cyber security Crossword Puzzles

Branch Physical Security 2022-08-23

Branch Physical Security crossword puzzle
Across
  1. The Post Robbery __________________ should be distributed.
  2. During a robbery, try to remain ________.
  3. Activate the alarm ______________________, providing this action will not endanger yourself or others.
  4. Who is our Retail Operations primary contact?
  5. Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
  1. ________________ with the robber(s)' instructions.
  2. Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
  3. Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.
  4. Who is our Physical Security Manager?
  5. Make note of the ______________ used in escape.

10 Clues: Who is our Physical Security Manager?During a robbery, try to remain ________.Who is our Retail Operations primary contact?Make note of the ______________ used in escape.________________ with the robber(s)' instructions.The Post Robbery __________________ should be distributed....

Remote Work Security 2025-05-26

Remote Work Security crossword puzzle
Across
  1. Spyware and ransomware are types of this
  2. You should never install unknown ____
  3. Software that blocks suspicious files
Down
  1. Often required after a password reset
  2. Layer of identity check beyond password
  3. Company-provided device
  4. This alert type may warn of phishing
  5. Avoid public ___ when working remotely
  6. Used to access company network securely
  7. Short for “Internet Protocol”

10 Clues: Company-provided deviceShort for “Internet Protocol”This alert type may warn of phishingOften required after a password resetYou should never install unknown ____Software that blocks suspicious filesAvoid public ___ when working remotelyLayer of identity check beyond passwordUsed to access company network securely...

CTF-CW-11 2025-11-14

CTF-CW-11 crossword puzzle
Across
  1. Tech world’s fire brigade—second shout
  2. When the cloud gets graded for playing by the compliance rulebook.
  3. VIOLATION Red ink on the corporate report card
  4. Every journey’s pit stops
  5. ESCALATION The elevator hack from novice to boss
  6. IQ At Tekion, this is like cyber gym class—get your anti-phishing muscles in shape!
  7. POLICY Document on every website about rules for handling details
  8. MODEL DNA test for who’s calling the shots
  9. DATA Any data, direct or indirect, that reveals a person’s identity
  10. When a hacker sneaks past your digital guard
Down
  1. At Tekion, this digital pathfinder sweeps up bugs before attackers even get a chance!
  2. When your browser “remembers” you, for a while
  3. Tekion’s legendary vault no hacker can touch.
  4. SEGMENTATION Safety scissors for your network
  5. Buzzing threat hunter hangout
  6. GOVERNANCE Processes to ensure robots don’t go rogue
  7. Slamming the panic room door on hackers
  8. NOTICE Pop-up or email outlining changes in how data gets used
  9. The organization behind the ATT&CK plots
  10. Info swap: turn gold into poker chips

20 Clues: Every journey’s pit stopsBuzzing threat hunter hangoutInfo swap: turn gold into poker chipsTech world’s fire brigade—second shoutSlamming the panic room door on hackersThe organization behind the ATT&CK plotsMODEL DNA test for who’s calling the shotsWhen a hacker sneaks past your digital guardTekion’s legendary vault no hacker can touch....

Escape from Dystopia 2019-01-08

Escape from Dystopia crossword puzzle
Across
  1. The word "utopia" was created from 2 __________ words, eutopia & outopia
  2. Propaganda serves to create an emotional response as opposed to a _________ response
  3. Sir Thomas __________
  4. Biased information used to promote a political point of view
  5. Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of dystopian ________
  6. Type of government that has total control over people's lives
  7. Dystopias often occur after an _________ event like a plague of nuclear warfare
Down
  1. Dystopian literature takes a current trend to the _________
  2. A dystopia typically exists as an _________ of a perfect world
  3. Opposite of dystopia
  4. Opposite of individuality
  5. A dystopian government often uses mass _________ to spy on its citizens
  6. Utopia was originally named for a fictional ___________
  7. Term for mega-technological genre: "cyber-__________"

14 Clues: Opposite of dystopiaSir Thomas __________Opposite of individualityTerm for mega-technological genre: "cyber-__________"Utopia was originally named for a fictional ___________Dystopian literature takes a current trend to the _________Biased information used to promote a political point of view...

Inside Reading Unit 6 2022-01-31

Inside Reading Unit 6 crossword puzzle
Across
  1. The police (tape) the crime scene
  2. They went to a (consult) for advice on cyber crime
  3. The police (summed up) that the criminal will never be found
  4. They knew the (location) of the next crime
  5. Can you (find) anything missing?
  6. What is your (reason) for learning English?
Down
  1. After being arrested, a (group) of judges decided he was guilty
  2. The crime scene evidence took longer than usual because of (tech) issues
  3. He (establish) that the money was stolen by someone he knew
  4. Police need (exact) information to solve crimes
  5. On the (opposite), criminals are very smart
  6. There are many (events) where criminals are caught within 24 hours
  7. The (authority) arrested him and sent him to prison for 5 years
  8. We need to use (reasoning) when solving problems

14 Clues: Can you (find) anything missing?The police (tape) the crime sceneThey knew the (location) of the next crimeOn the (opposite), criminals are very smartWhat is your (reason) for learning English?Police need (exact) information to solve crimesWe need to use (reasoning) when solving problemsThey went to a (consult) for advice on cyber crime...

Bullying and Self-Advocacy 2024-10-06

Bullying and Self-Advocacy crossword puzzle
Across
  1. Self-Advocacy is when we speak up about our...
  2. A type of bullying where someone makes fun of someone by name-calling
  3. It's okay to say...
  4. A type of bullying where someone spread rumors online
  5. Who to tell when you or another person is being bullied
  6. A type of bullying where someone touches or trips someone
  7. When someone is mean once, can be hurtful or friendly
Down
  1. When our classmates or friends try to influence us
  2. Sticking up for yourself
  3. When someone repeatedly tries to hurt someone's feelings
  4. A type of bullying where someone leaves others out or spread rumors about them

11 Clues: It's okay to say...Sticking up for yourselfSelf-Advocacy is when we speak up about our...When our classmates or friends try to influence usA type of bullying where someone spread rumors onlineWhen someone is mean once, can be hurtful or friendlyWho to tell when you or another person is being bullied...

Vocabulary: UNIT 5 2021-07-04

Vocabulary: UNIT 5 crossword puzzle
Across
  1. We can use it to listen to the news o to listen to music.
  2. Cyber world that contains a lot of information.
  3. We can do this by airplane, train or car.
  4. Means of transport. It can fly.
Down
  1. To communicate with other people.
  2. Similar to a letter but we send this via internet.
  3. Long ago people wrote this to communicate with friends.
  4. We can listen to them on the radio or turn on the T.V to hear this.

8 Clues: Means of transport. It can fly.To communicate with other people.We can do this by airplane, train or car.Cyber world that contains a lot of information.Similar to a letter but we send this via internet.Long ago people wrote this to communicate with friends.We can use it to listen to the news o to listen to music....

prior knowledge 2021-10-04

prior knowledge crossword puzzle
Across
  1. the practice of analysing large databases in order to generate new information.
  2. what YouTuber say at the end of videos
  3. when you hurt some one on the internet like social media
  4. what you use to get things in games
  5. the action or process of earning revenue from an asset, business, etc.
Down
  1. to get more in an app
  2. being able to get the location of something
  3. what you do to scam messages and annoying people

8 Clues: to get more in an appwhat you use to get things in gameswhat YouTuber say at the end of videosbeing able to get the location of somethingwhat you do to scam messages and annoying peoplewhen you hurt some one on the internet like social mediathe action or process of earning revenue from an asset, business, etc....

American Express Travelers Cheque 2021-11-22

American Express Travelers Cheque crossword puzzle
Across
  1. What code do you need on the Cheque
  2. What is one security feature
  3. _____ Express uses the Cheques
  4. How do you verify
  5. How many security features do they have
Down
  1. What do you have to do for the signatures
  2. Is the process where you validate both the presenter and the cheque
  3. Can you have counterfeit Cheques

8 Clues: How do you verifyWhat is one security feature_____ Express uses the ChequesCan you have counterfeit ChequesWhat code do you need on the ChequeHow many security features do they haveWhat do you have to do for the signaturesIs the process where you validate both the presenter and the cheque

TUGAS TEKA TEKA PPKN 2023-11-03

TUGAS TEKA TEKA PPKN crossword puzzle
Across
  1. Meningkatkan devisa negara merupakan pengaruh positif kemajuan iptek dibidang
  2. Perahu pinisi yang tahun 1986 melakukan pelayaran ke kota
  3. Gaya hidup yang selalu berorientasi kepada budaya barat yaitu
  4. Perilaku yang tidak boleh dikembangkan dalam menghadapi era globalisasi
  5. Sifat konsumtif merupakan dampak negatif iptek di bidang
  6. Kemajuan luar biasa dibidang komunikasi dan transportasi menjadi dunia bagaikan sebuah desa biasa disebut
  7. Pada tanggal 23 Agustus 1967,perkembangan iptek di Indonesia semakin maju dengan didirikannya
  8. Degradasi moral merupakan pengaruh.... kemajuan iptek
Down
  1. Sikap yang menganggap kenikmatan pribadi adalah nilai tertinggi
  2. Yang mengacu pada aktivitas kejahatan dengan komputer atau jaringan yaitu Cyber
  3. Pancasila sebagai falsafah hidup bangsa menjadi alat yang ampuh untuk
  4. Sikap yang menganggap kenikmatan pribadi adalah nilai tertinggi
  5. Salah satu pengaruh negatif kemajuan iptek yaitu mementingkan diri sendiri
  6. Yang dijadikan sebagai pegangan hidup bangsa adalah
  7. Komputer yang menggunakan transistor disebut
  8. Alat yang dikembangkan Johannes tahun 1440 yaitu mesin

16 Clues: Komputer yang menggunakan transistor disebutYang dijadikan sebagai pegangan hidup bangsa adalahDegradasi moral merupakan pengaruh.... kemajuan iptekAlat yang dikembangkan Johannes tahun 1440 yaitu mesinSifat konsumtif merupakan dampak negatif iptek di bidangPerahu pinisi yang tahun 1986 melakukan pelayaran ke kota...

November ulmanac 2025-10-23

November ulmanac crossword puzzle
Across
  1. - A type of puzzle with vertical and horizontal squares
  2. - The bridge at the heart of our project spotlight.
  3. - The red papaver by another name (hint: it's a flower)
  4. - The first name of the person who sang "Signed, Sealed, Delivered"
  5. - Commonly grown in November.
  6. - A calendar misnomer, this month's name is derived from the Latin word for nine.
  7. - What we spent a week doing in October.
  8. - "the combined action of a group, especially when effective and efficient."
Down
  1. - What a lot of people do on Black Friday and Cyber Monday.
  2. - what we're preventing this November
  3. - masks, gloves and goggles, for short.
  4. - Animal associated with this months full moon
  5. - This bird takes short, shuffling steps... just like you should when it's slippery.
  6. - The name of our employee newsletter.
  7. - Repeated three times followed by a moment of silence

15 Clues: - Commonly grown in November.- what we're preventing this November- The name of our employee newsletter.- masks, gloves and goggles, for short.- What we spent a week doing in October.- Animal associated with this months full moon- The bridge at the heart of our project spotlight.- Repeated three times followed by a moment of silence...

