of sound
Down
- Seeks to integrate all tools of national power across domains, geography, and threat space
- Document introduced “Integrated Deterrence” as a term:
- Agency with core mission to ensure safe, secure, and reliable nuclear stockpile
- Mid-west “plant” undergoing expansion
- _______ Chain (experiencing disruptions)
16 Clues: Trusted advisor and partner • Effort to prolong the life of weapons • Mid-west “plant” undergoing expansion • Sentinel will relieve these from duty • _______ Chain (experiencing disruptions) • Weapon travels more than 5xs the speed of sound • Document introduced “Integrated Deterrence” as a term: • Limiting of the production and spread of nuclear weapons • ...
U23 - A1 - Key Terms 2024-03-15
Across
- (6,2,7) a drawback could be how we live, work and think
- of data (12,2,4) a drawback could be access to large data stores will have an impact on security of data
- in this sector CC is used to enhanced customer experience, optimisation of store operations, improved supply chain management, identify potential markets
- in this sector CC is used to provide personalised travel advice and guidance
Down
- (6,11) use by security services, access to security systems a type of biometric
- (10,8) a drawback could be will job roles become redundant?
- is used in this sector for operations management, controlling systems etc.
- in this sector CC is used to personalise learning requirements, identify development needs
- this sector uses big data to suggesting diagnosis, recommending treatments
9 Clues: (6,2,7) a drawback could be how we live, work and think • (10,8) a drawback could be will job roles become redundant? • is used in this sector for operations management, controlling systems etc. • this sector uses big data to suggesting diagnosis, recommending treatments • in this sector CC is used to provide personalised travel advice and guidance • ...
#BeCyberAware 2023-09-29
Across
- The day that software vendors release regular security updates.
- Authentication based on unique physical or behavioral traits.
- Malware that encrypts data and demands a ransom for decryption.
- Unauthorized interception of communication.
- Software designed to detect and remove viruses and other malware.
- Malware that provides unauthorized access while concealing its presence.
- Software or hardware that records keystrokes without authorization.
Down
- A software update that fixes security vulnerabilities.
- Illegally using a computer's resources to mine cryptocurrency.
- A network of infected computers controlled by a single entity.
- A decoy system designed to attract and trap attackers.
- An attack that involves trying every possible combination to crack a password
- The malicious part of software responsible for harmful actions.
- Capturing and analyzing network traffic without authorization.
- The process of converting data into a code to prevent unauthorized access.
15 Clues: Unauthorized interception of communication. • A software update that fixes security vulnerabilities. • A decoy system designed to attract and trap attackers. • Authentication based on unique physical or behavioral traits. • Illegally using a computer's resources to mine cryptocurrency. • A network of infected computers controlled by a single entity. • ...
Perfection 2023-04-13
Across
- An asset, pledged by a borrower that a lender accepts as a security against a loan
- Collateral like oil and gas immediately as its drilled from the ground
- A _ is Perfected when it attaches if the applicable requirements are satisfied before the _ attaches
- ARTICLE 9-314
- Where you file security interests related to land
- Piece of paper that is filed in a public office in a searchable database
- ARTICLE 9-310
- ARTICLE 9-309
Down
- ARTICLE 9-313
- Location or building where Financing Statement is NORMALLY filed
- Trees slated to be cut down
- Article 9 concept, which is designed to give the world notice of the secured parties interest in the Debtors Collateral
- A person or institution that owes a sum of money
- Uniform Commercial Code (3 letters)
- i.e gas station pumps
15 Clues: ARTICLE 9-313 • ARTICLE 9-314 • ARTICLE 9-310 • ARTICLE 9-309 • i.e gas station pumps • Trees slated to be cut down • Uniform Commercial Code (3 letters) • A person or institution that owes a sum of money • Where you file security interests related to land • Location or building where Financing Statement is NORMALLY filed • ...
