cyber security Crossword Puzzles
Threat Modeling 2024-10-09
Across
- A diagram representing data flows in a software system
- Preventing legitimate access to resources
- Exposing sensitive information to unauthorized users
- A technique that helps visualize and analyze threats
- Unauthorized changes to data
- Recording system activity to detect or investigate security issues
Down
- A network-based attack pretending to be a trusted source (IP Spoofing)
- A network security system that monitors and controls incoming and outgoing traffic
- Pretending to be someone else
- A tool developed by OWASP for creating threat models (Threat ?)
- Attacker repeats valid data transmission (? Attack)
11 Clues: Unauthorized changes to data • Pretending to be someone else • Preventing legitimate access to resources • Attacker repeats valid data transmission (? Attack) • Exposing sensitive information to unauthorized users • A technique that helps visualize and analyze threats • A diagram representing data flows in a software system • ...
Networking 2025-05-29
Across
- address Unique address assigned to a device in a network.
- A device used to connect network.
- .
- Type of network that connects devices within a building.
- Connecting computers together to share data is called.
Down
- Network type that connects computers across cities or countries.
- Network security method that restricts unauthorized access.
- A major disadvantage of networking.
- Device used to connect multiple devices in a LAN.
- A virus or hacker is a type of _ to a network.
10 Clues: . • A device used to connect network. • A major disadvantage of networking. • A virus or hacker is a type of _ to a network. • Device used to connect multiple devices in a LAN. • Connecting computers together to share data is called. • Type of network that connects devices within a building. • address Unique address assigned to a device in a network. • ...
Puzzle #3 – “SSI” (Supplemental Security Income) 2025-06-27
Across
- - Property or savings considered during SSI eligibility
- - Monthly payment sent to SSI recipients
- - What SSI provides to help pay for basic needs
- - Health coverage often given automatically with SSI
- - SSI is funded by this level of government
- - Describes the type of income this program provides
Down
- - The “S” in SSI and Social Security
- - Program for people with limited income and resources
- - The kind of income and resources you must have to qualify
- - Type of program SSI is, based on financial need
10 Clues: - The “S” in SSI and Social Security • - Monthly payment sent to SSI recipients • - SSI is funded by this level of government • - What SSI provides to help pay for basic needs • - Type of program SSI is, based on financial need • - Health coverage often given automatically with SSI • - Describes the type of income this program provides • ...
Cybersecurity awareness cross-word 2025-11-09
Across
- – A secret string used to verify identity.
- – An update that fixes software vulnerabilities.
- – The process of converting data into code to prevent unauthorized access.
- – A security threat originating from within an organization.
- – Software designed to disrupt, damage, or gain unauthorized access.
Down
- – Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- – Secure connection used to access a network remotely.
- – A network security device that monitors and filters traffic.
- – Unwanted or unsolicited email.
- – A login method requiring two or more verification factors.
10 Clues: – Unwanted or unsolicited email. • – A secret string used to verify identity. • – An update that fixes software vulnerabilities. • – Secure connection used to access a network remotely. • – A security threat originating from within an organization. • – A login method requiring two or more verification factors. • ...
Crossword: Field Terms 2026-02-16
13 Clues: Spy tool • Fake name • Access card • Distraction • Secure room • File of intel • Security beam • Spy/operative • Watch secretly • Follow someone • Classified info • Fake story to blend in • Turn a message into code
Finance App. SUPPLY AND DEMAND 2024-01-10
Across
- any item that serves as a method of payment
- demand outweighing supply
- a rise in the general price level
- total amount of good/service available to consumers
- a financial instrument that holds monetary value
- studies the transfer of money between individuals , businesses, and governments
- a structure where well-informed and independent buyers and sellers exchange identical products
- chance of an outcome being the desired one
- a market structure with only one seller of a particular product
- people who buy goods and services to satisfy their wants/needs
Down
- the desire of a good/service at all possible prices
- someone who creates and supplies goods or services
- ability to convert an investment to cash for it's full value
- a security representing ownership in a corporation
- supply outweighing demand
- the sum of money that is determined by the relationship between demand/supply
16 Clues: demand outweighing supply • supply outweighing demand • a rise in the general price level • chance of an outcome being the desired one • any item that serves as a method of payment • a financial instrument that holds monetary value • someone who creates and supplies goods or services • a security representing ownership in a corporation • ...
Black Friday and Cyber Monday 2024-11-25
Across
- Where people go to shop online.
- Buying something for less money than usual.
- The day after Black Friday, focused on online shopping.
- The busiest shopping day of the year.
- What people make to keep track of items they want to buy.
- What many stores offer to attract customers on Black Friday.
- Online shopping is done using this.
- The opposite of "expensive."
Down
- People wait in these to enter stores on Black Friday.
- The Friday after Thanksgiving, famous for big shopping deals.
- A type of store located in malls or shopping centers.
- Another word for "inexpensive" or "low-cost."
- What shoppers try to save by finding good deals.
- Buying presents for friends or family is called __ shopping.
- Another word for a deal or a discount.
- ______ Shopping. Buying without going to a physical store.
- A piece of paper or code that gives you a discount.
- Buying many things at one time is called __ shopping.
- What people use to pay when shopping online.
- A place where many stores are located together.
20 Clues: The opposite of "expensive." • Where people go to shop online. • Online shopping is done using this. • The busiest shopping day of the year. • Another word for a deal or a discount. • Buying something for less money than usual. • What people use to pay when shopping online. • Another word for "inexpensive" or "low-cost." • A place where many stores are located together. • ...
Great Depression Crossword ! 2017-12-13
Across
- Tennessee Valley authority
- 32nd President of the US
- The US economy was in severe decline leaving millions of Americans unemplyed
- The purchasing of stocks by paying only a small percentage of the price borrowing the rest
- Works progress administration
- Drought and dust storms during the 1930's
- Social security act
- Public utility holding company act
- Security and exchange commision
- Federal Deposit Insurance Corporation
- Bonus Army March on Washington
- Agricultural Adjustment Act
- American engineer, politician, and business man who served as 31st president
Down
- Civilan Conservation corp
- Fair labor standards act
- Legislative initiative proposed by FDR to add more justices to the supreme court
- Schechter poultry vs U.S
- A monetary system in which the basic unit of currency is defined in terms of a set amount of gold
- Evening radio given by FDR lasting 13-44 minutes
- A currency that a government has declared to be legal tender
- No person elected to the office of the President more than twice
- Emergency Banking relief act
- FDR's program helping the ones in need during the great depression
23 Clues: Social security act • Fair labor standards act • Schechter poultry vs U.S • 32nd President of the US • Civilan Conservation corp • Tennessee Valley authority • Agricultural Adjustment Act • Emergency Banking relief act • Works progress administration • Bonus Army March on Washington • Security and exchange commision • Public utility holding company act • ...
Environmental Services 2017-08-18
Across
- What company takes care of RED trash and sharps for the hospital?
- What is the brand of electronic paper towels we use?
- What is the Color of ES Scrubs?
- Wheeler Who is the head of safety and security?
- What tupe of rags do we use to clean? (blue and yellow)
- What floor is ICU on?
- Evening discharge cleaners are called?
- Who is the manager of ES?
- What is the name of the security company?
- What is the name of the disinfectant we use to clean?
Down
- These are used to keep your hands clean.
- What is the name of the fragrance spray we use?
- What is used to clean the toilets?
- What brand of bleach do we use to clean with?
- Weeks How far out should you schedule PTO?
- What program is used to look up chemicals?
- Used to collect trash from multiple areas.
- This is used to clean the carpet.
- This is used to swipe you into the building or certain areas.
- What company takes care of pest control?
20 Clues: What floor is ICU on? • Who is the manager of ES? • What is the Color of ES Scrubs? • This is used to clean the carpet. • What is used to clean the toilets? • Evening discharge cleaners are called? • These are used to keep your hands clean. • What company takes care of pest control? • What is the name of the security company? • Weeks How far out should you schedule PTO? • ...
Kenalan sama Salman dulu 2018-03-04
Across
- Imam Muda Salman dan Kasek Pelayanan Jamaah P3R 1438H
- Nama tengah Ketua Dept. Idul Adha
- kepanjangan dari FO
- Asal daerah Faruq Imam
- Security YPM Salman ITB shift malam yang juga sering jadi Driver
- jumlah jamaah maksimal dlm 1 shaf Masjid Salman dihitung dari koridor utara sampai koridor selatan
- Nama belakang ketua P3RI
- Pembina YPM Salman ITB, Ketua Asosiasi Masjid Kampus Indonesia
- Asal daerah Ketua Dept. Ramadhan
- Kadang Imam Dzuhur,Asar, Ketua Harian YPM Salman ITB
Down
- Mata acara di P3R khusus buat ukhti-ukhti
- Jumlah bidang di Dept. Ramadhan
- Salah satu nilai di P3RI 1438H
- karyawati Masjid Salman ITB yang dulunya Security, Superkorlap di P3R 1438H
- Ketua Pembina YPM Salman ITB yang kuliah di Perancis
- Badan Semi Otonom Mata’ Salman ITB, merupakan kolaborasi bersama bidang dakwah, Gamais, UPTQ, Rumah Amal
- Jumlah sendal sebelah kanan saat Sholat Jumat di Masjid Salman
- Asal daerah Kasek Konsumsi P3R 1438H
- Yang buat chaos panitia P3R
- larangan Korlap di P3R 1438H adalah tidak boleh makan di ..
- Ketua YPM Salman
21 Clues: Ketua YPM Salman • kepanjangan dari FO • Asal daerah Faruq Imam • Nama belakang ketua P3RI • Yang buat chaos panitia P3R • Salah satu nilai di P3RI 1438H • Jumlah bidang di Dept. Ramadhan • Asal daerah Ketua Dept. Ramadhan • Nama tengah Ketua Dept. Idul Adha • Asal daerah Kasek Konsumsi P3R 1438H • Mata acara di P3R khusus buat ukhti-ukhti • ...
tourism 2018-02-27
Across
- typical temperature for freezing point
- this is where the plane is parked and where passengers embark and disembark from the aircraft
- typical temperature for boiling point?