TTS SOSIOLOGI 2025-11-05

TTS SOSIOLOGI crossword puzzle
Across
  1. Teori konflik yang timbul karena perbedaan kepentingan antara kelas Penguasa dan kelas Perkasa dikemukakan oleh
  2. Teori yang beranggapan kekerasan dan konflik dipicu karena adanya benturan antara identitas kelompok
  3. Kekerasan yang dilakukan individu atau kelompok menggunakan sistem hukum ekonomi atau tata kebiasaan merupakan bentuk kekerasan
  4. Bahasa Latin kekerasan
  5. Kesenjangan kebudayaan disebut juga
  6. Permasalahan sosial bersifat
  7. Konflik bersifat
  8. Upaya pengendalian permasalahan sosial tanpa kekerasan
  9. Masalah sosial yang berkaitan dengan kemampuan individu untuk mencukupi kebutuhan termasuk dalam faktor
  10. Proses sosial antara kedua belah pihak yang berkonflik saling menyesuaikan diri hingga mencapai kestabilan termasuk upaya penanganan metode
  11. Cyber bullying termasuk bentuk kekerasan
Down
  1. Hilangnya unsur budaya tradisional disebut
  2. Kejadian ketidak sesuaian antara harapan dengan kenyataan yang terjadi di kehidupan masyarakat disebut
  3. Contoh dari kekerasan terbuka
  4. Secara etimologi konflik sosial berasal dari bahasa latin yaitu "Con" dan "Fligere". "Con" artinya

15 Clues: Konflik bersifatBahasa Latin kekerasanPermasalahan sosial bersifatContoh dari kekerasan terbukaKesenjangan kebudayaan disebut jugaCyber bullying termasuk bentuk kekerasanHilangnya unsur budaya tradisional disebutUpaya pengendalian permasalahan sosial tanpa kekerasan...

BRAVO Crossword: Bullying 2015-11-10

BRAVO Crossword: Bullying crossword puzzle
Across
  1. A type of bullying
  2. The main subject of this crossword
  3. A type of bullying that hurts you
Down
  1. A type of bullying that you hear
  2. A relative term to the words: "All the time"

5 Clues: A type of bullyingA type of bullying that you hearA type of bullying that hurts youThe main subject of this crosswordA relative term to the words: "All the time"

Be Kind Online 2023-07-14

Be Kind Online crossword puzzle
Across
  1. wellness , the positive well-being of Internet users.
  2. , enthusiastic ,confident
  3. , a way of showing respect.
Down
  1. , due regard for the feelings, wishes, or rights of others.
  2. , involves use of electronics.
  3. , to treat others with high regard and be a socially responsible citizen.

6 Clues: , enthusiastic ,confident, a way of showing respect., involves use of electronics.wellness , the positive well-being of Internet users., due regard for the feelings, wishes, or rights of others., to treat others with high regard and be a socially responsible citizen.

CROSSWORD PUZZLE 2023-12-01

CROSSWORD PUZZLE crossword puzzle
Across
  1. A person who steals information and money
  2. A scammer’s goal
  3. Scam that acts like a banker
  4. A type of cyber-attack that uses fraudulent emails or websites to trick users into revealing their personal or financial information
Down
  1. A scam that involves sellers
  2. Scam that acts like an employer

6 Clues: A scammer’s goalA scam that involves sellersScam that acts like a bankerScam that acts like an employerA person who steals information and moneyA type of cyber-attack that uses fraudulent emails or websites to trick users into revealing their personal or financial information

PenFed 2022-01-27

PenFed crossword puzzle
Across
  1. leader
  2. long FI call
  3. a thief
  4. chatroom
  5. break/lunchtime
  6. where to find phone numbers
Down
  1. address request
  2. computer program
  3. what an upset ch call turns into
  4. who you are
  5. reader board
  6. not enough security
  7. PenFed scam
  8. add additional fraud
  9. face chris uses

15 Clues: leadera thiefchatroomwho you arePenFed scamreader boardlong FI calladdress requestface chris usesbreak/lunchtimecomputer programnot enough securityadd additional fraudwhere to find phone numberswhat an upset ch call turns into

Word Within a Word List 32 2012-10-01

Word Within a Word List 32 crossword puzzle
Across
  1. a flowing together
  2. sociable
  3. heated dispute
  4. thought-to-be
  5. unorthodox
  6. male head of family
  7. pledge as security
  8. force of a million tons of dynamite
  9. speech to oneself
Down
  1. make soft
  2. go against
  3. ego second self
  4. talking in circles
  5. cold-blooded composure
  6. affirm or declare

15 Clues: sociablemake softgo againstunorthodoxthought-to-beheated disputeego second selfaffirm or declarespeech to oneselfa flowing togethertalking in circlespledge as securitymale head of familycold-blooded composureforce of a million tons of dynamite

Word Within a Word List 32 2012-10-01

Word Within a Word List 32 crossword puzzle
Across
  1. make soft
  2. force of a million tons of dynamite
  3. a flowing together
  4. pledge as security
  5. second self
  6. talking in circles
  7. go against
  8. unorthodox
  9. thought-to-be
Down
  1. speech to oneself
  2. heated dispute
  3. male head of family
  4. affirm or declare
  5. cold-blooded composure
  6. sociable

15 Clues: sociablemake softgo againstunorthodoxsecond selfthought-to-beheated disputespeech to oneselfaffirm or declarea flowing togetherpledge as securitytalking in circlesmale head of familycold-blooded composureforce of a million tons of dynamite

Organelle Recap 2023-11-21

Organelle Recap crossword puzzle
Across
  1. Packaging/Transport
  2. Protection (like security guard)
  3. Liquid (like water in fish bowl)
  4. Role in cell division
  5. Power
  6. Controls cell
  7. Structure (plant only)
  8. Make proteins
Down
  1. Photosynthesis (plant only)
  2. Transport materials, make proteins
  3. Protect nucleus
  4. Makes ribosomes
  5. Transport materials, make fats
  6. Storage
  7. Digestion

15 Clues: PowerStorageDigestionControls cellMake proteinsProtect nucleusMakes ribosomesPackaging/TransportRole in cell divisionStructure (plant only)Photosynthesis (plant only)Transport materials, make fatsProtection (like security guard)Liquid (like water in fish bowl)Transport materials, make proteins

El viaje 2022-12-12

El viaje crossword puzzle
Across
  1. To withdraw money
  2. Passenger
  3. S/he/it takes a trip
  4. S/he/it takes the taxi
  5. Security
  6. S/he takes the plane
  7. Flight
Down
  1. Hotel
  2. Airport
  3. To Travel
  4. Suitcase
  5. S/he takes the bus
  6. S/he/it takes the train
  7. Trip
  8. Passport

15 Clues: TripHotelFlightAirportSuitcaseSecurityPassportPassengerTo TravelTo withdraw moneyS/he takes the busS/he/it takes a tripS/he takes the planeS/he/it takes the taxiS/he/it takes the train

New Deal Crossword 2024-04-09

New Deal Crossword crossword puzzle
Across
  1. amount of people employed by the CCC
  2. worked to improve the nation's public land from 1933 to 1942
  3. the maximum amount of time in prison after submitting a false Social Security Statement
  4. month when the Federal Emergency Relief Administration dissolved
  5. head of the TERA, FERA, and WPA
  6. the amount of time a man would work in the CCC
Down
  1. the year the Social Security Act was passed
  2. the president who instilled the New Deal Programs
  3. amount of funds given by the Federal Emergency Relief Administration after inflation adjustment
  4. acronym for the Federal Emergency Relief Administration
  5. enacted in august of 1935

11 Clues: enacted in august of 1935head of the TERA, FERA, and WPAamount of people employed by the CCCthe year the Social Security Act was passedthe amount of time a man would work in the CCCthe president who instilled the New Deal Programsacronym for the Federal Emergency Relief Administrationworked to improve the nation's public land from 1933 to 1942...

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. mediums
  2. decodes
  3. sender to receiver, creation
  4. protocol levels
  5. sending
Down
  1. common clock
  2. server, user's identity
  3. data
  4. interface, transmitter
  5. security

10 Clues: datamediumsdecodessendingsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysender to receiver, creation

FinTech Portal 2023-05-24

FinTech Portal crossword puzzle
Across
  1. Adoption Customer Resistance to Change
  2. Budget Overruns
  3. Integration Challenges
Down
  1. Payment Processing Failures
  2. Regulatory Compliance
  3. Security Breach

6 Clues: Budget OverrunsSecurity BreachRegulatory ComplianceIntegration ChallengesPayment Processing FailuresAdoption Customer Resistance to Change

Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11

Encrypting the You Matter Most Cybersecurity Crossword Challenge! crossword puzzle
Across
  1. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
  2. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
  3. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
  4. _____-force attack is a technique used to guess a password by trying many possible combinations
  5. Gain access to someone else’s computer or device without permission
  6. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
  7. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
  8. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
  9. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
  10. A location on the internet where you can save your data (rather than on your computer or device)
Down
  1. A program or device used to detect and prevent unauthorized access to a network
  2. A sequence of characters (or words) used to stop criminals from accessing your accounts
  3. A method of protecting data by converting it into unreadable code that only authorized parties can read
  4. Malicious software that could harm your computer or gadget
  5. What is a form of malware that monitors and records a user's activities without their knowledge?
  6. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
  7. A security incident where sensitive information is leaked to the public is a data ______
  8. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor

18 Clues: Malicious software that could harm your computer or gadgetGain access to someone else’s computer or device without permissionA program or device used to detect and prevent unauthorized access to a networkThe program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)...

Cybersecurity Awareness Month Crossword Puzzle 2025-09-19

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
  2. The best way to keep Cornerstone secure is to become a ________ ___________.
  3. All customer and bank information that is no longer required must be ____________.
  4. an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
  5. A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
  6. Malicious software designed to harm, exploit or otherwise compromise a computer system.
  7. the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
  8. Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
  9. Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
  10. A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
  11. Create strong ___________ or passphrases and never share them with anyone else.
Down
  1. A type of malware that encrypts a victim's files and demands payment for the decryption key.
  2. the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
  3. Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
  4. Someone who tries to access data that they aren't authorized to view.
  5. All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
  6. ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
  7. The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.

18 Clues: Someone who tries to access data that they aren't authorized to view.The best way to keep Cornerstone secure is to become a ________ ___________.Create strong ___________ or passphrases and never share them with anyone else.All customer and bank information that is no longer required must be ____________....

CH 11, LO 1 and 2 2021-04-14

CH 11, LO 1 and 2 crossword puzzle
Across
  1. debts that are owed to creditors
  2. when a business has received cash vefore providing goods or performing work
  3. must be paid with cash or goods/services within one year
  4. a written promise by a business to pay a debt wwithin one year or less
  5. the income tax deducted from gross pay
  6. medical benefits
Down
  1. old age, survivors, and disability insurance
  2. do not need to be paid within one year
  3. helps summarize the earnings, withholdings, and net pay for each employee
  4. also known as the Social Security Act, created the Social Security tax
  5. total amount of salary, wages, commissions, and bonuses earned by an employee during a pay period
  6. also called employee compensation
  7. the amount an employee gets to keep

13 Clues: medical benefitsdebts that are owed to creditorsalso called employee compensationthe amount an employee gets to keepdo not need to be paid within one yearthe income tax deducted from gross payold age, survivors, and disability insurancemust be paid with cash or goods/services within one year...

The United Nations 2025-12-02

The United Nations crossword puzzle
Across
  1. Education, Science and Culture organization;
  2. The city where the UN Headquarters is located;
  3. The UN's main policymaking and representative organ;
  4. The 15-member body responsible for maintaining international peace and security;
  5. Principal judicial organ of the UN, based in The Hague (abbrev.);
  6. UN agency for children;
  7. The authority on matters of global health;
Down
  1. The current Secretary-General of the UN;
  2. The five permanent members of the Security Council hold this power;
  3. The first UN peacekeeping mission (1948) was established in this country;
  4. The UN organ responsible for coordinating the economic, social, and related work of 15 specialized agencies;
  5. The official language used by the UN, along with Arabic, Chinese, English, Russian, and Spanish;
  6. Programme that works to eliminate poverty.

