cyber security Crossword Puzzles
FIRE / SEXTING / CYBER BULLYING 2015-09-09
Across
- Cyber bullying and ..... are new concepts affecting youth
- Can happen to you if you extinguish fire with water
- Doors and ...... should be used as exit points in fire
- Acronym used to remember how to use fire extinghuiser
Down
- To be practiced at home and school in case of fire
- In case of fire, with no smoke, go towards escape route .....
- Children should not play with matches and ..., it causes fire
- Sexting messages may be classified as child ......
- Stay low in case of fire and crawl on hands and .....
- How many times a year fire drills should be practiced
10 Clues: To be practiced at home and school in case of fire • Sexting messages may be classified as child ...... • Can happen to you if you extinguish fire with water • Stay low in case of fire and crawl on hands and ..... • How many times a year fire drills should be practiced • Acronym used to remember how to use fire extinghuiser • ...
CyberSecurity Puzzle 2024-06-06
Across
- __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
- SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
- OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
- EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
- CYBER ATTACK CAN CAUSE HUGE ____________
- IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
- IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
- HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
- MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
- ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.
10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________ • SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION. • OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL. • IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION. • ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS. • ...
Emerging careers 2025-05-13
Across
- Using big data insights to drive strategic financial decisions
- When companies can't pay debts, CAs in this field handle restructuring proceedings
- Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
- CAs provide funding, compliance, and scaling advice to these new ventures
- Accounting specialty investigating financial fraud and disputes
- Environmental, Social, Governance framework CAs use to assess sustainability reporting
Down
- Digital assets requiring specialized tax and regulatory expertise from modern CAs
- Ensuring adherence to laws and regulations like GST or SEBI guidelines
- Assessment and management of financial, operational or cyber threats
- Corporate combinations where CAs perform financial due diligence
10 Clues: Using big data insights to drive strategic financial decisions • Accounting specialty investigating financial fraud and disputes • Corporate combinations where CAs perform financial due diligence • Assessment and management of financial, operational or cyber threats • Ensuring adherence to laws and regulations like GST or SEBI guidelines • ...
cyberbullying 2025-06-19
Across
- something on the internet mostly on social media like youtube
- something two or more people can do to you
- someone who helps the bully or ignores the problem
- something on the internet that has almost all you info
- a person who makes people feel bad on the internet
Down
- someone who shares kind words and fights off the bully
- something that people play games on or go on social media
- a person who try's to find your info online
- related to computers
- is a option you can chose if you feel unsafe or if your being cyberbullied
10 Clues: related to computers • something two or more people can do to you • a person who try's to find your info online • someone who helps the bully or ignores the problem • a person who makes people feel bad on the internet • someone who shares kind words and fights off the bully • something on the internet that has almost all you info • ...
Industry 5.0 2025-01-21
Across
- A global network that connects smart devices and systems
- A major goal of Industry 5.0 focusing on reducing waste
- Robots designed to work alongside humans
- Technology that allows humans to interact with machines via speech or gestures
- Machines and systems that can learn and make decisions
- The integration of digital and physical systems in manufacturing
Down
- Industry 5.0 promotes this environmental concern in manufacturing
- A key technology that enables secure and transparent transactions
- A key concept of Industry 5.0 that focuses on human-centered approaches
- The process of using data to make better decisions
10 Clues: Robots designed to work alongside humans • The process of using data to make better decisions • Machines and systems that can learn and make decisions • A major goal of Industry 5.0 focusing on reducing waste • A global network that connects smart devices and systems • The integration of digital and physical systems in manufacturing • ...
teach 2025-09-07
Across
- Prefix for anything involving virtual or digital threats.
- Online test to tell humans from bots — often asks you to “spot the traffic light” .
- Microsoft’s OS that introduced the Start menu.
- A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
- The annoying lag between click and response (7).
- The coder’s social network for sharing repos (6).
Down
- Microsoft’s old web browser — or the Windows file manager.
- The digital ledger tech behind Bitcoin and more.
- Coffee-inspired programming language once said to “run everywhere” (4).
- Open-source OS mascot is a penguin named Tux (5).
10 Clues: Microsoft’s OS that introduced the Start menu. • The digital ledger tech behind Bitcoin and more. • The annoying lag between click and response (7). • Open-source OS mascot is a penguin named Tux (5). • The coder’s social network for sharing repos (6). • Prefix for anything involving virtual or digital threats. • ...
The Cyber Word Hunt 2025-10-22
Across
- : Field concerned with protecting systems and data from online attacks
- : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
- : The act of checking and improving quality in AML processes
- : Cyber attack that tricks users into revealing personal info via fake emails
- : The shift from traditional banking to online banking is called digital ___
Down
- : Process of verifying user identity before accessing an online account
- : Sending money electronically through a banking app
- : Device most commonly used to access digital banking apps
- : A new generation of online-only banks with no physical branches
- : Department that manages IT risk, compliance, and governance
10 Clues: : Sending money electronically through a banking app • : Device most commonly used to access digital banking apps • : The act of checking and improving quality in AML processes • : Department that manages IT risk, compliance, and governance • : A new generation of online-only banks with no physical branches • ...
xFi Crossword Puzzle 2019-01-09
Across
- speed required for xfi advantage
- amount of data included in xFi advantage
- uses a radio frequency signal instead of wires to connect your devices
- device that converts data so that it can be transmitted from computer to computer over telephone wires
Down
- delivers a smarter, more personalized security solution for your home network
- feature that includes equipment, unlimited data and security
- pods devices that can be paired with a compatible xFi Gateway to create a mesh WiFi network in the home
7 Clues: speed required for xfi advantage • amount of data included in xFi advantage • feature that includes equipment, unlimited data and security • uses a radio frequency signal instead of wires to connect your devices • delivers a smarter, more personalized security solution for your home network • ...
Vocabulary words of Computer 2021-10-06
Across
- stands for random access memory and it is a memory stored in that you can modify and edit it and it is sometimes used to store working data and machine codes.It stores the information you are using on your computer actively.
- is a small device that has flash memory that is to store data and it can also transfer the data to another computer
- stands for local area network and it is a network that is in areas like school and the computers can connect and share information
- It’s a device that can get connected to your computer and you use it with your computer
- it’s like trash emails that a person sends to many people and the person advertises hoping the receiver will buy the item.
- stands for wide area network and it is a big network and allows you to share information and communicate from computers to computers in other locations.
- makes your computer perform better and it is fast.
- it is when you have permission to copy from the owner.
- known as Universal serial bus and you can transfer or take your data and connect to other peripheral devices
- is a website were the community of users can edit and add content.For example google something random you will see Wikipedia with it and its loaded with information about the thing you googled
Down
- It is getting unauthorized data like passwords, private information, from other people in a computer or device.Or it can be exploiting in games using hacks.
- it is a security device that protects your computer making sure no suspicious things enter or cyber-attacks.
- stands for solid state driver is a storage and stores data persistently
- Fair use gives permission to use copyrighted work for a group of people without the work owner’s permission but only for uses like teaching, research, news report, and more.
- the rules for an acceptable way that you are going to use the internet.
- keeps your data and network safe from viruses or threats.
- is a recognizable area of a bigger program.
- it is copying someone's work and claiming that you made it and it was your idea.
- stands for central processing unit and it is the part of the computer that recovers and executes instructions.
- known as Hard disk drive and it is a type of storage thats in your computer and it can store and retrieve data they store like software programs and some other files
20 Clues: is a recognizable area of a bigger program. • makes your computer perform better and it is fast. • it is when you have permission to copy from the owner. • keeps your data and network safe from viruses or threats. • stands for solid state driver is a storage and stores data persistently • the rules for an acceptable way that you are going to use the internet. • ...
Dystopia Escape Room Crossword puzzle 2022-01-15
Across
- Term for mega-technological genre: “cyber-__________”.
- Biased information used to promote a political point of view.
- Type of government that has total control over people’s lives.
- Opposite of individuality.
- A dystopia typically exists as an __________ of a perfect world.
- The word “utopia” was created from 2 __________ words, eutopia & outopia.
Down
- Utopia was originally named for a fictional __________.
- Kim Jong-Un is practically worshipped by citizens, making him the figure ________ of North Korea.
- Opposite of dystopia.
- Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of a dystopian __________.
- Dystopian literature takes a current trend to the __________.
- Propaganda creates an emotional response as opposed to a __________ response.
- Dystopias often occur after an __________ event like a plague or nuclear warfare.
- Sir Thomas __________
- A dystopian government often uses mass __________ to spy on its citizens.
15 Clues: Opposite of dystopia. • Sir Thomas __________ • Opposite of individuality. • Term for mega-technological genre: “cyber-__________”. • Utopia was originally named for a fictional __________. • Dystopian literature takes a current trend to the __________. • Biased information used to promote a political point of view. • ...
The Time Machine Chapter 3- Crossword Puzzle 2021-02-17
10 Clues: nüfus • dikey • tarım • açıklama • mantıklı • geliştirmek • tanımak, bilmek • güvenlik, emniyet • gök gürültülü fırtına • (bir yerde) oturmak, işgal etmek
The Functions Performed Within Communication Systems 2021-07-07
10 Clues: data • mediums • decodes • sending • security • common clock • protocol levels • interface, transmitter • server, user's identity • sender to receiver, creation
Looking for words 2024-02-05
Food Security BC 2022-10-27
Across
- Plants grown for their produce
- Animals which are grown for their produce
- used in pesticide and fertilizers, oftentimes harmful towards the environment
- Interaction among companies, people and governments
- Where the city meets the rural area
- ... farming: farming in the city
Down
- same definition as healing, 'replenishing'
- A device invented to take photos of leftovers and notify people when there are leftovers so food isn't wasted
- an organization which donates leftover uneaten food from events such as the superbowl to homeless shelters and the people in need
- ... produce: produce grown near/close to the market(s) it ships to, so the food is fresh (but often rots quickly)
10 Clues: Plants grown for their produce • ... farming: farming in the city • Where the city meets the rural area • Animals which are grown for their produce • same definition as healing, 'replenishing' • Interaction among companies, people and governments • used in pesticide and fertilizers, oftentimes harmful towards the environment • ...