AP Comp Sci Test 2023-05-02
Across
- security network system that monitors incoming and outgoing network traffic based on security rules
- there are 8 bits in one ____
- variable in a function definition, placeholder for values
- networking device that forwards data packets between computer networks
- common method for referencing elements in a list or string using numbers
- standard markup language for documents designed to be displayed in a web browser
- an ordered collection of elements in a program
- legal right given to an originator
- smallest unit of data
- 0s and 1s
Down
- group of functions that may be used in creating new programs
- a finite set of instructions that accomplish a task
- program that records keystrokes by a user
- rules and regulations we all agree to use
- a facility that allows computing devices to connect to the internet and send data via radio waves
15 Clues: 0s and 1s • smallest unit of data • there are 8 bits in one ____ • legal right given to an originator • program that records keystrokes by a user • rules and regulations we all agree to use • an ordered collection of elements in a program • a finite set of instructions that accomplish a task • variable in a function definition, placeholder for values • ...
BrainRiddle 2025-02-09
Across
- A scam where attackers trick people into giving sensitive information.
- A test to prove you are not a robot.
- A software patch that fixes bugs and security issues.
- Small data files stored by websites on a user's computer.
- Software designed to harm a computer system.
- A type of malware that spreads by attaching itself to programs.
- A security system that filters network traffic.
Down
- A software used to access the internet.
- A wireless network used for internet access.
- A copy of data used for recovery in case of loss.
- A person who gains unauthorized access to systems.
- A secret word or phrase used for authentication.
- Unwanted or junk emails.
- A system that stores data on remote servers instead of local devices.
- A unique identifier used to log into an account.
15 Clues: Unwanted or junk emails. • A test to prove you are not a robot. • A software used to access the internet. • A wireless network used for internet access. • Software designed to harm a computer system. • A security system that filters network traffic. • A secret word or phrase used for authentication. • A unique identifier used to log into an account. • ...
new deal 2024-04-15
Across
- glass-_______ banking act
- book from 1939
- social ________ act
- civilian ___________ corps
- Tennessee Valley Authority
- movie from 1939
- ________ _____ administration
Down
- 32nd president
- ______ act
- ________ __________ recovery act
- the same price for crops in 1910
- roosevelt's plan for recovery
- federal _______ insurance corporation
- new deal _________
- _______ roosevelt
15 Clues: ______ act • 32nd president • book from 1939 • movie from 1939 • _______ roosevelt • new deal _________ • social ________ act • glass-_______ banking act • civilian ___________ corps • Tennessee Valley Authority • roosevelt's plan for recovery • ________ _____ administration • ________ __________ recovery act • the same price for crops in 1910 • federal _______ insurance corporation
State Departments 2020-11-19
Across
- what's the weather?
- helps Indian tribes
- conducts elections by workers
- helps provide food
- deals with the quality of food
- black truck that delivers mail
- rewards grants to universities
- does the legal business
- own a house
- rules for driving
- takes care of the money
- oversees bank activities
- oversees railroads
- keeps the stocks of businesses accountable
- "watchdog agency"
- provides education against terrorist attacks
- grants licenses for radios and television services
- protects rights of workers
Down
- provides for veterans
- sends mail
- space program
- helps small businesses
- provides grants for artists and scientific research
- helps with trademarks for new inventions
- public schools
- protects the natural environment
- deals with weight
- replaced Federal Security Agency
- highest ranks of the military
- the military is a big part of this branch
- helps the economy grow
- provides inexpensive electricity to the South
- tries to make energy consumption cheaper
- gives loans to farmers
- collects taxes
- analyzes security through human intelligence
- collects stats on diseases
- nation's central bank
38 Clues: sends mail • own a house • space program • public schools • collects taxes • deals with weight • rules for driving • "watchdog agency" • helps provide food • oversees railroads • what's the weather? • helps Indian tribes • provides for veterans • nation's central bank • helps small businesses • helps the economy grow • gives loans to farmers • does the legal business • takes care of the money • ...