13 Clues: UN agency for children;The current Secretary-General of the UN;Programme that works to eliminate poverty.The authority on matters of global health;Education, Science and Culture organization;The city where the UN Headquarters is located;The UN's main policymaking and representative organ;...

Bullying 2024-09-02

Bullying crossword puzzle
Across
  1. pelaku bullying
  2. bullying dengan mengolok olok, mengejek, mengancam, menuduh dan memfitnah
  3. dampak bully yang menyebabkan pengingkatan & penurunan suasana hati
  4. dampak bagi org yang mengalami kurang empati, kecenderungan melakukan kekerasan dan masalah perilaku
  5. tempat bullying memukuli adik kelas
  6. perasaan ketegangan dan tekanan emosional
  7. menanggung sesuatu yang tdk menyenangkan
  8. kata lain dari bullying
  9. sikap membedakan orang lain
Down
  1. bullying dalam media sosial
  2. bentuk tindakan agresif yang dilakukan dgn sengaja dan berulang kalidgn tujuan untuk melukai / mengakibatkan ketidaknyamanan pd org lain
  3. meminta uang atau barang scr paksa disertai ancaman
  4. korban memiliki kekurangan dalam aspek fisik maupun psikologis sehingga merasa dikucilkan
  5. stres, kecemasan, depresi
  6. perundungan yg dilakukan dgn menggunakan tubuh/objek utk menyakiti org lain
  7. dampak bullying yang menyebabkan munculnya keinginan untuk membalas / melihat org lain mengalami kesakitan, cedera atau tekanan
  8. dampak dimana korban mengalami isolasi sosial, perasaan kesepian, dan penurunan kualitas hidup scr keseluruhan
  9. tunjukkan prestasi, tumbuhkan rasa percaya diri, jadikan penyemangat utk sukses
  10. salah satu faktor bullying karena tidak memiliki sesuatu yg dimiliki org lain

19 Clues: pelaku bullyingkata lain dari bullyingstres, kecemasan, depresibullying dalam media sosialsikap membedakan orang laintempat bullying memukuli adik kelasmenanggung sesuatu yang tdk menyenangkanperasaan ketegangan dan tekanan emosionalmeminta uang atau barang scr paksa disertai ancaman...

bullying 2024-09-02

bullying crossword puzzle
Across
  1. pelaku bullying
  2. bullying dengan mengolok olok, mengejek, mengancam, menuduh dan memfitnah
  3. dampak bully yang menyebabkan pengingkatan & penurunan suasana hati
  4. dampak bagi org yang mengalami kurang empati, kecenderungan melakukan kekerasan dan masalah perilaku
  5. tempat bullying memukuli adik kelas
  6. perasaan ketegangan dan tekanan emosional
  7. menanggung sesuatu yang tdk menyenangkan
  8. kata lain dari bullying
  9. sikap membedakan orang lain
Down
  1. bullying dalam media sosial
  2. bentuk tindakan agresif yang dilakukan dgn sengaja dan berulang kalidgn tujuan untuk melukai / mengakibatkan ketidaknyamanan pd org lain
  3. meminta uang atau barang scr paksa disertai ancaman
  4. korban memiliki kekurangan dalam aspek fisik maupun psikologis sehingga merasa dikucilkan
  5. stres, kecemasan, depresi
  6. perundungan yg dilakukan dgn menggunakan tubuh/objek utk menyakiti org lain
  7. dampak bullying yang menyebabkan munculnya keinginan untuk membalas / melihat org lain mengalami kesakitan, cedera atau tekanan
  8. dampak dimana korban mengalami isolasi sosial, perasaan kesepian, dan penurunan kualitas hidup scr keseluruhan
  9. tunjukkan prestasi, tumbuhkan rasa percaya diri, jadikan penyemangat utk sukses
  10. salah satu faktor bullying karena tidak memiliki sesuatu yg dimiliki org lain

19 Clues: pelaku bullyingkata lain dari bullyingstres, kecemasan, depresibullying dalam media sosialsikap membedakan orang laintempat bullying memukuli adik kelasmenanggung sesuatu yang tdk menyenangkanperasaan ketegangan dan tekanan emosionalmeminta uang atau barang scr paksa disertai ancaman...

Definitions for computer 2021-10-06

Definitions for computer crossword puzzle
Across
  1. to gain information from someone else in a bad way
  2. parts of a computer or substance
  3. to pertain something
  4. small and portable soli device that can be inserted onto a USB
  5. the key to the computer system which stands for Central Processing Unit
  6. storage information
  7. a reason or limited use of copyrighting
  8. the way to communicate with other networks
  9. this is used to store memory and has lots of small chips
  10. when you take or steal information from someone else and copy it to make it look like yours
Down
  1. a website that allows to delete, gain, revise a content using a web browser
  2. a local network area
  3. a security use to protect the use of your network and data
  4. the right to make copies of music, artistic work and words
  5. stands for wide network area which is a computer network that connects smaller networks
  6. a storage device
  7. a security device that can help protect the computer
  8. used to connect cables to a computer
  9. this is often seen in messages and posts

19 Clues: a storage devicestorage informationa local network areato pertain somethingparts of a computer or substanceused to connect cables to a computera reason or limited use of copyrightingthis is often seen in messages and poststhe way to communicate with other networksto gain information from someone else in a bad way...

key terms geography 2025-09-15

key terms geography crossword puzzle
Across
  1. The influence of geography on international politics and power relations.
  2. The study of population structure and change.
  3. A location with meaning attached to it.
  4. ratio The ratio of dependent people to working-age people.
  5. resource management Using resources without depleting them for future generations.
  6. A city with a population over 10 million.
  7. Renovation of poor urban areas attracting wealthier residents.
  8. heat island effect Cities are warmer than surrounding rural areas due to human activity.
  9. commons Areas outside national jurisdiction shared by all (oceans, atmosphere, Antarctica, space).
  10. Increasing interconnectedness of people, places and economies worldwide.
  11. / outsider How included or excluded someone feels in a place.
  12. Growth in the proportion of people living in towns and cities.
Down
  1. Mutual reliance between countries or regions for goods, services, labour or capital.
  2. Unequal distribution of wealth, opportunities or resources between groups or places.
  3. governance International cooperation to manage global issues through laws, norms and institutions.
  4. Movement from urban areas to rural areas.
  5. security Reliable access to sufficient, nutritious food.
  6. of place The emotional attachment people have to a place.
  7. (non-governmental organisation) Independent organisation addressing social, environmental or humanitarian issues.
  8. security Reliable access to essential resources.

20 Clues: A location with meaning attached to it.Movement from urban areas to rural areas.A city with a population over 10 million.The study of population structure and change.security Reliable access to essential resources.security Reliable access to sufficient, nutritious food.of place The emotional attachment people have to a place....

Office 2022-03-10

Office crossword puzzle
Across
  1. making people happy (2words)
  2. online meeting tool
  3. melody's saying (4words)
  4. has keys
Down
  1. get money
  2. used for viewing data
  3. bossy person (2words)
  4. people you work with
  5. sit upon
  6. job security
  7. david's favorite city
  8. needed workspace
  9. birthday in mar
  10. transfer labs

14 Clues: sit uponhas keysget moneyjob securitytransfer labsbirthday in marneeded workspaceonline meeting toolpeople you work withused for viewing databossy person (2words)david's favorite citymelody's saying (4words)making people happy (2words)

digital ciizenship 2021-01-29

digital ciizenship crossword puzzle
Across
  1. reliable information
  2. protecting yourself
  3. group of people
  4. real world
  5. being safe online
  6. being safe
Down
  1. passwords
  2. opposite of plagiarism
  3. being tricked
  4. evaluate media
  5. online community
  6. to keep someone away digitally

12 Clues: passwordsreal worldbeing safebeing trickedevaluate mediagroup of peopleonline communitybeing safe onlineprotecting yourselfreliable informationopposite of plagiarismto keep someone away digitally

Ch. 1-3 Narnia 2023-11-13

Ch. 1-3 Narnia crossword puzzle
Across
  1. curious
  2. packages
  3. crazy
  4. layer of gold
  5. light meal, Eng. custom
Down
  1. scarf
  2. radio without cords
  3. "tell me"
  4. male deer
  5. from now on
  6. to put to sleep, sense of security
  7. trick

12 Clues: scarfcrazytrickcuriouspackages"tell me"male deerfrom now onlayer of goldradio without cordslight meal, Eng. customto put to sleep, sense of security

PHRASAL VERBS 2020-05-18

PHRASAL VERBS crossword puzzle
Across
  1. sentarse
  2. despertarse
  3. wait
  4. levantarse
  5. break or separate into pieces
Down
  1. have a friendly relationship
  2. reparar
  3. ponerse de pie
  4. request
  5. become happy
  6. copy as a security measure
  7. devolverle algo a alguién

12 Clues: waitrepararrequestsentarselevantarsedespertarsebecome happyponerse de piedevolverle algo a alguiéncopy as a security measurehave a friendly relationshipbreak or separate into pieces

CAB 2021-03-04

CAB crossword puzzle
Across
  1. Punching,kicking spitiig
  2. intentionally excluding someone from an online group
  3. spreading rumors
  4. the person that just sits and watches someone getting picked on
  5. someone who sticks up for someone that is getting bullied
  6. repeatedly sending abusive, insulting, or unwanted messages
  7. Online arguments using electronic messages with aggressive or abusive language
  8. Disclosing someone else’s secrets or embarrassing information online without their consent
Down
  1. pretending to be someone else and sending or posting material
  2. writing mean messages on social media
  3. repeated, intense harassment and denigration that includes threats or creates significant fear
  4. Spreading gossip, lies or rumours about someone to damage their reputation or friendships
  5. talking someone into revealing secrets or embarrassing information, then publishing it online
  6. name calling threning
  7. messing around with your friend and both of you are having fun

15 Clues: spreading rumorsname calling threningPunching,kicking spitiigwriting mean messages on social mediaintentionally excluding someone from an online groupsomeone who sticks up for someone that is getting bulliedrepeatedly sending abusive, insulting, or unwanted messagespretending to be someone else and sending or posting material...

tech crossword 2023-06-07

tech crossword crossword puzzle
Across
  1. a type of computer memory where data is stored
  2. it is a mobile operating system
  3. a malicous software that may cause disruption to your computer and leak private information online
  4. it is any sequence of one or more symbols
  5. small blocks of data created by a server
  6. a system that protects the Internet from cyber attacks
  7. a program that once is executed, would cause major damage to the computer
Down
  1. a digital representation of text and data
  2. a collection of data duplicating original values
  3. a mapping for some domain to bits
  4. one of the largest technology companies
  5. an image that is used for representing data
  6. a hardware used for transmitting digital video and audio from one device to another
  7. a moving digital image
  8. a method of transmitting and receiving messages using electronic devices

15 Clues: a moving digital imageit is a mobile operating systema mapping for some domain to bitsone of the largest technology companiessmall blocks of data created by a servera digital representation of text and datait is any sequence of one or more symbolsan image that is used for representing dataa type of computer memory where data is stored...

