cyber security Crossword Puzzles

FIRE / SEXTING / CYBER BULLYING 2015-09-09

FIRE / SEXTING / CYBER BULLYING crossword puzzle
Across
  1. Cyber bullying and ..... are new concepts affecting youth
  2. Can happen to you if you extinguish fire with water
  3. Doors and ...... should be used as exit points in fire
  4. Acronym used to remember how to use fire extinghuiser
Down
  1. To be practiced at home and school in case of fire
  2. In case of fire, with no smoke, go towards escape route .....
  3. Children should not play with matches and ..., it causes fire
  4. Sexting messages may be classified as child ......
  5. Stay low in case of fire and crawl on hands and .....
  6. How many times a year fire drills should be practiced

10 Clues: To be practiced at home and school in case of fireSexting messages may be classified as child ......Can happen to you if you extinguish fire with waterStay low in case of fire and crawl on hands and .....How many times a year fire drills should be practicedAcronym used to remember how to use fire extinghuiser...

CyberSecurity Puzzle 2024-06-06

CyberSecurity Puzzle crossword puzzle
Across
  1. __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
  2. SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
  3. OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
  4. EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
  1. CYBER ATTACK CAN CAUSE HUGE ____________
  2. IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
  3. IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
  4. HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
  5. MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
  6. ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.

10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS....

Emerging careers 2025-05-13

Emerging careers crossword puzzle
Across
  1. Using big data insights to drive strategic financial decisions
  2. When companies can't pay debts, CAs in this field handle restructuring proceedings
  3. Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
  4. CAs provide funding, compliance, and scaling advice to these new ventures
  5. Accounting specialty investigating financial fraud and disputes
  6. Environmental, Social, Governance framework CAs use to assess sustainability reporting
Down
  1. Digital assets requiring specialized tax and regulatory expertise from modern CAs
  2. Ensuring adherence to laws and regulations like GST or SEBI guidelines
  3. Assessment and management of financial, operational or cyber threats
  4. Corporate combinations where CAs perform financial due diligence

10 Clues: Using big data insights to drive strategic financial decisionsAccounting specialty investigating financial fraud and disputesCorporate combinations where CAs perform financial due diligenceAssessment and management of financial, operational or cyber threatsEnsuring adherence to laws and regulations like GST or SEBI guidelines...

cyberbullying 2025-06-19

cyberbullying crossword puzzle
Across
  1. something on the internet mostly on social media like youtube
  2. something two or more people can do to you
  3. someone who helps the bully or ignores the problem
  4. something on the internet that has almost all you info
  5. a person who makes people feel bad on the internet
Down
  1. someone who shares kind words and fights off the bully
  2. something that people play games on or go on social media
  3. a person who try's to find your info online
  4. related to computers
  5. is a option you can chose if you feel unsafe or if your being cyberbullied

10 Clues: related to computerssomething two or more people can do to youa person who try's to find your info onlinesomeone who helps the bully or ignores the problema person who makes people feel bad on the internetsomeone who shares kind words and fights off the bullysomething on the internet that has almost all you info...

Industry 5.0 2025-01-21

Industry 5.0 crossword puzzle
Across
  1. A global network that connects smart devices and systems
  2. A major goal of Industry 5.0 focusing on reducing waste
  3. Robots designed to work alongside humans
  4. Technology that allows humans to interact with machines via speech or gestures
  5. Machines and systems that can learn and make decisions
  6. The integration of digital and physical systems in manufacturing
Down
  1. Industry 5.0 promotes this environmental concern in manufacturing
  2. A key technology that enables secure and transparent transactions
  3. A key concept of Industry 5.0 that focuses on human-centered approaches
  4. The process of using data to make better decisions

10 Clues: Robots designed to work alongside humansThe process of using data to make better decisionsMachines and systems that can learn and make decisionsA major goal of Industry 5.0 focusing on reducing wasteA global network that connects smart devices and systemsThe integration of digital and physical systems in manufacturing...

teach 2025-09-07

teach crossword puzzle
Across
  1. Prefix for anything involving virtual or digital threats.
  2. Online test to tell humans from bots — often asks you to “spot the traffic light” .
  3. Microsoft’s OS that introduced the Start menu.
  4. A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
  5. The annoying lag between click and response (7).
  6. The coder’s social network for sharing repos (6).
Down
  1. Microsoft’s old web browser — or the Windows file manager.
  2. The digital ledger tech behind Bitcoin and more.
  3. Coffee-inspired programming language once said to “run everywhere” (4).
  4. Open-source OS mascot is a penguin named Tux (5).

10 Clues: Microsoft’s OS that introduced the Start menu.The digital ledger tech behind Bitcoin and more.The annoying lag between click and response (7).Open-source OS mascot is a penguin named Tux (5).The coder’s social network for sharing repos (6).Prefix for anything involving virtual or digital threats....

The Cyber Word Hunt 2025-10-22

The Cyber Word Hunt crossword puzzle
Across
  1. : Field concerned with protecting systems and data from online attacks
  2. : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
  3. : The act of checking and improving quality in AML processes
  4. : Cyber attack that tricks users into revealing personal info via fake emails
  5. : The shift from traditional banking to online banking is called digital ___
Down
  1. : Process of verifying user identity before accessing an online account
  2. : Sending money electronically through a banking app
  3. : Device most commonly used to access digital banking apps
  4. : A new generation of online-only banks with no physical branches
  5. : Department that manages IT risk, compliance, and governance

10 Clues: : Sending money electronically through a banking app: Device most commonly used to access digital banking apps: The act of checking and improving quality in AML processes: Department that manages IT risk, compliance, and governance: A new generation of online-only banks with no physical branches...

xFi Crossword Puzzle 2019-01-09

xFi Crossword Puzzle crossword puzzle
Across
  1. speed required for xfi advantage
  2. amount of data included in xFi advantage
  3. uses a radio frequency signal instead of wires to connect your devices
  4. device that converts data so that it can be transmitted from computer to computer over telephone wires
Down
  1. delivers a smarter, more personalized security solution for your home network
  2. feature that includes equipment, unlimited data and security
  3. pods devices that can be paired with a compatible xFi Gateway to create a mesh WiFi network in the home

7 Clues: speed required for xfi advantageamount of data included in xFi advantagefeature that includes equipment, unlimited data and securityuses a radio frequency signal instead of wires to connect your devicesdelivers a smarter, more personalized security solution for your home network...

Vocabulary words of Computer 2021-10-06

Vocabulary words of Computer crossword puzzle
Across
  1. stands for random access memory and it is a memory stored in that you can modify and edit it and it is sometimes used to store working data and machine codes.It stores the information you are using on your computer actively.
  2. is a small device that has flash memory that is to store data and it can also transfer the data to another computer
  3. stands for local area network and it is a network that is in areas like school and the computers can connect and share information
  4. It’s a device that can get connected to your computer and you use it with your computer
  5. it’s like trash emails that a person sends to many people and the person advertises hoping the receiver will buy the item.
  6. stands for wide area network and it is a big network and allows you to share information and communicate from computers to computers in other locations.
  7. makes your computer perform better and it is fast.
  8. it is when you have permission to copy from the owner.
  9. known as Universal serial bus and you can transfer or take your data and connect to other peripheral devices
  10. is a website were the community of users can edit and add content.For example google something random you will see Wikipedia with it and its loaded with information about the thing you googled
Down
  1. It is getting unauthorized data like passwords, private information, from other people in a computer or device.Or it can be exploiting in games using hacks.
  2. it is a security device that protects your computer making sure no suspicious things enter or cyber-attacks.
  3. stands for solid state driver is a storage and stores data persistently
  4. Fair use gives permission to use copyrighted work for a group of people without the work owner’s permission but only for uses like teaching, research, news report, and more.
  5. the rules for an acceptable way that you are going to use the internet.
  6. keeps your data and network safe from viruses or threats.
  7. is a recognizable area of a bigger program.
  8. it is copying someone's work and claiming that you made it and it was your idea.
  9. stands for central processing unit and it is the part of the computer that recovers and executes instructions.
  10. known as Hard disk drive and it is a type of storage thats in your computer and it can store and retrieve data they store like software programs and some other files

20 Clues: is a recognizable area of a bigger program.makes your computer perform better and it is fast.it is when you have permission to copy from the owner.keeps your data and network safe from viruses or threats.stands for solid state driver is a storage and stores data persistentlythe rules for an acceptable way that you are going to use the internet....

Dystopia Escape Room Crossword puzzle 2022-01-15

Dystopia Escape Room Crossword puzzle crossword puzzle
Across
  1. Term for mega-technological genre: “cyber-__________”.
  2. Biased information used to promote a political point of view.
  3. Type of government that has total control over people’s lives.
  4. Opposite of individuality.
  5. A dystopia typically exists as an __________ of a perfect world.
  6. The word “utopia” was created from 2 __________ words, eutopia & outopia.
Down
  1. Utopia was originally named for a fictional __________.
  2. Kim Jong-Un is practically worshipped by citizens, making him the figure ________ of North Korea.
  3. Opposite of dystopia.
  4. Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of a dystopian __________.
  5. Dystopian literature takes a current trend to the __________.
  6. Propaganda creates an emotional response as opposed to a __________ response.
  7. Dystopias often occur after an __________ event like a plague or nuclear warfare.
  8. Sir Thomas __________
  9. A dystopian government often uses mass __________ to spy on its citizens.