- what is the 3 letter code for Auckland
- pathway that connects the apron to the runway
- airbus and ... are two most manufacturing aircrafts in the world
- what is the name a emergency landing
- disease producing bacteria can enter the body through
- area before departing passengers through security
Down
- flight deck is also known as?
- 3 letter code for Madrid
- around another name for a missed approach
- designated for aircrafts to take off and land
- what is the cut off age for minors
- New Zealanders collect these points when flying and you get bonus's such as VIP lounge and unlimited food and beverages
- area where you go through security and hand over your passport and departure card for inspection
- is a partition that divides the cabin
- what is the 3 letter code for Tauranga
- what 3 letter code rhymes with stud
- what is the 3 letter code for Melbourne
20 Clues: 3 letter code for Madrid • flight deck is also known as? • what is the cut off age for minors • what 3 letter code rhymes with stud • what is the name a emergency landing • is a partition that divides the cabin • typical temperature for freezing point • typical temperature for boiling point? • what is the 3 letter code for Auckland • what is the 3 letter code for Tauranga • ...
Flourish 2014-03-24
Across
- the state of recognising ones’ self
- to assist unconditionally
- state of pleasure and contentment
- bringing together incomplete parts into a whole
- of life/ general wellbeing of an individual defined in terms of health and happiness over wealth
- the condition of being oneself not another
- state of equilibrium and satisfaction at both a physical and mental level
- state of rest or balance of opposing forces
- experiencing the thoughts, feelings and attitudes of another
- pertaining to or involving sentiment
- state of mutual harmony
- general condition of body and mind with reference to sound and vigour
Down
- state of satisfaction
- an integrated system designed to facilitate information exchange and support
- the state of being an individual
- freedom from danger and anxiety
- practice of extended or continued thought or reflection
- feeling of deep sympathy
- pertaining to the body
- state of attentiveness and being aware
- care given to comfort not to cure
- health care facility for terminally ill
- place of domestic security
- pertaining to the mind
24 Clues: state of satisfaction • pertaining to the body • pertaining to the mind • state of mutual harmony • feeling of deep sympathy • to assist unconditionally • place of domestic security • freedom from danger and anxiety • the state of being an individual • state of pleasure and contentment • care given to comfort not to cure • the state of recognising ones’ self • ...
Cold War by Jaimi Taylor 2014-02-17
Across
- when the central government rules by terrorizing citizens
- Vietnam city
- The theroy that if one country falls then the rest will soon follow
- Divided North Vietnam from South Vietnam
- Two people accused of passing atomic secrets to the soviets during the war
- Cuban communist leader
- Line that separates North Korea from South Korea
- European economic recovery made by the USA
- conflict between USA and USSR
- Leader of Indochina communist party
- freed people from resisting communism
Down
- countries controlled by USSR
- 10 nations pleged mutual assistance in the event of a attck
- moved supplys to West Berlin
- the man who wanted to contain communism so he made the Marshall Plan
- Republican Senator who accused Government Officials of communism
- investigates disloyaity on the eve of war
- working class women and men
- Security council doccument that suggested trippling defence budget
- Chinese nationalist who took over China
- the act of preventing spread of communism
- An organization made for peace, security, and economic developement
- High ranking state department leader investigated for spying
23 Clues: Vietnam city • Cuban communist leader • working class women and men • countries controlled by USSR • moved supplys to West Berlin • conflict between USA and USSR • Leader of Indochina communist party • freed people from resisting communism • Chinese nationalist who took over China • Divided North Vietnam from South Vietnam • investigates disloyaity on the eve of war • ...
LSEG Crossword 2021-02-13
Across
- What links Austin Powers with the antagonist from John Carpenter’s Halloween film series
- City in the middle of Spain, located on the banks of the Tagus river in central Iberia
- Synonym for Oxford and Cambridge professors
- Trading periods of 1,000 years
- Venus & Serena
- In possession of fortune
- The 91st day of the year in a number and a word
- Homer, Marge, Bart, Lisa & Maggie
- Who plays Ross from Friends
- The romantic interest of the Joker in the DC Universe
- Welsh singer who had the UK’s bestselling album in 2008, most notable for its hit single ‘Mercy"
Down
- Intelligent papers
- Someone who writes in verses
- Tom Hanks' favourite beach ball
- The name of the lead shark in Finding Nemo
- The Arabic word for ‘king’
- Surname meaning ‘lion’ in IndoIranian languages
- Electromagnetic radiation with a wavelength longer than visible light “____ red”
- 37.035714, 22.126963
- Acronym for the agency of the U.S. Department of Homeland Security that has authority over the security of the traveling public in the United States
20 Clues: Venus & Serena • Intelligent papers • 37.035714, 22.126963 • In possession of fortune • The Arabic word for ‘king’ • Who plays Ross from Friends • Someone who writes in verses • Trading periods of 1,000 years • Tom Hanks' favourite beach ball • Homer, Marge, Bart, Lisa & Maggie • The name of the lead shark in Finding Nemo • Synonym for Oxford and Cambridge professors • ...
Ir al aeropuerto 2022-10-13
Across
- security has to do this to your bags before you can board the plane
- something you do during the holidays
- something that holds your belongings on a trip
- the actual thing you fly on
- the people on the plane
- you go through this to get to the plane
- you give this to the flight attendant as you board the plane
- this is a fast way of traveling that brings you to your destination
- the opposite of leaving
- a form of identification needed for international travel
Down
- you have to go though this when you travel internationally
- you wait in these to board the plane and go through security
- where you wait for a train
- this makes sure we are safe at the airport
- to look closely or observe
- to get on the flight
- to use money to get
- you do this to the travel agency to confirm your flight
- this holds the information about your flight
- the place where you go to get on the plane
20 Clues: to use money to get • to get on the flight • the people on the plane • the opposite of leaving • where you wait for a train • to look closely or observe • the actual thing you fly on • something you do during the holidays • you go through this to get to the plane • this makes sure we are safe at the airport • the place where you go to get on the plane • ...
cashless society 2024-09-02
Across
- to defend their branches fron physical bank robberies
- An economic phenomenon potentially influenced by reduced cash use.
- transaction without the usage of cash
- such a illegal activities cash in commonly
- many modern financial processes and transaction are now taking place without the use of...
- carrying cash makes poeple a high-value target for...
- another way to payment without e-wallet
- Communication system used to connect devices without physical cables.
- The global network that enables electronic transactions worldwide.
- cashless society has its advantage and...
Down
- the first advantage of cashless society
- A drawback in a cashless society related to technology reliance.
- customers can easily ... their cash from the bank if they do not like the fees
- to avoid something
- the electronic aquivalents of bank robbers and muggers
- that should disappear in a cashless society
- thought to be more and just handy
- The process of checking identity in electronic transactions for security.
- must store money, obtain more when they run out , deposit cash when they have an axcess of it
- deposit pay is the other way firms to transfer cash...
20 Clues: to avoid something • thought to be more and just handy • transaction without the usage of cash • the first advantage of cashless society • another way to payment without e-wallet • cashless society has its advantage and... • such a illegal activities cash in commonly • that should disappear in a cashless society • to defend their branches fron physical bank robberies • ...
Finance Final Crossword 2024-05-28
Across
- Your lender takes back your car
- Place where you record check transactions
- Always send out this with your resume
- Interest earned on past & accumulated interest
- What the R stands for using STAR interview method
- Don't spend more than what percentage on a car?
- Total value of your assets minus liabilities
- The numbers on the bottom of checks for banks
- Pauses student loan but interest continues
- Good on the computer is what type of skill?
- Scammers sending fraudulent text messages
Down
- Amount of pay before deductions are taken out
- Insurance used when window gets cracked
- Amount of money percentage of the principal
- Pauses student loan payments for military duty
- 50/30/20 rule - 20% should go to?
- Federal loans available to grad students
- Something of value providing security for a loan
- Difference between amount owed and worth
- 401K where you pay taxes before investing
- social security and medicare are what type of tax?
- Increase or decrease in money on hand
- Type of banks owned by depositors
23 Clues: Your lender takes back your car • 50/30/20 rule - 20% should go to? • Type of banks owned by depositors • Always send out this with your resume • Increase or decrease in money on hand • Insurance used when window gets cracked • Federal loans available to grad students • Difference between amount owed and worth • Place where you record check transactions • ...
public safety 2024-08-08
Across
- one that is unexpected or dangerous.
- Law enforcement officers
- The process of moving
- A natural or man-made event that
- an impending danger.
- immediate attention.
- for maintaining public order and safety.
- An event or occurrence,
- widespread damage or loss.
- A risk or danger,
- The possibility of
- case of emergency.
- A way out, especially
- protection in an emergency.
- to cause danger.
- The condition of being protected from or
- something that could cause harm.
- Measures taken to
- safety and protection from threats.
- The actions taken by
- from happening or arising.
- To monitor an area for security or safety.
Down
- The action of stopping
- A serious, unexpected situation
- to safety in case of danger.
- A device that signals a warning,
- before professional help arrives.
- and extinguish fires.
- A person trained to
- in need of urgent medical care.
- distressing situation.
- of danger.
- A formal notification or warning
- A structure or place
- bad happening.
- Immediate care given for
- To save someone from a dangerous
- and responders after a crisis has occurred.
- A vehicle used to transport
39 Clues: of danger. • bad happening. • to cause danger. • A risk or danger, • Measures taken to • The possibility of • case of emergency. • A person trained to • an impending danger. • immediate attention. • A structure or place • The actions taken by • The process of moving • and extinguish fires. • A way out, especially • The action of stopping • distressing situation. • An event or occurrence, • ...
FINANCIAL LITERACY 2023-03-08
Across
- an exchange between the bank and the consumer
- an asset that has fantiacl value and that can be traded
- - a long sever economic recession
- a general decrease in the prices of goods and services
- - a loan to buy now and pay later
- a percentage of the purchase price
- period - the number of days for which your being payed
- a plan for spending and saving money
- a sum of money borrowed from the bank
- - the money that comes into you
- a share of ownership in a corporation
Down
- is a security that provides fixed interest payments for a set period of time
- - an economic slowdown that last for 6 months or longer
- the money received annually from an investment
- deposit - arrangement you will receive a pay sub so that you know how much you've earned and how much is deducted
- - a general increase in the price of goods and services
- -is an investment that protects you fatality against everyday risk
- taking money out of your account
- the measurable likelihood of loss or less than expected return
- putting money in an account
20 Clues: putting money in an account • - the money that comes into you • taking money out of your account • - a long sever economic recession • - a loan to buy now and pay later • a percentage of the purchase price • a plan for spending and saving money • a sum of money borrowed from the bank • a share of ownership in a corporation • an exchange between the bank and the consumer • ...