Privacy and Security 2019-09-30
Across
- Covered Entity Service Provider (1st Word)
- ___________ Identifiable Information
- Cybercrime (e.g., action request by email)
- Unauthorized access of PHI (non-breach)
- __________ Health Information
- PHI Law
- Altarum PHI Oversight Body
Down
- Form of Secure Electronic Submission
- Covered Entity Service Provider (2nd Word)
- Secret Word (unlocks computer)
10 Clues: PHI Law • Altarum PHI Oversight Body • __________ Health Information • Secret Word (unlocks computer) • Form of Secure Electronic Submission • ___________ Identifiable Information • Unauthorized access of PHI (non-breach) • Covered Entity Service Provider (2nd Word) • Covered Entity Service Provider (1st Word) • Cybercrime (e.g., action request by email)
SECURITY AND VIRUSES 2013-05-01
Across
- software program that displays advertising on your computer
- Programming language that allows applets to run within a web browser
- is a file or program other then a virus that is potentially harmful
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
- program written with malicious intent and sent out by attackers
Down
- Events or attacks that remove, corrupt, deny access, allow access, or steal information
- technically a worm
- , is software designed specifically to detect, disable, and remove viruses
- Technology created by Microsoft to control interactivity on web pages
- self-replicating program that is harmful to networks
10 Clues: technically a worm • self-replicating program that is harmful to networks • software program that displays advertising on your computer • program written with malicious intent and sent out by attackers • is a file or program other then a virus that is potentially harmful • Programming language that allows applets to run within a web browser • ...
Information Security Crossword 2017-01-13
Across
- A secret series of characters used to authenticate a person’s identity.
- A person who uses computers to gain unauthorized access to computer systems and networks.
- Anything that has the potential to cause serious harm to a computer system.
- You may not divulge this information while you are working for an employer or after you leave.
Down
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
- A type of malware that is often disguised as legitimate software.
- A flaw or weakness that can be used to attack a system or organization.
- Personal information related to personal data stored on computer systems
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • Personal information related to personal data stored on computer systems • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- A piece of digital information generated by a web server and saved in your computer after visiting a website
- A network using which things can communicate with each other using internet as means of communication between them.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- An attempt by hackers to damage or destroy a computer network or system.
- A software that is designed to detect and destroy compute viruses.
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
Network Security Commands 2022-04-25
Across
- Authenticates the vty line against the local database.
- Configure the IP domain name of the network by using the global configuration mode.
- Enables vty inbound SSH sessions
- Generates a key to encrypt SSH traffic
- Disables an inactive privileged EXEC mode access after a specified amount of time.
- Sets a minimum acceptable password length
Down
- Encrypts all plaintext passwords.
- Shows the services or ports that are on by default.
- Deters brute-force password guessing attacks.
- Verifies or creates a local database entry.
10 Clues: Enables vty inbound SSH sessions • Encrypts all plaintext passwords. • Generates a key to encrypt SSH traffic • Sets a minimum acceptable password length • Verifies or creates a local database entry. • Deters brute-force password guessing attacks. • Shows the services or ports that are on by default. • Authenticates the vty line against the local database. • ...
FNaF Security Breach 2023-08-11
10 Clues: Your guardian • I smell pizza! • A security guard • Narcissistic fox • Psycho rabbit lady • He always comes back • A broken ex-guitarist • A funny daytime jester man • The guitarist's replacement • A funny nighttime jester man
SPECIAL SECURITY PUZZLE 2023-08-17
10 Clues: 702-254-2303 • NO SOLICITING • EMERGENCY LIGHT • EIGHTSIDED SIGN • LIFELINE FOR PET • NIGHTTIME DETERRENT • SEE OUTSIDE THE DOOR • SAFEST PLACE FOR CAR • TOP SPEED IN SUN CITY • KEEP GARAGE DOOR_____
SECURITY AWARENESS PUZZLE 2023-09-20
Across
- Acronym for Communications Security
- An orange stripe on an visitor's badge indicates that the visitor is a
- If an unauthorized individual has seen classified material the the material has been?
- Classified material must NEVER be left
- Acronym for Department of Defense?
Down
- Name of the area in a facility where classified computer equipment is openly stored (two words)
- This must be worn at all times when entering, exiting and within all company locations
- Acronym for the Federal Bureau of Investigation
- Visitors must have an ___ at all times
- Access to classified information requires a clearance and a (3 words)
10 Clues: Acronym for Department of Defense? • Acronym for Communications Security • Visitors must have an ___ at all times • Classified material must NEVER be left • Acronym for the Federal Bureau of Investigation • Access to classified information requires a clearance and a (3 words) • An orange stripe on an visitor's badge indicates that the visitor is a • ...
Platfom security crossword 2023-09-15
Across
- , helps to prevent unauthorized access to data on lost or stolen computers by combining
- boot , Measured Boot measures all important code and configuration settings during the boot of Windows.
- , the process responsible for secure logon.
- , linux uses this technique to define the priority of processes
- ,The core of OS and has complete control over everything in the system.
Down
- Network Authentication protocol based on trusted third party to authenticate server and client.
- , processes running in the background, started by the kernel itself.
- , a real-time operating system used in mission-critical applications
- , one method to block buffer overflow attacks
- ,a connection used to exchange data between the processes.
10 Clues: , the process responsible for secure logon. • , one method to block buffer overflow attacks • ,a connection used to exchange data between the processes. • , linux uses this technique to define the priority of processes • , processes running in the background, started by the kernel itself. • , a real-time operating system used in mission-critical applications • ...
Network security management 2024-03-21
Across
- Tools for monitoring and analyzing network traffic
- A mechanism for verifying user identity
- A system for detecting abnormal network behavior
- Protocol for encrypted data transmission
- Technologies to prevent the spread of malicious software
Down
- Technologies used to protect data transmission in networks
- Practice of protecting computer networks from unauthorized access
- A Strategy for Restricting Network Resource Access
- Provide a secure channel for remote access to network devices
- A device for detecting and blocking network attacks
10 Clues: A mechanism for verifying user identity • Protocol for encrypted data transmission • A system for detecting abnormal network behavior • Tools for monitoring and analyzing network traffic • A Strategy for Restricting Network Resource Access • A device for detecting and blocking network attacks • Technologies to prevent the spread of malicious software • ...
HIPAA Security Training 2024-03-15
Across
- Used to protect accounts and information
- Protection against unauthorized access
- Process to secure data
- Permission by individuals for use of their PHI
- Health Insurance Portability and Accountability Act
Down
- Adherence to laws and regulations
- Right of individuals to keep their information secure
- Unauthorized access/disclosure of PHI
- Protected Health Information
- Notifying appropriate entities about breaches
10 Clues: Process to secure data • Protected Health Information • Adherence to laws and regulations • Unauthorized access/disclosure of PHI • Protection against unauthorized access • Used to protect accounts and information • Notifying appropriate entities about breaches • Permission by individuals for use of their PHI • Health Insurance Portability and Accountability Act • ...
Security Crossword Puzzle 2024-05-16
Across
- there is a right and ______ way to lift properly and prevent back injuries.
- _____ offers a year-round discount to all Great Wolf Pack Members on these shoes.
- Balancing work with our personal lives and responsibilities can sometimes take a toll on our _____ health.
- The biggest _____ when it comes to stretching is not holding the stretch long enough.
Down
- It only takes how many bad lifts to potentially seriously injure yourself?
- What should you check on your shoes frequently?
- Keep the object you are lifting _____ to your body.
- Do NOT lift with your back ______?
- Slip, _____, and fall incidents can result in serious injury and are the most common cause of workplace injuries at Great Wolf.
- Do not _____ while lifting objects.
10 Clues: Do NOT lift with your back ______? • Do not _____ while lifting objects. • What should you check on your shoes frequently? • Keep the object you are lifting _____ to your body. • It only takes how many bad lifts to potentially seriously injure yourself? • there is a right and ______ way to lift properly and prevent back injuries. • ...
Information Security Essentials 2025-04-28
Across
- Program untuk mendeteksi dan menghapus malware
- Aturan organisasi untuk keamanan informasi
- Melindungi informasi dari akses yang tidak sah
- Informasi selalu dapat diakses saat dibutuhkan
Down
- Penipuan untuk mencuri data via email/SMS/telepon
- Aset berharga yang harus dilindungi
- Kata sandi yang sulit ditebak
- Menjaga informasi agar tidak diubah secara ilegal
- Aplikasi untuk menyimpan kata sandi dengan aman
- Tindakan saat temukan aktivitas mencurigakan
10 Clues: Kata sandi yang sulit ditebak • Aset berharga yang harus dilindungi • Aturan organisasi untuk keamanan informasi • Tindakan saat temukan aktivitas mencurigakan • Program untuk mendeteksi dan menghapus malware • Melindungi informasi dari akses yang tidak sah • Informasi selalu dapat diakses saat dibutuhkan • Aplikasi untuk menyimpan kata sandi dengan aman • ...
Mobile Security Quiz 2025-09-15
Across
- (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.
- (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.
- (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.
- (9) | Collecting data remotely from devices to monitor performance or security status.
- (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.
Down
- (7) | An isolated environment restricting app access to the broader system to contain threats.
- (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.
- (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.
- (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.
- (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.
10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status. • (7) | An isolated environment restricting app access to the broader system to contain threats. • (8) | Software that mimics a physical mobile device to test app behavior in a safe environment. • ...
Mobile Security Quiz 2025-09-15
Across
- (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.
- (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.