15 Clues: Opposite of dystopia.Sir Thomas __________Opposite of individuality.Term for mega-technological genre: “cyber-__________”.Utopia was originally named for a fictional __________.Dystopian literature takes a current trend to the __________.Biased information used to promote a political point of view....

The Time Machine Chapter 3- Crossword Puzzle 2021-02-17

The Time Machine Chapter 3- Crossword Puzzle crossword puzzle
Across
  1. geliştirmek
  2. mantıklı
  3. nüfus
  4. güvenlik, emniyet
  5. tarım
Down
  1. açıklama
  2. tanımak, bilmek
  3. gök gürültülü fırtına
  4. (bir yerde) oturmak, işgal etmek
  5. dikey

10 Clues: nüfusdikeytarımaçıklamamantıklıgeliştirmektanımak, bilmekgüvenlik, emniyetgök gürültülü fırtına(bir yerde) oturmak, işgal etmek

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. mediums
  2. decodes
  3. sender to receiver, creation
  4. protocol levels
  5. sending
Down
  1. common clock
  2. server, user's identity
  3. data
  4. interface, transmitter
  5. security

10 Clues: datamediumsdecodessendingsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysender to receiver, creation

Looking for words 2024-02-05

Looking for words crossword puzzle
Across
  1. peaceful
  2. having plenty of room
  3. insulation
  4. near
  5. security
Down
  1. luminous
  2. original
  3. luxury property
  4. representative co-owners
  5. excellent

10 Clues: nearluminousoriginalpeacefulsecurityexcellentinsulationluxury propertyhaving plenty of roomrepresentative co-owners

Food Security BC 2022-10-27

Food Security BC crossword puzzle
Across
  1. Plants grown for their produce
  2. Animals which are grown for their produce
  3. used in pesticide and fertilizers, oftentimes harmful towards the environment
  4. Interaction among companies, people and governments
  5. Where the city meets the rural area
  6. ... farming: farming in the city
Down
  1. same definition as healing, 'replenishing'
  2. A device invented to take photos of leftovers and notify people when there are leftovers so food isn't wasted
  3. an organization which donates leftover uneaten food from events such as the superbowl to homeless shelters and the people in need
  4. ... produce: produce grown near/close to the market(s) it ships to, so the food is fresh (but often rots quickly)

10 Clues: Plants grown for their produce... farming: farming in the cityWhere the city meets the rural areaAnimals which are grown for their producesame definition as healing, 'replenishing'Interaction among companies, people and governmentsused in pesticide and fertilizers, oftentimes harmful towards the environment...

Privacy and Security 2019-09-30

Privacy and Security crossword puzzle
Across
  1. Covered Entity Service Provider (1st Word)
  2. ___________ Identifiable Information
  3. Cybercrime (e.g., action request by email)
  4. Unauthorized access of PHI (non-breach)
  5. __________ Health Information
  6. PHI Law
  7. Altarum PHI Oversight Body
Down
  1. Form of Secure Electronic Submission
  2. Covered Entity Service Provider (2nd Word)
  3. Secret Word (unlocks computer)

10 Clues: PHI LawAltarum PHI Oversight Body__________ Health InformationSecret Word (unlocks computer)Form of Secure Electronic Submission___________ Identifiable InformationUnauthorized access of PHI (non-breach)Covered Entity Service Provider (2nd Word)Covered Entity Service Provider (1st Word)Cybercrime (e.g., action request by email)

SECURITY AND VIRUSES 2013-05-01

SECURITY AND VIRUSES crossword puzzle
Across
  1. software program that displays advertising on your computer
  2. Programming language that allows applets to run within a web browser
  3. is a file or program other then a virus that is potentially harmful
  4. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
  5. program written with malicious intent and sent out by attackers
Down
  1. Events or attacks that remove, corrupt, deny access, allow access, or steal information
  2. technically a worm
  3. , is software designed specifically to detect, disable, and remove viruses
  4. Technology created by Microsoft to control interactivity on web pages
  5. self-replicating program that is harmful to networks

10 Clues: technically a wormself-replicating program that is harmful to networkssoftware program that displays advertising on your computerprogram written with malicious intent and sent out by attackersis a file or program other then a virus that is potentially harmfulProgramming language that allows applets to run within a web browser...

Information Security Crossword 2017-01-13

Information Security Crossword crossword puzzle
Across
  1. A secret series of characters used to authenticate a person’s identity.
  2. A person who uses computers to gain unauthorized access to computer systems and networks.
  3. Anything that has the potential to cause serious harm to a computer system.
  4. You may not divulge this information while you are working for an employer or after you leave.
Down
  1. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
  2. A type of malware that is often disguised as legitimate software.
  3. A flaw or weakness that can be used to attack a system or organization.
  4. Personal information related to personal data stored on computer systems
  5. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
  6. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.

10 Clues: A type of malware that is often disguised as legitimate software.A flaw or weakness that can be used to attack a system or organization.A secret series of characters used to authenticate a person’s identity.Personal information related to personal data stored on computer systems...

INFORMATION SECURITY PUZZLE 2017-11-14

INFORMATION SECURITY PUZZLE crossword puzzle
Across
  1. A piece of digital information generated by a web server and saved in your computer after visiting a website
  2. A network using which things can communicate with each other using internet as means of communication between them.
  3. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
  1. Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  2. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  3. An attempt by hackers to damage or destroy a computer network or system.
  4. A software that is designed to detect and destroy compute viruses.
  5. Global system of interconnected computer networks that use the Internet protocol suite
  6. Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.

10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _A software that is designed to detect and destroy compute viruses.An attempt by hackers to damage or destroy a computer network or system.Don't click on _ _ _ _ _ within emails from an unknown or untrusted source...

Network Security Commands 2022-04-25

Network Security Commands crossword puzzle
Across
  1. Authenticates the vty line against the local database.
  2. Configure the IP domain name of the network by using the global configuration mode.
  3. Enables vty inbound SSH sessions
  4. Generates a key to encrypt SSH traffic
  5. Disables an inactive privileged EXEC mode access after a specified amount of time.
  6. Sets a minimum acceptable password length
Down
  1. Encrypts all plaintext passwords.
  2. Shows the services or ports that are on by default.
  3. Deters brute-force password guessing attacks.
  4. Verifies or creates a local database entry.

10 Clues: Enables vty inbound SSH sessionsEncrypts all plaintext passwords.Generates a key to encrypt SSH trafficSets a minimum acceptable password lengthVerifies or creates a local database entry.Deters brute-force password guessing attacks.Shows the services or ports that are on by default.Authenticates the vty line against the local database....

FNaF Security Breach 2023-08-11

FNaF Security Breach crossword puzzle
Across
  1. A broken ex-guitarist
  2. Narcissistic fox
  3. A funny nighttime jester man
  4. A funny daytime jester man
  5. Your guardian
  6. I smell pizza!
Down
  1. Psycho rabbit lady
  2. He always comes back
  3. A security guard
  4. The guitarist's replacement

10 Clues: Your guardianI smell pizza!A security guardNarcissistic foxPsycho rabbit ladyHe always comes backA broken ex-guitaristA funny daytime jester manThe guitarist's replacementA funny nighttime jester man

SPECIAL SECURITY PUZZLE 2023-08-17

SPECIAL SECURITY PUZZLE crossword puzzle
Across
  1. EMERGENCY LIGHT
  2. EIGHTSIDED SIGN
  3. SEE OUTSIDE THE DOOR
  4. SAFEST PLACE FOR CAR
  5. LIFELINE FOR PET
Down
  1. TOP SPEED IN SUN CITY
  2. NO SOLICITING
  3. 702-254-2303
  4. KEEP GARAGE DOOR_____
  5. NIGHTTIME DETERRENT

10 Clues: 702-254-2303NO SOLICITINGEMERGENCY LIGHTEIGHTSIDED SIGNLIFELINE FOR PETNIGHTTIME DETERRENTSEE OUTSIDE THE DOORSAFEST PLACE FOR CARTOP SPEED IN SUN CITYKEEP GARAGE DOOR_____

SECURITY AWARENESS PUZZLE 2023-09-20

SECURITY AWARENESS PUZZLE crossword puzzle
Across
  1. Acronym for Communications Security
  2. An orange stripe on an visitor's badge indicates that the visitor is a
  3. If an unauthorized individual has seen classified material the the material has been?
  4. Classified material must NEVER be left
  5. Acronym for Department of Defense?
Down
  1. Name of the area in a facility where classified computer equipment is openly stored (two words)
  2. This must be worn at all times when entering, exiting and within all company locations
  3. Acronym for the Federal Bureau of Investigation
  4. Visitors must have an ___ at all times
  5. Access to classified information requires a clearance and a (3 words)

10 Clues: Acronym for Department of Defense?Acronym for Communications SecurityVisitors must have an ___ at all timesClassified material must NEVER be leftAcronym for the Federal Bureau of InvestigationAccess to classified information requires a clearance and a (3 words)An orange stripe on an visitor's badge indicates that the visitor is a...