Asleep On A Plane 2023-06-29
Across
- it's pressurized
- where declarations are made
- the brothers who got us here
- an alaskan island NOT served by many airlines
- everyone's waiting for the light to go off
- he'll bring you snacks
- where the plane goes from ground to sky
- despite the inflatable slide, no one wants to go to this pool party
- popular western airline
- famous German airline
- fluffy clouds
- what the plane's doing at 30,000 feet
- dispensed by a dangling mask
- where your carry-on is stored
- what you gotta pay to check
- stop in-between
- fills the tank
Down
- classic inflight drink
- additional security layer for some international travel
- domain of TSA
- at the helm
- seat position upon landing
- seatback furniture
- sign of baby's distress
- puke vessel
- classic inflight snack
- precedes arrival
- bumpy ride
- chocolate, liquor, electronics found here
- where the VIPs hang
- where one waits for one's plane
- badly behaved
- the state of most flights these days
- what condors and vultures do
34 Clues: bumpy ride • at the helm • puke vessel • domain of TSA • fluffy clouds • badly behaved • fills the tank • stop in-between • it's pressurized • precedes arrival • seatback furniture • where the VIPs hang • famous German airline • classic inflight drink • he'll bring you snacks • classic inflight snack • sign of baby's distress • popular western airline • seat position upon landing • ...
DevOps Buzzwords 2023-08-29
Across
- controversial devops metric, abbr
- serverless service starts with a baby farm animal
- splits a single dataset into partitions
- container company with whale logo
- open source database monitoring tool invented by Torkel Ödegaard
- service availability problem or bug
- writer of top ten web application security risks
- between cyan and blue
- foundational security measures, abbr
- data on the use and performance of applications
- the three pillars are metrics, traces and logs
- developer pipeline to production, abbr
Down
- ___ borealis
- author of Metamorphis
- Brazilian Rainforest
- reports on drivers of software delivery and operations performance
- search engine and csp
- when you treat operations as a software problem, abbr
- says "open sesame"
- observability product with a pet for a logo
- observability product with a logo of where bees may live
- greek god of fire
- greek word for navigator or guide
- tool for managing infrastructure as code AND a for making planets bio-compatible
- get code to users
- it's mostly made up of linux servers, also white and fluffy
- to quote famous meme of dog in a room on fire
27 Clues: ___ borealis • greek god of fire • get code to users • says "open sesame" • Brazilian Rainforest • author of Metamorphis • search engine and csp • between cyan and blue • controversial devops metric, abbr • container company with whale logo • greek word for navigator or guide • service availability problem or bug • foundational security measures, abbr • ...
Real Money Real World 2025-02-07
Across
- Tax paid to the U.S. government based on earnings.
- The amount paid for insurance coverage.
- Money set aside for financial security in retirement.
- The amount left after all deductions are taken from a paycheck.
- Interest calculated on both the initial principal and accumulated interest.
- Amounts subtracted from gross income, including taxes and benefits.
- A financial plan for managing income and expenses.
- The total amount of money earned before deductions.
- Money owed to lenders or creditors.
- A bank account used for everyday transactions.
Down
- Coverage that helps pay for medical expenses.
- Non-essential items that improve comfort or lifestyle.
- A numerical rating representing a person’s creditworthiness.
- A payroll tax that funds Social Security and Medicare.
- The amount a person must pay before insurance covers expenses.
- Essentials required for survival, such as food and housing.
- A bank account that earns interest over time.
- The electronic transfer of a paycheck into a bank account.
- Borrowed money to pay for education that must be repaid.
- Money received from working or investments.
20 Clues: Money owed to lenders or creditors. • The amount paid for insurance coverage. • Money received from working or investments. • Coverage that helps pay for medical expenses. • A bank account that earns interest over time. • A bank account used for everyday transactions. • Tax paid to the U.S. government based on earnings. • ...
Cybersecurity Crossword 2025-05-14
Across
- Software designed to detect and destroy computer viruses.
- Potential dangers or malicious activities found on the internet.
- Synthetic media replacing a person's likeness using AI.
- A network security system controlling traffic based on rules.
- A security process using two different verification factors.
- Manipulating people to divulge info or perform actions.
- Extends a private network across public ones for secure data transfer.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Trustworthy and accurate sources of information.
Down
- Protecting computer systems/networks from theft, damage, or disruption.
- Connected to the internet.
- Bullying that occurs over digital devices like phones and computers.
- Potential dangers or hazards.
- The trail of data you create while using the Internet.
- Individuals who exploit weaknesses in computer systems or networks.
- Software intended to damage or disable computers and systems.
- Encoding info so only authorized parties can understand it.
- Data that can be used to identify an individual.
- A strong and unique combination to protect online accounts.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Data that can be used to identify an individual. • Trustworthy and accurate sources of information. • The trail of data you create while using the Internet. • Synthetic media replacing a person's likeness using AI. • Manipulating people to divulge info or perform actions. • ...
Descubre 3.5.2 2026-01-20
Across
- drowned m
- ball field
- chance; coincidence
- tourist (adj.)m
- protected m
- windshield
- propeller
- safety; security
- wall
- to sink
- brick
- artifact
- to stay
- bay
- port
- rain forest
- pier
- to sail
- to take off
- stripe
- myth
- pretend
- to land
- to confront
- to throw away
- to float
- fishing
- to visit; to go around
- oar
- distant m
- seat belt
Down
- sleeve
- ring
- ring
- (P. Rico; Cuba) to outdo oneself
- wood
- to change planes
- stone
- recommendable; advisable
- luxurious m
- height; highest level
- legend
- notice; warning
- stern
- to pack
- bow
- traffic jam
- security measures
- airline gate
- shark
- ball game
- concrete
- to throw ... out
- jet
- cascade; waterfall
- to throw
- the Mayan Trail
- What on earth?
- diamond
- pyramid
- to get caught
- boat
- chance
- scuba diver m
- risky m
- lighthouse; beacon
- con tubo de respiración to snorkel
67 Clues: bay • bow • jet • oar • ring • ring • wood • wall • port • pier • myth • boat • stone • brick • stern • shark • sleeve • legend • stripe • chance • to sink • to stay • to pack • to sail • diamond • pretend • pyramid • to land • risky m • fishing • artifact • concrete • to throw • to float • drowned m • propeller • ball game • distant m • seat belt • ball field • windshield • protected m • luxurious m • rain forest • traffic jam • to take off • to confront • airline gate • to get caught • ...
week 4 2025-09-18
Across
- trump hit a Venezuela blank with a deadly strike
- a lot of politics are pushing for more of this
- the U.K. is raising security for when this guy visits
- childhood vaccinations are on the _____
- this pope just turned 70
- this country just had a big sink hole happen
- this thing is where school shooters go to see other school shootings
- a massive this happened in the U.K.
- trump is sending these into U.S. cities
- this debater got shot last week
- this is happening to keep TikTok in the U.S.
Down
- trump threatens Russia with new of these
- a farmer in ft. Wayne indiana grows the tallest this type of flower
- who is Arial assaulting gaza
- where did trump send troops
- these type of booths are back in style
- what flight company got turned around after a bird strike
- people who criticized kirk's death on this are now getting in trouble
- this is charlie kirk's killers name
- what country is having rising tensions with the U.S.
20 Clues: this pope just turned 70 • where did trump send troops • who is Arial assaulting gaza • this debater got shot last week • a massive this happened in the U.K. • this is charlie kirk's killers name • these type of booths are back in style • childhood vaccinations are on the _____ • trump is sending these into U.S. cities • trump threatens Russia with new of these • ...
BEYOND BORDERS 2025-11-24
Across
- Foundational 1945 agreement establishing principles for post-war international cooperation (two words)
- Global financial institution offering stabilisation loans (abbr.)
- Regional bloc of Southeast Asian nations
- Western military alliance founded in 1949
- Strategy where a rising power acts more assertively to reshape regional order
- India–Sri Lanka water body important for maritime security
- Dutch city that hosts major international courts
- Trade-related charge imposed on imports
- Conflict where states back opposing sides without direct fighting
- UN body dealing with economic and social issues
- Narrow waterway connecting the Red Sea to the Mediterranean
- Influence through culture and attraction, not force
Down
- UN body responsible for global peace and security (abbr.
- System where multiple major powers coexist
- Currency used in 20+ European countries
- a group of people who have been dispersed from their original homeland to other places
- Major climate agreement adopted in 2015
- India’s vision document outlining foreign-policy priorities in the Indo-Pacific (two words)
- Political grouping of Brazil, Russia, India, China, South Africa, and new members added in 2024
- a Strategic Indian Ocean island nation central to India–China rivalry
20 Clues: Currency used in 20+ European countries • Major climate agreement adopted in 2015 • Trade-related charge imposed on imports • Regional bloc of Southeast Asian nations • Western military alliance founded in 1949 • System where multiple major powers coexist • UN body dealing with economic and social issues • Dutch city that hosts major international courts • ...
Chapter 5 - Information Assurance Management 2026-01-12
Across
- Process of recognizing possible dangers to systems or information
- Pillar that confirms actions can be traced to individuals
- Pillar of information assurance that ensures data is accessible when needed
- Practice that focuses mainly on protecting data from unauthorized access
- Potential cause of harm to information systems
- Stage in PDCA where plans are implemented
- Pillar that proves actions or transactions occurred
- Law that protects creative works such as software and digital content
- Rules and agreements that apply across multiple countries
Down
- Weakness that can be exploited by a threat
- Law that protects personal data and privacy
- Field that ensures information remains secure, reliable, and available
- Law that governs misuse of computers and digital systems
- Stage in PDCA where results are reviewed and evaluated
- Pillar that ensures data is accurate and not altered improperly
- Program designed to educate users about security risks and best practices
- Process of identifying valuable items such as data, systems, and hardware
- Pillar that ensures information is protected from unauthorized access
- Systematic process of evaluating risks and deciding how to control them
- Methodology that improves processes continuously
20 Clues: Stage in PDCA where plans are implemented • Weakness that can be exploited by a threat • Law that protects personal data and privacy • Potential cause of harm to information systems • Methodology that improves processes continuously • Pillar that proves actions or transactions occurred • Stage in PDCA where results are reviewed and evaluated • ...