Jobs and places of work 2021-10-20
Across
- A place where people go to learn
- A person that spend their time at school or university, but it is not the teacher
- A place where people work in cubicles and computers
- A place where you spend most of your time
- A person that works in a factory
- This person gives the people their food in restaurants and it is a man
- This person helps the doctors and patients at the hospital
- A person that helps other people with legal things
- A person that helps other person to complete their work
- This person helps people with health
- This person sells things
Down
- A building where people create things
- A public security man that helps other people
- A place where they sell things
- This person works in a school
- A building where they help sick people
- A place where people go to eat
- A public security woman that helps other people
- A public space where cars can move
- This person gives the people their food in restaurants and it is a woman
20 Clues: This person sells things • This person works in a school • A place where they sell things • A place where people go to eat • A place where people go to learn • A person that works in a factory • A public space where cars can move • This person helps people with health • A building where people create things • A building where they help sick people • ...
Income Tax Vocabulary 2013-03-20
Across
- When you overpay the government, you receive a refund
- Expenses the government has
- gross income Total income
- withholding Money an employer holds from your paycheck
- status Married/single/head of household
- Income from stocks and bonds
- Income the government receives from taxpayers, etc.
- Dependents you are claiming
- Personal expenses you can subtract from income before figuring tax owed (medical, dependents, house mort.)
- Set $ amount not taxed for each dependent
- Money you earn from employment
- income Money earned before deductions
- Husband/Wife
Down
- care expenses Money you pay for someone else to care for a child or elder dependent
- tax Taxes on income
- deduction $ amount non itemizers may subtract from income based upon filing status
- security Your personal identification number
- income Income received from interest, dividends, social security & pentions
- Money received from saving account
- A person who relies on someone for living expenses
- Your banks identification number
- of household Single person who has dependents
- No withholding
- pay Money you earn to take home
24 Clues: Husband/Wife • No withholding • tax Taxes on income • gross income Total income • Expenses the government has • Dependents you are claiming • Income from stocks and bonds • Money you earn from employment • pay Money you earn to take home • Your banks identification number • Money received from saving account • income Money earned before deductions • ...
Compliance Week 2015 2015-10-28
Across
- Reporting a _______ Incident is everyone’s responsibility.
- A Living Will is an example of an _______ Directive.
- NPI Stands for National ________ Identifier.
- ____ your screen when stepping away from your desk.
- Make sure you use a strong ________.
- The Compliance Dept. conducts quarterly Privacy & Security ______.
- Report Security concerns to the __________ department.
- We protect the PHI of our _______.
- All portable electronic _____ must be encrypted.
- The Compliance Officer is Marie _____.
- CHPW uses _____ shred bins for the disposal of PHI.
Down
- Never allow someone else to ________ through a badged door behind you.
- _______ Entities may share PHI for Treatment, Payment, and Operations.
- _________filters spam from our emails.
- You can report concerns anonymously to the Integrity _______.
- CHPW’s Standards of Conduct are the __________ of Integrity.
- Never _____ a password.
- Your cell phone is a portable ______.
- Clues
- PHI stands for _________ Health Information.
- Strong passwords are longer, include upper and lower case, and can include _______.
- _____ requires us to protect our member’s PHI.
- Only use the _______ necessary amount of PHI to do your job.
- If you forget your badge, get a ______ badge from Reception.
24 Clues: Clues • Never _____ a password. • We protect the PHI of our _______. • Make sure you use a strong ________. • Your cell phone is a portable ______. • _________filters spam from our emails. • The Compliance Officer is Marie _____. • NPI Stands for National ________ Identifier. • PHI stands for _________ Health Information. • _____ requires us to protect our member’s PHI. • ...