Vocabulary revision. unit 6, Light up 2023-04-21

Vocabulary revision. unit 6, Light up crossword puzzle
Across
  1. both countries were about to start a _____ because of their disagreements.
  2. prejudice or discrimination because of a person's age.
  3. after the heavy rains, there was a lot of _______in the city.
  4. the belief that humans may be divided into separate and exclusive biological entities called “races”
  5. team or group
  6. starting point
  7. There was too much _____ in the country because of the bad economy
Down
  1. People had nothing to eat. A ______ was declared.
  2. (verb)consists of
  3. The education system is excellent and the country has almost no _______ among its citizens.
  4. Cyber _______ is one of the modern-day problems affecting teenagers.
  5. the practice of ending a personal relationship with someone by suddenly and without explanation withdrawing from all communication.
  6. (verb) to stay away from someone or something
  7. the way it develops
  8. (verb) to get better

15 Clues: team or groupstarting point(verb)consists ofthe way it develops(verb) to get better(verb) to stay away from someone or somethingPeople had nothing to eat. A ______ was declared.prejudice or discrimination because of a person's age.after the heavy rains, there was a lot of _______in the city....

Vocabulary pag 72 2024-04-17

Vocabulary pag 72 crossword puzzle
Across
  1. or evidence used to prove or disprove a fact.
  2. observe or carefully analyze something to obtain information.
  3. in charge of investigating crimes and collecting evidence.
  4. of illegally taking another person's property without his or her consent.
  5. of seeking information and collecting evidence to solve a criminal case.
  6. a solution or answer to a problem or situation.
  7. used to inflict damage or cause injury.
  8. to the act of illegally taking another person's property without their consent.
  9. of killing someone intentionally and illegally.
  10. actively follow or search for someone, especially a criminal.
Down
  1. and distinctive prints on your fingertips.
  2. to identify people and as evidence in criminal cases.
  3. where people convicted of crimes are imprisoned.
  4. officers-Members of law enforcement agencies charged with maintaining peace and security.
  5. Guard-Professional in charge of protecting property and people.
  6. person who commits crimes or breaks the law.
  7. capture or detain someone, especially a criminal.

17 Clues: used to inflict damage or cause injury.and distinctive prints on your fingertips.person who commits crimes or breaks the law.or evidence used to prove or disprove a fact.a solution or answer to a problem or situation.of killing someone intentionally and illegally.where people convicted of crimes are imprisoned....

Technology 2025-12-20

Technology crossword puzzle
Across
  1. Useable on doors
  2. Addicted
  3. Head braker
  4. Opposite of slow
  5. Television
  6. The name of the puzzle
Down
  1. Oposite of start
  2. Film,take pictures
  3. Manage
  4. Security
  5. Structure & Organization
  6. A girls best friend
  7. Computers,phones and technology

13 Clues: ManageAddictedSecurityTelevisionHead brakerOposite of startUseable on doorsOpposite of slowFilm,take picturesA girls best friendThe name of the puzzleStructure & OrganizationComputers,phones and technology

Online Safety 2019-09-09

Online Safety crossword puzzle
Across
  1. An illegal scam used by criminals to with hopes to obtain your personal information is called
  2. __ means to be safe on the internet and act ethical.
  3. legal trouble suspension and __ for cyber bullying
  4. The act of using another person’s words or ideas without giving credit to that person.
  5. Education Criticizing Comedy and News reporting is legal examples of __.
Down
  1. many teens send time on __.
  2. Turn off your location and __ settings.
  3. illegal downloading and sharing music.
  4. Bullying that takes place using an electronic device to harass, threaten, embarrass or target someone
  5. never share personal __ with strangers.

10 Clues: many teens send time on __.illegal downloading and sharing music.Turn off your location and __ settings.never share personal __ with strangers.legal trouble suspension and __ for cyber bullying__ means to be safe on the internet and act ethical.Education Criticizing Comedy and News reporting is legal examples of __....

Think before you click-crosswords 2023-05-17

Think before you click-crosswords crossword puzzle
Across
  1. A cyber attack caused by clicking on a like button of a post or an ad
  2. American term for journalism
  3. Presenting information in an exciting way
  4. False online identity that promotes personal opinions
Down
  1. False information used to mislead for example an enemy
  2. Anonymous person who sends provocative and off-topic messages
  3. Set of rules that ranks how likely users interact with social media
  4. A malicious link that’s under a clickable surface
  5. For example image processing to produce videos of celebrities saying or doing something they haven’t done
  6. Popular newspaper with pictures and very short and small

10 Clues: American term for journalismPresenting information in an exciting wayA malicious link that’s under a clickable surfaceFalse online identity that promotes personal opinionsFalse information used to mislead for example an enemyPopular newspaper with pictures and very short and smallAnonymous person who sends provocative and off-topic messages...

SERENTAK BERGERAK STOP PERUNDUNGAN 2023-11-10

SERENTAK BERGERAK STOP PERUNDUNGAN crossword puzzle
Across
  1. penggunaan kekuasaan atau kekuatan untuk menyakiti seseorang atau kelompok, sehingga korban merasa tertekan trauma dan tidak berdaya
  2. salah satu dimensi Profil Pelajar Pancasila
  3. salah satu tempat yang digunakan untuk membuat kebijakan anti bullying
  4. Komisi Perlindungan Anak Indonesia
Down
  1. membangun komunikasi anak dan orang tua adalah salah satu cara mencegah bullying di lingkungan ...
  2. bullying yang dilakukan secara lisan akan berdampak seius pada ... korban
  3. Perundungan melalui media elektronik
  4. jenis perundungan dengan memukul, mendorong, menggigit, menjambak, menendang
  5. salah satu akibat yang timbul karena perundungan
  6. jenis bullying dengan penggunaan kata-kata untuk menyakiti misalnya memanggil nama dengan julukan yang tidak baik

10 Clues: Komisi Perlindungan Anak IndonesiaPerundungan melalui media elektroniksalah satu dimensi Profil Pelajar Pancasilasalah satu akibat yang timbul karena perundungansalah satu tempat yang digunakan untuk membuat kebijakan anti bullyingbullying yang dilakukan secara lisan akan berdampak seius pada ... korban...

tts bk 2024-04-30

tts bk crossword puzzle
Across
  1. adalah bullying yang dilakukan pelakunya melalui sarana elektronik
  2. adalah pelopor penelitian bullying
  3. Meminta uang atau barang secara paksa disertai dengan ancaman
  4. adalah salah satu sebab munculnya bulliying karena tradisi turun temurun dari senior
  5. contohnya adalah menendang , memukul , menampar
  6. adalah bentuk penindasan yang dilakukan seseorang atau sekelompok orang yang lebih kuat terhadap orang lain dengan tujuan untuk menyakiti
Down
  1. dalam pandangan Islam, bullying merupakan perbuatan
  2. ini dapat berupa julukan nama celaan,fitnah,ketikan kejam, penghinaan,dll
  3. adalah dampak bullying yang menyebabkan peningkatan dan penurunan suasana hati
  4. Salah satu faktor penyebab bullying karena tidak memiliki sesuatu yang dimiliki orang lain

10 Clues: adalah pelopor penelitian bullyingcontohnya adalah menendang , memukul , menampardalam pandangan Islam, bullying merupakan perbuatanMeminta uang atau barang secara paksa disertai dengan ancamanadalah bullying yang dilakukan pelakunya melalui sarana elektronikini dapat berupa julukan nama celaan,fitnah,ketikan kejam, penghinaan,dll...

Kel.3 Kelas X-A (AI & LoT) 2024-08-07

Kel.3 Kelas X-A (AI & LoT) crossword puzzle
Across
  1. AI tidak hanya meningkatkan pemahaman terhadap kondisi saat ini tetapi juga memberikan kemampuan
  2. pengumpulan dan pertukaran data yang luas oleh perangkat LOT meningkatkan risiko serangan
  3. rumah pintar konker yang menggambarkan hubungan erat antara LOT dan AI
  4. time algoritma AI dapat menganalisis data ini secara
  5. pemegang peran utama dalam mengelola data mentah yang dikumpulkan oleh sensor-sensor
  6. tidak hanya tentang pengumpulan data tetapi juga tentang memberikan konteks dan makna pada data tersebut
Down
  1. Spanyol salah satu implementasi kota pintar yang signifikan terletak di
  2. antara perangkat lot yang beragam
  3. untuk mengatasi serangan perlu diterapkan tindakan keamanan yang
  4. AI dan IOT digabungkan terbentuk

10 Clues: AI dan IOT digabungkan terbentukantara perangkat lot yang beragamtime algoritma AI dapat menganalisis data ini secarauntuk mengatasi serangan perlu diterapkan tindakan keamanan yangrumah pintar konker yang menggambarkan hubungan erat antara LOT dan AISpanyol salah satu implementasi kota pintar yang signifikan terletak di...

teach 2025-09-07

teach crossword puzzle
Across
  1. Prefix for anything involving virtual or digital threats.
  2. Online test to tell humans from bots — often asks you to “spot the traffic light” .
  3. Microsoft’s OS that introduced the Start menu.
  4. – A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
  5. – The annoying lag between click and response (7).
  6. – The coder’s social network for sharing repos (6).
Down
  1. Microsoft’s old web browser — or the Windows file manager.
  2. The digital ledger tech behind Bitcoin and more.
  3. – Coffee-inspired programming language once said to “run everywhere” (4).
  4. – Open-source OS mascot is a penguin named Tux (5).

10 Clues: Microsoft’s OS that introduced the Start menu.The digital ledger tech behind Bitcoin and more.– The annoying lag between click and response (7).– Open-source OS mascot is a penguin named Tux (5).– The coder’s social network for sharing repos (6).Prefix for anything involving virtual or digital threats....

Dampak Sosial Informasi dan Jaringan Komputer dan Internet 2025-11-24

Dampak Sosial Informasi dan Jaringan Komputer dan Internet crossword puzzle
Across
  1. Pelecehan terhadap seseorang menggunakan teknologi digital
  2. Memungkinkan komunikasi jarak jauh yang cepat dan mudah, serta memperluas jaringan sosial.
  3. perundungan di dunia maya
  4. Penyebaran Informasi palsu yang menyesatkan masyarakat
  5. Penyebaran informasi bohong untuk menyesatkan publik
  6. seseorang akan merasa “bahagia” hanya dengan berbekal smartphone ataupun komputer.
Down
  1. kejahatan dengan menggunakan teknologi komputer untuk kemudian melakukan transaksi dengan menggunakan kartu kredit orang lain
  2. Mempermudah akses terhadap sumber belajar melalui platform daring
  3. Hak seseorang untuk mengontrol informasi pribadi
  4. kejahatan yang dilakukan dengan membuat gangguan, perusakan ataupun penghancuran terhadap suatu data, program komputer, sistem jaringan komputer yang terhubung langsung dengan internet.

10 Clues: perundungan di dunia mayaHak seseorang untuk mengontrol informasi pribadiPenyebaran informasi bohong untuk menyesatkan publikPenyebaran Informasi palsu yang menyesatkan masyarakatPelecehan terhadap seseorang menggunakan teknologi digitalMempermudah akses terhadap sumber belajar melalui platform daring...