Luke's sadly not brainrot puzzle 2025-02-13
12 Clues: synonym: tangy • synonym: picky • synonym: cuddle • antonym: to risk • synonym: catolog • synonym: petition • synonym: to guide • synonym: landslide • synonym: guideline • synonym: insecurity • synonym: ridiculous • antonym: unrealistic
Chapter 18 Layers of Defense Againist Malware 2021-09-30
Across
- otherwise known as Apps or Programs
- _________ software functions kind of like a guard dog
- The layer of Defense between your computer and the Internet this layer is called a _____.
- ________ cover the known weaknesses in a program so that attackers can't exploit them.
Down
- The person is known as the _______.
- Layer 1
- Arm yourself with ___________
- None of these layers is very effective on its own. But taken together they constitute a strong ______ defense strategy.
8 Clues: Layer 1 • Arm yourself with ___________ • The person is known as the _______. • otherwise known as Apps or Programs • _________ software functions kind of like a guard dog • ________ cover the known weaknesses in a program so that attackers can't exploit them. • The layer of Defense between your computer and the Internet this layer is called a _____. • ...
jobs 2026-01-27
Across
- a person who builds or repairs houses.
- a person who helps patients with daily care in hospitals.
- a person who prepares meals.
Down
- a person who cuts and styles hair.
- a person who welcomes people in a company or office.
- a person who protects computers from cyber attacks.
- a person who designs and takes care of gardens.
- a person who cares for skin, nails and beauty treatments.
8 Clues: a person who prepares meals. • a person who cuts and styles hair. • a person who builds or repairs houses. • a person who designs and takes care of gardens. • a person who protects computers from cyber attacks. • a person who welcomes people in a company or office. • a person who cares for skin, nails and beauty treatments. • ...
Crossword 2014-06-12
Across
- I am working for data bases management team. Complete the signature: RESG/GTS/MKT/…
- What always comes ‘FIRST’ in SSB team ?
- One of the four main RESG Resources lines
- My name is GTS. I am … years old
- Number of Outages typologies
- The RESG/GTS/MKT department working for "architecture, projects and security"
- They manages the Group networks and telecom (voice, data, security) as well as computer rooms
Down
- The 3 letters for connecting to Marley
- Not Retail but corporate finance and investment
- Head of RESG/GTS/MKT
- Acronym of “IT Infrastructures” (Global technology Services) department
- To be submitted if I want to perform an ITIL change
12 Clues: Head of RESG/GTS/MKT • Number of Outages typologies • My name is GTS. I am … years old • The 3 letters for connecting to Marley • What always comes ‘FIRST’ in SSB team ? • One of the four main RESG Resources lines • Not Retail but corporate finance and investment • To be submitted if I want to perform an ITIL change • ...
Investing unit 2023-10-16
Across
- New York Stock Exchange
- Provides individually tailored investment advice
- money is paid regularly at a particular rate for the use of money lent
- a security that represents fractional ownership in a company
- things and ventures that cost you money
Down
- The money that originally agreed to pay back
- Anything you own that adds financial value
- The nominal or dollar value of a security
- Prices of goods and services increase over a long period of time
- issued by gov. corporations when they want to raise money
- A global electronic marketplace for buying and selling securities
- Something with the ability to negatively impact you
12 Clues: New York Stock Exchange • things and ventures that cost you money • The nominal or dollar value of a security • Anything you own that adds financial value • The money that originally agreed to pay back • Provides individually tailored investment advice • Something with the ability to negatively impact you • issued by gov. corporations when they want to raise money • ...
Puzzle #2 – “DISABILITY” 2025-06-27
Across
- - Professional who must verify your condition
- - Medical condition that limits daily activities
- - What you can do if your Social Security claim is denied
- - Condition that prevents someone from working full-time
Down
- - Earned through employment and needed for SSDI
- - What you must be to qualify for SSDI
- - Your reported income that determines SSDI eligibility
- - Social Security program for disabled workers
- - The date your disability began
9 Clues: - The date your disability began • - What you must be to qualify for SSDI • - Professional who must verify your condition • - Social Security program for disabled workers • - Earned through employment and needed for SSDI • - Medical condition that limits daily activities • - Your reported income that determines SSDI eligibility • ...
Chris kiris 2019-09-05
12 Clues: secure • Social • Profile • Texting • computer • Recording • Customize • Information • A shop on the web • private and secure • Convert into a code • a text that has been decoded
Chris kiris 2019-09-06
12 Clues: Social • secure • Profile • Texting • computer • Recording • Customize • Information • A shop on the web • private and secure • Convert into a code • a text that has been decoded
puzzle1 2023-08-11
12 Clues: Nova core • Authorization • Worker Domain • Authentication • Country Domain • Shared services • Customer Domain • NextGen Security • Purchasing Domain • Nova Tenant Management • scaling/data ingestion • Document Management Platform Domain
Public Services 2012-10-02
AGtest 2021-02-23
Women in Tech 2023-02-22
Finance crossword 2019-04-30
Across
- Any person who owns shares of a company's stock
- Distribution of profits made by a company to its shareholders
- Market Any market in which prices of the share are advancing in an upward trend
- A unit of a company owned by an individual, company or mutual funds
- An asset of a certain monetary value which can be exchanged with assets of the same type and value
Down
- Relating to public revenues (taxation), public spending, debt, and finance
- A situation in which investors have expressed an interest in buying more shares of a new security than will be available
- An asset that a lender accepts as security for a loan
- The process of making the securities officially quoted on the notified stock exchange for the trade
9 Clues: Any person who owns shares of a company's stock • An asset that a lender accepts as security for a loan • Distribution of profits made by a company to its shareholders • A unit of a company owned by an individual, company or mutual funds • Relating to public revenues (taxation), public spending, debt, and finance • ...
Finance Crossword - Adfactors PR 2019-04-30
Across
- Relating to public revenues (taxation), public spending, debt, and finance
- An asset of a certain monetary value which can be exchanged with assets of the same type and value
- A unit of a company owned by an individual, company or mutual funds
- A situation in which investors have expressed an interest in buying more shares of a new security than will be available
Down
- Any market in which prices of the share are advancing in an upward trend
- Distribution of profits made by a company to its shareholders
- Any person who owns shares of a company's stock
- An asset that a lender accepts as security for a loan
- The process of making the securities officially quoted on the notified stock exchange for the trade
9 Clues: Any person who owns shares of a company's stock • An asset that a lender accepts as security for a loan • Distribution of profits made by a company to its shareholders • A unit of a company owned by an individual, company or mutual funds • Any market in which prices of the share are advancing in an upward trend • ...
Protecting Data 2024-10-06
Across
- The highest level of access allowing full control over system resources. (13/6 letters)
- Rules or standards that define how data is transmitted over a network. (9 letters)
- A type of backup that only saves changes made since the last backup. (11/6 letters)
- A copy of data stored separately to be used for recovery in case of data loss. (6 letters)
- The successor to SSL, providing enhanced security for data transmission. (3 letters)
- A permission level where users can view but not modify files. (4/4/6 letters)
Down
- Software that is designed to damage or disrupt a system. (7 letters)
- Electronic documents used to authenticate the identity of users or websites. (7/12 letters)
- A security protocol used for encrypting information over the internet. (3 letters)
- A physical security measure using biological data, like fingerprints or iris scans, for authentication. (9/6 letters)
- The process of converting data into a coded format to prevent unauthorized access. (10 letters)
11 Clues: Software that is designed to damage or disrupt a system. (7 letters) • A permission level where users can view but not modify files. (4/4/6 letters) • A security protocol used for encrypting information over the internet. (3 letters) • Rules or standards that define how data is transmitted over a network. (9 letters) • ...
Synonyms 2021-06-24
11 Clues: crisis • danger risk • boss manager • evaluate judge • methods process • signals warnings • manage supervise • rules guidelines • duties obligations • safeguard security • safeguarding precautionary
Security Fortnight Awareness Crossword 2024-07-24
Across
- Never use others ID cards
- You will salute when I am raised
- Ensure you create this before vendor comes
- I need to be diffused to save lives
- final point to reach incase of emergency
- I will sing when you open the emergency exit
- Backbone in case of emergencies
- Used to find something suspicious
- Smile when you see it
Down
- I used to cover or earmark an area
- Maintain 20 km/hr
- As you leave I will scan your belongings
- Identity that you are FS
- FS Guardian from Entry to Exit
- Use me if you are entering inside shopfloor
15 Clues: Maintain 20 km/hr • Smile when you see it • Identity that you are FS • Never use others ID cards • FS Guardian from Entry to Exit • Backbone in case of emergencies • You will salute when I am raised • Used to find something suspicious • I used to cover or earmark an area • I need to be diffused to save lives • As you leave I will scan your belongings • ...
CRYPTOGRAPHY AND NETWORK SECURITY 2023-07-30
Across
- Same Key
- An art of secret writing
- Pair of two different Keys
- Only attempts to learn
- Both cryptography and cryptanalysis
- Transformed Message
- Architecture that focuses on security attack, mechanism, service
- Known only to sender and receiver
Down
- An algorithm to transform
- Types of attacks
- Also called code breaking
- Plain to Cipher
- Cipher to Plain
- Alter system resources
- Original Message
15 Clues: Same Key • Plain to Cipher • Cipher to Plain • Types of attacks • Original Message • Transformed Message • Only attempts to learn • Alter system resources • An art of secret writing • An algorithm to transform • Also called code breaking • Pair of two different Keys • Known only to sender and receiver • Both cryptography and cryptanalysis • ...