Afghanistan Plus 2024-01-01
Across
- The president who ordered the war in afghanistan
- Other than USSR, the other country that the King was trying to work with to modernize the country
- President who ordered the assassination of Bin-Laden
- Bin-Laden's first name
- The group that attacked USA on 9/11
- The security group in Pakistan who helped use USA money to prop up the Taliban
- Who in the Government overthrew the King
- What Al-Qaeda attacked on 9/11
- Pakistan wanted the taliban as a buffer between them and who?
- a security force created because of 9/11
- Capital of Afghanistan
Down
- Where Afghani soldiers trained and were influenced by communist ideals
- The country immediately to the east of Afghanistan
- Leader of Al-Qaeda
- The terrorist group that took over Afghanistan from the communist government
- President who actually pulled out of Afghanistan
- What the King was trying to accomplish
- The King of Afghanistan till 1973
- Primary religion in ALL countries ending with "stan"
- President who agreed to leave Afghanista
- A sudden decisive exercise of force in politics overthrowing a government
21 Clues: Leader of Al-Qaeda • Bin-Laden's first name • Capital of Afghanistan • What Al-Qaeda attacked on 9/11 • The King of Afghanistan till 1973 • The group that attacked USA on 9/11 • What the King was trying to accomplish • Who in the Government overthrew the King • President who agreed to leave Afghanista • a security force created because of 9/11 • ...
Zackory's Econ Crossword 2023-09-01
Across
- Capitalist philosopher
- freedom and justice in a system
- usefulness and/or value of a good or service
- the absence of swings in cost for a product
- motivations to succeed
- one thing that must be sacrificed to gain something else
- merchandise or products
- equity, freedom, efficiency, security, growth
- Fovernment controlled market
- limited supply for infinite demand
- a system in which multiple theories of economic system are applied
- Expenditures of economic choices
- lower risk of failure in a system
- objectively considering the best choice
- a "hands off" policy of government
Down
- what one must give up in order to achieve something else
- effectiveness in a system
- community ownership of the means of production
- positive output of a system
- Positive outcomes
- the most efficient use of resources
- the ability to make individualistic choices
- inputs of the production process
- social science of goods and services
- materials needed to create a product
- Communist philosopher
- Free market system
- the action of working for someone
- the network of buyers and sellers of a product
29 Clues: Positive outcomes • Free market system • Communist philosopher • Capitalist philosopher • motivations to succeed • merchandise or products • effectiveness in a system • positive output of a system • Fovernment controlled market • freedom and justice in a system • inputs of the production process • Expenditures of economic choices • the action of working for someone • ...
Cybersecurity Crossword 2025-05-14
Across
- A strong and unique combination to protect online accounts.
- Software designed to detect and destroy computer viruses.
- Bullying that occurs over digital devices like phones and computers.
- authentication A security process using two different verification factors.
- A network security system controlling traffic based on rules.
- Data that can be used to identify an individual.
- Encoding info so only authorized parties can understand it.
- Potential dangers or malicious activities found on the internet.
- Protecting computer systems/networks from theft, damage, or disruption.
Down
- Manipulating people to divulge info or perform actions.
- Synthetic media replacing a person's likeness using AI.
- Individuals who exploit weaknesses in computer systems or networks.
- Connected to the internet.
- Extends a private network across public ones for secure data transfer.
- Footprint The trail of data you create while using the Internet.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Software intended to damage or disable computers and systems.
- Trustworthy and accurate sources of information.
- Potential dangers or hazards.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Trustworthy and accurate sources of information. • Data that can be used to identify an individual. • Manipulating people to divulge info or perform actions. • Synthetic media replacing a person's likeness using AI. • Software designed to detect and destroy computer viruses. • ...