- (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.
- (9) | Collecting data remotely from devices to monitor performance or security status.
- (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.
Down
- (7) | An isolated environment restricting app access to the broader system to contain threats.
- (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.
- (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.
- (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.
- (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.
10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status. • (7) | An isolated environment restricting app access to the broader system to contain threats. • (8) | Software that mimics a physical mobile device to test app behavior in a safe environment. • ...
Information Security Challenge 2025-12-01
Across
- An individual who uses technical skills to gain unauthorized access to systems or data.
- The potential for loss or damage when a threat exploits a vulnerability.
- Restricting access to resources based on user identity and permissions.
- Double-check before you enter—password plus token.
- Ensuring that data remains accurate, consistent, and unaltered.
Down
- Writing software in a way that prevents security vulnerabilities.
- Ensuring that systems and data are accessible when needed by authorized users.
- Any circumstance or event with the potential to harm systems or data.
- GDPR and HIPAA aim to ensure this
- Gaining unauthorized physical access by following an authorized person into a secure area.
10 Clues: GDPR and HIPAA aim to ensure this • Double-check before you enter—password plus token. • Ensuring that data remains accurate, consistent, and unaltered. • Writing software in a way that prevents security vulnerabilities. • Any circumstance or event with the potential to harm systems or data. • ...
Security Awareness Spotlight 2025-06-04
Across
- For device maintenance, you should uninstall_______ apps from your devices.
- The event automatically logs _______ minutes per mission as volunteer time.
- To verify identities during emergencies, families should establish a unique _______ or phrase
- Browser maintenance includes clearing_______ and cookies.
- One of the missions is called "_______ boost", which involves securing your Wi-Fi network
- For account security, you should enable_______ authentication on critical accounts
- You should regularly update your devices'_______ systems and apps.
Down
- The TELUS Days of Giving event invites you to host a "_______ Party" with family and friends.
- You should _______ yourself to see what information is publicly available.
- To check if your data has been compromised, you can scan your email for _______ web breaches.
10 Clues: Browser maintenance includes clearing_______ and cookies. • You should regularly update your devices'_______ systems and apps. • You should _______ yourself to see what information is publicly available. • For device maintenance, you should uninstall_______ apps from your devices. • The event automatically logs _______ minutes per mission as volunteer time. • ...
July Security Sightline 2025-07-07
Across
- Stay _____ in public spaces, especially at large gatherings or events
- Practice, tactics, techniques & strategies used to combat or eliminate terrorism
- ____ is Antiterrorism Month
- Scott _____ Kartvedt - Former Blue Angel
Down
- End on a Positive Note "___ TO BE HERE"
- Only as a last resort
- See Something,____ Something
- If escape isn't possible - stay quiet and out of sight
- RGi's Rubber Mascot
- If you can escape safely
10 Clues: RGi's Rubber Mascot • Only as a last resort • If you can escape safely • ____ is Antiterrorism Month • See Something,____ Something • End on a Positive Note "___ TO BE HERE" • Scott _____ Kartvedt - Former Blue Angel • If escape isn't possible - stay quiet and out of sight • Stay _____ in public spaces, especially at large gatherings or events • ...
Security Code East 2025-07-09
10 Clues: Begone! • Happy cat! • Turkey dinner • What most of us are • What one might do to hair • Will leave your fingers stained • An essential for an art student • In between acrylic and watercolor • What one might need a cleanser for • A descriptor for say, Arnold Schwarzenegger
HIPAA Privacy & Security 2025-08-25
Across
- Documenting for services not provided.
- Keeping client information from being shared.
- When personal benefit interferes with duty.
- Anonymous channel for ethical reporting.
Down
- Accurate and complete ___ is required for compliance.
- Sharing PHI improperly is a HIPAA ___.
- Making decisions with integrity.
- Speaking up about wrongdoing.
- To speak up against wrongdoing.
- Law banning referral incentives
10 Clues: Speaking up about wrongdoing. • To speak up against wrongdoing. • Law banning referral incentives • Making decisions with integrity. • Documenting for services not provided. • Sharing PHI improperly is a HIPAA ___. • Anonymous channel for ethical reporting. • When personal benefit interferes with duty. • Keeping client information from being shared. • ...
Antivirus 2022-12-09
Pay Checks 2021-09-29
Across
- collects federal taxes to pay for public services
- the most common method of payment
- methods to pay employees
- money is electronically loaded onto a plastic card
- employee withholding allowance certificate
- The national health care program for the elderly and is 1.45%
- The nation's retirement program and is 6.2%
- compulsory charges imposed on citizens by local, state and federal governments
Down
- is the easiest way to get paid
- the length of time for which an employee's wages are calculated
- Is a retirement program you can make contributions to
- The amount of money left after all deductions have been withheld
- on the W-4 are used to calculate the amount of federal taxes withheld from your paycheck
- are associated with using a payroll card
- The total amount of money earned during a pay period before deductions
- a document included each pay period which outlines paycheck deductions
- Includes 2 separate taxes, social security, and medicare
- you must be a documented worker in order to be eligible to work in the United States
- Employment Eligibility Verification Form
19 Clues: methods to pay employees • is the easiest way to get paid • the most common method of payment • are associated with using a payroll card • Employment Eligibility Verification Form • employee withholding allowance certificate • The nation's retirement program and is 6.2% • collects federal taxes to pay for public services • ...
Stock Market 2023-04-26
Across
- The Federal Deposit Insurance Corporation
- A security that gives a of ownership of a company
- Owners/part-owners of a company not involved with running the buisiness
- Money left over after paying for any expenses
- A market where securities are bought and sold
- Company's ability to convert assets to cash or acquire cash
- The value of financial assets increases over time
Down
- Uncertainty with respect to one's investments
- The cost of an item/security
- An agreement to provide you a future equity stake based on the amount you invested
- Increase in price, usually in securities/stocks
- An instrument in which a person can either make investment, borrow money, or save money
- The process of buying assets that increase or decrease in value over time and provide returns
- Decrease in price, usually in securities/stocks
- Distribution of a company's earnings to its shareholders
- State, act, or right of owning something
- A single company that has a controlling interest in another company or companies
- Issued by government when they want to raise money
- Unit of equity ownership in a corporation
19 Clues: The cost of an item/security • State, act, or right of owning something • The Federal Deposit Insurance Corporation • Unit of equity ownership in a corporation • Uncertainty with respect to one's investments • Money left over after paying for any expenses • A market where securities are bought and sold • Increase in price, usually in securities/stocks • ...
A word Maze : Facility Management & Corporate Real Estate 2024-01-16
Across
- A term for the physical location of a property
- A type of real estate that includes warehouses and factories
- A professional who advises on property transactions
- A term for the usable space in a building
- A professional responsible for managing all aspects of a building
- The process of planning for future facility needs
- A type of contract for the use of a property
- A type of maintenance performed to avoid breakdowns
- A term for the income a property generates after expenses
- A type of real estate that includes apartment buildings
Down
- A type of real estate that includes shopping centers and restaurants
- A term for the day-to-day maintenance of a building
- A term for the ongoing costs of operating a building
- The process of maximizing the value and usage of a property
- The process of ensuring a facility complies with regulations
- The cost of using a property, often expressed per square foot
- The process of managing a property’s energy usage
- A type of real estate that includes office buildings
- The process of overseeing a property’s security measures
- A document that outlines the terms and conditions of a property lease
20 Clues: A term for the usable space in a building • A type of contract for the use of a property • A term for the physical location of a property • The process of managing a property’s energy usage • The process of planning for future facility needs • A term for the day-to-day maintenance of a building • A professional who advises on property transactions • ...
wow 2022-09-12
Across
- A secret word or phrase that is used to access a computer system or service
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- Customizable additions to software for extra functionality.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- The deliberate use of someone else's identity, typically for financial gain.
- A simple form of code for software that can be written in word editors.
- Hacking that is meant to do minimal damage and is usually done out of curiosity.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- When an attacker inputs many passwords in the hope that it is eventually guessed correctly.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
Down
- Software that has their code listed as free to use, share, and modify.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- Admin control: Having _____ control of any given system.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Software that can only be run for a limited amount of time before it expires.
- A previously unknown, bug, flaw, or backdoor in software. An attack happens once this flaw is exploited and attackers release malware before the flaw can be patched.
- The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
20 Clues: Admin control: Having _____ control of any given system. • Customizable additions to software for extra functionality. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service • ...
HAPPY BIRTHDAY TANNER! 2024-02-15
14 Clues: 38? • peak • slugs • startle • "DARN!" • security • bullseye • what skiers wear • rhymes with cammo • "home, home on the..." • smaller than a mountain • Barbie's favorite color • "Joe of old time bubblegum" • what you might want to wear to a rap concert
cyber safety 2017-04-25
6 Clues: a word used for electronics • worldwide of computer networks • a message sent from electronics • when a person writes something online • an application that lets you in a game or internet • a application on the web that locates,retrieves, and displays information
Cyber Safety 2023-05-22
6 Clues: Being Safe and Responsible Online • A code used to prove your identity • Someone who is mean or aggressive online • Posting rumours online ruining someone's Reputation • Someone who pretends to be someone else to get money • A hack or Hacker Forcing something bad onto a computer
Cyber Hygiene 2024-03-06
Across
- A string of characters that allows access to a computer system or service.
- A security method that requires two forms of identification to access resources and data.
- A set of practices users take to improve their online security.
Down
- A type of scam that uses email or websites to trick victims.
- Malicious activities on digital systems or network.
- A scam that involves a victim to be tricked by a fake online identity.