Vision 2020 2019-12-23
Across
- XH offers 24/7 professional
- 500 MBPS
- We offer Home Security and Xfinity Home Security
- Vision 2020 introduces packages with a new
- xFi Pods require a leased wireless
- This is an easy way to enjoy Netflix, HBO, Prime Video, Music and thousands of free movies and shows together
- All X1 Pro+ Package offers will require a
Down
- The average family has 14 smart devices connected to the home
- This comes included in all X1 Pro+ packages
- 100 MBPS
- We offer, Double plays, Triple Plays and
- If a customer cancels their service before they've paid for their equipment in full, they must pay the remaining balance on their
- Vision 2020 goes live on January
- With XH you can purchase a la carte
- These provide a great solution for customers who have connectivity issues in areas of their home
15 Clues: 100 MBPS • 500 MBPS • XH offers 24/7 professional • Vision 2020 goes live on January • xFi Pods require a leased wireless • With XH you can purchase a la carte • We offer, Double plays, Triple Plays and • All X1 Pro+ Package offers will require a • Vision 2020 introduces packages with a new • This comes included in all X1 Pro+ packages • ...
READY. SET. SAFETY! 2021-05-06
Across
- concentrator this oxygen device can go on the ride
- age of a supervising companion
- how to contact health services/security on the phone
- muster station
- can you use the AED in a medical emergency
- if we lose ____ camera(s) we would cycle as normal but call tech base and inform a lead
Down
- A in ABLE
- E in ABLE
- what should you do if you notice one of the loops is undone and has already left the station
- first thing to do on platform if there is a signal 25 or 29
- these have to be removed before the guest can ride the ride
- tank this oxygen device cannot go on the ride
- L in ABLE
- B in ABLE
- how to contact health services/security via the radio
- if we lose ____ camera(s) we would cycle clear and call 11-D, then inform the lead
16 Clues: A in ABLE • E in ABLE • L in ABLE • B in ABLE • muster station • age of a supervising companion • can you use the AED in a medical emergency • tank this oxygen device cannot go on the ride • concentrator this oxygen device can go on the ride • how to contact health services/security on the phone • how to contact health services/security via the radio • ...
International Response to the Darfur Genocide 2023-05-08
Across
- Country that provided weapons and had flight simulators
- Last name of the American journalist who brought light to Darfur
- Peace Agreement that was signed in 2020
- US Secretary of State (classified the killings as genocide- 2 words)
- Militia from Sudan
- Country that exported Russian weapons to Sudan
Down
- Two words- the type of car that the Sudanese police force used
- Document that sparked UNAMID
- Country that reportedly discussed military cooperation
- Type of aid that UNAMID was meant to give
- Adopted by the security council in 2017
- Put in place by the security council, many countries went against it, wasn't heavily monitored
12 Clues: Militia from Sudan • Document that sparked UNAMID • Peace Agreement that was signed in 2020 • Adopted by the security council in 2017 • Type of aid that UNAMID was meant to give • Country that exported Russian weapons to Sudan • Country that reportedly discussed military cooperation • Country that provided weapons and had flight simulators • ...
Biometrics Vocabulary 2026-02-01
Across
- – Tricking people to gain money, information, or power.
- – A person who pretends to be someone else.
- – Weak spots or flaws that make something easier to break into.
- – Pretending to be someone or something else.
- – When security fails and private information is exposed.
- – Got around a rule or protection instead of following it.
- – Made or copied illegally to look real.
Down
- – Using a weakness to gain an unfair advantage or access.
- – People who break the law.
- – Something used to hide who a person really is.
- – Ways to protect information, devices, or systems from being harmed or used without permission.
- – Entered a computer or account without permission.
12 Clues: – People who break the law. • – Made or copied illegally to look real. • – A person who pretends to be someone else. • – Pretending to be someone or something else. • – Something used to hide who a person really is. • – Entered a computer or account without permission. • – Tricking people to gain money, information, or power. • ...
cybersecurity 2026-03-23
Across
- A second layer of security beyond a password (abbreviation)
- A type of attack that locks your files until payment is made
- The process of converting data into a secure format
- A harmful program that spreads and replicates itself
- A network security system that monitors and controls traffic
- Pretending to be a trusted source to deceive users
Down
- A secret word or phrase used to access accounts
- A secure connection used on public networks
- A program that protects against malicious software
- A scam that tricks users into revealing sensitive information
- Software designed to damage or disrupt systems
- Unauthorized access to a system or account
12 Clues: Unauthorized access to a system or account • A secure connection used on public networks • Software designed to damage or disrupt systems • A secret word or phrase used to access accounts • A program that protects against malicious software • Pretending to be a trusted source to deceive users • The process of converting data into a secure format • ...
Bullying 2024-09-02
Across
- pelaku bullying
- bullying dengan mengolok olok, mengejek, mengancam, menuduh dan memfitnah
- dampak bully yang menyebabkan pengingkatan & penurunan suasana hati
- dampak bagi org yang mengalami kurang empati, kecenderungan melakukan kekerasan dan masalah perilaku
- tempat bullying memukuli adik kelas
- perasaan ketegangan dan tekanan emosional
- menanggung sesuatu yang tdk menyenangkan
- kata lain dari bullying
- sikap membedakan orang lain
Down
- bullying dalam media sosial
- bentuk tindakan agresif yang dilakukan dgn sengaja dan berulang kalidgn tujuan untuk melukai / mengakibatkan ketidaknyamanan pd org lain
- meminta uang atau barang scr paksa disertai ancaman
- korban memiliki kekurangan dalam aspek fisik maupun psikologis sehingga merasa dikucilkan
- stres, kecemasan, depresi
- perundungan yg dilakukan dgn menggunakan tubuh/objek utk menyakiti org lain
- dampak bullying yang menyebabkan munculnya keinginan untuk membalas / melihat org lain mengalami kesakitan, cedera atau tekanan
- dampak dimana korban mengalami isolasi sosial, perasaan kesepian, dan penurunan kualitas hidup scr keseluruhan
- tunjukkan prestasi, tumbuhkan rasa percaya diri, jadikan penyemangat utk sukses
- salah satu faktor bullying karena tidak memiliki sesuatu yg dimiliki org lain
19 Clues: pelaku bullying • kata lain dari bullying • stres, kecemasan, depresi • bullying dalam media sosial • sikap membedakan orang lain • tempat bullying memukuli adik kelas • menanggung sesuatu yang tdk menyenangkan • perasaan ketegangan dan tekanan emosional • meminta uang atau barang scr paksa disertai ancaman • ...
2022 Cyber Breaches 2022-10-12
Across
- successfully targeted by Lapsus$
- social media platform
- Airline company
- Online game geared towards children
- cryptocurrency exchange financial services company
Down
- Family-owned hotel megachain
- online gaming company responsible for GTA7
- Gig transportation company
- Global organization that helps people in crisis
9 Clues: Airline company • social media platform • Gig transportation company • Family-owned hotel megachain • successfully targeted by Lapsus$ • Online game geared towards children • online gaming company responsible for GTA7 • Global organization that helps people in crisis • cryptocurrency exchange financial services company
Cyber Month Crossword 2024-06-23
Across
- The action of making sure your software is up-to-date (9 letters)
- Software designed to protect against viruses (8 letters)
- Type of attack where hackers trick people into providing personal information (8 letters)
- A method of encrypting information to make it unreadable to unauthorized users (9 letters)
Down
- A secret word or phrase used to gain access to something (8 letters)
- Unauthorized access to a computer or network (7 letters)
- Malicious software that replicates itself to spread to other computers (5 letters)
- Keeping personal and sensitive information safe (10 letters)
- Security measure that requires two forms of identification (3 letters)
9 Clues: Unauthorized access to a computer or network (7 letters) • Software designed to protect against viruses (8 letters) • Keeping personal and sensitive information safe (10 letters) • The action of making sure your software is up-to-date (9 letters) • A secret word or phrase used to gain access to something (8 letters) • ...
Crossword#2 2015-12-03
Across
- _______ ensures routing and transformation for internal and external interfaces of APTP components
- Example of a debt security
- Example of an equity security
- Demand for the IPO > The total number of shares not issued
Down
- Example of a Mandatory Corporate Action
- Date when trade terms are negotiated
- Used for raising funds for an entity
- As price of bond increases, its ____ decreases
- Amount a bondholder will receive as interest payment
- Value of all fund assets (less liabilities) in a Mutual fund divided by the number of units outstanding
10 Clues: Example of a debt security • Example of an equity security • Date when trade terms are negotiated • Used for raising funds for an entity • Example of a Mandatory Corporate Action • As price of bond increases, its ____ decreases • Amount a bondholder will receive as interest payment • Demand for the IPO > The total number of shares not issued • ...
Crossword#1 2015-12-04
Across
- Book-building is used in _____
- Golden source of APTP and its clients for securities’ information
- Date when trade is expected to be settled
- ________ agrees to purchase any unplaced shares and charges a commission for undertaking the risk of under subscription
- Strategy used to reduce the risk exposure in an investment
Down
- Type of reconciliation
- Security that represents ownership in a company
- These mutual funds, once issued can be brought from the secondary market only
- A settlement system
- A security identifier
10 Clues: A settlement system • A security identifier • Type of reconciliation • Book-building is used in _____ • Date when trade is expected to be settled • Security that represents ownership in a company • Strategy used to reduce the risk exposure in an investment • Golden source of APTP and its clients for securities’ information • ...
HACKING TERMS 2023-11-13
Across
- Software designed to harm or exploit computer systems
- A deliberate attempt to exploit computer systems or networks.
- A reward offered for discovering and reporting software bugs
- A secret word or phrase used for authentication.
- A series of instructions for a computer to execute.
- Protective measures against digital threats
Down
- Ethical hackers working to improve security
- The right to keep personal information and activities confidential.
- A weakness or flaw in a system that can be exploited.
- The process of converting information into a code for security.
10 Clues: Ethical hackers working to improve security • Protective measures against digital threats • A secret word or phrase used for authentication. • A series of instructions for a computer to execute. • Software designed to harm or exploit computer systems • A weakness or flaw in a system that can be exploited. • ...
Unit 3-9 2025-03-22
Across
- Design with spokes extending from a central control area
- Model emphasizing community and family ties for reentry
- Major private prison corporation in the U.S.