Emerging careers 2025-05-13

Emerging careers crossword puzzle
Across
  1. Environmental, Social, Governance framework CAs use to assess sustainability reporting
  2. Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
  3. Ensuring adherence to laws and regulations like GST or SEBI guidelines
  4. Corporate combinations where CAs perform financial due diligence
  5. When companies can't pay debts, CAs in this field handle restructuring proceedings
Down
  1. Using big data insights to drive strategic financial decisions
  2. Assessment and management of financial, operational or cyber threats
  3. CAs provide funding, compliance, and scaling advice to these new ventures
  4. Digital assets requiring specialized tax and regulatory expertise from modern CAs
  5. Accounting specialty investigating financial fraud and disputes

10 Clues: Using big data insights to drive strategic financial decisionsAccounting specialty investigating financial fraud and disputesCorporate combinations where CAs perform financial due diligenceAssessment and management of financial, operational or cyber threatsEnsuring adherence to laws and regulations like GST or SEBI guidelines...

10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) 2024-01-17

10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) crossword puzzle
Across
  1. California physician and critic of FDR who wanted the government to help the elderly more.
  2. Economic upturn, after a depression
  3. Catholic priest and radio host who didn't think FDR was going far enough in his reforms.
  4. Process in which a neutral party hears arguments from two opposing sides and makes a decision that both must accept
  5. Something that provides security against misfortune.
  6. This was abolished under the Fair Labor Standards Act.
  7. Spending borrowed money rather than raising taxes.
  8. Attempt to resolve conflict between hostile people or groups.
Down
  1. Role of government to work out conflicts among competing interest groups.
  2. FDR's wife
  3. To provide money for a project.
  4. Type of strike that is a method of boycotting work by sitting down at work and refusing to leave.
  5. Act passed by Congress to provide financial security to older Americans.
  6. Appointing extra judges who will rule in favor of your policies.
  7. Law passed that guaranteed workers the right to unionize.
  8. Former governor of Louisiana and critic of FDR.
  9. Works Progress Administration
  10. Because of that.
  11. Something that promotes well-being or is a useful aid

19 Clues: FDR's wifeBecause of that.Works Progress AdministrationTo provide money for a project.Economic upturn, after a depressionFormer governor of Louisiana and critic of FDR.Spending borrowed money rather than raising taxes.Something that provides security against misfortune.Something that promotes well-being or is a useful aid...

Chapter 11 test study guide 2025-04-09

Chapter 11 test study guide crossword puzzle
Across
  1. The rising stock prices convinced many people to ___________ in stocks.
  2. federal __________ insurance corporation
  3. ____________ borrowed their money from banks.
  4. Many people supported the New Deal, but the ____________ world did not.
  5. The WPA also gave jobs to ________ artists and writers.
  6. Many investors did not have the money to buy stocks, so they bought on _________.
  7. In 1930 Congress passed the _________ Tariff.
  8. Most people during the dustbowl left __________ to head for California.
  9. By the late 1920s, ____________ prices were very high.
  10. In 1935 Roosevelt created a new set of programs, often called the ______________.
Down
  1. homeless shelters during the depression
  2. In August 1935, Congress passed the __________ act.
  3. The United States slid into an economic crisis called the __________.
  4. In April, Congress created the _____________ administration
  5. The _________ improved a little by the mid-1930s, but the Great Depression continued.
  6. The social security act placed a _____ on workers and employers.
  7. an organized system for buying and selling shares, or blocks of investments, in corporations
  8. The Hawley-Smoot was a tax on ___________.
  9. The money from the social security act was used to pay monthly ________ to retired people.

19 Clues: homeless shelters during the depressionfederal __________ insurance corporationThe Hawley-Smoot was a tax on ___________.____________ borrowed their money from banks.In 1930 Congress passed the _________ Tariff.In August 1935, Congress passed the __________ act.By the late 1920s, ____________ prices were very high....

302 2017-01-30

302 crossword puzzle
Across
  1. unnecessary
  2. knowledgeable
  3. risk-taker
  4. plan
Down
  1. self-employed
  2. move jobs
  3. continuing
  4. protection
  5. possibility

9 Clues: planmove jobscontinuingprotectionrisk-takerunnecessarypossibilityself-employedknowledgeable

Family 2024-09-09

Family crossword puzzle
Across
  1. smell
  2. community
  3. pleasant
  4. famous city in France.
  5. weather
  6. emotion
Down
  1. security
  2. hike
  3. emotion
  4. sea

10 Clues: seahikesmellemotionweatheremotionsecuritypleasantcommunityfamous city in France.

KNOW YOUR CODES 2018-12-12

KNOW YOUR CODES crossword puzzle
Across
  1. FIRE
  2. EVACUATION
  3. BOMB THREAT
  4. SECURITY EMERGENCY
  5. PLAN D
  6. CHEMICAL SPILL
Down
  1. CODE 11
  2. OUT OF CONTROL PERSON
  3. CODE 99
  4. INFANT/CHILD ABDUCTION
  5. PATIENT LOCATION ALERT

11 Clues: FIREPLAN DCODE 11CODE 99EVACUATIONBOMB THREATCHEMICAL SPILLSECURITY EMERGENCYOUT OF CONTROL PERSONINFANT/CHILD ABDUCTIONPATIENT LOCATION ALERT

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sent by the sender to receiver
  2. data
  3. origin
  4. interface, transmitter
  5. common clock
  6. server, user's identity
  7. security
Down
  1. decodes
  2. protocol levels
  3. bringing something to existence
  4. mediums

11 Clues: dataorigindecodesmediumssecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysent by the sender to receiverbringing something to existence

PenFed Fun 2022-09-05

PenFed Fun crossword puzzle
Across
  1. who we are
  2. must be _______ out of state
  3. not enough security
  4. member services
  5. Paris' Dog's name
  6. transfer
  7. computer program
  8. who you gonna call?
Down
  1. leader
  2. a thief
  3. add more fraud
  4. famous fraudster
  5. reader board
  6. block of calls from 8-11am

14 Clues: leadera thieftransferwho we arereader boardadd more fraudmember servicesfamous fraudstercomputer programParis' Dog's namenot enough securitywho you gonna call?block of calls from 8-11ammust be _______ out of state

Unit 6: Tidy your room!! 2020-10-26

Unit 6: Tidy your room!! crossword puzzle
Across
  1. Security implement used to cover your mouth and nose.
  2. car A vehicle used by the police.
  3. Security implement used to protect your head.
  4. A person who extinguishes fires.
Down
  1. A vehicle which transport injured people.
  2. Metal rings used for souring prisoners.
  3. A vehicle used by firefighters.
  4. A person who helps doctors and cares for sick people.

8 Clues: A vehicle used by firefighters.A person who extinguishes fires.car A vehicle used by the police.Metal rings used for souring prisoners.A vehicle which transport injured people.Security implement used to protect your head.Security implement used to cover your mouth and nose.A person who helps doctors and cares for sick people.

NZST Airport Operations 2020-03-30

NZST Airport Operations crossword puzzle
Across
  1. Stage 3: Check the _____ to check the baggage allowance
  2. Printing the labels and attaching to bags is known as
  3. Complete the job title: Customer Service _______
  4. The first stage of check in is the ______
  5. These are not included in your hand luggage allowance
Down
  1. Skis, surf boards and golf clubs are ______ baggage
  2. In stage two the CSA will ask for ID such as a ________
  3. When pax are through security, they are now ______
  4. Stage 7 Tell pax which _____ to go to
  5. Where is New Zealand's busiest Airport?
  6. In Stage 5 the CSA asks security and ___goods questions

11 Clues: Stage 7 Tell pax which _____ to go toWhere is New Zealand's busiest Airport?The first stage of check in is the ______Complete the job title: Customer Service _______When pax are through security, they are now ______Skis, surf boards and golf clubs are ______ baggagePrinting the labels and attaching to bags is known as...

Confientiality 2025-02-06

Confientiality crossword puzzle
Across
  1. insurance information
  2. Data information which may arise from employment-related physicals, drug tests and
  3. work history, date of birth, social security number, criminal record,
  4. information
  5. or Sensitive Data information about an employee prior to employment such as a résumé,
  6. of information
  7. involves individuals hired to steal trade secrets, new products or
Down
  1. Data records of an employee’s performance on the job such as performance reports,
  2. religion, etc.
  3. actions, supervisory notations Corporate Espionage form of espionage conducted for commercial purposes rather than security;
  4. of rules or promises which limits access or places restrictions on certain

11 Clues: informationreligion, etc.of informationinsurance informationinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,of rules or promises which limits access or places restrictions on certainData records of an employee’s performance on the job such as performance reports,...

JOBS 2013-05-02

JOBS crossword puzzle
Across
  1. / helps the doctor
  2. / cuts hair
  3. / plays intruments
  4. / flies planes
  5. / serves food
  6. / informs about the news
  7. / helps sick people
Down
  1. player / plays soccer
  2. / goes to school
  3. / works in the house
  4. / doesn't work anymore
  5. /sells products
  6. officer /controls security
  7. / teaches English
  8. / participates in movies

15 Clues: / cuts hair/ serves food/ flies planes/sells products/ goes to school/ teaches English/ helps the doctor/ plays intruments/ helps sick people/ works in the houseplayer / plays soccer/ doesn't work anymore/ informs about the news/ participates in moviesofficer /controls security

List 32 Vocabulary Words 2021-10-20

List 32 Vocabulary Words crossword puzzle
Across
  1. talking in circles
  2. ego second self
  3. force of a million pounds of dynamite
  4. sociable
  5. pledge as security
  6. male head of family
  7. speech to oneself
Down
  1. cold-blooded composure
  2. a flowing together
  3. affirm or declare
  4. go against
  5. make soft
  6. unorthodox
  7. heated dispute
  8. thought-to-be

15 Clues: sociablemake softgo againstunorthodoxthought-to-beheated disputeego second selfaffirm or declarespeech to oneselfa flowing togethertalking in circlespledge as securitymale head of familycold-blooded composureforce of a million pounds of dynamite

Sure! Here's the list of terms in one line, separated by a single space: righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression 2025-05-21

Sure! Here's the list of terms in one line, separated by a single space:  righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression crossword puzzle
Across
  1. next to, adjoining
  2. separation, disconnection
  3. advancement, development
  4. memorials, statues
  5. idol worship, paganism
  6. ancestry, lineage
  7. legacy moral inheritance, ethical heritage
  8. inheritance, heritage
  9. virtuous, moral
Down
  1. secondary result, side effect
  2. stability financial security, fiscal balance
  3. identity group belonging, shared culture
  4. generosity, cordiality
  5. maintain, protect
  6. barren, sterile

15 Clues: barren, sterilevirtuous, moralmaintain, protectancestry, lineagenext to, adjoiningmemorials, statuesinheritance, heritagegenerosity, cordialityidol worship, paganismadvancement, developmentseparation, disconnectionsecondary result, side effectidentity group belonging, shared culturelegacy moral inheritance, ethical heritage...

Chapter 14 2016-04-18

Chapter 14 crossword puzzle
Across
  1. tax, a tax on the value of a property
  2. income tax, a tax on a persons earnings
  3. tax, a tax on the dollar value of a good or service being sold
  4. of a tax, a final burden of a tax
  5. spending, spending on certain programs that is mandated or required by existing law
  6. tax on imported goods
  7. budget, budget in which revenue is equal to spending
Down
  1. budget, budget for day-to-day expenses
  2. security, old-age survivors and disability insurance
  3. a required payment to a local, state, or national government
  4. tax, a tax on money or property that one living person gives to another
  5. spending, spending category about which government planners can make choices
  6. budget, budget for major capital or investment expenditures
  7. taxes that fund social security and medicare
  8. income tax, a tax on the value of a company's profits
  9. base, income property, good, or service that is subject to a tax
  10. income received by a government from taxes and non-taxed resources

17 Clues: tax on imported goodsof a tax, a final burden of a taxtax, a tax on the value of a propertybudget, budget for day-to-day expensesincome tax, a tax on a persons earningstaxes that fund social security and medicaresecurity, old-age survivors and disability insurancebudget, budget in which revenue is equal to spending...