Platfom security crossword 2023-09-15

Platfom security crossword crossword puzzle
Across
  1. , helps to prevent unauthorized access to data on lost or stolen computers by combining
  2. boot , Measured Boot measures all important code and configuration settings during the boot of Windows.
  3. , the process responsible for secure logon.
  4. , linux uses this technique to define the priority of processes
  5. ,The core of OS and has complete control over everything in the system.
Down
  1. Network Authentication protocol based on trusted third party to authenticate server and client.
  2. , processes running in the background, started by the kernel itself.
  3. , a real-time operating system used in mission-critical applications
  4. , one method to block buffer overflow attacks
  5. ,a connection used to exchange data between the processes.

10 Clues: , the process responsible for secure logon., one method to block buffer overflow attacks,a connection used to exchange data between the processes., linux uses this technique to define the priority of processes, processes running in the background, started by the kernel itself., a real-time operating system used in mission-critical applications...

Network security management 2024-03-21

Network security management crossword puzzle
Across
  1. Tools for monitoring and analyzing network traffic
  2. A mechanism for verifying user identity
  3. A system for detecting abnormal network behavior
  4. Protocol for encrypted data transmission
  5. Technologies to prevent the spread of malicious software
Down
  1. Technologies used to protect data transmission in networks
  2. Practice of protecting computer networks from unauthorized access
  3. A Strategy for Restricting Network Resource Access
  4. Provide a secure channel for remote access to network devices
  5. A device for detecting and blocking network attacks

10 Clues: A mechanism for verifying user identityProtocol for encrypted data transmissionA system for detecting abnormal network behaviorTools for monitoring and analyzing network trafficA Strategy for Restricting Network Resource AccessA device for detecting and blocking network attacksTechnologies to prevent the spread of malicious software...

HIPAA Security Training 2024-03-15

HIPAA Security Training crossword puzzle
Across
  1. Used to protect accounts and information
  2. Protection against unauthorized access
  3. Process to secure data
  4. Permission by individuals for use of their PHI
  5. Health Insurance Portability and Accountability Act
Down
  1. Adherence to laws and regulations
  2. Right of individuals to keep their information secure
  3. Unauthorized access/disclosure of PHI
  4. Protected Health Information
  5. Notifying appropriate entities about breaches

10 Clues: Process to secure dataProtected Health InformationAdherence to laws and regulationsUnauthorized access/disclosure of PHIProtection against unauthorized accessUsed to protect accounts and informationNotifying appropriate entities about breachesPermission by individuals for use of their PHIHealth Insurance Portability and Accountability Act...

Security Crossword Puzzle 2024-05-16

Security Crossword Puzzle crossword puzzle
Across
  1. there is a right and ______ way to lift properly and prevent back injuries.
  2. _____ offers a year-round discount to all Great Wolf Pack Members on these shoes.
  3. Balancing work with our personal lives and responsibilities can sometimes take a toll on our _____ health.
  4. The biggest _____ when it comes to stretching is not holding the stretch long enough.
Down
  1. It only takes how many bad lifts to potentially seriously injure yourself?
  2. What should you check on your shoes frequently?
  3. Keep the object you are lifting _____ to your body.
  4. Do NOT lift with your back ______?
  5. Slip, _____, and fall incidents can result in serious injury and are the most common cause of workplace injuries at Great Wolf.
  6. Do not _____ while lifting objects.

10 Clues: Do NOT lift with your back ______?Do not _____ while lifting objects.What should you check on your shoes frequently?Keep the object you are lifting _____ to your body.It only takes how many bad lifts to potentially seriously injure yourself?there is a right and ______ way to lift properly and prevent back injuries....

Information Security Essentials 2025-04-28

Information Security Essentials crossword puzzle
Across
  1. Program untuk mendeteksi dan menghapus malware
  2. Aturan organisasi untuk keamanan informasi
  3. Melindungi informasi dari akses yang tidak sah
  4. Informasi selalu dapat diakses saat dibutuhkan
Down
  1. Penipuan untuk mencuri data via email/SMS/telepon
  2. Aset berharga yang harus dilindungi
  3. Kata sandi yang sulit ditebak
  4. Menjaga informasi agar tidak diubah secara ilegal
  5. Aplikasi untuk menyimpan kata sandi dengan aman
  6. Tindakan saat temukan aktivitas mencurigakan

10 Clues: Kata sandi yang sulit ditebakAset berharga yang harus dilindungiAturan organisasi untuk keamanan informasiTindakan saat temukan aktivitas mencurigakanProgram untuk mendeteksi dan menghapus malwareMelindungi informasi dari akses yang tidak sahInformasi selalu dapat diakses saat dibutuhkanAplikasi untuk menyimpan kata sandi dengan aman...

Mobile Security Quiz 2025-09-15

Mobile Security Quiz crossword puzzle
Across
  1. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.​
  2. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.​
  3. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.​
  4. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.​
Down
  1. (7) | An isolated environment restricting app access to the broader system to contain threats.​
  2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.​
  3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.​
  4. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​
  5. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.​

10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status.(7) | An isolated environment restricting app access to the broader system to contain threats.​(8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​...

Mobile Security Quiz 2025-09-15

Mobile Security Quiz crossword puzzle
Across
  1. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.​
  2. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.​
  3. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.​
  4. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.​
Down
  1. (7) | An isolated environment restricting app access to the broader system to contain threats.​
  2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.​
  3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.​
  4. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​
  5. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.​

10 Clues: (9) | Collecting data remotely from devices to monitor performance or security status.(7) | An isolated environment restricting app access to the broader system to contain threats.​(8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​...

Information Security Challenge 2025-12-01

Information Security Challenge crossword puzzle
Across
  1. An individual who uses technical skills to gain unauthorized access to systems or data.
  2. The potential for loss or damage when a threat exploits a vulnerability.
  3. Restricting access to resources based on user identity and permissions.
  4. Double-check before you enter—password plus token.
  5. Ensuring that data remains accurate, consistent, and unaltered.
Down
  1. Writing software in a way that prevents security vulnerabilities.
  2. Ensuring that systems and data are accessible when needed by authorized users.
  3. Any circumstance or event with the potential to harm systems or data.
  4. GDPR and HIPAA aim to ensure this
  5. Gaining unauthorized physical access by following an authorized person into a secure area.

10 Clues: GDPR and HIPAA aim to ensure thisDouble-check before you enter—password plus token.Ensuring that data remains accurate, consistent, and unaltered.Writing software in a way that prevents security vulnerabilities.Any circumstance or event with the potential to harm systems or data....

Security Awareness Spotlight 2025-06-04

Security Awareness Spotlight crossword puzzle
Across
  1. For device maintenance, you should uninstall_______ apps from your devices.
  2. The event automatically logs _______ minutes per mission as volunteer time.
  3. To verify identities during emergencies, families should establish a unique _______ or phrase
  4. Browser maintenance includes clearing_______ and cookies.
  5. One of the missions is called "_______ boost", which involves securing your Wi-Fi network
  6. For account security, you should enable_______ authentication on critical accounts
  7. You should regularly update your devices'_______ systems and apps.
Down
  1. The TELUS Days of Giving event invites you to host a "_______ Party" with family and friends.
  2. You should _______ yourself to see what information is publicly available.
  3. To check if your data has been compromised, you can scan your email for _______ web breaches.

10 Clues: Browser maintenance includes clearing_______ and cookies.You should regularly update your devices'_______ systems and apps.You should _______ yourself to see what information is publicly available.For device maintenance, you should uninstall_______ apps from your devices.The event automatically logs _______ minutes per mission as volunteer time....

July Security Sightline 2025-07-07

July Security Sightline crossword puzzle
Across
  1. Stay _____ in public spaces, especially at large gatherings or events
  2. Practice, tactics, techniques & strategies used to combat or eliminate terrorism
  3. ____ is Antiterrorism Month
  4. Scott _____ Kartvedt - Former Blue Angel
Down
  1. End on a Positive Note "___ TO BE HERE"
  2. Only as a last resort
  3. See Something,____ Something
  4. If escape isn't possible - stay quiet and out of sight
  5. RGi's Rubber Mascot
  6. If you can escape safely

10 Clues: RGi's Rubber MascotOnly as a last resortIf you can escape safely____ is Antiterrorism MonthSee Something,____ SomethingEnd on a Positive Note "___ TO BE HERE"Scott _____ Kartvedt - Former Blue AngelIf escape isn't possible - stay quiet and out of sightStay _____ in public spaces, especially at large gatherings or events...

Security Code East 2025-07-09

Security Code East crossword puzzle
Across
  1. Will leave your fingers stained
  2. Begone!
  3. What one might do to hair
  4. What one might need a cleanser for
  5. In between acrylic and watercolor
Down
  1. Turkey dinner
  2. An essential for an art student
  3. A descriptor for say, Arnold Schwarzenegger
  4. What most of us are
  5. Happy cat!