- Model focused on security, discipline, and order in prisons
- Loss of property connected to criminal activity
- Federal agency responsible for prisons and corrections (acronym)
Down
- For-profit facility operated by a non-governmental organization
- Model focused on treatment to reform offenders
- Layout where buildings surround an open square for inmate movement
- Highest security level for the most dangerous inmates
10 Clues: Major private prison corporation in the U.S. • Model focused on treatment to reform offenders • Loss of property connected to criminal activity • Highest security level for the most dangerous inmates • Model emphasizing community and family ties for reentry • Design with spokes extending from a central control area • ...
Vocabulary: A l'aeroport 2024-04-07
12 Clues: ticket • counter • suitcase • arrivals • passport • passenger • carry-on bag • boarding gate • boarding card • flight number • airline company • security control
What is that word 2025-02-13
12 Clues: safe • label • settle • a rule • landslide • body gourd • good sense • a small pie • making no sense • scream for help • to steer a course • very carful about choosing
social network 2013-11-21
Cyber safety 2015-03-01
Humanities 2021-11-09
12 Clues: Theory • Theory • Effect • Anomaly • Security • resource • extraction • Water Scarcity • Climate Change • Water Scarcity • Greenhouse Effect • Capture and Storage
Resources of the 21st century 2021-11-09
12 Clues: Theory • Effect • Theory • Anomaly • resource • Security • extraction • Climate Change • Water Scarcity • Water Scarcity • Greenhouse Effect • Capture and Storage
Spanish Vocabulary Crossword 2025-04-11
Chapter 6 2019-09-26
Across
- a history professor who defines of 1990 is national security as defined through the lens of national power.
- the requirement to maintain the survival of the state through the use of economic, power projection and political power, and the exercise of diplomacy.
- in this section, the state values the dignity of every human person and guarantees full respect for human rights.
- in this section, the state shall promote social justice in all phases of national development.
- supposed to represents a democratic society with a mission to educate, not to police children.
- he enlarged the definition of national security by including elements such as economic and environmental security.
- in this section,the separation of Church and state shall be inviolable
- in this section, that state shall protect and promote the right to health of the people and instill health consciousness among them.
Down
- who stated that citizens yield to a powerful sovereign who in turn promises an end to civil and religious war.
- a state without war
- the art and the practice of conducting negotiations among representatives of groups or states.
- while recognizing the need to segregate the subjectivity of the conceptual idea from the objectivity.
- a German philosopher in his 1795 essay, "Perpetual peace :a philosophical sketch"
- in this section the state shall ensure the autonomy of local government.
- in this section, the state recognizes the viral role of communication and information in nation building.
- in this section, the state shall promote comprehensive rural development and agrarian reform.
16 Clues: a state without war • in this section,the separation of Church and state shall be inviolable • in this section the state shall ensure the autonomy of local government. • a German philosopher in his 1795 essay, "Perpetual peace :a philosophical sketch" • in this section, the state shall promote comprehensive rural development and agrarian reform. • ...
The Ark 2022-05-31
12 Clues: deadly • not wet • low cost • to enroll • assurance • three feet • communication • group of trees • different kinds • move around or avoid • imaginative narration • bend over upon itself
Vocab crossword puzzle 2024-02-08
12 Clues: truth • to pilot • to order • a appeal • to cuddle • achievable • to confirm • sour taste • a landslide • making no sense • freedom from danger • very careful about picking
Safer Internet 2022-03-02
3 Clues: Mobbing , • ,Verbales Mobbing Verspotten ,Physisches Mobbing • Stalking ,Cyber Mobbing ,Apps, soziale Netzwerke Facebook, Instagram ,E-Mail-Adressen ,Installation Daten,
Chapter 18 Layers of Defense Againist Malware 2021-09-30
Across
- otherwise known as Apps or Programs
- _________ software functions kind of like a guard dog
- The layer of Defense between your computer and the Internet this layer is called a _____.
- ________ cover the known weaknesses in a program so that attackers can't exploit them.
Down
- The person is known as the _______.
- Layer 1
- Arm yourself with ___________
- None of these layers is very effective on its own. But taken together they constitute a strong ______ defense strategy.
8 Clues: Layer 1 • Arm yourself with ___________ • The person is known as the _______. • otherwise known as Apps or Programs • _________ software functions kind of like a guard dog • ________ cover the known weaknesses in a program so that attackers can't exploit them. • The layer of Defense between your computer and the Internet this layer is called a _____. • ...
Cyberbullying 2016-12-08
Across
- Sharing someones secrets and embarrassing information online.
- Intentionally excluding someone from an online group.
- Breaking into someones account, posing as that person.
- Intentionally posting provocative messages about sensitive subjects to create conflict.
Down
- repeatedly sending message that include threats of harm or are highly intimidating.
- "Dissing' someone online. Sending or posting cruel gossip about someone to ruin reputation.
- Repeatedly sending offensive, rude and insulting messages.
- Online fights using electronic messages with angry and vulgar language.
8 Clues: Intentionally excluding someone from an online group. • Breaking into someones account, posing as that person. • Repeatedly sending offensive, rude and insulting messages. • Sharing someones secrets and embarrassing information online. • Online fights using electronic messages with angry and vulgar language. • ...
E-safety 2019-03-01
Across
- Safety on the internet
- The actual components to a computer
- Something parents can do control their children on the internet.
- Your past searches on the internet are stored here.
Down
- To copy a file onto a computer system
- A record of all the things you have done on the internet
- Repeated harm or abuse to someone.
- Lots of emails of no use that could infect your software with viruses.
8 Clues: Safety on the internet • Repeated harm or abuse to someone. • The actual components to a computer • To copy a file onto a computer system • Your past searches on the internet are stored here. • A record of all the things you have done on the internet • Something parents can do control their children on the internet. • ...
Mengatasi Kecanduan Gadget, Media Sosial, dan Game Online 2025-09-04
Across
- Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp.
- Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget.
- Salah satu langkah mengatasi kecanduan gadget adalah membatasi ____ penggunaan.
- Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari
Down
- Sikap malas beraktivitas fisik akibat terlalu sering main game
- Permainan yang dimainkan lewat internet
- Salah satu dampak negatif kecanduan gadget yang berhubungan dengan kurang tidur.
- Penyakit yang bisa muncul karena terlalu sering menerima ejekan di internet (____ bullying).
8 Clues: Permainan yang dimainkan lewat internet • Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp. • Sikap malas beraktivitas fisik akibat terlalu sering main game • Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari • Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget. • ...
Mengatasi Kecanduan Gadget, Media Sosial, dan Game Online 2025-09-04
Across
- Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp.
- Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget.
- Salah satu langkah mengatasi kecanduan gadget adalah membatasi ____ penggunaan.
- Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari
Down
- Sikap malas beraktivitas fisik akibat terlalu sering main game
- Permainan yang dimainkan lewat internet
- Salah satu dampak negatif kecanduan gadget yang berhubungan dengan kurang tidur.
- Penyakit yang bisa muncul karena terlalu sering menerima ejekan di internet (____ bullying).
8 Clues: Permainan yang dimainkan lewat internet • Aplikasi di gadget seperti Instagram, TikTok, atau WhatsApp. • Sikap malas beraktivitas fisik akibat terlalu sering main game • Alat elektronik seperti HP atau laptop yang sering dipakai sehari-hari • Kondisi saat seseorang sulit mengontrol diri untuk berhenti memakai gadget. • ...
Security Crossword - August 2015 2015-08-13
Across
- If something is lost, it might be here
- A fire on site may cause this
- I am red and will call the SCC when picked up
- Something broken? Fill me out
- Call me to put the Fire Panel in test mode
- Problem in the Main Lobby, pull this
- The sharing of pertinent information between shifts
- The SCCO does this every hour
Down
- This can happen if I am lost or stolen
- All of our logs are kept here
- Someone gets hurt on site, this needs to be filled out
- I can save a life
- An employee needs to solder on a temperature chamber? This needs to be filled out first
- This box is leaking and has too much postage
- Observe and...
15 Clues: Observe and... • I can save a life • All of our logs are kept here • A fire on site may cause this • Something broken? Fill me out • The SCCO does this every hour • Problem in the Main Lobby, pull this • This can happen if I am lost or stolen • If something is lost, it might be here • Call me to put the Fire Panel in test mode • This box is leaking and has too much postage • ...
Managing User Security Vocan 2021-09-28
Across
- sets strict level pf access to resources
- ability to perfrom a type of action on computer
- physical token inserted into computer's usb
- potion where FAR and FRR are equal
- deals with specific abilities within a right
- users forced to take vacations
- biometric credentials invalid
- measures patterns of rhythm
- user can be granted additional right to data
Down
- process of validating a user
- password that is valid for only 1 login
- dening an unauthorized biometric credential
- authentication method pattern in human act.
- rights are assigned to a role instead of indvidual
- analysis of a biological feature
15 Clues: measures patterns of rhythm • process of validating a user • biometric credentials invalid • users forced to take vacations • analysis of a biological feature • potion where FAR and FRR are equal • password that is valid for only 1 login • sets strict level pf access to resources • physical token inserted into computer's usb • dening an unauthorized biometric credential • ...
COMM 205 IS Security 2024-08-27
Across
- A harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs.
- ____ engineering Involves conning your way into acquiring information that you have no right to.
- The process of encoding data upon its transmission or storage so that only authorized individuals can read it.
- Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
- Software that is written with malicious intent to cause annoyance or damage.
- The process of making computer and network systems more resistant to tampering or malicious software.
- A software program or hardware device that is used to increase security on its network by blocking unwanted data.
Down
- A type of virus that replicates and spreads itself.
- A string of characters used to verify or “authenticate” a person’s identity.
- An illegal activity that is committed with the use of a computer.
- The procedure for making extra copies of data in case the original is lost or damaged.
- A name used in conjunction with a password to gain access to a computer system or a network service.
- When someone accesses a computer without permission.
- Occurs when a user receives an e-mail that looks as if it is from a trusted source, asking them to click a link and log in to a website that mimics the genuine website.
- A type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.
15 Clues: A type of virus that replicates and spreads itself. • When someone accesses a computer without permission. • An illegal activity that is committed with the use of a computer. • A string of characters used to verify or “authenticate” a person’s identity. • Software that is written with malicious intent to cause annoyance or damage. • ...