Patients Matter Crossword Puzzle 2019-01-31

Patients Matter Crossword Puzzle crossword puzzle
Across
  1. What does the P stand for in PHI as defined by HIPAA?
  2. Last Name of our Information Security Director
  3. Sending e-mails to gain relevant information
  4. Log to track and manage risks (Two words)
  5. unplanned interruption to an IT Service or a reduction in the Quality of an IT Service
  6. Internal control reports on the services provided by a service organization (Two words)
  7. What is the open Slack Channel to contact ITGRC? (No characters)
Down
  1. We have an obligation to destroy data
  2. Last Name of our Director of Enterprise Risk Management
  3. I can travel anywhere in the world with my laptop?
  4. Last Name of our Security Officer
  5. What does the C stand for in ITGRC?
  6. Who should I contact if I suspect fraud, misuse, or accidental disclosure?
  7. Last Name of our Privacy Officer
  8. Which ITGRC area do I contact for an acceptable use request?
  9. Office of Consumer Rights
  10. Last Name of our Investigations Lead

17 Clues: Office of Consumer RightsLast Name of our Privacy OfficerLast Name of our Security OfficerWhat does the C stand for in ITGRC?Last Name of our Investigations LeadWe have an obligation to destroy dataLog to track and manage risks (Two words)Sending e-mails to gain relevant informationLast Name of our Information Security Director...

Government and National budget 2025-01-18

Government and National budget crossword puzzle
Across
  1. Refers to the people who own and control factors of production.
  2. increase in the level of production of a country.
  3. Government expenditure to keep country safe.
  4. The government that deals with safety and security of the whole country.
  5. A payment made to a business by the government to assist it.
  6. The government that deals with education of a specific province.
  7. The compulsory payment made to government by an individual or business on the income or profit that they earn.
  8. The minster who presents the national budget.
Down
  1. A list of expected income and intended expenditure.
  2. The government that deals issues within a town or municipal area.
  3. Tax charged on luxury/non-essential items.
  4. A situation in which something is unfair/unequal.
  5. Taxes paid directly to the government.
  6. The sums of money paid by the government for a particular purpose, for example pensioners.
  7. Tax charged when goods are bought and sold.
  8. Tax charged by companies.
  9. Tax charged on salaries and wages by households.

17 Clues: Tax charged by companies.Taxes paid directly to the government.Tax charged on luxury/non-essential items.Tax charged when goods are bought and sold.Government expenditure to keep country safe.The minster who presents the national budget.Tax charged on salaries and wages by households.increase in the level of production of a country....

Cyber Bulying 2018-04-26

Cyber Bulying crossword puzzle
Across
  1. Που επιδρά ο διαδικτυακός εκφοβισμός ;
  2. Αυτός που ασκεί τον εκφοβισμό
  3. Αντιμετωπίζει την επιθετικότητα
  4. Μπορεί να δεχτεί εκεί τον εκφοβισμό
  5. Αυτός που δέχεται τον εκφοβισμό
Down
  1. Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.

6 Clues: Αυτός που ασκεί τον εκφοβισμόΑντιμετωπίζει την επιθετικότηταΑυτός που δέχεται τον εκφοβισμόΜπορεί να δεχτεί εκεί τον εκφοβισμόΠου επιδρά ο διαδικτυακός εκφοβισμός ;Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.

cyber wellness 2022-06-23

cyber wellness crossword puzzle
Across
  1. Hostile or violent behaviour.
  2. Refusing to go out.
  3. The condition of being addicted to a particular activity.
Down
  1. Feeling a fairly strong and persistent pain.
  2. Regularly having problems sleeping.
  3. A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.

6 Clues: Refusing to go out.Hostile or violent behaviour.Regularly having problems sleeping.Feeling a fairly strong and persistent pain.The condition of being addicted to a particular activity.A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.

cyber seguridad 2020-12-01

cyber seguridad crossword puzzle
Across
  1. this prevents viruses from entering the computer
  2. is the eassiest way to hack somebody are key numbers to enter intagram for example
  3. this way hackers can get confidential
Down
  1. is when you recieve an email fake thats ..... .....
  2. It is something to protect yourself from hackers and not to steal data
  3. when somebady spy you because you dowland something eligal or some trap that the hacker put you

6 Clues: this way hackers can get confidentialthis prevents viruses from entering the computeris when you recieve an email fake thats ..... .....It is something to protect yourself from hackers and not to steal datais the eassiest way to hack somebody are key numbers to enter intagram for example...

cyber seguridad 2020-12-01

cyber seguridad crossword puzzle
Across
  1. this prevents viruses from entering the computer
  2. is the eassiest way to hack somebody are key numbers to enter intagram for example
  3. this way hackers can get confidential
Down
  1. is when you recieve an email fake thats ..... .....
  2. It is something to protect yourself from hackers and not to steal data
  3. when somebady spy you because you dowland something eligal or some trap that the hacker put you

6 Clues: this way hackers can get confidentialthis prevents viruses from entering the computeris when you recieve an email fake thats ..... .....It is something to protect yourself from hackers and not to steal datais the eassiest way to hack somebody are key numbers to enter intagram for example...

Cyber Safety 2024-06-04

Cyber Safety crossword puzzle
Across
  1. Unwanted or unsolicited email messages.
  2. Unauthorized intrusion into a computer system or network.
  3. Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
  1. Digital method of exchanging messages over the internet.
  2. Measures taken to protect a system against unauthorized access or attacks.
  3. A secret word or phrase used to gain access to a system.

6 Clues: Unwanted or unsolicited email messages.Digital method of exchanging messages over the internet.A secret word or phrase used to gain access to a system.Unauthorized intrusion into a computer system or network.Measures taken to protect a system against unauthorized access or attacks....

Cyber Safety 2023-05-18

Cyber Safety crossword puzzle
Across
  1. Stealing someone's work without giving credit
  2. Online fights through messaging
Down
  1. Pretending to be someone else
  2. Getting a fake email
  3. An abbreviation Laughing out loud
  4. Something that ruins your computer

6 Clues: Getting a fake emailPretending to be someone elseOnline fights through messagingAn abbreviation Laughing out loudSomething that ruins your computerStealing someone's work without giving credit

Cyber World 2023-07-12

Cyber World crossword puzzle
Across
  1. change the case of the letter when pressed
  2. an input device
  3. Read Access Memory
Down
  1. The brain of the computer.
  2. An output device
  3. The ________ is a mean of sending information to the computer

6 Clues: an input deviceAn output deviceRead Access MemoryThe brain of the computer.change the case of the letter when pressedThe ________ is a mean of sending information to the computer

Network concept and Cyber ethics 2025-05-31

Network concept and Cyber ethics crossword puzzle
Across
  1. A network within a small area, like a home or school
  2. A set of rules for data communication between devices
  3. A security system that controls incoming and outgoing network traffic
  4. Global network connecting millions of computers
  5. Unauthorized access to computer systems
  6. Bullying or harassment using digital technology
  7. Illegal copying or downloading of software or media
  8. Secret string of characters used for authentication
Down
  1. A network that covers a large geographic area
  2. A computer that provides data to other computers
  3. A computer that receives data from a server
  4. The right to keep personal information secure online
  5. Fraudulent attempt to obtain sensitive information via fake messages
  6. Device that converts digital data into signals for transmission
  7. copying someone’s work or ideas without permission or credit
  8. Permission given to collect or use data
  9. Device that forwards data packets between networks
  10. Malicious software designed to damage or disrupt systems

18 Clues: Permission given to collect or use dataUnauthorized access to computer systemsA computer that receives data from a serverA network that covers a large geographic areaGlobal network connecting millions of computersBullying or harassment using digital technologyA computer that provides data to other computers...

Informatika 2023-03-01

Informatika crossword puzzle
Across
  1. singkatan dari computational thinking
  2. perangkat keras (hardware) pada komputer yang berfungsi sebagai alat untuk input data yang berupa huruf, angka dan simbol
  3. ... bullying adalah perundungan dengan menggunakan teknologi digital
  4. memudahkan pemerintah dalam melakukan sosialisasi kebijakan merupakan salah satu dampak ... informatika
  5. STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)
  6. bentuk kejahatan online yang dilakukan dengan cara menggunakan kartu kredit orang lain
Down
  1. salah satu aplikasi media chat
  2. kemampuan memecah data, proses atau masalah (kompleks)menjadai bagian-bagian yang lebih kecil atau menjadi tugas-tugas yang mudah dikelola
  3. alat mencetak kertas
  4. salah satu program aplikasi pengolah angka

10 Clues: alat mencetak kertassalah satu aplikasi media chatsingkatan dari computational thinkingsalah satu program aplikasi pengolah angka... bullying adalah perundungan dengan menggunakan teknologi digitalSTEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)...

ICT WORDZ 2024-02-23

ICT WORDZ crossword puzzle
Across
  1. Is the gap between those who have access to technology and those who don't
  2. Also known as home working
  3. Allows you to make informed decisions
  4. Moral rules that describe what we believe is right or wrong within a civilized
  5. Is the legal right of ownership for the creator piece of work
Down
  1. A establishment of the purchaser's right to use the software
  2. A type of cyber crime
  3. Going against moral rules of right and wrong in the society
  4. Users are licensees. They can't copy, modify or share the product
  5. Grants a user the right to run an application on a specific machine

10 Clues: A type of cyber crimeAlso known as home workingAllows you to make informed decisionsGoing against moral rules of right and wrong in the societyA establishment of the purchaser's right to use the softwareIs the legal right of ownership for the creator piece of workUsers are licensees. They can't copy, modify or share the product...

C2BK Presentation Crossword Puzzle 2024-05-28

C2BK Presentation Crossword Puzzle crossword puzzle
Across
  1. help bullies to understand the harm of bullying
  2. Have you ever hurt anyone by purpose? Did you keep yourself safe when you reached out to others?
  3. the person who helps the victim, who you can become
  4. the person who bullies
  5. the person who is being bullied
  6. the person who helps the bully
Down
  1. the person who does not interact with bullying
  2. the name for bullying that happens online
  3. something that you can ask for from your teachers and friends that will make you and the situation better
  4. false information that you shouldn’t spread

10 Clues: the person who bulliesthe person who helps the bullythe person who is being bulliedthe name for bullying that happens onlinefalse information that you shouldn’t spreadthe person who does not interact with bullyinghelp bullies to understand the harm of bullyingthe person who helps the victim, who you can become...

Let's Solve 2025-02-19

Let's Solve crossword puzzle
Across
  1. ,An online identity created by user to share information such as thoughts photos videos etc.
  2. ,A relationship between friend.
  3. ,To gain access you must make sure you are computer or device is connected to the INTERNET
  4. ,__________________ is to chat share and exchange thought, Idea or information.
Down
  1. ,A mix of letter numbers and symbols to keep pure account Secure.
  2. ,Never share _____________ information.
  3. ,Ability and knowledge to safely access digital
  4. bullying ,A form of online bullying.
  5. ,Doing this prevent access to information and resecure.
  6. ,A Traile of information and data as a result of you active.

10 Clues: ,A relationship between friend.bullying ,A form of online bullying.,Never share _____________ information.,Ability and knowledge to safely access digital,Doing this prevent access to information and resecure.,A Traile of information and data as a result of you active.,A mix of letter numbers and symbols to keep pure account Secure....