10 Clues: Begone!Happy cat!Turkey dinnerWhat most of us areWhat one might do to hairWill leave your fingers stainedAn essential for an art studentIn between acrylic and watercolorWhat one might need a cleanser forA descriptor for say, Arnold Schwarzenegger

HIPAA Privacy & Security 2025-08-25

HIPAA Privacy & Security crossword puzzle
Across
  1. Documenting for services not provided.
  2. Keeping client information from being shared.
  3. When personal benefit interferes with duty.
  4. Anonymous channel for ethical reporting.
Down
  1. Accurate and complete ___ is required for compliance.
  2. Sharing PHI improperly is a HIPAA ___.
  3. Making decisions with integrity.
  4. Speaking up about wrongdoing.
  5. To speak up against wrongdoing.
  6. Law banning referral incentives

10 Clues: Speaking up about wrongdoing.To speak up against wrongdoing.Law banning referral incentivesMaking decisions with integrity.Documenting for services not provided.Sharing PHI improperly is a HIPAA ___.Anonymous channel for ethical reporting.When personal benefit interferes with duty.Keeping client information from being shared....

Antivirus 2022-12-09

Antivirus crossword puzzle
Across
  1. Cleanup Premium
  2. Data Internet security
  3. Web Security Space
Down
  1. Internet security
  2. Dome
  3. Internet security

6 Clues: DomeCleanup PremiumInternet securityInternet securityWeb Security SpaceData Internet security

Pay Checks 2021-09-29

Pay Checks crossword puzzle
Across
  1. collects federal taxes to pay for public services
  2. the most common method of payment
  3. methods to pay employees
  4. money is electronically loaded onto a plastic card
  5. employee withholding allowance certificate
  6. The national health care program for the elderly and is 1.45%
  7. The nation's retirement program and is 6.2%
  8. compulsory charges imposed on citizens by local, state and federal governments
Down
  1. is the easiest way to get paid
  2. the length of time for which an employee's wages are calculated
  3. Is a retirement program you can make contributions to
  4. The amount of money left after all deductions have been withheld
  5. on the W-4 are used to calculate the amount of federal taxes withheld from your paycheck
  6. are associated with using a payroll card
  7. The total amount of money earned during a pay period before deductions
  8. a document included each pay period which outlines paycheck deductions
  9. Includes 2 separate taxes, social security, and medicare
  10. you must be a documented worker in order to be eligible to work in the United States
  11. Employment Eligibility Verification Form

19 Clues: methods to pay employeesis the easiest way to get paidthe most common method of paymentare associated with using a payroll cardEmployment Eligibility Verification Formemployee withholding allowance certificateThe nation's retirement program and is 6.2%collects federal taxes to pay for public services...

Stock Market 2023-04-26

Stock Market crossword puzzle
Across
  1. The Federal Deposit Insurance Corporation
  2. A security that gives a of ownership of a company
  3. Owners/part-owners of a company not involved with running the buisiness
  4. Money left over after paying for any expenses
  5. A market where securities are bought and sold
  6. Company's ability to convert assets to cash or acquire cash
  7. The value of financial assets increases over time
Down
  1. Uncertainty with respect to one's investments
  2. The cost of an item/security
  3. An agreement to provide you a future equity stake based on the amount you invested
  4. Increase in price, usually in securities/stocks
  5. An instrument in which a person can either make investment, borrow money, or save money
  6. The process of buying assets that increase or decrease in value over time and provide returns
  7. Decrease in price, usually in securities/stocks
  8. Distribution of a company's earnings to its shareholders
  9. State, act, or right of owning something
  10. A single company that has a controlling interest in another company or companies
  11. Issued by government when they want to raise money
  12. Unit of equity ownership in a corporation

19 Clues: The cost of an item/securityState, act, or right of owning somethingThe Federal Deposit Insurance CorporationUnit of equity ownership in a corporationUncertainty with respect to one's investmentsMoney left over after paying for any expensesA market where securities are bought and soldIncrease in price, usually in securities/stocks...

A word Maze : Facility Management & Corporate Real Estate 2024-01-16

A word Maze : Facility Management & Corporate Real Estate crossword puzzle
Across
  1. A term for the physical location of a property
  2. A type of real estate that includes warehouses and factories
  3. A professional who advises on property transactions
  4. A term for the usable space in a building
  5. A professional responsible for managing all aspects of a building
  6. The process of planning for future facility needs
  7. A type of contract for the use of a property
  8. A type of maintenance performed to avoid breakdowns
  9. A term for the income a property generates after expenses
  10. A type of real estate that includes apartment buildings
Down
  1. A type of real estate that includes shopping centers and restaurants
  2. A term for the day-to-day maintenance of a building
  3. A term for the ongoing costs of operating a building
  4. The process of maximizing the value and usage of a property
  5. The process of ensuring a facility complies with regulations
  6. The cost of using a property, often expressed per square foot
  7. The process of managing a property’s energy usage
  8. A type of real estate that includes office buildings
  9. The process of overseeing a property’s security measures
  10. A document that outlines the terms and conditions of a property lease

20 Clues: A term for the usable space in a buildingA type of contract for the use of a propertyA term for the physical location of a propertyThe process of managing a property’s energy usageThe process of planning for future facility needsA term for the day-to-day maintenance of a buildingA professional who advises on property transactions...

wow 2022-09-12

wow crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service
  2. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  3. Customizable additions to software for extra functionality.
  4. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. The deliberate use of someone else's identity, typically for financial gain.
  6. A simple form of code for software that can be written in word editors.
  7. Hacking that is meant to do minimal damage and is usually done out of curiosity.
  8. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  9. When an attacker inputs many passwords in the hope that it is eventually guessed correctly.
  10. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
Down
  1. Software that has their code listed as free to use, share, and modify.
  2. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  3. Admin control: Having _____ control of any given system.
  4. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  5. A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. Software that can only be run for a limited amount of time before it expires.
  8. A previously unknown, bug, flaw, or backdoor in software. An attack happens once this flaw is exploited and attackers release malware before the flaw can be patched.
  9. The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
  10. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.

20 Clues: Admin control: Having _____ control of any given system.Customizable additions to software for extra functionality.Software that has their code listed as free to use, share, and modify.A simple form of code for software that can be written in word editors.A secret word or phrase that is used to access a computer system or service...

HAPPY BIRTHDAY TANNER! 2024-02-15

HAPPY BIRTHDAY TANNER! crossword puzzle
Across
  1. "home, home on the..."
  2. slugs
  3. Barbie's favorite color
  4. "Joe of old time bubblegum"
  5. peak
  6. bullseye
Down
  1. what skiers wear
  2. startle
  3. smaller than a mountain
  4. "DARN!"
  5. what you might want to wear to a rap concert
  6. rhymes with cammo
  7. security
  8. 38?

14 Clues: 38?peakslugsstartle"DARN!"securitybullseyewhat skiers wearrhymes with cammo"home, home on the..."smaller than a mountainBarbie's favorite color"Joe of old time bubblegum"what you might want to wear to a rap concert

cyber safety 2017-04-25

cyber safety crossword puzzle
Across
  1. when a person writes something online
  2. worldwide of computer networks
  3. an application that lets you in a game or internet
Down
  1. a application on the web that locates,retrieves, and displays information
  2. a word used for electronics
  3. a message sent from electronics

6 Clues: a word used for electronicsworldwide of computer networksa message sent from electronicswhen a person writes something onlinean application that lets you in a game or interneta application on the web that locates,retrieves, and displays information

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. A code used to prove your identity
  2. Someone who is mean or aggressive online
Down
  1. Posting rumours online ruining someone's Reputation
  2. A hack or Hacker Forcing something bad onto a computer
  3. Someone who pretends to be someone else to get money
  4. Being Safe and Responsible Online

6 Clues: Being Safe and Responsible OnlineA code used to prove your identitySomeone who is mean or aggressive onlinePosting rumours online ruining someone's ReputationSomeone who pretends to be someone else to get moneyA hack or Hacker Forcing something bad onto a computer

Cyber Hygiene 2024-03-06

Cyber Hygiene crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. A security method that requires two forms of identification to access resources and data.
  3. A set of practices users take to improve their online security.
Down
  1. A type of scam that uses email or websites to trick victims.
  2. Malicious activities on digital systems or network.
  3. A scam that involves a victim to be tricked by a fake online identity.

6 Clues: Malicious activities on digital systems or network.A type of scam that uses email or websites to trick victims.A set of practices users take to improve their online security.A scam that involves a victim to be tricked by a fake online identity.A string of characters that allows access to a computer system or service....

cyber mobbing 2024-04-15

cyber mobbing crossword puzzle
Across
  1. wo passiert am meisten cybermobbing?
  2. auf was solltest du achten um deinen account von hackern zu schützen?
  3. wie heißt mobbing übers Internet?
Down
  1. in welchem land ist cybermobbing seid 2016 strafbar?
  2. wie heißt die notrufnummer für hilfe?
  3. wie heißt ein gefälschtes profil?