Digital Security Crossword Puzzle 2025-03-01
Across
- What is a network security device that monitors and filters incoming and outgoing traffic
- What is a short code sent to confirm your identity when logging in
- What is the unique address of a device on the internet
- What type of software is designed to detect and remove malicious programs
- What is a malicious software that locks users out of their data until a ransom is paid
- What is a secret combination of characters used to access a system
- What is a program that secretly records what you type
- What is a small file that websites store on your computer to remember information
- What is a security flaw that hackers use before it gets fixed
Down
- What is the practice of verifying a user’s identity before granting access
- What is the act of attempting to gain sensitive information by pretending to be a trustworthy entity
- What is the process of converting data into a coded format to prevent unauthorized access
- What is a password system that protects Wi-Fi
- What is an attack where hackers overload a website with too much traffic
- What is the process of making regular copies of data to prevent loss
15 Clues: What is a password system that protects Wi-Fi • What is a program that secretly records what you type • What is the unique address of a device on the internet • What is a security flaw that hackers use before it gets fixed • What is a short code sent to confirm your identity when logging in • What is a secret combination of characters used to access a system • ...
Online Safety and Security 2025-02-18
Across
- Money borrowed from a bank
- Important and private information
- A secret code to log in
- What you look at on phones or computers
- Used to keep things safe and closed
- Keeping information secret
- Something that seems wrong or unsafe
Down
- Broken into a computer or account
- Information on computers
- Tricks to steal money or information
- Protection from danger
- Free from danger
- Online letters
- Online crimes
- Extra copies of files
15 Clues: Online crimes • Online letters • Free from danger • Protection from danger • Extra copies of files • A secret code to log in • Information on computers • Money borrowed from a bank • Keeping information secret • Broken into a computer or account • Important and private information • Used to keep things safe and closed • Tricks to steal money or information • ...
Global Nutrition & Food Security 2025-11-16
Across
- UN agency that plays a primary role in maternal and child nutrition, especially in emergencies.
- A dimension of food security referring to safe food preparation and adequate water, sanitation, and healthcare.
- An FAO-defined concept describing diets with low environmental impact that support present and future generations.
- The type of malnutrition characterized by excess nutrient intake leading to obesity and NCDs.
- Term describing diets high in processed foods, sugars, and fats as countries undergo economic development.
Down
- A form of undernutrition affecting linear growth in children.
- The coexistence of undernutrition, overnutrition, and micronutrient deficiencies within a population.
- New food security dimension emphasizing people’s ability to shape their food systems and make autonomous choices.
- Micronutrient known for reducing infection risk and preventing blindness.
- The climate phenomenon that reduces crop yields and livestock productivity and increases food insecurity.
- A global framework that replaced the MDGs and includes Zero Hunger as Goal 2.
- The micronutrient deficiency responsible for impaired thyroid function and brain development.
- The FAO-UNICEF-WHO statistic notes that about 40% of pregnant women experience this condition.
- A system that includes environments, inputs, processes, and activities related to food production and consumption.
- Global health organization responsible for nutrition standards and monitoring.
15 Clues: A form of undernutrition affecting linear growth in children. • Micronutrient known for reducing infection risk and preventing blindness. • A global framework that replaced the MDGs and includes Zero Hunger as Goal 2. • Global health organization responsible for nutrition standards and monitoring. • ...
Thanksgiving Security Crossword Puzzle 2025-11-25
Across
- A sneaky “recipe” email that isn’t from Grandma.
- Two keys: one is the front door and the other is Grandma’s secret password.
- Like the kitchen wall that keeps the turkey smoke from spreading.
- Showing your invite before you enter the home.
- A swarm of “helpers” that take over the kitchen only to ruin it.
- The bad stuffing that ruins the whole meal.
Down
- Pretending to be Uncle Joe to get extra dessert.
- Wrapping your data tighter than foil on leftovers.
- Keeping the secret pie recipe safe from prying eyes.
- Your official nametag at the Thanksgiving table.
- When someone sneaks a slice before dinner.
- Holding the pumpkin pie hostage until you get Grandma’s real recipe.
- Fixing the hole in your pie crust before baking.
- Your secret and private dinner invitation.
- Making sure the mashed potatoes aren’t secretly cauliflower.
15 Clues: When someone sneaks a slice before dinner. • Your secret and private dinner invitation. • The bad stuffing that ruins the whole meal. • Showing your invite before you enter the home. • Pretending to be Uncle Joe to get extra dessert. • A sneaky “recipe” email that isn’t from Grandma. • Your official nametag at the Thanksgiving table. • ...
Holiday Travel Security Crossword 2025-11-25
Across
- The type of crime that crowded areas, like airports and shopping centers, are prime targets for. (18 letters, no space)
- Where you should store gifts and luggage in your car to deter thieves. (5 letters)
- The name of the government system where foreign travel must be recorded. (4 letters)
- The security risk where public USB charging stations can be used to compromise your device (two words, no space). (11 letters)
- The mandatory government directive (acronym) requiring all foreign travel reporting. (5 letters)
- The term for the mandatory meeting with your FSO/SSO immediately after returning from travel. (10 letters)
- This type of sensitive information should have a "zero" policy for travel. (12 letters)
Down
- A type of suspicious individual you might encounter who takes an unusual interest in your job. (15 letters)
- The security principle stating you should avoid wearing company logos or badges to draw less attention. (9 letters)
- What you should use instead of public Wi-Fi for sensitive tasks while traveling. (3 letters)
- What you should always assume will happen to electronic devices taken to adversarial foreign countries. (12 letters)
- The most common type of travel that cleared personnel are required to report (two words, no space).(14 letters)
- What you should avoid doing with your phone in unfamiliar areas to remain vigilant (two words, no space). (16 letters)
- The type of device you should use OCONUS that is stripped of sensitive data. (5 letters)
- The report you must update to assist in personnel recovery, if necessary. (7 letters)
15 Clues: Where you should store gifts and luggage in your car to deter thieves. (5 letters) • The name of the government system where foreign travel must be recorded. (4 letters) • The report you must update to assist in personnel recovery, if necessary. (7 letters) • This type of sensitive information should have a "zero" policy for travel. (12 letters) • ...
RancherPrime 1510 2024-10-15
Across
- For customers who rely on multiple clusters and environments (e.g., hybrid or multi cloud), SUSE® Rancher Prime consolidates their infrastructure management into a single pane of this
- The curated collection offered by Rancher Prime, providing hardened images of cloud-native applicati
- This type of Kubernetes management is supported by Rancher Prime for multiple environments.
- Rancher Prime's lifecycle includes this many months of full support
- The process of managing Kubernetes from infrastructure to applications, supported by Rancher Prime
- The only open and interoperable enterprise container management solution, that manages multiple clusters, streamline tooling, and provides enterprise-grade security and observability
Down
- Rancher Prime provides secure delivery by complying with this security level for software artifacts
- Rancher Prime includes this, which contains signed and trusted artifacts
- Rancher Prime supports all distributions certified by this Kubernetes foundation
- Rancher Prime’s UI extensions allow integration with this security-focused tool for threat detection
- This document, available on demand, lists all the software components used in Rancher Prime
11 Clues: Rancher Prime's lifecycle includes this many months of full support • Rancher Prime includes this, which contains signed and trusted artifacts • Rancher Prime supports all distributions certified by this Kubernetes foundation • This type of Kubernetes management is supported by Rancher Prime for multiple environments. • ...
AI Tools Crossword 2025-07-02
Across
- Analyzes data when you ask questions in plain English.
- Real-time AI diagnostics for DevOps pipelines.
- To improve call quality this helps in removing background noise.
- Enables users to build and deploy ML models without writing code.
- Your calendar is automatically scheduled based on task urgency.
- Refactors Python code automatically for efficiency and readability.
- code snippets and autocompletes based on IDE.
- Organizes and delivers team knowledge with the help of AI.
- Root cause is identified using AI and erros are detected.
Down
- Comments are turned into code and code into comments by this AI.
- simplifies bug tracking and captures detailed logs using AI.
- UI change are detected and runs regression tests.
- Issue tracking with Ai based prioritization
- Cyber threats are monitored and blocked using this AI.
- Spreadsheets to dashbards conversion with AI.
15 Clues: Issue tracking with Ai based prioritization • Spreadsheets to dashbards conversion with AI. • code snippets and autocompletes based on IDE. • Real-time AI diagnostics for DevOps pipelines. • UI change are detected and runs regression tests. • Analyzes data when you ask questions in plain English. • Cyber threats are monitored and blocked using this AI. • ...
AI In CyberSpace 2024-10-15
11 Clues: Data Learning • Mixed Effects. • Exploit Tactics • security action • Machine Weakness • human intelligence • Vulnerable Systems • Strategy Problems. • Protective Measures • Political motivations • Financial motivations
Carnival Crossword 2026-03-19
Across
- A warning that suspicious or dangerous activity may be happening
- The act of signing into a system or account
- The investigation of digital evidence after an attack
- A saved copy of data used for recovery
- A security method that requires more than one proof of identity
- The digital proof of who a user is
- A security event that may harm systems or data
Down
- A lure used to trick someone into clicking or responding
- Malware that locks or steals data and demands payment
- A code or digital item used to confirm access
- A dishonest attempt to steal money, data, or trust
- A longer, stronger alternative to a password
- A software update that fixes a weakness or flaw
- Check that something or someone is genuine before trusting it
14 Clues: The digital proof of who a user is • A saved copy of data used for recovery • The act of signing into a system or account • A longer, stronger alternative to a password • A code or digital item used to confirm access • A security event that may harm systems or data • A software update that fixes a weakness or flaw • A dishonest attempt to steal money, data, or trust • ...
Mind the gaps:Reducing hunger by improving yields on small farms 2017-03-30
Across
- which millennium did the world hunger start to decrease?
- what is Africa overdue for
- 'new farming techniques could triple ----- production
- a word for food that is grown
- what is the first name of the author of the text
- how many counties are at alarming food rates
- where does 70% of all food come from
Down
- what is in a bigger demand due to population growth
- what is there too many of that makes Africa be food insecure
- what are we doing to Earth's lands?