B1_Unit10 dictation 2025-05-05

B1_Unit10 dictation crossword puzzle
Across
  1. To transfer files from the Internet onto your computer.
  2. To add new software to your computer.
  3. To turn a computer off and then turn on again.
  4. To make specific changes and prepare a device or software for use.
  5. When a program or computer stops working suddenly.
  6. To make a copy of important files in case something goes wrong.
Down
  1. This program helps protect your computer from cyber attacks.
  2. To remove an unnecessary app from your computer.
  3. To sign up for something (for ex. a Youtube Channel) to get updates or information regularly.
  4. To install the latest version of a program.

10 Clues: To add new software to your computer.To install the latest version of a program.To turn a computer off and then turn on again.To remove an unnecessary app from your computer.When a program or computer stops working suddenly.To transfer files from the Internet onto your computer.This program helps protect your computer from cyber attacks....

engineering crosswords 2024-12-03

engineering crosswords crossword puzzle
Across
  1. A step-by-step procedure for solving a problem.
  2. Relating to computers, networks, or information technology.
  3. The process of creating and writing computer software.
  4. A set of connected parts working together as a whole.
  5. The act of introducing something new or improving existing technology.
Down
  1. The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
  2. The capacity to do work or power machines.
  3. The use of technology to perform tasks without human intervention.
  4. A machine capable of carrying out a complex series of actions.
  5. written instructions for a computer to execute

10 Clues: The capacity to do work or power machines.written instructions for a computer to executeA step-by-step procedure for solving a problem.A set of connected parts working together as a whole.The process of creating and writing computer software.Relating to computers, networks, or information technology....

Crossword On Internet and Technology 2025-10-03

Crossword On Internet and Technology crossword puzzle
Across
  1. Protection of digital systems from theft or damage
  2. The introduction of new ideas or methods
  3. A digital world where people interact with each other, digital objects and environments in real time
  4. An important and sudden discovery or progress
  5. The right to keep personal information secure
Down
  1. Old-fashioned; no longer useful
  2. A person who is connected to the internet or who is using electronic devices
  3. Happening in many places or among many people
  4. A person who is knowledgeable and skilled in the use of technology
  5. Cyber attacks that trick people into giving away personal data

10 Clues: Old-fashioned; no longer usefulThe introduction of new ideas or methodsHappening in many places or among many peopleAn important and sudden discovery or progressThe right to keep personal information secureProtection of digital systems from theft or damageCyber attacks that trick people into giving away personal data...

Shirley Homes Chapter 5 2021-04-08

Shirley Homes Chapter 5 crossword puzzle
Across
  1. Shirley had a good _____ , so she took great photos
  2. Jeff was very nervous and started to ____
  3. Anna and her boyfriend kissed each other. They were very happy and ______
  4. When the investigator saw Anna in the pub, she decided to create a new _____
  5. Shirley wanted to watch Anna, so she wore a bright student ____
Down
  1. They suspected Anna, but couldn't ____ it
  2. When Jeff knew who the cyber thief was, he got really ____
  3. Anna was a clever young woman, not _____
  4. Anna had her lunch in the pub. There were a lot of people there, so it was _____

9 Clues: Anna was a clever young woman, not _____They suspected Anna, but couldn't ____ itJeff was very nervous and started to ____Shirley had a good _____ , so she took great photosWhen Jeff knew who the cyber thief was, he got really ____Shirley wanted to watch Anna, so she wore a bright student ____...

Robbery and Security 2021-11-19

Robbery and Security crossword puzzle
Across
  1. - It's always important to stick to cash drawer ___
  2. - The most important thing is the safety of ___
  3. - Know the location of your ___ kit, and what's inside
  4. - Know the location of, and how to use ____ alarms
Down
  1. - Get the robber out of the bank as ___ as possible
  2. - Get as good of a ___ of the robber as possible
  3. - Always be ___ of your surroundings
  4. - ___ with the robbers demands
  5. - Always assume the robber is ___, even if no weapon is displayed
  6. - ___ try to interfere or apprehend the robber

10 Clues: - ___ with the robbers demands- Always be ___ of your surroundings- ___ try to interfere or apprehend the robber- The most important thing is the safety of ___- Get as good of a ___ of the robber as possible- Know the location of, and how to use ____ alarms- Get the robber out of the bank as ___ as possible...

Information Security Puzzle 2015-07-08

Information Security Puzzle crossword puzzle
Across
  1. / Such emails should be immediately deleted and not circulated further.
  2. / This policy requires employees to keep workstations free of confidential information when unattended
  3. / Mare sure that your computed screen is always ____ when unattended.
  4. / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
  5. / An internationally acclaimed certification for information security standards.
  6. / ensures safeguarding the accuracy and completeness of information.
Down
  1. / This should contain a combination of alphabets, numbers and special characters .
  2. / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
  3. / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  4. / This type of information is available on GKE websites, and free for everyone to access.

10 Clues: / ensures safeguarding the accuracy and completeness of information./ Mare sure that your computed screen is always ____ when unattended./ Such emails should be immediately deleted and not circulated further./ An internationally acclaimed certification for information security standards....

Social Security Taxes 2023-03-10

Social Security Taxes crossword puzzle
Across
  1. pay any payment made to individuals because of their personal injury or sickness that does not constitute wages
  2. the excess of the amount of employment taxes required to be deposited over the amount deposited on or before the last date prescribed for the deposit
  3. the block of time, consisting of four quarters beginning July 1 of the second preceding year and ending June 30 of the prior year, used to determine if an employer is a monthly or a semiweekly depositor
  4. any service performed by employees for their employer, regardless of the citizenship or residence of either
  5. the expenses that an employer pays for an employee’s education, such as tuition, fees, and payments for books, supplies, and equipment
Down
  1. the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA
  2. rule that determines if an employer has satisfied the deposit obligation by having no shortfall that exceeds $100 or 2 percent of the amount of employment taxes required to be deposited
  3. an entity defined by law as an individual, a trust or estate, a partnership, or a corporation
  4. also known as a Federal Tax Identification Number, and is used to identify a business entity
  5. any person or organization who employs one or more individuals for the performance of services, unless such services or employment are specifically excepted by law

10 Clues: also known as a Federal Tax Identification Number, and is used to identify a business entityan entity defined by law as an individual, a trust or estate, a partnership, or a corporationthe maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA...

Email Security Crossword 2021-10-15

Email Security Crossword crossword puzzle
Across
  1. Another way to check email authenticity is to look for our company ________.
  2. Always ______ emails that ask for confidential information, asks you to take action, or contains links and attachments.
  3. According to the FBI, ________ was the most common type of cybercrime in 2020.
  4. If an email is not asking you for action or information, send it to _____.
Down
  1. One way to check email authenticity is to check for the sender in your inbox or in _______.
  2. _________ emails are any emails attempting to sell you a service or to get you into a meeting.
  3. Successful phishing campaigns can lead to __________ attacks.
  4. If an email asks for ____________ information, report it to Data Security.
  5. If an email is from a sender you do not want to hear from again, mark it as ____.
  6. One way to determine if an email is suspicious is to check for _____ or attachments.

10 Clues: Successful phishing campaigns can lead to __________ attacks.If an email asks for ____________ information, report it to Data Security.If an email is not asking you for action or information, send it to _____.Another way to check email authenticity is to look for our company ________....

Branch Physical Security 2022-08-23

Branch Physical Security crossword puzzle
Across
  1. Who is our Retail Operations primary contact?
  2. During a robbery, try to remain ________.
  3. Make note of the ______________ used in escape.
  4. ________________ with the robber(s)' instructions.
  5. Activate the alarm ______________________, providing this action will not endanger yourself or others.
  6. Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
  1. The Post Robbery __________________ should be distributed.
  2. Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
  3. Who is our Physical Security Manager?
  4. Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.

10 Clues: Who is our Physical Security Manager?During a robbery, try to remain ________.Who is our Retail Operations primary contact?Make note of the ______________ used in escape.________________ with the robber(s)' instructions.The Post Robbery __________________ should be distributed....

Information Security Crossword 2017-01-13

Information Security Crossword crossword puzzle
Across
  1. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
  2. A person who uses computers to gain unauthorized access to computer systems and networks.
  3. A type of malware that is often disguised as legitimate software.
  4. You may not divulge this information while you are working for an employer or after you leave.
  5. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
Down
  1. Anything that has the potential to cause serious harm to a computer system.
  2. A flaw or weakness that can be used to attack a system or organization.
  3. Personal information related to personal data stored on computer systems
  4. A secret series of characters used to authenticate a person’s identity.
  5. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.

10 Clues: A type of malware that is often disguised as legitimate software.A flaw or weakness that can be used to attack a system or organization.A secret series of characters used to authenticate a person’s identity.Personal information related to personal data stored on computer systems...

National Security Policymaking 2016-12-13

National Security Policymaking crossword puzzle
Across
  1. A policy, beginning in the earl;y 1970s, that sought a relaxation of tensions between the US and the Soviet Union, coupled with firm guarantees of mutual security
  2. A mutual reliance in which actions in a county reverberate and affect the economic well-being of people in other countries
  3. The foreign policy of the US followed throughout most of its history whereby it tried to stay out of other nations' conflicts, particularly European wars
  4. The use of violence to frighten a country's population or government
  5. First reduction in nuclear war
Down
  1. Defense budget cuts during times of peace
  2. An agency created after WWII to coordinate American Intelligence activities abroad and to collect, analyze, and evaluate intelligence
  3. The ratio of what a country pays for imports to what it earns from exports
  4. Policy that involves choice taking about relations with the rest of the world
  5. Being occupied by non-muslim peoples created a magnet for

10 Clues: First reduction in nuclear warDefense budget cuts during times of peaceBeing occupied by non-muslim peoples created a magnet forThe use of violence to frighten a country's population or governmentThe ratio of what a country pays for imports to what it earns from exportsPolicy that involves choice taking about relations with the rest of the world...

Ethics & Computer Security 2019-04-18

Ethics & Computer Security crossword puzzle
Across
  1. the process of gaining root access to the iOS operating system that runs on Apple devices, including the iPad, iPhone and iPod Touch.
  2. the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.
  3. reporting an immoral or illegal activity.
  4. redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website.
  5. any software that brings harm to a computer system.
Down
  1. a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
  2. the process of using an algorithm to transform information to make it unreadable for unauthorized users.
  3. Worm a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
  4. of Ethics the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
  5. a technology that tracks and records consecutive key strokes on a keyboard.

10 Clues: reporting an immoral or illegal activity.any software that brings harm to a computer system.a technology that tracks and records consecutive key strokes on a keyboard.the use of electronic messaging systems to send out unrequested or unwanted messages in bulk....

Computer System Security 2024-03-25

Computer System Security crossword puzzle
Across
  1. Science of studying ciphers
  2. A Secret entry point into a program
  3. Hiding a message inside an image
  4. A collection of parameters required to establish a secure session
  5. A graphical network packet analyser
Down
  1. Allows server & client to authenticate each other
  2. Creates a secure tunnel over a public network
  3. A functions take inputs of variable lengths to return outputs of a fixed length
  4. A signature which is attached to a electronic document
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: Science of studying ciphersHiding a message inside an imageA Secret entry point into a programA graphical network packet analyserCreates a secure tunnel over a public networkAllows server & client to authenticate each otherA signature which is attached to a electronic documentA collection of parameters required to establish a secure session...