6 Clues: wie heißt ein gefälschtes profil?wie heißt mobbing übers Internet?wo passiert am meisten cybermobbing?wie heißt die notrufnummer für hilfe?in welchem land ist cybermobbing seid 2016 strafbar?auf was solltest du achten um deinen account von hackern zu schützen?

Cyber Wellness 2023-02-01

Cyber Wellness crossword puzzle
Across
  1. whatever you post online, it will have an ______ on how others think about you
  2. do not _______ your password
  3. think ______ you do
Down
  1. you can share you password with ______ friends
  2. _____ others opinions and privacy
  3. you need to have trust before you _____ someone

6 Clues: think ______ you dodo not _______ your password_____ others opinions and privacyyou can share you password with ______ friendsyou need to have trust before you _____ someonewhatever you post online, it will have an ______ on how others think about you

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. : Local network in a small area
  2. : A global network of networks
Down
  1. : Harmful software
  2. : Wireless internet access
  3. : Sends data between computer networks
  4. : Moral rules for digital use

6 Clues: : Harmful software: Wireless internet access: Moral rules for digital use: A global network of networks: Local network in a small area: Sends data between computer networks

Cyber Chase 2025-09-09

Cyber Chase crossword puzzle
Across
  1. – A type of malicious code that replicates itself.
  2. – Malicious software that pretends to be legitimate.
  3. – A person who breaks into computer systems.
Down
  1. – Self-replicating malware that spreads without user action.
  2. – Secretly tracks your activity.
  3. – Shows excessive ads but doesn’t always track data.

6 Clues: – Secretly tracks your activity.– A person who breaks into computer systems.– A type of malicious code that replicates itself.– Malicious software that pretends to be legitimate.– Shows excessive ads but doesn’t always track data.– Self-replicating malware that spreads without user action.

Cyber Witch 2025-11-04

Cyber Witch crossword puzzle
Across
  1. Ritual con vela
  2. Lectura
  3. Lectura
Down
  1. Jar ritual de mar
  2. una vela
  3. Lectura
  4. Vale la pena
  5. Pregunta puntuales

8 Clues: LecturaLecturaLecturauna velaVale la penaRitual con velaJar ritual de marPregunta puntuales

Cyber Safety 2025-11-20

Cyber Safety crossword puzzle
Across
  1. A fake message trying to steal info
  2. The private word/phrase you use to sign in
  3. Verifying something is real
  4. An email designed to look legit but isn’t
Down
  1. Type of hacker hired by companies to test employees
  2. Someone who protects a company from attacks

6 Clues: Verifying something is realA fake message trying to steal infoAn email designed to look legit but isn’tThe private word/phrase you use to sign inSomeone who protects a company from attacksType of hacker hired by companies to test employees

RECAP IND 2023-08-01

RECAP IND crossword puzzle
Across
  1. BEFORE DESIGNING A TRAINING YOU NEED TO DEFINE CLEAR TRAINING....
  2. THIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING
  3. A TYPE OF INTERACTIVE EXERSICE THAT CAN BE USED IN MIDAS TRAININGS
  4. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURES USING MIDAS
  5. A...LIKES TO LEARN FROM DEMONSTRATIONS
  6. A...LIKES TO BE INTELLECTUALLY CHALLENGED
  7. A TRAVELLERS' FINGERPRINTS AND PHOTOGRAPH ARE CONSIDERED THEIR...
  8. A STRATEGY TO MANAGE A DIFFICULT PARTICIPANT BY ASKING "WHAT WOULD YOU DO IN THIS CASE?"
  9. WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPH
Down
  1. AN...HAS ACCESS TO THE WHOLE SYSTEM
  2. WHAT DOES THE D IN MIDAS STAND FOR?
  3. THIS IS A TYPE OF TRAVEL DOCUMENT
  4. WHAT DO YOU NEED TO CHANGE THE FIRST TIME YOU USE MIDAS?
  5. SETTING UP... CAN HELP YOU PREVENT DIFFICULT BEHAVIOURS
  6. MACHINE READABLE TRAVEL DOCUMENTS HAVE A...
  7. IN ADULT LEARNING THEORY, AN... LIKES WORKING IN GROUPS
  8. A TYPE OF LIGHT TO EXAMINE A DOCUMENT SECURITY FEATURE USING MIDAS

17 Clues: THIS IS A TYPE OF TRAVEL DOCUMENTAN...HAS ACCESS TO THE WHOLE SYSTEMWHAT DOES THE D IN MIDAS STAND FOR?A...LIKES TO LEARN FROM DEMONSTRATIONSA...LIKES TO BE INTELLECTUALLY CHALLENGEDMACHINE READABLE TRAVEL DOCUMENTS HAVE A...WHAT IS USED TO CAPTURE A TRAVELLER PHOTOGRAPHTHIS GIVES THE PARTICIPANTS AN OVERVIEW OF THE TRAINING...

cybersecurity Crossword 2025-10-14

cybersecurity Crossword crossword puzzle
Across
  1. acts as a security camera which watches for any suspicious activity
  2. ensuring data is accurate, complete, and secure
  3. storing data on a device not connected to a network
  4. used to detect, prevent, and remove any malicious software
  5. transmits data as pulses of light
  6. the proccess of proving your identity and ensuring authorization
  7. a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
  1. ensuring timely access to information
  2. two step process to verifying identity
  3. relies on physical connections, which makes it difficult to hack
  4. ensures that someone can't unsend anything or deny any action online
  5. to reduce the potential harm of a threat
  6. tool which monitora network traffic and blocks off any sort of malicious activity
  7. stands for confidentiality, integrity, and availability and also means keeping data secret and secure
  8. ways to verify a user's identity
  9. the possibility of an unfortunate event occuring
  10. keeping data private and accessible only to those who are authorized

17 Clues: ways to verify a user's identitytransmits data as pulses of lightensuring timely access to informationtwo step process to verifying identityto reduce the potential harm of a threatensuring data is accurate, complete, and securethe possibility of an unfortunate event occuringstoring data on a device not connected to a network...

I.R.F.I.PCRUCIVERBANDO 2024-01-25

I.R.F.I.PCRUCIVERBANDO crossword puzzle
Across
  1. CHI COMPIE ATTI DI AGGRESSIONE
  2. FURTO DI IDENTITA'
Down
  1. BULLISMO IN RETE
  2. RISPETTO PER LE REGOLE

4 Clues: BULLISMO IN RETEFURTO DI IDENTITA'RISPETTO PER LE REGOLECHI COMPIE ATTI DI AGGRESSIONE

NETWORKING CONCEPTS AND CYBER ETHICS . 2025-05-28

NETWORKING CONCEPTS AND CYBER ETHICS . crossword puzzle
Across
  1. ________ spam filtering / blocking software .
  2. ___________ refers to criminal activities .
  3. A _____ is a network device that is used to connect all the computers in a network with each other .
  4. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  5. A computer ___________ can be as a group of computers .
  6. _____________ refers to an illegal intrusion into a computer system or network .
  7. A network maintained without using wires is called a ___________ network .
  8. A digital footprint is also known as .
  9. What is the short form of Local Area Network ?
Down
  1. _________ topology is connected in circular path .
  2. Hacking , which is done for a good ~cause , such as national security , is known as .
  3. What is the short form of Information and communication technology ?
  4. _____ is a network created for an individual person .
  5. A ________ is a device that connects two different types of networks with each other .
  6. A __________ similar to a hub .
  7. To _________ plagiarism , one can rephrase the material .
  8. Each computer in a network is called a .
  9. ______ refers to unwanted bulk email .

18 Clues: A __________ similar to a hub .A digital footprint is also known as .______ refers to unwanted bulk email .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28

NETWORKING CONCEPT AND CYBER ETHICS crossword puzzle
Across
  1. _________ topology is connected in circular path .
  2. ______ refers to unwanted bulk email .
  3. A digital footprint is also known as .
  4. Each computer in a network is called a .
  5. ________ spam filtering / blocking software .
  6. A _____ is a network device that is used to connect all the computers in a network with each other .
  7. Hacking , which is done for a good ~cause , such as national security , is known as .
  8. A computer ___________ can be as a group of computers .
Down
  1. ___________ refers to criminal activities .
  2. _____________ refers to an illegal intrusion into a computer system or network .
  3. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  4. A network maintained without using wires is called a ___________ network .
  5. What is the short form of Local Area Network ?
  6. A ________ is a device that connects two different types of networks with each other .
  7. To _________ plagiarism , one can rephrase the material .
  8. A __________ similar to a hub .
  9. _____ is a network created for an individual person .
  10. What is the short form of Information and communication technology ?

18 Clues: A __________ similar to a hub .______ refers to unwanted bulk email .A digital footprint is also known as .Each computer in a network is called a .___________ refers to criminal activities .________ spam filtering / blocking software .What is the short form of Local Area Network ?_________ topology is connected in circular path ....