HSE Crossword 2025-05-07
Across
- Cipher component modifiable for crypto agility
- Self-test comparing output to expected results
- Legacy protocol surpassed by HSE performance
- Security feature to zeroize keys upon intrusion
- Quantum-resistant encryption initiative
- Protocol for secure management via CM7
- Key used for deriving encryption keys
- Diagnostic tool for encrypted Ethernet links
- Encryption algorithm used in CN Series
- Vendor of CN Series encryptors
- Time delay minimized by cut-through architecture
- Competitor protocol with hop-by-hop limitations
- Compact encryptor ideal for remote sites
Down
- Traffic handling policy besides encrypt or discard
- Mode for point-to-point encryption over Ethernet
- Capability to support new algorithms
- Software used to manage Senetas encryptors
- Transport Independent Mode acronym
- Kit for developing custom ciphers
- Self-test for manual verification of output
- Certification for cryptographic module security
- Command to zeroize keys and CSPs
- Mode for point-to-multipoint Ethernet encryption
- Encryption solution for secure data in motion
- Erasing all sensitive keys and data
- Management interface for configuring HSE devices
- High-performance encryptor for 100Gbps
- Mid-range encryptor for 10Gbps networks
28 Clues: Vendor of CN Series encryptors • Command to zeroize keys and CSPs • Kit for developing custom ciphers • Transport Independent Mode acronym • Erasing all sensitive keys and data • Capability to support new algorithms • Key used for deriving encryption keys • Protocol for secure management via CM7 • Encryption algorithm used in CN Series • ...
Taxes 2025-12-02
Across
- Health insurance program for older Americans.
- Tax added to the things you buy in stores.
- Document showing how much money you earned and how much tax was taken out.
- The federal agency in charge of collecting taxes.
- The date federal income tax is due each year.
- Group that writes tax laws in the U.S.
- Form you fill out each year to report your income.
- Tax taken out of your paycheck before you get paid.
- Person or business that pays taxes.
- A required payment made to the government.
- Expenses you can subtract from your income to lower your taxes.
Down
- State agency that manages taxes.
- Tax where everyone pays the same percentage.
- Last day of the tax year for individuals
- Money removed from your paycheck for Social Security and Medicare.
- Money returned to you if you paid too much tax.
- Government program that gives money to retired workers.
- Money you earn from working.
- Money you pay to the government so it can provide services.
- President who started social security in 1935
20 Clues: Money you earn from working. • State agency that manages taxes. • Person or business that pays taxes. • Group that writes tax laws in the U.S. • Last day of the tax year for individuals • Tax added to the things you buy in stores. • A required payment made to the government. • Tax where everyone pays the same percentage. • Health insurance program for older Americans. • ...
Chapter 11 – Illiberalism 2025-12-01
Across
- Holding suspects without trial
- Quebec rules protecting French
- Targeting based on race or ethnicity
- Canada’s main historical suspension of rights used three times
- Forced detention of specific groups
- Group interned during WWII
- Right violated by government surveillance
- Rights held by a group, not just individuals
- Serious threat requiring federal action
- US post-9/11 anti-terror legislation
- Expanded security agency powers
- Lack of representation in institutions
Down
- Minor recruited or used in armed group
- State separation from religion
- _____ Crisis, 1970 kidnapping + WMA invocation
- Government monitoring of communications
- Quebec terrorist separatist group
- Unequal treatment of groups
- Policies supporting underrepresented groups
- Rights of language groups + Indigenous peoples
- Government payment for past wrongs
- Social, economic, political exclusion
- US detention center in Cuba
- Canada’s 2001 response to 9/11
- Trudeau quote during FLQ crisis
- Label for targeted groups in WWI/WWII
- Modern Canadian emergency legislation
- Ensuring marginalized groups participate
- Non liberal acts
- Canada’s constitutional rights document
- List restricting travel for security reasons
- Human rights violations used in Guantanamo to obtain confessions
32 Clues: Non liberal acts • Group interned during WWII • Unequal treatment of groups • US detention center in Cuba • State separation from religion • Holding suspects without trial • Quebec rules protecting French • Canada’s 2001 response to 9/11 • Trudeau quote during FLQ crisis • Expanded security agency powers • Quebec terrorist separatist group • Government payment for past wrongs • ...