6 Clues: Malicious activities on digital systems or network. • A type of scam that uses email or websites to trick victims. • A set of practices users take to improve their online security. • A scam that involves a victim to be tricked by a fake online identity. • A string of characters that allows access to a computer system or service. • ...
cyber mobbing 2024-04-15
6 Clues: wie heißt ein gefälschtes profil? • wie heißt mobbing übers Internet? • wo passiert am meisten cybermobbing? • wie heißt die notrufnummer für hilfe? • in welchem land ist cybermobbing seid 2016 strafbar? • auf was solltest du achten um deinen account von hackern zu schützen?
Cyber Wellness 2023-02-01
6 Clues: think ______ you do • do not _______ your password • _____ others opinions and privacy • you can share you password with ______ friends • you need to have trust before you _____ someone • whatever you post online, it will have an ______ on how others think about you
Cyber Ethics 2025-06-07
6 Clues: : Harmful software • : Wireless internet access • : Moral rules for digital use • : A global network of networks • : Local network in a small area • : Sends data between computer networks
Cyber Chase 2025-09-09
Across
- – A type of malicious code that replicates itself.
- – Malicious software that pretends to be legitimate.
- – A person who breaks into computer systems.
Down
- – Self-replicating malware that spreads without user action.
- – Secretly tracks your activity.
- – Shows excessive ads but doesn’t always track data.
6 Clues: – Secretly tracks your activity. • – A person who breaks into computer systems. • – A type of malicious code that replicates itself. • – Malicious software that pretends to be legitimate. • – Shows excessive ads but doesn’t always track data. • – Self-replicating malware that spreads without user action.
Cyber Witch 2025-11-04
Cyber Safety 2025-11-20
6 Clues: Verifying something is real • A fake message trying to steal info • An email designed to look legit but isn’t • The private word/phrase you use to sign in • Someone who protects a company from attacks • Type of hacker hired by companies to test employees
RECAP IND 2023-08-01
Across
- BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
- THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING
- A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
- A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
- A...LIKES TO LEARN FROM DEMONSTRATIONS
- A...LIKES TO BE INTELLECTUALLY CHALLENGED
- A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
- A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOU DO IN THIS CASE?"
- WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
Down
- AN...HAS ACCESS TO THE WHOLE SYSTEM
- WHAT DOES THE D IN MIDAS STAND FOR?
- THIS IS A TYPE OF TRAVEL DOCUMENT
- WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?
- SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
- MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
- IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
- A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURE USING MIDAS
17 Clues: THIS IS A TYPE OF TRAVEL DOCUMENT • AN...HAS ACCESS TO THE WHOLE SYSTEM • WHAT DOES THE D IN MIDAS STAND FOR? • A...LIKES TO LEARN FROM DEMONSTRATIONS • A...LIKES TO BE INTELLECTUALLY CHALLENGED • MACHINE READABLE TRAVEL DOCUMENTS HAVE A... • WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH • THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING • ...
cybersecurity Crossword 2025-10-14
Across
- acts as a security camera which watches for any suspicious activity
- ensuring data is accurate, complete, and secure
- storing data on a device not connected to a network
- used to detect, prevent, and remove any malicious software
- transmits data as pulses of light
- the proccess of proving your identity and ensuring authorization
- a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
- ensuring timely access to information
- two step process to verifying identity
- relies on physical connections, which makes it difficult to hack
- ensures that someone can't unsend anything or deny any action online
- to reduce the potential harm of a threat
- tool which monitora network traffic and blocks off any sort of malicious activity
- stands for confidentiality, integrity, and availability and also means keeping data secret and secure
- ways to verify a user's identity
- the possibility of an unfortunate event occuring
- keeping data private and accessible only to those who are authorized
17 Clues: ways to verify a user's identity • transmits data as pulses of light • ensuring timely access to information • two step process to verifying identity • to reduce the potential harm of a threat • ensuring data is accurate, complete, and secure • the possibility of an unfortunate event occuring • storing data on a device not connected to a network • ...
I.R.F.I.PCRUCIVERBANDO 2024-01-25
NETWORKING CONCEPTS AND CYBER ETHICS . 2025-05-28
Across
- ________ spam filtering / blocking software .
- ___________ refers to criminal activities .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A computer ___________ can be as a group of computers .
- _____________ refers to an illegal intrusion into a computer system or network .
- A network maintained without using wires is called a ___________ network .
- A digital footprint is also known as .
- What is the short form of Local Area Network ?
Down
- _________ topology is connected in circular path .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- What is the short form of Information and communication technology ?
- _____ is a network created for an individual person .
- A ________ is a device that connects two different types of networks with each other .
- A __________ similar to a hub .
- To _________ plagiarism , one can rephrase the material .
- Each computer in a network is called a .
- ______ refers to unwanted bulk email .
18 Clues: A __________ similar to a hub . • A digital footprint is also known as . • ______ refers to unwanted bulk email . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
Spring Firm Meeting 2024 2024-04-09
Across
- BPB was founded in nineteen
- An activity that often uses talents from a variety of departments
- What every company and high net worth family needs
- An area that helps high-net-worth people manage their financial lives
- Where most of the firm’s new business is originated
- A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- A type of organization that serves the community, we do their taxes and audits
- Something BayBridge Real Estate Capital helps clients manage, find or refinance
- What we all aspire to do
- An acronym for a special type of insurance that is tax mitigation tool
- How our HR department helps clients
- He is the CEO and grew up in the firm
- A type of advisory service that helps buyers and sellers of companies
- The largest group in the firm and a typical entry point for multiple services
- Something PWA advisors help client protect
- A software platform MST helps implement at companies
- One approach our tax controversy team takes with the IRS
- A specialty area of PWA
- An acronym for solving repetitive tasks with robotics
- How PWA creates a comprehensive approach
Down
- What many of our MST services entail
- A type of entity that provides tax benefits for manufacturers and distributors that expert products
- Where our first office was located
- What assurance and cyber teams often do
- A lifechanging client event we can help with from planning to tax preparation to estate planning
- A governmental agency that scares of our clients but not us
- Part of the name of several affiliates
- A type of tax credit for manufacturing or product improvement
- One of the firm’s key service areas
- A core value brought to life by our participation in the DCC and Bounce Back from Cancer
- Diversity, equity and blank
- A charity event the firm teams have contributed $2 million to since it started 14 years ago
- Present blank analysis
- Investigating, often in fraud or legal situations
- An area of tax that especially impacts clients with operations in multiple states
- The area of tax services BPB is probably most famous for
- A service that several departments have in their names
- A special type of audit for public companies
- Managed blank and Technology
- Firm members speak in practice in more than this many languages
40 Clues: Present blank analysis • A specialty area of PWA • What we all aspire to do • BPB was founded in nineteen • Diversity, equity and blank • Managed blank and Technology • Where our first office was located • One of the firm’s key service areas • How our HR department helps clients • What many of our MST services entail • He is the CEO and grew up in the firm • ...
Inventions Crossword 2025-10-30
Across
- the _____ Brothers’ first flight occurred in 1903
- the assembly line was introduced by Henry ________________
- airplanes improved trade and global ________________
- the first flight lasted only ______________ seconds__
- computers made it easier to process and access ________________
- the printing press was invented by ________________
- buying and selling online is called e-
- the oven discovered accidentally by Percy Spencer was the ________________
- the first computer (Z1) was invented by Konrad ______________
- the first photograph was taken by Joseph ________________
- the name of Karl Benz’s first car was ________________
- the telegraph was invented by Samuel ________________
- _______ launched in the year 2004
- the television was invented by Philo ________________
- before Facebook, a popular social network was ________________
- the first practical steam engine was built by Thomas ________________
- one modern risk of computers is cyber ________________
- the first mobile phone call was made by Martin ________________
- the inventor who improved the steam engine was James ________________
- the _____ engine was invented in the year 1712
- the radio was invented by Guglielmo ________________
- the first mobile phone was the size of a ________________
- the first automobile was built by Karl ________________
- Gutenberg’s press made books more ________________
- the invention that captures images and memories is the ________________
- the early Internet network was known as ________________
- the first ______ was built in the year 1936
Down
- the radio made mass ________________ possible
- Facebook was created by Mark ________________
- one negative result of industrial steam power was more ________________
- the airplane was invented by the ________________ brothers
- the first major book printed using movable type was the Gutenberg ________________
- steam engines allowed for faster ________________
- the telephone was invented by Alexander Graham ________________
- James Watt added a separate ________________ to improve efficiency
- the inventor of the World Wide Web was Tim ________________
- the light bulb was invented by Thomas ________________
- a light bulb works because of a heated ________________
- _____ stands for the World Wide Web
- Bell’s first words were “Mr. , come here”
- steam engines provided power for early ________________
- one negative result of cars was increased ________________
- the first mobile phone was produced by ________________
- the printing press spread knowledge and improved access to ________________
- the telephone revolutionized long-distance ________________
- the British inventor who also made a light bulb was Joseph ________________
- the first online pages were known as ________________
- the automobile increased personal ________________
- the light bulb was safer than candles because of reduced fire ________________
- the light _____ was invented in the year 1879
- Facebook originally started as a platform limited to ________________ students
51 Clues: _______ launched in the year 2004 • _____ stands for the World Wide Web • buying and selling online is called e- • Bell’s first words were “Mr. , come here” • the first ______ was built in the year 1936 • the radio made mass ________________ possible • Facebook was created by Mark ________________ • the light _____ was invented in the year 1879 • ...
Sundong Air 2025-07-11
CHINA VS USA TIKTOK WARS 2024-09-26
Across
- Platforms like TikTok that engage users worldwide.
- A security system used to protect against external threats.
- TikTok's CEO who testified before the U.S. Congress.
- The economic conflict between the U.S. and China impacting technology companies.
- The tech company that controls TikTok.
- and data collection, often a concern in Chinese platforms.
- A popular video-sharing app owned by Chinese company ByteDance.
- The country where TikTok’s parent company is based.
- The U.S. legislative body involved in TikTok discussions.
- Concerns about TikTok shaping public opinion or politics.