Spring Firm Meeting 2024 2024-04-09

Spring Firm Meeting 2024 crossword puzzle
Across
  1. BPB was founded in nineteen
  2. An activity that often uses talents from a variety of departments
  3. What every company and high net worth family needs
  4. An area that helps high-net-worth people manage their financial lives
  5. Where most of the firm’s new business is originated
  6. A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
  7. A type of organization that serves the community, we do their taxes and audits
  8. Something BayBridge Real Estate Capital helps clients manage, find or refinance
  9. What we all aspire to do
  10. An acronym for a special type of insurance that is tax mitigation tool
  11. How our HR department helps clients
  12. He is the CEO and grew up in the firm
  13. A type of advisory service that helps buyers and sellers of companies
  14. The largest group in the firm and a typical entry point for multiple services
  15. Something PWA advisors help client protect
  16. A software platform MST helps implement at companies
  17. One approach our tax controversy team takes with the IRS
  18. A specialty area of PWA
  19. An acronym for solving repetitive tasks with robotics
  20. How PWA creates a comprehensive approach
Down
  1. What many of our MST services entail
  2. A type of entity that provides tax benefits for manufacturers and distributors that expert products
  3. Where our first office was located
  4. What assurance and cyber teams often do
  5. A lifechanging client event we can help with from planning to tax preparation to estate planning
  6. A governmental agency that scares of our clients but not us
  7. Part of the name of several affiliates
  8. A type of tax credit for manufacturing or product improvement
  9. One of the firm’s key service areas
  10. A core value brought to life by our participation in the DCC and Bounce Back from Cancer
  11. Diversity, equity and blank
  12. A charity event the firm teams have contributed $2 million to since it started 14 years ago
  13. Present blank analysis
  14. Investigating, often in fraud or legal situations
  15. An area of tax that especially impacts clients with operations in multiple states
  16. The area of tax services BPB is probably most famous for
  17. A service that several departments have in their names
  18. A special type of audit for public companies
  19. Managed blank and Technology
  20. Firm members speak in practice in more than this many languages

40 Clues: Present blank analysisA specialty area of PWAWhat we all aspire to doBPB was founded in nineteenDiversity, equity and blankManaged blank and TechnologyWhere our first office was locatedOne of the firm’s key service areasHow our HR department helps clientsWhat many of our MST services entailHe is the CEO and grew up in the firm...

Inventions Crossword 2025-10-30

Inventions Crossword crossword puzzle
Across
  1. the _____ Brothers’ first flight occurred in 1903
  2. the assembly line was introduced by Henry ________________
  3. airplanes improved trade and global ________________
  4. the first flight lasted only ______________ seconds__
  5. computers made it easier to process and access ________________
  6. the printing press was invented by ________________
  7. buying and selling online is called e-
  8. the oven discovered accidentally by Percy Spencer was the ________________
  9. the first computer (Z1) was invented by Konrad ______________
  10. the first photograph was taken by Joseph ________________
  11. the name of Karl Benz’s first car was ________________
  12. the telegraph was invented by Samuel ________________
  13. _______ launched in the year 2004
  14. the television was invented by Philo ________________
  15. before Facebook, a popular social network was ________________
  16. the first practical steam engine was built by Thomas ________________
  17. one modern risk of computers is cyber ________________
  18. the first mobile phone call was made by Martin ________________
  19. the inventor who improved the steam engine was James ________________
  20. the _____ engine was invented in the year 1712
  21. the radio was invented by Guglielmo ________________
  22. the first mobile phone was the size of a ________________
  23. the first automobile was built by Karl ________________
  24. Gutenberg’s press made books more ________________
  25. the invention that captures images and memories is the ________________
  26. the early Internet network was known as ________________
  27. the first ______ was built in the year 1936
Down
  1. the radio made mass ________________ possible
  2. Facebook was created by Mark ________________
  3. one negative result of industrial steam power was more ________________
  4. the airplane was invented by the ________________ brothers
  5. the first major book printed using movable type was the Gutenberg ________________
  6. steam engines allowed for faster ________________
  7. the telephone was invented by Alexander Graham ________________
  8. James Watt added a separate ________________ to improve efficiency
  9. the inventor of the World Wide Web was Tim ________________
  10. the light bulb was invented by Thomas ________________
  11. a light bulb works because of a heated ________________
  12. _____ stands for the World Wide Web
  13. Bell’s first words were “Mr. , come here”
  14. steam engines provided power for early ________________
  15. one negative result of cars was increased ________________
  16. the first mobile phone was produced by ________________
  17. the printing press spread knowledge and improved access to ________________
  18. the telephone revolutionized long-distance ________________
  19. the British inventor who also made a light bulb was Joseph ________________
  20. the first online pages were known as ________________
  21. the automobile increased personal ________________
  22. the light bulb was safer than candles because of reduced fire ________________
  23. the light _____ was invented in the year 1879
  24. Facebook originally started as a platform limited to ________________ students

51 Clues: _______ launched in the year 2004_____ stands for the World Wide Webbuying and selling online is called e-Bell’s first words were “Mr. , come here”the first ______ was built in the year 1936the radio made mass ________________ possibleFacebook was created by Mark ________________the light _____ was invented in the year 1879...

Sundong Air 2025-07-11

Sundong Air crossword puzzle
Across
  1. 탑승구
  2. 체크인 카운터
  3. 여권
Down
  1. 비행기
  2. 탑승권
  3. 보안 검색대
  4. 공항

9 Clues: 공항여권비행기탑승권탑승구보안 검색대체크인 카운터

CHINA VS USA TIKTOK WARS 2024-09-26

CHINA VS USA TIKTOK WARS crossword puzzle
Across
  1. Platforms like TikTok that engage users worldwide.
  2. A security system used to protect against external threats.
  3. TikTok's CEO who testified before the U.S. Congress.
  4. The economic conflict between the U.S. and China impacting technology companies.
  5. The tech company that controls TikTok.
  6. and data collection, often a concern in Chinese platforms.
  7. A popular video-sharing app owned by Chinese company ByteDance.
  8. The country where TikTok’s parent company is based.
  9. The U.S. legislative body involved in TikTok discussions.
  10. Concerns about TikTok shaping public opinion or politics.
Down
  1. The idea of controlling digital infrastructure within a country.
  2. A set of rules TikTok uses to suggest personalized content.
  3. Moderation The practice of managing what is shared on social media platforms.
  4. Information that TikTok collects from its users.
  5. A major concern for the U.S. government regarding TikTok’s operations.
  6. What the U.S. government has considered for TikTok.
  7. Control over content, especially associated with Chinese media.
  8. A key issue raised in the U.S. regarding TikTok’s data collection.
  9. The Chinese parent company of TikTok.
  10. The control or possession of a company, questioned in the TikTok debate.

20 Clues: The Chinese parent company of TikTok.The tech company that controls TikTok.Information that TikTok collects from its users.Platforms like TikTok that engage users worldwide.What the U.S. government has considered for TikTok.The country where TikTok’s parent company is based.TikTok's CEO who testified before the U.S. Congress....

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sent by the sender to receiver
  2. data
  3. origin
  4. interface, transmitter
  5. common clock
  6. server, user's identity
  7. security
Down
  1. decodes
  2. protocol levels
  3. bringing something to existence
  4. mediums

11 Clues: dataorigindecodesmediumssecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysent by the sender to receiverbringing something to existence

cocoa deals 2022-01-10

cocoa deals crossword puzzle
Across
  1. Steagall banking
  2. conservation corps
  3. housing act
  4. security administration
  5. owner's loan act
  6. works administration
Down
  1. industrial recovery administration
  2. work administration
  3. banking relief act
  4. progress administration
  5. conservation

11 Clues: housing actconservationSteagall bankingowner's loan actconservation corpsbanking relief actwork administrationworks administrationprogress administrationsecurity administrationindustrial recovery administration

Empathy and Violence 2021-02-04

Empathy and Violence crossword puzzle
Across
  1. number of habits of an empathetic person
  2. Second H in the HA-HA-SO model
  3. the capacity to understand or feel what another person is experiencing
  4. The s in the HA-HA-SO model
  5. a way to increase Self-Esteem
  6. an individual's subjective evaluation of their own worth.
  7. This type of bullying happens online
Down
  1. someone who may shape your self esteem, starts with P
  2. a person who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
  3. First A in the HA-HA-SO model
  4. The O in the HA-HA-SO model
  5. someone who may shape your self esteem, starts with F
  6. Second A in the HA-HA-SO model
  7. First H in the HA-HA-SO model
  8. This type of bullying may be punches
  9. This type of bullying uses words

16 Clues: The O in the HA-HA-SO modelThe s in the HA-HA-SO modelFirst A in the HA-HA-SO modelFirst H in the HA-HA-SO modela way to increase Self-EsteemSecond A in the HA-HA-SO modelSecond H in the HA-HA-SO modelThis type of bullying uses wordsThis type of bullying may be punchesThis type of bullying happens onlinenumber of habits of an empathetic person...