Econ 2026-04-01
Across
- Spending Government spending beyond its income
- Tax Taxes on large gifts
- Tax Taxes on corporations
- Year 12 month accounting period for financial planning
- Debt Cumulative total of budget deficits
- Capita Per person
- of a Tax The entity that bears the burden of a tax
- Break Lower taxes to encourage specific behaviors, or help lower-income taxpayers
- Tax Taxes on property transferred after death
- Out Effect When government borrowing reduces private investment
- Tax Higher burden on lower-income taxpayers
Down
- Tax Fixed percentage tax
- Deficit Amount spent exceeding revenue
- Sector Government controlled economic activities
- Duties Taxes and fees on imported goods.
- Money Currency declared legal tender by the government
- Tax Higher rates for higher income earners
- Taxes Taxes on sale of specific goods or services
- Taxes to fund Medicare and Social Security
- Sector Businesses and economic activities owned by individuals
- to Pay Principle Those who can afford it should pay more
- Benefits programs such as Social Security, Medicare, and SNAP
- Principle of Taxation Entity that benefits should bear the burden
- Taxes Taxes on products considered socially harmful
24 Clues: Capita Per person • Tax Fixed percentage tax • Tax Taxes on large gifts • Tax Taxes on corporations • Deficit Amount spent exceeding revenue • Duties Taxes and fees on imported goods. • Debt Cumulative total of budget deficits • Tax Higher rates for higher income earners • Taxes to fund Medicare and Social Security • Tax Higher burden on lower-income taxpayers • ...
UNIT 1 2023-05-03
Great Depression 2025-05-19
Third ISMS Crossword Puzzle 2015-11-17
Across
- When receiving an email from an unknown contact that has an attachment, you should ______ the mail
- New hire ____________________ should cover policies, security procedures, access levels, and training on the secure use of information systems.
- How often should you perform an incremental backup?
- Every Vendor or third party is supposed to sign _____ before signing contract with Motif?
- The act of an unauthorized person who follows someone to a restricted area without the knowledge of the authorized person is called ________?
- ____ is the term used to prevent the disclosure of information to unauthorized individuals or systems.
- _____ is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
Down
- Mechanisms that implement the policy
- For information security purposes, ___ are the systems that use, store, and transmit information.
- Looking over someone's shoulder, to get information is called _______?
- This is a document that states in writing how a company plans to protect the company's physical and IT assets.
- An identified weakness of a controlled system is known as a ____.
- Security violations must be reported _____ of discovery
- _____ is protective software designed to defend your computer against malicious software. Malicious software or "malware" includes: viruses, Trojans, key loggers, hijackers, dialers, and other code that vandalizes or steals your computer contents.
- _____ means that data cannot be modified undetectably
15 Clues: Mechanisms that implement the policy • How often should you perform an incremental backup? • _____ means that data cannot be modified undetectably • Security violations must be reported _____ of discovery • An identified weakness of a controlled system is known as a ____. • Looking over someone's shoulder, to get information is called _______? • ...
A Stock Market Adventure 2024-03-22
Across
- Buying securities with money borrowed from a broker, using other securities as collateral.
- A period of sustained increases in the prices of stocks, bonds, or indexes.
- Abbreviation for Initial Public Offering, the first sale of stock by a company to the public.
- Abbreviation for Exchange-Traded Fund, a type of investment fund and exchange-traded product, i.e., they are traded on stock exchanges.
- A payment made by a corporation to its shareholders, usually as a distribution of profits.
- The number of shares or contracts traded in a security or an entire market during a given period.
- A unit of ownership in a corporation or financial asset.
- An individual or firm that charges a fee or commission for executing buy and sell orders submitted by an investor.
Down
- A range of investments held by a person or organization.
- The income return on an investment, such as the interest or dividends received from holding a particular security.