Down
- The idea of controlling digital infrastructure within a country.
- A set of rules TikTok uses to suggest personalized content.
- Moderation The practice of managing what is shared on social media platforms.
- Information that TikTok collects from its users.
- A major concern for the U.S. government regarding TikTok’s operations.
- What the U.S. government has considered for TikTok.
- Control over content, especially associated with Chinese media.
- A key issue raised in the U.S. regarding TikTok’s data collection.
- The Chinese parent company of TikTok.
- The control or possession of a company, questioned in the TikTok debate.
20 Clues: The Chinese parent company of TikTok. • The tech company that controls TikTok. • Information that TikTok collects from its users. • Platforms like TikTok that engage users worldwide. • What the U.S. government has considered for TikTok. • The country where TikTok’s parent company is based. • TikTok's CEO who testified before the U.S. Congress. • ...
The Functions Performed Within Communication Systems 2021-07-07
11 Clues: data • origin • decodes • mediums • security • common clock • protocol levels • interface, transmitter • server, user's identity • sent by the sender to receiver • bringing something to existence
cocoa deals 2022-01-10
11 Clues: housing act • conservation • Steagall banking • owner's loan act • conservation corps • banking relief act • work administration • works administration • progress administration • security administration • industrial recovery administration
Empathy and Violence 2021-02-04
Across
- number of habits of an empathetic person
- Second H in the HA-HA-SO model
- the capacity to understand or feel what another person is experiencing
- The s in the HA-HA-SO model
- a way to increase Self-Esteem
- an individual's subjective evaluation of their own worth.
- This type of bullying happens online
Down
- someone who may shape your self esteem, starts with P
- a person who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
- First A in the HA-HA-SO model
- The O in the HA-HA-SO model
- someone who may shape your self esteem, starts with F
- Second A in the HA-HA-SO model
- First H in the HA-HA-SO model
- This type of bullying may be punches
- This type of bullying uses words
16 Clues: The O in the HA-HA-SO model • The s in the HA-HA-SO model • First A in the HA-HA-SO model • First H in the HA-HA-SO model • a way to increase Self-Esteem • Second A in the HA-HA-SO model • Second H in the HA-HA-SO model • This type of bullying uses words • This type of bullying may be punches • This type of bullying happens online • number of habits of an empathetic person • ...
Dystopian Escape Room 2020-04-23
Across
- opposite of dystopia
- Kim Jong-Un is practically worshipped by citizens, making him the __________ of North Korea
- The word “utopia” was created from 2 __________ words, eutopia & outopia
- A dystopian government often uses mass __________ to spy on its citizens
- Term for mega-technological genre: “cyber-__________”
- Type of government that has total control over people’s lives
- Opposite of individuality
- __________
Down
- #7 down was originally named for a fictional __________
- Dystopias often occur after an __________ event like a plague of nuclear warfare
- Dystopian literature takes a current trend to the _____
- Sir Thomas __________
- A dystopia typically exists as an __________ of a perfect world
- The answer to #15 across serves to create an emotional response as opposed to a __________ response
- Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of
- Biased information used to promote a political point of view
16 Clues: __________ • opposite of dystopia • Sir Thomas __________ • Opposite of individuality • Term for mega-technological genre: “cyber-__________” • #7 down was originally named for a fictional __________ • Dystopian literature takes a current trend to the _____ • Biased information used to promote a political point of view • ...
Understand & Taking A Stand Against Bullying 2024-05-30
Across
- Position or rank in relation to others.
- An act of physical harm or injury to another person.
- Behavior directed at another person that is unwanted and unwelcome.
- Belief in one's own abilities.
- To communicate through words or gestures the intent to harm another person.
- Set apart from others; alone.
- Having to do with or involving computers or other online technology.
- To refuse to admit; to force out.
- Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
- People of the same age, or close in age, who are similar in many ways.
- To keep from happening or existing.
Down
- Boldly hostile; quarrelsome.
- Related to words and speech.
- The result or outcome of an action or event.
- Done on purpose; planned or deliberate.
- Confident and self-assured.
16 Clues: Confident and self-assured. • Boldly hostile; quarrelsome. • Related to words and speech. • Set apart from others; alone. • Belief in one's own abilities. • To refuse to admit; to force out. • To keep from happening or existing. • Position or rank in relation to others. • Done on purpose; planned or deliberate. • The result or outcome of an action or event. • ...
Cyberbullying via Social Media 2024-10-31
Across
- a lighthearted way to defuse a mean situation
- popular social media app with integrated "Here for you"
- protect this and change it immediately if anyone finds it out for your cyber safety and privacy
- cyberbullying has caused almost double the attempts of this
- type of thinking required to decide if something is real or not online
- Australia's ranking in 'countries with the highest level of bullying'
- sharing someones personal identity without their consent
- recommended site to report bullying
Down
- type of bystander to call out when witnessing bullying
- what you should do before you post
- type of cyberbullying for sharing private information about someone without their consent
- the 4th S in KidsHelpline's '4S' steps
- percent of teens without access to a cell phone
- trending social media app with a wellbeing guide
- intimate messaging type putting you at risk of blackmail or image-abuse
- reason for cyberbullying which can be benign or toxic
16 Clues: what you should do before you post • recommended site to report bullying • the 4th S in KidsHelpline's '4S' steps • a lighthearted way to defuse a mean situation • percent of teens without access to a cell phone • trending social media app with a wellbeing guide • reason for cyberbullying which can be benign or toxic • ...
class puzzle 2023-08-22
Across
- the act of taking over other electronics
- the amount of time it takes to get a action done
- the act of bullyng on the enternet
- a two word virus named was a computer worm designed to exploit major flaws in Microsoft’s Internet Information Services web server.
- the sexueal
- the most dangerious virus first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites.
- what you need to sign in
- worm was not just a worm that could replicate itself but also a Trojan horse, or malware disguised as a harmless program.
- a facebook virus that was named after a snack made of flower egg and chocolate
- a person employed to look after technical equipment or do practical work in a laboratory.
- the "cells" of a webcite
- theact of making electronics work
Down
- another computer worm, targeted machines with Windows XP and Windows 2000 operating systems in 2004. It spread quickly through a vulnerability in the Local Security Authority Subsystem Service, which is responsible for managing user logins and credentials. The worm caused millions of PCs to blue screen and crash, which led many businesses to shut down their networks until the infection was dealt with.
- was designed to encrypt files on infected computers and demand a ransom from its victims. However, the malware was unique in that it spread rapidly throughout computer networks by exploiting vulnerabilities in outdated Windows operating systems.
- the location of informaiton
- the worst malware in history, causing more than $38 billion worth of damages in 2004. Like Sobig, it was another type of mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.
- a virus named after the greek god of lightning
- malware appeared in October 2001. It had the capability to exploit buggy Microsoft email clients and spread itself to everyone in a user’s Outlook address book.
- computer worm discovered in 2010, spreading via corrupted USB drives and was predominantly used in cyber warfare. The malware targeted industrial control systems used to control nuclear power plants and other industrial facilities.
- good hacker it is 2 words no space
- bad hacker it is 2 words no space
- also known as the love letter or the LoveBug virus, was first discovered in May 2000.
- the way to get to a web sight
- a bad program
- most vaulable player
25 Clues: the sexueal • a bad program • most vaulable player • what you need to sign in • the "cells" of a webcite • the location of informaiton • the way to get to a web sight • bad hacker it is 2 words no space • theact of making electronics work • the act of bullyng on the enternet • good hacker it is 2 words no space • the act of taking over other electronics • ...
Title 2017-01-23
Across
- an instrument used to encumber land as a security for a debt (Non-Judicial States)
- date the county has verified their records through
- total amount paid during a transfer of land
- a map representing a piece of land subdivided into lots
- road map to final policy
- IE. A property in Maryland requiring yearly ground rent payments
- a person, who, by a written instrument receives an interest in land
Down
- product provided by an abstractor consisting of deeds and open encumbrances
- recorded document switching lien position
- boundary lines of a piece of land
- cover page of a search package
- IE. Right of Way
- right of ownership for the life of an individual
- end results of refinance transaction once all requirements have been met
- a person, who, by a written instrument transfers to another an interest in land
- lien or charge upon the land of the debtor
- an instrument used to encumber land as a security for a debt (Judicial States)
17 Clues: IE. Right of Way • road map to final policy • cover page of a search package • boundary lines of a piece of land • recorded document switching lien position • lien or charge upon the land of the debtor • total amount paid during a transfer of land • right of ownership for the life of an individual • date the county has verified their records through • ...
maabd crossword 2023-03-24
Across
- this program provides qualified Medicare eligible individuals withcoverage of their Medicare premiums
- Amendment Public Law 94-566 Section 503
- Covers only Medicare co-pays, premium and deductible charges
- medical assistance to disabled children who require a level of care provided ina medical facility, but can be appropriately cared for at home for less cost
- RETIREMENT, SURVIVORS, DISABILITY INSURANCE
- determined blind according to Social Security Administration criteria
- Have net countable income 100% - 120% of FPL
- must be 65 years or older
- SUPPLEMENTAL SECURITY INCOME
Down
- eligibility renewed once every 12 months
- cover aged, blind and disabled individuals using SSI budgeting methodologies
- Have net countable income 120% - 135% of FPL
- Aging and Disability Services Division
- individual must meet the disability criteria established by the SSA
- SUPPLEMENTAL SECURITY INCOME
- Individuals eligible for this program receive reduced premium payments for their Part D prescription drug program
- Scholarships, Fellowships, Need-Based Education Grants
- Medicaid coverage for emergency medical situations to individuals who do not meet the criteria of a qualified non-citizen
18 Clues: must be 65 years or older • SUPPLEMENTAL SECURITY INCOME • SUPPLEMENTAL SECURITY INCOME • Aging and Disability Services Division • eligibility renewed once every 12 months • Amendment Public Law 94-566 Section 503 • RETIREMENT, SURVIVORS, DISABILITY INSURANCE • Have net countable income 120% - 135% of FPL • Have net countable income 100% - 120% of FPL • ...