Dystopian Escape Room 2020-04-23

Dystopian Escape Room crossword puzzle
Across
  1. opposite of dystopia
  2. Kim Jong-Un is practically worshipped by citizens, making him the __________ of North Korea
  3. The word “utopia” was created from 2 __________ words, eutopia & outopia
  4. A dystopian government often uses mass __________ to spy on its citizens
  5. Term for mega-technological genre: “cyber-__________”
  6. Type of government that has total control over people’s lives
  7. Opposite of individuality
  8. __________
Down
  1. #7 down was originally named for a fictional __________
  2. Dystopias often occur after an __________ event like a plague of nuclear warfare
  3. Dystopian literature takes a current trend to the _____
  4. Sir Thomas __________
  5. A dystopia typically exists as an __________ of a perfect world
  6. The answer to #15 across serves to create an emotional response as opposed to a __________ response
  7. Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of
  8. Biased information used to promote a political point of view

16 Clues: __________opposite of dystopiaSir Thomas __________Opposite of individualityTerm for mega-technological genre: “cyber-__________”#7 down was originally named for a fictional __________Dystopian literature takes a current trend to the _____Biased information used to promote a political point of view...

Understand & Taking A Stand Against Bullying 2024-05-30

Understand & Taking A Stand Against Bullying crossword puzzle
Across
  1. Position or rank in relation to others.
  2. An act of physical harm or injury to another person.
  3. Behavior directed at another person that is unwanted and unwelcome.
  4. Belief in one's own abilities.
  5. To communicate through words or gestures the intent to harm another person.
  6. Set apart from others; alone.
  7. Having to do with or involving computers or other online technology.
  8. To refuse to admit; to force out.
  9. Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
  10. People of the same age, or close in age, who are similar in many ways.
  11. To keep from happening or existing.
Down
  1. Boldly hostile; quarrelsome.
  2. Related to words and speech.
  3. The result or outcome of an action or event.
  4. Done on purpose; planned or deliberate.
  5. Confident and self-assured.

16 Clues: Confident and self-assured.Boldly hostile; quarrelsome.Related to words and speech.Set apart from others; alone.Belief in one's own abilities.To refuse to admit; to force out.To keep from happening or existing.Position or rank in relation to others.Done on purpose; planned or deliberate.The result or outcome of an action or event....

Cyberbullying via Social Media 2024-10-31

Cyberbullying via Social Media crossword puzzle
Across
  1. a lighthearted way to defuse a mean situation
  2. popular social media app with integrated "Here for you"
  3. protect this and change it immediately if anyone finds it out for your cyber safety and privacy
  4. cyberbullying has caused almost double the attempts of this
  5. type of thinking required to decide if something is real or not online
  6. Australia's ranking in 'countries with the highest level of bullying'
  7. sharing someones personal identity without their consent
  8. recommended site to report bullying
Down
  1. type of bystander to call out when witnessing bullying
  2. what you should do before you post
  3. type of cyberbullying for sharing private information about someone without their consent
  4. the 4th S in KidsHelpline's '4S' steps
  5. percent of teens without access to a cell phone
  6. trending social media app with a wellbeing guide
  7. intimate messaging type putting you at risk of blackmail or image-abuse
  8. reason for cyberbullying which can be benign or toxic

16 Clues: what you should do before you postrecommended site to report bullyingthe 4th S in KidsHelpline's '4S' stepsa lighthearted way to defuse a mean situationpercent of teens without access to a cell phonetrending social media app with a wellbeing guidereason for cyberbullying which can be benign or toxic...

class puzzle 2023-08-22

class puzzle crossword puzzle
Across
  1. the act of taking over other electronics
  2. the amount of time it takes to get a action done
  3. the act of bullyng on the enternet
  4. a two word virus named was a computer worm designed to exploit major flaws in Microsoft’s Internet Information Services web server.
  5. the sexueal
  6. the most dangerious virus first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites.
  7. what you need to sign in
  8. worm was not just a worm that could replicate itself but also a Trojan horse, or malware disguised as a harmless program.
  9. a facebook virus that was named after a snack made of flower egg and chocolate
  10. a person employed to look after technical equipment or do practical work in a laboratory.
  11. the "cells" of a webcite
  12. theact of making electronics work
Down
  1. another computer worm, targeted machines with Windows XP and Windows 2000 operating systems in 2004. It spread quickly through a vulnerability in the Local Security Authority Subsystem Service, which is responsible for managing user logins and credentials. The worm caused millions of PCs to blue screen and crash, which led many businesses to shut down their networks until the infection was dealt with.
  2. was designed to encrypt files on infected computers and demand a ransom from its victims. However, the malware was unique in that it spread rapidly throughout computer networks by exploiting vulnerabilities in outdated Windows operating systems.
  3. the location of informaiton
  4. the worst malware in history, causing more than $38 billion worth of damages in 2004. Like Sobig, it was another type of mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.
  5. a virus named after the greek god of lightning
  6. malware appeared in October 2001. It had the capability to exploit buggy Microsoft email clients and spread itself to everyone in a user’s Outlook address book.
  7. computer worm discovered in 2010, spreading via corrupted USB drives and was predominantly used in cyber warfare. The malware targeted industrial control systems used to control nuclear power plants and other industrial facilities.
  8. good hacker it is 2 words no space
  9. bad hacker it is 2 words no space
  10. also known as the love letter or the LoveBug virus, was first discovered in May 2000.
  11. the way to get to a web sight
  12. a bad program
  13. most vaulable player

25 Clues: the sexueala bad programmost vaulable playerwhat you need to sign inthe "cells" of a webcitethe location of informaitonthe way to get to a web sightbad hacker it is 2 words no spacetheact of making electronics workthe act of bullyng on the enternetgood hacker it is 2 words no spacethe act of taking over other electronics...

Title 2017-01-23

Title crossword puzzle
Across
  1. an instrument used to encumber land as a security for a debt (Non-Judicial States)
  2. date the county has verified their records through
  3. total amount paid during a transfer of land
  4. a map representing a piece of land subdivided into lots
  5. road map to final policy
  6. IE. A property in Maryland requiring yearly ground rent payments
  7. a person, who, by a written instrument receives an interest in land
Down
  1. product provided by an abstractor consisting of deeds and open encumbrances
  2. recorded document switching lien position
  3. boundary lines of a piece of land
  4. cover page of a search package
  5. IE. Right of Way
  6. right of ownership for the life of an individual
  7. end results of refinance transaction once all requirements have been met
  8. a person, who, by a written instrument transfers to another an interest in land
  9. lien or charge upon the land of the debtor
  10. an instrument used to encumber land as a security for a debt (Judicial States)

17 Clues: IE. Right of Wayroad map to final policycover page of a search packageboundary lines of a piece of landrecorded document switching lien positionlien or charge upon the land of the debtortotal amount paid during a transfer of landright of ownership for the life of an individualdate the county has verified their records through...

maabd crossword 2023-03-24

maabd crossword crossword puzzle
Across
  1. this program provides qualified Medicare eligible individuals withcoverage of their Medicare premiums
  2. Amendment Public Law 94-566 Section 503
  3. Covers only Medicare co-pays, premium and deductible charges
  4. medical assistance to disabled children who require a level of care provided ina medical facility, but can be appropriately cared for at home for less cost
  5. RETIREMENT, SURVIVORS, DISABILITY INSURANCE
  6. determined blind according to Social Security Administration criteria
  7. Have net countable income 100% - 120% of FPL
  8. must be 65 years or older
  9. SUPPLEMENTAL SECURITY INCOME
Down
  1. eligibility renewed once every 12 months
  2. cover aged, blind and disabled individuals using SSI budgeting methodologies
  3. Have net countable income 120% - 135% of FPL
  4. Aging and Disability Services Division
  5. individual must meet the disability criteria established by the SSA
  6. SUPPLEMENTAL SECURITY INCOME
  7. Individuals eligible for this program receive reduced premium payments for their Part D prescription drug program
  8. Scholarships, Fellowships, Need-Based Education Grants
  9. Medicaid coverage for emergency medical situations to individuals who do not meet the criteria of a qualified non-citizen

18 Clues: must be 65 years or olderSUPPLEMENTAL SECURITY INCOMESUPPLEMENTAL SECURITY INCOMEAging and Disability Services Divisioneligibility renewed once every 12 monthsAmendment Public Law 94-566 Section 503RETIREMENT, SURVIVORS, DISABILITY INSURANCEHave net countable income 120% - 135% of FPLHave net countable income 100% - 120% of FPL...

Deposit and withdrawal puzzle 2022-05-05

Deposit and withdrawal puzzle crossword puzzle
Across
  1. internal decline generated on a credit card deposit attempt.
  2. security tool, checking for fraud and financial background of customer.
  3. 3-4% charge
  4. The deposit limit is 2 per month.
  5. checking email address, phone number or name to see if the customer has an online presence or background.
  6. card number starts with 6.
  7. Once the Payments Out department determines that all the Rules/Terms and Conditions were upheld.
  8. the sense of regret after spending a lot of money.
  9. This code consists of 8 - 11 characters.
Down
  1. used to store, buy, send and receive Bitcoins and Bitcoin Cash coins.
  2. Refund request must be sent to the Payments Department.
  3. Reviews only WGS, JS, Rival, Everygame, GE.
  4. processors are not using an online gaming merchant category code for processing transactions.
  5. The minimum deposit amount for Miami Club Casino is $35.
  6. A Transaction will not show up in IPP. backoffice because.
  7. Only available for WGS & RI players.
  8. processors which in the final step of transaction require an additional security password.