Security and commerce 2023-10-27

Security and commerce crossword puzzle
Across
  1. The electronic equivalent of a wallet
  2. A program, that spread by attaching themselves to executable files
  3. Special gift in the email, which is a fraud
  4. Programs, which are disguise as an innocent-looking file
  5. Bank fraud
  6. The illegal copying and distribution of copyrighted things
  7. Shopping basket
Down
  1. Online harassment or abuse in chatrooms
  2. The most common type of e-commerce
  3. Virtual shopping trolley

10 Clues: Bank fraudShopping basketVirtual shopping trolleyThe most common type of e-commerceThe electronic equivalent of a walletOnline harassment or abuse in chatroomsSpecial gift in the email, which is a fraudPrograms, which are disguise as an innocent-looking fileThe illegal copying and distribution of copyrighted things...

Password Security Crossword 2024-09-25

Password Security Crossword crossword puzzle
Across
  1. Use this type of phrase to create a strong password (e.g., “MyD0g$pot!”)
  2. Your MSID password needs to be at least this many characters long
  3. A method to verify your identity using something you know, something you have and/or something you are
Down
  1. Person you can share your password with.
  2. Never use ________ information in your passwords
  3. This type of attack tricks you into revealing your password through fake emails or websites
  4. UHG approved password manager
  5. Always log out of your accounts when using a ______ computer
  6. Your ____ email address should only be used for work purposes
  7. Avoid using the same ________ across multiple accounts

10 Clues: UHG approved password managerPerson you can share your password with.Never use ________ information in your passwordsAvoid using the same ________ across multiple accountsAlways log out of your accounts when using a ______ computerYour ____ email address should only be used for work purposes...

Food Security Crossword 2024-10-17

Food Security Crossword crossword puzzle
Across
  1. Lack of consistent access to enough food
  2. The component in food essential for growth
  3. Crop failure due to extreme weather
  4. Nutrient deficiency resulting from lack of food
  5. Storing crops for future use
Down
  1. Agricultural practice to boost crop yields
  2. Promoting sustainable agriculture
  3. Diversifying crops to reduce risk
  4. Global organization addressing hunger
  5. Condition of having limited food supply

10 Clues: Storing crops for future usePromoting sustainable agricultureDiversifying crops to reduce riskCrop failure due to extreme weatherGlobal organization addressing hungerCondition of having limited food supplyLack of consistent access to enough foodAgricultural practice to boost crop yieldsThe component in food essential for growth...

April (Security) Fools! 2025-04-18

April (Security) Fools! crossword puzzle
Across
  1. Malicious software that locks data and demands payment for its release.
  2. A type of malware disguised as legitimate software.
  3. The process of converting information into a secure format.
  4. A barrier that controls the flow of network traffic.
  5. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
  1. Software that secretly monitors and collects information about a user's activities.
  2. Software designed to disrupt, damage, or gain unauthorized access.
  3. The process of verifying the identity of a user or device.
  4. A network of infected devices controlled by a malicious actor.
  5. Software that detects and removes malicious programs.

10 Clues: A type of malware disguised as legitimate software.A barrier that controls the flow of network traffic.Software that detects and removes malicious programs.The process of verifying the identity of a user or device.The process of converting information into a secure format.A network of infected devices controlled by a malicious actor....

CYBER-CRIME / INTERNET ADDICTION 2016-08-17

CYBER-CRIME / INTERNET ADDICTION crossword puzzle
Across
  1. This is the system a computer need to start working or “thinking”
  2. A file, document or picture you add to an email.
  3. This helps you to look for any kind of information online.
  4. This is an annoying email that many people get in their emails inbox.
  5. The action of using emails to take someone’s financial information.
  6. This is the place where you can leave online notes for friends.
  7. A program you need to stop receiving annoying emails.
Down
  1. A computer system that helps you to protect against phishing.
  2. A computer user who illegally have access to computer systems
  3. A message you send to your friend and he/she can read it a few second later.
  4. A dangerous computer program. When it is in your computer you cannot open any file.
  5. A series of unimportant letters and numbers to log in a webpage and that people don’t know.
  6. This is where emails are sent to.

13 Clues: This is where emails are sent to.A file, document or picture you add to an email.A program you need to stop receiving annoying emails.This helps you to look for any kind of information online.A computer system that helps you to protect against phishing.A computer user who illegally have access to computer systems...

Cyber Law CIA I 2021-09-01

Cyber Law CIA I crossword puzzle
Across
  1. A network is usually private or restricted, specially created for an enterprise or an organization.
  2. A collection of web pages and other created content having a common domain.
  3. A situation where a person gets verbally or physically threaten on the internet,causing the other person a mental imbalance.
  4. People who are frequent users of the internet.
  5. A right especially to protect the rights and expression of the original work done by the creator.
  6. A security system present in the computer which supervises the operation and network traffic as per precoded rules.
  7. The process of exploiting the computer system or any private network.
  8. A way to protect data for the concerned user to access it.
Down
  1. A structured set of files just like a stack held in a computer, which is accessible in various ways.
  2. The conversion of text, pictures, or sound in the digital form.
  3. An environment in which communication occurs through a computer network.
  4. the right/powers to make rules and authority to interpret and apply them.
  5. It is a stated obligation and everyone has to abide by it.

13 Clues: People who are frequent users of the internet.It is a stated obligation and everyone has to abide by it.A way to protect data for the concerned user to access it.The conversion of text, pictures, or sound in the digital form.The process of exploiting the computer system or any private network....

Spring Into Cyber Acrostic 2025-02-19

Spring Into Cyber Acrostic crossword puzzle
Across
  1. Irish holiday celebrated on March 17th.
  2. A tool or method used by hackers to take advantage of security flaws.
  3. A type of malware that locks files and demands payment.
  4. A type of cyberattack that overwhelms a network with traffic (abbr.)
  5. Animal often associated with March's unpredictable weather, with 'In like a lamb'
  6. The secure way to remotely connect to a corporate network.
Down
  1. The NCAA basketball tournament nickname (two words).
  2. Data-Link's year of incorporation, with Nineteen _________.
  3. Phase of the moon associated with strange happenings (two words)
  4. The process of verifying a user's identity online.
  5. A method used by hackers to secretly monitor network traffic.
  6. A festive procession often held on holidays.
  7. Season that begins in March

13 Clues: Season that begins in MarchIrish holiday celebrated on March 17th.A festive procession often held on holidays.The process of verifying a user's identity online.The NCAA basketball tournament nickname (two words).A type of malware that locks files and demands payment.The secure way to remotely connect to a corporate network....

Cyber Safety Module 2020-06-05

Cyber Safety Module crossword puzzle
Across
  1. A small window, usually displaying an ad
  2. An online room where people can login to talk to each other
  3. An online personal log or journal
  4. A type of malicious code or software that looks legitimate but can take control of your computer
  5. A malicious software program infecting a user's computer and performing malicious actions
  6. Getting information from a computer from somewhere on the internet and transferring it to your computer
Down
  1. A combination of numbers, letter and special characters that is known only to you and gives you access to a computer, website or network
  2. A social media platform
  3. Using the internet to harass, demean, bullying and insult someone

9 Clues: A social media platformAn online personal log or journalA small window, usually displaying an adAn online room where people can login to talk to each otherUsing the internet to harass, demean, bullying and insult someoneA malicious software program infecting a user's computer and performing malicious actions...

CWSI Cyber CrossWord 2025-03-25

CWSI Cyber CrossWord crossword puzzle
Across
  1. Foundation of both cybersecurity and team collaboration
  2. Common attack vector for phishing and scams
  3. What you should never do with suspicious links or attachments
  4. A vulnerability in software waiting to be exploited
  5. Guidelines that govern secure workplace behavior
Down
  1. A physical or digital object used for multi-factor authentication
  2. What hackers see unaware employees as
  3. A potential danger that exploits system vulnerabilities
  4. The chance that a threat will exploit a vulnerability

9 Clues: What hackers see unaware employees asCommon attack vector for phishing and scamsGuidelines that govern secure workplace behaviorA vulnerability in software waiting to be exploitedThe chance that a threat will exploit a vulnerabilityFoundation of both cybersecurity and team collaborationA potential danger that exploits system vulnerabilities...

LDM Team Member Trivia Puzzle 2022-01-06

LDM Team Member Trivia Puzzle crossword puzzle
Across
  1. Just like the meaning of her name - a bird, who freely flies in the sky.
  2. Name is shared with a well known 19th century US writer.
  3. An important vitamin is the first letter of this persons name.
  4. Matured through an army stint, served during his late teens.
  5. Once spent an entire week in Oklahoma as a working cowboy.
  6. For a period of time this person slept with a M16 rifle under the pillow.
  7. A smiling person easy to work with.
  8. Enjoys learning new things about almost any topic.
  9. Family owns a vineyard.
Down
  1. Lifelong Bruins fan.
  2. Started at Cisco in 1999
  3. Spent time watching white tigers with chess grandmaster Garry Kasparov.
  4. Holds Master's degree in finance & accounting
  5. Backpacked ~400 miles in the last 2 years.
  6. Worked as a coffee roaster while studying computer networking in school.
  7. A wanna-be professional football player but not quite cutting it.
  8. Wanted to be cricketer before becoming curious about cyber threats.
  9. Son of a former catholic priest
  10. Unadorned royalty.

19 Clues: Unadorned royalty.Lifelong Bruins fan.Family owns a vineyard.Started at Cisco in 1999Son of a former catholic priestA smiling person easy to work with.Backpacked ~400 miles in the last 2 years.Holds Master's degree in finance & accountingEnjoys learning new things about almost any topic.Name is shared with a well known 19th century US writer....

perkembangan transaksi ekonomi di era digital 2025-10-16

perkembangan transaksi ekonomi di era digital crossword puzzle
Across
  1. MARKETING Strategi pemasaran yang menargetkan pengguna media sosial.
  2. Transaksi yang memanfaatkan Quick Response Code (Kode Respon Cepat).
  3. Matauang kripto yang paling populer.
  4. Singkatan untuk Pembayaran Non Tunai.
  5. Konsumen yang melakukan pembelian secara daring (online).
  6. Platform yang memfasilitasi pertemuan antara penjual dan pembeli secara online.
  7. Proses jual beli barang atau jasa menggunakan jaringan internet.
  8. BANKING Penggunaan teknologi mobile untuk layanan keuangan.
  9. LENDING Suatu kegiatan pinjam meminjam dana yang dilakukan secara online.
  10. Layanan perbankan yang dapat diakses melalui ponsel pintar.
Down
  1. Istilah yang merujuk pada segala sesuatu yang berhubungan dengan dunia maya atau internet.
  2. CHANNEL Layanan yang menyediakan fasilitas transfer uang antar rekening tanpa melalui bank konvensional.
  3. Metode otentikasi menggunakan sidik jari atau wajah.
  4. Teknologi dasar yang mendukung mata uang kripto seperti Bitcoin.
  5. Istilah untuk dompet digital.
  6. Pembayaran yang dilakukan secara online tanpa menggunakan uang tunai fisik.
  7. Pelaku usaha yang memanfaatkan media digital untuk memasarkan produknya.
  8. Singkatan dari Financial Technology.
  9. CRIME Kejahatan di dunia maya yang bertujuan mencuri data atau informasi penting.
  10. Bentuk keamanan data yang mengubah informasi menjadi kode rahasia.

20 Clues: Istilah untuk dompet digital.Matauang kripto yang paling populer.Singkatan dari Financial Technology.Singkatan untuk Pembayaran Non Tunai.Metode otentikasi menggunakan sidik jari atau wajah.Konsumen yang melakukan pembelian secara daring (online).BANKING Penggunaan teknologi mobile untuk layanan keuangan....