Deposit and withdrawal puzzle 2022-05-05
Across
- internal decline generated on a credit card deposit attempt.
- security tool, checking for fraud and financial background of customer.
- 3-4% charge
- The deposit limit is 2 per month.
- checking email address, phone number or name to see if the customer has an online presence or background.
- card number starts with 6.
- Once the Payments Out department determines that all the Rules/Terms and Conditions were upheld.
- the sense of regret after spending a lot of money.
- This code consists of 8 - 11 characters.
Down
- used to store, buy, send and receive Bitcoins and Bitcoin Cash coins.
- Refund request must be sent to the Payments Department.
- Reviews only WGS, JS, Rival, Everygame, GE.
- processors are not using an online gaming merchant category code for processing transactions.
- The minimum deposit amount for Miami Club Casino is $35.
- A Transaction will not show up in IPP. backoffice because.
- Only available for WGS & RI players.
- processors which in the final step of transaction require an additional security password.
17 Clues: 3-4% charge • card number starts with 6. • The deposit limit is 2 per month. • Only available for WGS & RI players. • This code consists of 8 - 11 characters. • Reviews only WGS, JS, Rival, Everygame, GE. • the sense of regret after spending a lot of money. • Refund request must be sent to the Payments Department. • The minimum deposit amount for Miami Club Casino is $35. • ...
vocab 2022-11-28
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- Sharing someone’s secrets or embarrassing information online
- A hostile and insulting interaction between internet users.
- An image that is captured of what is shown on a phone, tablet, or computer screen
- A technology that allows us to access our files through the internet from anywhere in the world.
- An Internet service that helps you search for information on the web
- Someone who posts rude or off-topic messages in an online community
Down
- Online communities, also known as social networks
- Setting up a fake online profile
- malware,cyber-destroyer, break your technology
- Rules or manners for interacting courteously with others online
10 Clues: Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
TECHNOLOGY 2021-10-07
Across
- introducing or using new ideas, ways of doing something, etc.
- no longer used because something new has been invented
- too important to be without
- having a good knowledge and understanding of modern technology, especially computers
- a person who fears, dislikes or avoids new technology
Down
- the utilization of imagination or original ideas to generate something
- develop (something) to a higher standard, especially (equipment or machinery) by adding or replacing components
- of only average quality, not very good
- a small tool or device that does something useful
- relating to, or involving computers or computer networks (as the Internet)
10 Clues: too important to be without • of only average quality, not very good • a small tool or device that does something useful • a person who fears, dislikes or avoids new technology • no longer used because something new has been invented • introducing or using new ideas, ways of doing something, etc. • ...
BK 2024-02-05
Across
- memukul, mendorong, dll termasuk bully…
- Gangguan yang di dapatkan oleh korban bullying ada gangguan…
- Pihak yang mampu membela dirinya karena lemah ketika mendapatkan tindakan agresif dan manipulatif disebut…
- Tindakan mengganggu atau menyakiti orang lain secara fisik atau psikis disebut....
- intimidasi yang melibatkan kata kata bauk secara tertulis/ terucap merupakan bully…
Down
- dapat meniru niru bullying adalah dampak negatif bagi…
- Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…
- Gangguan emosi, sulit mendapatkan pekerjaan ketika sudah dewasa adalah dampak negatif bagi…
- memposting foto memalukan/ menyebarkan aib, termasuk ke bully…
- Jenis Tindakan Bully di dunia maya yang ditunjukkan untuk mengucilkan seseorang adalah…
10 Clues: memukul, mendorong, dll termasuk bully… • dapat meniru niru bullying adalah dampak negatif bagi… • Gangguan yang di dapatkan oleh korban bullying ada gangguan… • memposting foto memalukan/ menyebarkan aib, termasuk ke bully… • Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying… • ...
ASTS TIK_FATIMAH AZZAHRA PURNOMO (14/ X E-10) 2024-09-12
Across
- Sistem komputer dan informasi; dunia maya; berhubungan dengan internet
- Empat pilar dalam berpikir komputasional, yaitu dekomposisi, abstraksi, pengenalan pola, dan...
- Yang diperlukan individu dan kelompok untuk mengambil keputusan
- Yang membagi tugas fan peran secara adil dalam berkolaborasi
- Jenis infografis yang menampilkan daftar informasi dengan berbagai pembahasan, seperti tips, trik, dan pembahasan lainnya
- Pengelolaan dan penyajian data bervolume lebih besar dan melakukan analisis yang lebih kompleks dari fase sebelumnya
Down
- Cyber physical system dikenal dengan
- Tentukan tujuan kolaborasi, dan pastikan persamaan persepsi dan deskripsi lengkap tentang prakondisi masing-masing
- Informatika berasal dari bahasa Inggris
- Ukuran huruf cukup besar untuk dapat dilihat oleh pendengarnya
10 Clues: Cyber physical system dikenal dengan • Informatika berasal dari bahasa Inggris • Yang membagi tugas fan peran secara adil dalam berkolaborasi • Ukuran huruf cukup besar untuk dapat dilihat oleh pendengarnya • Yang diperlukan individu dan kelompok untuk mengambil keputusan • Sistem komputer dan informasi; dunia maya; berhubungan dengan internet • ...
TTS KELOMPOK 2 (10.6) 2024-10-30
Across
- Program atau Kampanye untuk melawan bullying di sekolah?
- Hak setiap murid untuk merasa aman dan dihargai di lingkungan sekolah disebut hak...
- Emosi yang sering dirasakan korban setelah mengalami bullying berulang kali?
- Korban bullying biasanya mengalami gangguan
Down
- Orang yang melihat tindakan Bullying secara langsung
- Menerima perbedaan dan tidak membeda-bedakan adalah?
- Tindakan kekerasan kepada seseorang yang di anggap lemah?
- Tindakan yang membuat orang lain merasa tidak nyaman atau sedih dan dapat dilakukan oleh seseorang maupun sekelompok orang
- Platform atau media cyber bullying yang digunakan untuk menyebarkan komentar negatif atau ujaran kebencian?
- Menghina dan merendahkan orang lain dengan kata-kata disebut?
10 Clues: Korban bullying biasanya mengalami gangguan • Orang yang melihat tindakan Bullying secara langsung • Menerima perbedaan dan tidak membeda-bedakan adalah? • Program atau Kampanye untuk melawan bullying di sekolah? • Tindakan kekerasan kepada seseorang yang di anggap lemah? • Menghina dan merendahkan orang lain dengan kata-kata disebut? • ...
Rabin Remembrance Day 2023-10-26
SAW 2022 ENG 2022-01-27
Across
- Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
- Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
- Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
- This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
- A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
- Converting information from one form to another to hide its content and prevent unauthorized access.
- An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
- Indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
- A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
- Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
- Applies to information or assets that, if compromised, could cause serious injury to the national interest.
- Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
- Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
- The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information.
- Malicious software designed to infiltrate and damage computers without the user’s consent.
- An attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
- Training that provides an overview of the directives and best practices related to security. Contains 10 modules
17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent. • An inadequacy related to security that could increase susceptibility to compromise or injury. • Converting information from one form to another to hide its content and prevent unauthorized access. • ...
Glossary: Your biggest fan (4.2 ) 2023-03-16
10 Clues: huono • häiritä • kohtalo • keskittyä • kuuluisuus • raivoissaan • tulla väliin • todennäköisyys • turvakoodi (sanaväli=väliviiva) • täyttää odotukset (sanaväli=väliviiva
Devolved and Reserved Powers 2021-11-01
Vocab 2025-10-21
10 Clues: award • habitat • flooding • food security • voter turnout • rehabilitation • equal opportunity • government crisis • species protection • shooting conditions / terms of conditions
Bonus Game 2024-10-22
Across
- a state of being free from public attention.
- it is a consent or authorization to do something.
- mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Down
- serves as a pass when entering something.
- Acronym: One ____ Passwords.
- it is a person's name and other facts about who they are.
6 Clues: Acronym: One ____ Passwords. • serves as a pass when entering something. • a state of being free from public attention. • it is a consent or authorization to do something. • it is a person's name and other facts about who they are. • mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Into the XDR Abyss: A Puzzling Descent 2023-10-06
Across
- The digital playbook's maneuvers (7)
- Linking digital dots to paint a threat landscape (9)
- When a digital item needs its own space (9)
- That "He-Who-Must-Not-Be-Named" of the network (9)
- Tune out digital chatter to hear alerts better (6,2,5)
- Supercharged defense with the Iron Throne's view (3) (abbr.)
- Patterns like Sheldon's knocks on Big Bang Theory. (10)
- Darwin would have a digital field day with this (4,8)
- Guarding against too good-to-be-true jackpot letters (18)
Down
- Computers getting their digital diplomas (15)
- Like Rick's adventures in Rick and Morty (14)
- Where digital realms intersect and tales intertwine (11)
- Letting tech do the heavy digital lifting (8)
- Cutting through the cyber fog to see clearly (10)
- Demanding the lion's share of digital assets (9,10)
- Were Neo's choices in The Matrix really directionless? (7)
16 Clues: The digital playbook's maneuvers (7) • When a digital item needs its own space (9) • Computers getting their digital diplomas (15) • Like Rick's adventures in Rick and Morty (14) • Letting tech do the heavy digital lifting (8) • Cutting through the cyber fog to see clearly (10) • That "He-Who-Must-Not-Be-Named" of the network (9) • ...
It 2020-03-16
Across
- / To say to someone that you will harm someone or do something unpleasant or unwanted
- / If you have your parents'______ to order something over the Internet
- / When someone abuses or insults you on a regular basis
- / To make someone uncomfortable.His bad manners _________ her
- / Social Media is a great way to ______ with friends.