- A statistical measure of the changes in a portfolio of stocks representing a portion of the overall market.
- Selling a security that is not owned by the seller, with the expectation that the price will decline.
- A market condition where prices are rising or expected to rise.
- A marketplace where securities, commodities, derivatives and other financial instruments are traded.
- A market condition where prices are falling or expected to fall.
15 Clues: A range of investments held by a person or organization. • A unit of ownership in a corporation or financial asset. • A market condition where prices are rising or expected to rise. • A market condition where prices are falling or expected to fall. • A period of sustained increases in the prices of stocks, bonds, or indexes. • ...
Chapter 4 Ramsey 2025-03-06
Across
- Asset an asset that loses value over time, such as a car that’s worth less every year
- a moneylender who charges extremely high rates of interest, typically under illegal conditions.
- a thing that is borrowed, especially a sum of money that is expected to be paid back with interest.
- something owned (that has value) offered as security on a debt; if the debt is not repaid as agreed, the item is forfeited to the lender
- total value of everything you own minus all your debts
- the increase in value of a home over time the difference between the amount owed and what the home could be sold for
- credit when the lender doesn’t require you to put down a security deposit or collateral.
Down
- credit that automatically renews whenever a payment is made to reduce the debt
- Credit a loan for a fixed amount of money that‘s paid back in monthly installments
- credit when you have to put down a security deposit or use something as collateral.
- Lending a lender who uses deceptive, unfair, or fraudulent practices on borrowers who are desperate for cash
- a legal claim against (or right to own) an asset until the debt (loan) is repaid
- Asset an asset that increases in value over time
- failure to repay a loan on time
- an estimate of income and expenditure for a set period of time.
15 Clues: failure to repay a loan on time • total value of everything you own minus all your debts • Asset an asset that increases in value over time • an estimate of income and expenditure for a set period of time. • credit that automatically renews whenever a payment is made to reduce the debt • ...
ServiceNow Knowledge 2024-11-07
Across
- Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
- effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
- Best Enterprise Architect in the business; Utilities Expert
- links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
- Build apps at scale with a low-code development environment and prebuilt templates
- personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
Down
- provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
- Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
- Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
- Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
- generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
- ServiceNow Solutions Consultant
- Procure ServiceNow in the Azure or AWS Marketplace
- high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
- Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
- automates and enhances IT operations through strategic use of machine learning and data science
16 Clues: ServiceNow Solutions Consultant • Procure ServiceNow in the Azure or AWS Marketplace • Best Enterprise Architect in the business; Utilities Expert • Build apps at scale with a low-code development environment and prebuilt templates • Strengthen cloud security, protect sensitive data, and ensure regulatory compliance • ...
Black Friday and Cyber Monday 2024-11-25
Across
- Where people go to shop online.
- Buying something for less money than usual.
- The day after Black Friday, focused on online shopping.
- The busiest shopping day of the year.
- What people make to keep track of items they want to buy.
- What many stores offer to attract customers on Black Friday.
- Online shopping is done using this.
- The opposite of "expensive."
Down
- People wait in these to enter stores on Black Friday.
- The Friday after Thanksgiving, famous for big shopping deals.
- A type of store located in malls or shopping centers.
- Another word for "inexpensive" or "low-cost."
- What shoppers try to save by finding good deals.
- Buying presents for friends or family is called __ shopping.
- Another word for a deal or a discount.
- ______ Shopping. Buying without going to a physical store.
- A piece of paper or code that gives you a discount.
- Buying many things at one time is called __ shopping.
- What people use to pay when shopping online.
- A place where many stores are located together.
20 Clues: The opposite of "expensive." • Where people go to shop online. • Online shopping is done using this. • The busiest shopping day of the year. • Another word for a deal or a discount. • Buying something for less money than usual. • What people use to pay when shopping online. • Another word for "inexpensive" or "low-cost." • A place where many stores are located together. • ...