- what is the average size of a farm in countries with a low food security
- what makes rice farming more sustainable and profitable
- how bad is Africa in food security low, medium, serious or alarming
- the --------- One Acre Fund has helped over 400,000 farmers across six different countries...
- who is the author's colleague
15 Clues: what is Africa overdue for • a word for food that is grown • who is the author's colleague • what are we doing to Earth's lands? • where does 70% of all food come from • how many counties are at alarming food rates • what is the first name of the author of the text • what is in a bigger demand due to population growth • ...
Investing Crossword 2024-11-25
Across
- Post tax money
- a pool of investors who come together for the purpose of buying securities
- an optimistic market where people are buying and holding stocks
- a security that represent a piece of ownership in a company
- A pessimistic market
- The potential to lose money
- an account anyone can open to buy and sell securities
- process of setting money aside with the purpose to gain wealth
- a debt security that can be sold by a government or company
Down
- This is where you store your securities once you have purchased them
- a pre-tax retirement account for school teachers
- Buying and selling securities within a given day purely for the purpose of making money
- the day you get to quit going to work
- a 529 is set aside for these types of expenses
- individual retirement account
15 Clues: Post tax money • A pessimistic market • The potential to lose money • individual retirement account • the day you get to quit going to work • a 529 is set aside for these types of expenses • a pre-tax retirement account for school teachers • an account anyone can open to buy and sell securities • a security that represent a piece of ownership in a company • ...
The Iron Curtain 2026-03-02
Across
- ideological war fought between U.S and Soviet Union
- national org for the nations allied with the Soviet union
- barrier separating west and east Germany
- US radio channel to spread news to Eastern European countries of the harms of the communist regime
- leading communist nation of the Cold War
- pact created for U.S to protect nations of Western Europe from communism spread
- united states nation security org
- president of the U.S during the beginning of the Cold War period
Down
- famous leader of the Soviet union
- the Soviet unions national security org
- continent where the " iron curtain" was
- where Churchill gave his speech mentioning the " iron curtain "
- phrase used to describe the communist ideology of eastern europe
- war predating cold war
- prime minister of Britain who popularized the term iron curtain
15 Clues: war predating cold war • famous leader of the Soviet union • united states nation security org • the Soviet unions national security org • continent where the " iron curtain" was • barrier separating west and east Germany • leading communist nation of the Cold War • ideological war fought between U.S and Soviet Union • ...
Hello Operator Crossword 2022-08-11
18 Clues: Kim Radio# • Jay Radio# • Jim Radio# • Josh Radio# • Troy Radio# • Chase Radio# • Stacy Radio# • Jamie Radio# • Melanie Radio# • Front Gate Ext. • Front Gate Radio# • Steve Brewer Radio# • Bar Service Room Ext. • Security Rover Radio# • W.O. Main Ext. /Gate # • Cafe Kitchen Wall Ext. • Cafe Kitchen Office Ext. • Cafe Service Station Ext.
UNIT 3 VOCAB REVISION 2023-07-08
Across
- транспортное средство (любое)
- таможня, погранконтроль
- приземляться
- отправление
- багаж
- нанимать на работу или брать что-то в ренту
- дорожный переход
- передвинуть, удалить, убрать
- пропустить, не успеть на транспорт
- задержанный рейс
Down
- пассажир
- прямо, напрямую
- брать за услугу какую-то сумму
- отмененный рейс
- чинить, ремонтировать
- врезаться или авария
- безопасность, охрана
- путешествие на большое расстояние
18 Clues: багаж • пассажир • отправление • приземляться • прямо, напрямую • отмененный рейс • дорожный переход • задержанный рейс • врезаться или авария • безопасность, охрана • чинить, ремонтировать • таможня, погранконтроль • передвинуть, удалить, убрать • транспортное средство (любое) • брать за услугу какую-то сумму • путешествие на большое расстояние • пропустить, не успеть на транспорт • ...
Windows 2020-10-29
15 Clues: rgb • programs • built in • no waiting • you choose • short notes • built safety • for just you • pen or mouse • get stuff done • go back in time • nice for the eyes • android on windows • fast and secure login • multiple apps, one screen
Windows 2020-10-29
15 Clues: rgb • programs • built in • no waiting • you choose • short notes • built safety • for just you • pen or mouse • get stuff done • go back in time • nice for the eyes • android on windows • fast and secure login • multiple apps, one screen
Tony's Crossword 2014-05-19
15 Clues: Always • Loves Doing • Self Taught • Tobacco Brand • Place of Birth • First Born Son • Childhood Sport • Security Blanket • The Eldest Child • Favourite Musician • Favourite Dog Breed • Tony's Favourite Meal • Essential Kitchen Wear • Tony's Youngest Daughter • "Only Child" in a big family
IRONMAN 3 (2013) 2023-04-06
15 Clues: AI • President • Rhodes suit • Killian actor • Who helps Tony • Who saves Tony • Tony's disorder • Name of director • Disabled scientist • Where Tony crashes • Killian's procedure • Holiday Tony met Maya • Tony's security chief • Name of fake terrorist • Real name of terrorist
ServiceNow Knowledge 2024-11-07
Across
- automates and enhances IT operations through strategic use of machine learning and data science
- effectively collaborate with suppliers, manage supplier relationships, monitor risk, compliance, and performance across the supplier life cycle
- links your Kafka environment to your ServiceNow instance, enabling you to stream data between your instance and your external systems
- Respond collaboratively to critical security incidents such as ransomware, data breaches, and other targeted attacks
- Make risk-informed decisions and increase efficiency. Innovate at speed, with confidence, to build trust and reach your business goals
- provides a complete and contextual view of OT systems, so you can keep them secure—and up and running
Down
- Best Enterprise Architect in the business; Utilities Expert
- Procure ServiceNow in the Azure or AWS Marketplace
- Built on best practice definitions gathered from analyzing thousands of instances, this tool quickly scans your ServiceNow instance to provide data points across five key categories, security, upgradability, performance, manageability, and usability
- ServiceNow Solutions Consultant
- Benefits: Simplifies Audits, License Management, Provides Control over Cloud Software Usage
- Strengthen cloud security, protect sensitive data, and ensure regulatory compliance
- generative AI that is designed to enhance user productivity and efficiency through conversation and proactive experiences
- high-performance hybrid transactional and analytical processing (HTAP) database built specifically for ServiceNow workloads
- personalizes your value experience, speeds results, and amplifies expertise on your transformation journey
- Build apps at scale with a low-code development environment and prebuilt templates
16 Clues: ServiceNow Solutions Consultant • Procure ServiceNow in the Azure or AWS Marketplace • Best Enterprise Architect in the business; Utilities Expert • Build apps at scale with a low-code development environment and prebuilt templates • Strengthen cloud security, protect sensitive data, and ensure regulatory compliance • ...
Current issues 2023-10-26
Across
- Israeli defense force
- Godot famous person
- dome missile defense system
- a treaty alliance
- terrorist organization
- someone in inflict fear
- country in the middle east
- ethnic people
- killing of ethnic population
- religious belief
Down
- money
- strip contested area
- security council
- East place in the world
- Arabic
- explosive device
- musk rich guy
- taking over a country
- a city
- states a country
20 Clues: money • Arabic • a city • musk rich guy • ethnic people • security council • explosive device • states a country • religious belief • a treaty alliance • Godot famous person • Israeli defense force • taking over a country • terrorist organization • strip contested area • East place in the world • someone in inflict fear • country in the middle east • killing of ethnic population • ...
cashless society 2024-09-03
Across
- used for electronic transaction
- goods for sale
- digital
- can easy withdraw
- payment
- its own advantages and weakness
- big sums
- are conducted without the usage of cash
- with cashless
- digital
Down
- the usage of cash
- cash safely
- make life easier
- cash
- transactions
- money cost more
- rates are lower
- internet
- devices or codes for security
- makes people high value
20 Clues: cash • digital • payment • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • the usage of cash • can easy withdraw • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
cashless society 2024-09-03
Across
- transactions
- internet
- to do
- cash safely
- makes people high value
- digital
- make life easier
- rates are lower
- the usage of cash
- goods for sale
- with cashless
Down
- payment
- can easy withdraw
- big sums
- used for electronic transaction
- money cost more
- devices or codes for security
- are conducted without the usage of cash
- its own advantages and weakness
- digital
20 Clues: to do • payment • digital • digital • big sums • internet • cash safely • transactions • with cashless • goods for sale • money cost more • rates are lower • make life easier • can easy withdraw • the usage of cash • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
"Vamos de viaje" 2026-03-09
19 Clues: ticket • the trip • passport • round trip • the arrival • the luggage • the suitcase • the bus stop • to take a cab • the itinerary • the departure • to get in line • the travel agent • to pack a suitcase • to check in luggage • the flight attendant • to confirm the flight • to pass through customs • to pass through security
Testing Open Day Crossword 2023-02-14
Across
- Name of an open source Performance testing tool from Apache
- Tool for .NET that integrates with Visual Studio and can be used for BDD automation testing
- The unauthorized access to or control over computer network security systems for some illicit purpose.
- Term defining the number of transactions per second an application can handle
- Type of testing where software modules are tested as a group
- Is used by a server when the server needs to know exactly who is accessing their information or site
- Involves ethical hackers scaling planned attacks against a company's security infrastructure to hunt down security vulnerabilities
Down
- The action of handling dynamic values coming from the application while running in a script
- Type of performance testing that verifies how the system behaves over its expected limits
- Software testing technique which is used to check defects in software application without executing the code
- An incorrect step, process or data definition in a computer program that causes the program to perform in an unintended or unanticipated manner
- A method by which information is converted into secret code that hides the information's true meaning
- Type of testing that focuses on the server-side of an application
- An error in a program or a malfunction in a program's code
- A small piece of code developed to correct a major software bug or fault and released as quickly as possible
- How is called a testing environment for conducting rigorous, transparent, and replicable testing
- The "D" from the acronym "DRE" stands for
17 Clues: The "D" from the acronym "DRE" stands for • An error in a program or a malfunction in a program's code • Name of an open source Performance testing tool from Apache • Type of testing where software modules are tested as a group • Type of testing that focuses on the server-side of an application • ...