- / Cyberbullying can have serious ______.
- bullying / Bullying that happens online
Down
- / Never try to seek ______ on a cyberbully. Don't do to them what they did to you.
- / Don't share the _________ for your accounts
- / Make sure that you have installed a ______ to keep your device safe from hackers.
- / You will use the right __________
- / Never give any personal ___________ to people online
- / People cyberbully because is less likely to be ______
- / Always follow the _____
- / Teach other about keeping ______ on the Internet.
- / Never agree to meet face-to-face with someone you've met ______ without discussing it with your parents
16 Clues: / Always follow the _____ • / You will use the right __________ • bullying / Bullying that happens online • / Cyberbullying can have serious ______. • / Don't share the _________ for your accounts • / Teach other about keeping ______ on the Internet. • / Never give any personal ___________ to people online • ...
Business brief vocabulary 2021-10-17
Across
- their risk investment in lots of different items/locations to reduce the possibility of loss.
- security protection for computers/websites.
- viruses human created computer disease.
- of assets taking a person’s/companies possession by an authorized individual/organisation/business.
- establish companies Companies exist for a long time/famous/significant brand name e.g. Nike.
- liability claims to be at fault due to the product poor design/quality and a subsequent financial or legal claim.
- something in return.
- espionage obtaining trade secrets illegally.
- suicide Brand collapses due to poor decisions.
- Cheating. Presenting something that is not true. It results in someone losing something.
- risks risk connected to business performance linked to the reputation of the company.
Down
- something not exactly legal.
- to take/grab someone and demand money.
- people who break IT security.
- capitalists investment of money/resources linked to the amount of risk.
- self confidence without worrying about anything else.
- programs that protect against computer viruses.
- What you get back from an investment.
- recalls taking product from the market by the producer/government.
- off a situation which you accept something in a compromise.
20 Clues: something in return. • something not exactly legal. • people who break IT security. • What you get back from an investment. • to take/grab someone and demand money. • viruses human created computer disease. • security protection for computers/websites. • espionage obtaining trade secrets illegally. • programs that protect against computer viruses. • ...
Government Finance 2023-04-20
Across
- When the government borrows money by selling ____
- Taxes people pay on the land and houses they own
- General tax levied on consumer's purchases of nearly all products
- Social Security, National Defense, Income Security, Medicare, and Health are all _____
- Most important resources of state government revenues
- Programs that help citizens who meet established eligibility requirements (i.e health, nutritional, income)
- Takes the same percentage of tac from anyone no matter how much they make
- Spending equal revenues
Down
- Government expenditures that must be approved yearly
- Tax rate that increases as income increases
- Laws that approve spending got a particular activity
- Money the government has borrowed and hasn’t paid back
- When the government spends more than it collects in revenue
- Programs that begin working to stimulate the economy as soon as needer
- State spending on their citizen's education
- Spending that does not need annual approval
- The percentage of tax you pay decreases as you make more money
- Tax levied by the government directly on your income
- Second largest category of federal expenditures
19 Clues: Spending equal revenues • Tax rate that increases as income increases • State spending on their citizen's education • Spending that does not need annual approval • Second largest category of federal expenditures • Taxes people pay on the land and houses they own • When the government borrows money by selling ____ • Government expenditures that must be approved yearly • ...
NSA 2015-11-20
Across
- / Windows 2008 has two types of account Local and ___________
- / a device designed to control the flow of traffic into and out-of a network
- / Ping O’ Death is a ___________ attack.
- / Each computer in a DNS domain is uniquely identified by its?
- / Virus scanners must determine the ___________ of the file to determine that it is a virus
- / ___________ Filtering A Technique employed to ensure that incoming packets are from the network they say they are from
- / A group policy that is obtained from a higher level.
- / An attack from many agents.
- / Failing to install and update security patches could lead to a ____ on your system
- / They change their encryption module on replication
Down
- / A built in account
- / Units that mirror your organization's functional or business structure
- / A virus that spreads via Word, Excel, PowerPoint & PDF files
- / A built in account
- / A Syn Flood attack exploits the TCP ________________
- / Software that uses security holes to replicate itself
16 Clues: / A built in account • / A built in account • / An attack from many agents. • / Ping O’ Death is a ___________ attack. • / They change their encryption module on replication • / A group policy that is obtained from a higher level. • / A Syn Flood attack exploits the TCP ________________ • / Software that uses security holes to replicate itself • ...
Business Law 2022-07-08
Across
- type of security under which the issuer owes the holder a debt, & is obliged to repay
- long term loan that a corporate or govt. raises from the public for capital requirements
- something given up for a promise
- a person who takes responsibility for another's debt
- giving the world notice that the creditor has interest in adulterous property; other creditors beware
- district or county which is where the contract was executed
- rule adopted by an org. chiefly for the govt. of its members & the regulation of affairs
Down
- creditors rights attach as soon as they sign
- promises exchanged between parties
- promise to keep an offer open that is paid for
- distribution of profits by a corp. to its shareholders
- control over work is dependent on employer
- promise for performance
- shares of which ownership of a corporation
- security interest or legal rights acquired in one property by a creditor
15 Clues: promise for performance • something given up for a promise • promises exchanged between parties • control over work is dependent on employer • shares of which ownership of a corporation • creditors rights attach as soon as they sign • promise to keep an offer open that is paid for • a person who takes responsibility for another's debt • ...
Climate and Food Production 2022-11-24
Across
- The amount of crop harvested per area of land
- Climate change is one of these factors that threaten food security
- The type of fertiliser best used for sustainable farming practices
- the presence of salt on the surface of the land or in rivers
- The availability and access to enough nutritious food to maintain a healthy life
- Most crops will not grow with this present in the soil
- A decline in the quality of land so it becomes unproductive
- One of the main crops grown in Western Australia
- A natural underground water source
Down
- Includes rainfall and temperature
- The supply of water by artificial means to agricultural areas where there is a shortage
- A glass building that houses plants and vegetables
- A threat to food security
- When agriculture meets the current and future generational needs
- A method to store rainwater on farms
15 Clues: A threat to food security • Includes rainfall and temperature • A natural underground water source • A method to store rainwater on farms • The amount of crop harvested per area of land • One of the main crops grown in Western Australia • A glass building that houses plants and vegetables • Most crops will not grow with this present in the soil • ...
CROSSWORD 2024-05-20
Across
- - What improvements can be made to the audiovisual experience?
- - What steps can be taken to improve accessibility for people with disabilities?
- - How can we create a more exclusive experience for certain attendees?
- - How can parking facilities be made more convenient and spacious?
- - How can the cleanliness of restrooms and common areas be maintained?
- - How an public transportation options be improved for the arena?
- - How can security be improved without inconveniencing attendees?
Down
- - What can be done to enhance mobile connectivity for visitors?
- - How can we cater to diverse tastes in food and beverages?
- - How can the ticketing experience be made more efficient?
- - How can we reduce crowd congestion at the Mall of Asia Arena?
- - How can navigation within the arena be made easier for visitors?
- - What eco-friendly initiatives can the arena implement?
- - What additional entertainment options could be offered around event times?
- - What can be done to improve seating comfort for attendees?
15 Clues: - What eco-friendly initiatives can the arena implement? • - How can the ticketing experience be made more efficient? • - How can we cater to diverse tastes in food and beverages? • - What can be done to improve seating comfort for attendees? • - What improvements can be made to the audiovisual experience? • ...
Understanding our neighbours 2024-03-18
Across
- Indonesia has plans to relocate its _ _ _ _ _ _ _ from Jakarta to Nusantara
- What is the event that affect Singapore the most with Indonesia
- SAF and NS foster _ _ _ _ _ _ _ _ _ _ _ _ among Singaporeans, crucial for national unity
- The current King of Malaysia is Sultan of which state?
- _ _ _ _ _ _ _ _ _ _ in SAF and NS is key to maintaining Singapore's defense readiness
- Building _ _ _ _ _ in Singapore's defense capabilities through rigorous training
- Indonesia and Singapore develop joint initiatives to address regional security challenges, such as _ _ _ _ _ _ _-terrorism and maritime safety
Down
- What Political Coalitions is the Current Prime Minister from?
- The Defense Cooperation Agreement enables Singapore Armed Forces to conduct _ _ _ _ _ _ _ _ training in Indonesia
- Major area of cooperation between Malaysia and Singapore?
- Current president of Indonesia
- Crucial for _ _ _ _ _ _ _ _ defense and the credibility of Singapore's commitment to it
- Essential to ensuring _ _ _ _ _ _ _ _ in a small nation like Singapore
- What does SEZ stands for?
- What is the challenges that is a point of contention between Malaysia and Singapore?
15 Clues: What does SEZ stands for? • Current president of Indonesia • The current King of Malaysia is Sultan of which state? • Major area of cooperation between Malaysia and Singapore? • What Political Coalitions is the Current Prime Minister from? • What is the event that affect Singapore the most with Indonesia • ...
crossword 2024-10-09
Across
- Encryption Standard :A symmetric-key algorithm for data encryption
- communication from an unknown source as being from a known one.
- Notification: A legal requirement to inform affected individuals after a data breach.
- :A network of compromised computers controlled by a hacker.
- Management:Processes for responding to and managing security incidents.
- Security:Measures to protect physical assets and locations from unauthorized access.
- vulnerability that is exploited before the vendor knows about it
- list of approved entities allowed access to a system.
Down
- a computer network into smaller parts for security.
- :Information used to verify a user’s identity, like a password.
- Authority (CA):An entity that issues digital certificates for secure communications.
- Hash:A fixed-size string generated from data to ensure integrity.
- Code:Software intended to harm or exploit any programmable device.
- code injection technique used to attack databases.
- state of being unidentifiable within a network or system.
15 Clues: code injection technique used to attack databases. • a computer network into smaller parts for security. • list of approved entities allowed access to a system. • state of being unidentifiable within a network or system. • :A network of compromised computers controlled by a hacker. • :Information used to verify a user’s identity, like a password. • ...
crossword 2024-10-09
Across
- A list of approved entities allowed access to a system.
- A vulnerability that is exploited before the vendor knows about it
- Processes for responding to and managing security incidents.
- Information used to verify a user’s identity, like a password.
- A network of compromised computers controlled by a hacker.
- Disguising communication from an unknown source as being from a known one.
- A code injection technique used to attack databases.
- Measures to protect physical assets and locations from unauthorized access.
- The state of being unidentifiable within a network or system.
- A symmetric-key algorithm for data encryption
Down
- A legal requirement to inform affected individuals after a data breach.
- A fixed-size string generated from data to ensure integrity.
- Dividing a computer network into smaller parts for security.
- An entity that issues digital certificates for secure communications.
- Software intended to harm or exploit any programmable device.
15 Clues: A symmetric-key algorithm for data encryption • A code injection technique used to attack databases. • A list of approved entities allowed access to a system. • A network of compromised computers controlled by a hacker. • A fixed-size string generated from data to ensure integrity. • Dividing a computer network into smaller parts for security. • ...
about the work 2024-11-11
Across
- performs a number of important functions to ensure security and order in society.\
- Performs on stage
- He is engaged in creative activities in various fields of art
- This is a leader who manages people and processes.
- controls the flight of the aircraft
- produces agricultural products for sale on leased or own land
- maintenance, repair, adjustment and inspection of various mechanical systems
- Selection of flowers and plants
Down
- Driving a vehicle
- He is engaged in the management and control of various technical devices
- Preparation of drinks
- занимается учётом и хранением книг, а также выдачей их всем желающим для работы или простого чтения.
- is engaged in ensuring the safety of the facility
- He is engaged in the translation and adaptation of written text or oral speech from one language to another
- He must guide his student in coordinating his personal goals with academic ones.
15 Clues: Driving a vehicle • Performs on stage • Preparation of drinks • Selection of flowers and plants • controls the flight of the aircraft • is engaged in ensuring the safety of the facility • This is a leader who manages people and processes. • He is engaged in creative activities in various fields of art • produces agricultural products for sale on leased or own land • ...
Think Before You Click: Cyber Threats Crossword 2025-03-20
Across
- Unsolicited and irrelevant emails sent to many users
- Security system controlling network traffic
- Malware that blocks access or threatens to leak data unless ransom paid
- Report suspicious emails quickly to your __________ team.
- Don’t share __________ info, colleagues won’t ask via personal email.
- Fraudulent attempt to obtain sensitive information by pretending to be trustworthy
- Saving passwords in unsecured files or browsers is unsafe, use a __________ instead.
- Disguising communication from unknown source as trusted
- Fraud attempt to get sensitive info via SMS
Down
- Don’t download strange __________ from unexpected emails — it might be malware!
- Don’t click on strange _____ in emails — it might be a phishing trick.
- If a site warns it’s unsafe, don’t ignore the browser’s __________.
- Clicking ‘unsubscribe’ in spam emails may __________ your email to attackers.
- Phishing attack targeted at specific individual or organization
- A secret word or phrase used to gain access to a system
15 Clues: Security system controlling network traffic • Fraud attempt to get sensitive info via SMS • Unsolicited and irrelevant emails sent to many users • Disguising communication from unknown source as trusted • A secret word or phrase used to gain access to a system • Report suspicious emails quickly to your __________ team. • ...
Chapter 3 section 1 2013-10-02
Across
- include sending letters of appreciation and presenting awards
- result from a desire to reach our ultimate potential
- include love, friendship and reputation
- includes economic security, mental security, protection from harm
- in order to build trust you need to take___________to let the customers get to know you
- always keep your_______ when trying to build trust
- the most basic need includes food, water and shelter
Down
- what type of selling needs to emphasize the relationship between salesperson and buyer
- personal selling needs to have what type of communication
- based on the desire to have a specific product or service
- based on the customers logical reasoning
- you shoud___________ time for small talk with customers to build trust
12 Clues: include love, friendship and reputation • based on the customers logical reasoning • always keep your_______ when trying to build trust • result from a desire to reach our ultimate potential • the most basic need includes food, water and shelter • personal selling needs to have what type of communication • based on the desire to have a specific product or service • ...
Fuller Leadership Crossword 2022-02-14
Across
- Nutrition Services Supervisor
- Quality of Life Supervisor
- 2nd Floor Manager
- Director of Nursing
- Assistant Administrator
- 3rd Floor Manager
- Financial Counselor/Office Supervisor
- Security Supervisor
- Nutrition Services Supervisor
- Administrator
Down
- 4th Floor Manager
- Assistant Administrator
- 5th Floor Manager
- Environmental Services Supervisor
- Infection Prevention
- Therapy Supervisor
16 Clues: Administrator • 4th Floor Manager • 5th Floor Manager • 2nd Floor Manager • 3rd Floor Manager • Therapy Supervisor • Director of Nursing • Security Supervisor • Infection Prevention • Assistant Administrator • Assistant Administrator • Quality of Life Supervisor • Nutrition Services Supervisor • Nutrition Services Supervisor • Environmental Services Supervisor • ...
#18 Hospital Staff 2025-09-11
14 Clues: Greet visitors • Offer kindness • Keep rooms safe • Prepare medicines • Organize treatment • Provide medical care • Create healthy menus • Move patients safely • Support patient needs • Give spiritual comfort • Daily support and help • Guide physical activity • Protect hospital grounds • Operate hospital machines
crossword 2018-05-21
Across
- once passengers are though immigration and security they are now in
- what is the three letter code for kerikeri
- In 2014 how may passengers did auckland international airport carry
- whats the number runways at the auckland airport
- for parking facilities which do you think would cost more short or long term
- what is the liquid measurement that your aloud to carry
- true or false both travellers and non-travellers have access to all landslide facilities
Down
- whats the third phase of flight
- what side does this definition belong to-this is the area before departing passengers pass through security.
- true or false landslide offers lounges
- what do you put your gels and liquids in
- whats hours does the airport operate
- what does AVSEC stand for
- auckland city is how far away from the airport
- how many airbridges does auckland international airport have
- what jet engine aircrafts do these belong to,737,767,777,787
- what is the three letter code for hamilton
17 Clues: what does AVSEC stand for • whats the third phase of flight • whats hours does the airport operate • true or false landslide offers lounges • what do you put your gels and liquids in • what is the three letter code for kerikeri • what is the three letter code for hamilton • auckland city is how far away from the airport • whats the number runways at the auckland airport • ...
Vocabulary pag 72 2024-04-17
Across
- refers to the act of illegally taking another person's property without their consent.
- institution where people convicted of crimes are imprisoned.
- process of seeking information and collecting evidence to solve a criminal case.
- professional in charge of investigating crimes and collecting evidence.
- object used to inflict damage or cause injury.
- act of killing someone intentionally and illegally.
- act of illegally taking another person's property without his or her consent.
- used to identify people and as evidence in criminal cases.
- information or evidence used to prove or disprove a fact.
Down
- to observe or carefully analyze something to obtain information.
- a person who commits crimes or breaks the law.
- unique and distinctive prints on your fingertips.
- find a solution or answer to a problem or situation.
- to capture or detain someone, especially a criminal.
- Guard- professional in charge of protecting property and people.
- to actively follow or search for someone, especially a criminal.
- officers-members of law enforcement agencies charged with maintaining peace and security.
17 Clues: a person who commits crimes or breaks the law. • object used to inflict damage or cause injury. • unique and distinctive prints on your fingertips. • act of killing someone intentionally and illegally. • find a solution or answer to a problem or situation. • to capture or detain someone, especially a criminal. • ...
Cybersecurity Glosary 2025-10-07
Across
- Security principle ensuring that data is not altered or tampered with
- Type of malware that locks data until a payment is made
- Permission to access certain resources or perform actions
- Fraudulent attempt to get sensitive information by pretending to be a trusted empty
- Company that provides users access to the Internet
- Malicious program disguised as legitimate software
- Network of connected devices that communicate over the Internet
- Unauthorized takeover of a system, network or online session
- Process that converts data into unreadable code to protect it
- Manipulating people to reveal confidential information
Down
- Weak Points in a system that attackers can exploit
- Security principle ensuring that systems and data are accesible when needed
- Process of verifying someone's identity before granting access
- Secret string of characters used for authentication
- Probability that a threat will exploit a vulnerability
- Software that secretly collects user data and send it to others
- Risks that come from employees or people inside an organization
17 Clues: Weak Points in a system that attackers can exploit • Company that provides users access to the Internet • Malicious program disguised as legitimate software • Secret string of characters used for authentication • Probability that a threat will exploit a vulnerability • Manipulating people to reveal confidential information • ...
Words from FMC-010 2025-11-07
Across
- The amount of safety you take with your money
- A card linked to your money, you can also use online banking
- The amount of money you take from the bank
- The length of time until a loan must be paid
- The maximum amount of money
- The amount of chance you take with your money
- Someone who borrows money from someone
- The percentage of interest each month or annum
- An agreement that has a set end date
Down
- something pledged as security for repayment of a loan
- The rate that stays the same no matter what
- The interest rate that changes by the market
- Someone who lends you money
- The amount of money the bank pays when you buy a house
- A card that is directly linked to your banks money that you have to pay back every month
- Changing the way you pack back the bank or someone
- The original amount of money borrowed
17 Clues: The maximum amount of money • Someone who lends you money • An agreement that has a set end date • The original amount of money borrowed • Someone who borrows money from someone • The amount of money you take from the bank • The rate that stays the same no matter what • The interest rate that changes by the market • The length of time until a loan must be paid • ...