17 Clues: 3-4% chargecard number starts with 6.The deposit limit is 2 per month.Only available for WGS & RI players.This code consists of 8 - 11 characters.Reviews only WGS, JS, Rival, Everygame, GE.the sense of regret after spending a lot of money.Refund request must be sent to the Payments Department.The minimum deposit amount for Miami Club Casino is $35....

vocab 2022-11-28

vocab crossword puzzle
Across
  1. to go through security
  2. passport
  3. to travel
  4. to travel by taxi
  5. ticket
  6. exit
Down
  1. door/gate
  2. airport
  3. Suitcase
  4. luggage

10 Clues: exitticketairportluggageSuitcasepassportdoor/gateto travelto travel by taxito go through security

Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29

Whaine V. ~ 7/8 Internet Safety CrossWord! crossword puzzle
Across
  1. Sharing someone’s secrets or embarrassing information online
  2. A hostile and insulting interaction between internet users.
  3. An image that is captured of what is shown on a phone, tablet, or computer screen
  4. A technology that allows us to access our files through the internet from anywhere in the world.
  5. An Internet service that helps you search for information on the web
  6. Someone who posts rude or off-topic messages in an online community
Down
  1. Online communities, also known as social networks
  2. Setting up a fake online profile
  3. malware,cyber-destroyer, break your technology
  4. Rules or manners for interacting courteously with others online

10 Clues: Setting up a fake online profilemalware,cyber-destroyer, break your technologyOnline communities, also known as social networksA hostile and insulting interaction between internet users.Sharing someone’s secrets or embarrassing information onlineRules or manners for interacting courteously with others online...

TECHNOLOGY 2021-10-07

TECHNOLOGY crossword puzzle
Across
  1. ​introducing or using new ideas, ways of doing something, etc.
  2. no longer used because something new has been invented
  3. too important to be without
  4. having a good knowledge and understanding of modern technology, especially computers
  5. a person who fears, dislikes or avoids new technology
Down
  1. the utilization of imagination or original ideas to generate something
  2. develop (something) to a higher standard, especially (equipment or machinery) by adding or replacing components
  3. of only average quality, not very good
  4. a small tool or device that does something useful
  5. relating to, or involving computers or computer networks (as the Internet)

10 Clues: too important to be withoutof only average quality, not very gooda small tool or device that does something usefula person who fears, dislikes or avoids new technologyno longer used because something new has been invented​introducing or using new ideas, ways of doing something, etc....

BK 2024-02-05

BK crossword puzzle
Across
  1. memukul, mendorong, dll termasuk bully…
  2. Gangguan yang di dapatkan oleh korban bullying ada gangguan…
  3. Pihak yang mampu membela dirinya karena lemah ketika mendapatkan tindakan agresif dan manipulatif disebut…
  4. Tindakan mengganggu atau menyakiti orang lain secara fisik atau psikis disebut....
  5. intimidasi yang melibatkan kata kata bauk secara tertulis/ terucap merupakan bully…
Down
  1. dapat meniru niru bullying adalah dampak negatif bagi…
  2. Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…
  3. Gangguan emosi, sulit mendapatkan pekerjaan ketika sudah dewasa adalah dampak negatif bagi…
  4. memposting foto memalukan/ menyebarkan aib, termasuk ke bully…
  5. Jenis Tindakan Bully di dunia maya yang ditunjukkan untuk mengucilkan seseorang adalah…

10 Clues: memukul, mendorong, dll termasuk bully…dapat meniru niru bullying adalah dampak negatif bagi…Gangguan yang di dapatkan oleh korban bullying ada gangguan…memposting foto memalukan/ menyebarkan aib, termasuk ke bully…Menyebarkan kebohongan atau fitnah terhadap seseorang merupakan jenis bullying…...

ASTS TIK_FATIMAH AZZAHRA PURNOMO (14/ X E-10) 2024-09-12

ASTS TIK_FATIMAH AZZAHRA PURNOMO (14/ X E-10) crossword puzzle
Across
  1. Sistem komputer dan informasi; dunia maya; berhubungan dengan internet
  2. Empat pilar dalam berpikir komputasional, yaitu dekomposisi, abstraksi, pengenalan pola, dan...
  3. Yang diperlukan individu dan kelompok untuk mengambil keputusan
  4. Yang membagi tugas fan peran secara adil dalam berkolaborasi
  5. Jenis infografis yang menampilkan daftar informasi dengan berbagai pembahasan, seperti tips, trik, dan pembahasan lainnya
  6. Pengelolaan dan penyajian data bervolume lebih besar dan melakukan analisis yang lebih kompleks dari fase sebelumnya
Down
  1. Cyber physical system dikenal dengan
  2. Tentukan tujuan kolaborasi, dan pastikan persamaan persepsi dan deskripsi lengkap tentang prakondisi masing-masing
  3. Informatika berasal dari bahasa Inggris
  4. Ukuran huruf cukup besar untuk dapat dilihat oleh pendengarnya

10 Clues: Cyber physical system dikenal denganInformatika berasal dari bahasa InggrisYang membagi tugas fan peran secara adil dalam berkolaborasiUkuran huruf cukup besar untuk dapat dilihat oleh pendengarnyaYang diperlukan individu dan kelompok untuk mengambil keputusanSistem komputer dan informasi; dunia maya; berhubungan dengan internet...

TTS KELOMPOK 2 (10.6) 2024-10-30

TTS KELOMPOK 2 (10.6) crossword puzzle
Across
  1. Program atau Kampanye untuk melawan bullying di sekolah?
  2. Hak setiap murid untuk merasa aman dan dihargai di lingkungan sekolah disebut hak...
  3. Emosi yang sering dirasakan korban setelah mengalami bullying berulang kali?
  4. Korban bullying biasanya mengalami gangguan
Down
  1. Orang yang melihat tindakan Bullying secara langsung
  2. Menerima perbedaan dan tidak membeda-bedakan adalah?
  3. Tindakan kekerasan kepada seseorang yang di anggap lemah?
  4. Tindakan yang membuat orang lain merasa tidak nyaman atau sedih dan dapat dilakukan oleh seseorang maupun sekelompok orang
  5. Platform atau media cyber bullying yang digunakan untuk menyebarkan komentar negatif atau ujaran kebencian?
  6. Menghina dan merendahkan orang lain dengan kata-kata disebut?

10 Clues: Korban bullying biasanya mengalami gangguanOrang yang melihat tindakan Bullying secara langsungMenerima perbedaan dan tidak membeda-bedakan adalah?Program atau Kampanye untuk melawan bullying di sekolah?Tindakan kekerasan kepada seseorang yang di anggap lemah?Menghina dan merendahkan orang lain dengan kata-kata disebut?...

Rabin Remembrance Day 2023-10-26

Rabin Remembrance Day crossword puzzle
Across
  1. army צבא חזקה
  2. להסיג
  3. country מדינה חזקה
  4. אותם
  5. יכולת
Down
  1. אזרח
  2. ביטחון
  3. להתבגר
  4. believe להאמין
  5. מטרה
  6. build לבנות

11 Clues: אזרחמטרהאותםלהסיגיכולתביטחוןלהתבגרarmy צבא חזקהbuild לבנותbelieve להאמיןcountry מדינה חזקה

SAW 2022 ENG 2022-01-27

SAW 2022 ENG crossword puzzle
Across
  1. Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
  2. Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
  3. Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
  4. This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
  5. A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
  6. Converting information from one form to another to hide its content and prevent unauthorized access.
  7. An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
  1. Indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
  2. A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
  3. Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
  4. Applies to information or assets that, if compromised, could cause serious injury to the national interest.
  5. Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
  6. Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
  7. The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information.
  8. Malicious software designed to infiltrate and damage computers without the user’s consent.
  9. An attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
  10. Training that provides an overview of the directives and best practices related to security. Contains 10 modules

17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent.An inadequacy related to security that could increase susceptibility to compromise or injury.Converting information from one form to another to hide its content and prevent unauthorized access....

Glossary: Your biggest fan (4.2 ) 2023-03-16

Glossary: Your biggest fan (4.2 ) crossword puzzle
Across
  1. todennäköisyys
  2. häiritä
  3. raivoissaan
  4. täyttää odotukset (sanaväli=väliviiva
  5. huono
  6. keskittyä
  7. kuuluisuus
Down
  1. turvakoodi (sanaväli=väliviiva)
  2. kohtalo
  3. tulla väliin

10 Clues: huonohäiritäkohtalokeskittyäkuuluisuusraivoissaantulla väliintodennäköisyysturvakoodi (sanaväli=väliviiva)täyttää odotukset (sanaväli=väliviiva

Devolved and Reserved Powers 2021-11-01

Devolved and Reserved Powers crossword puzzle
Across
  1. Exams
  2. Scottish Parl
  3. country
  4. NHS
  5. Free in Scotland
  6. HGV drivers
Down
  1. £20
  2. one force
  3. UK Parliament
  4. Conflict

10 Clues: £20NHSExamscountryConflictone forceHGV driversScottish ParlUK ParliamentFree in Scotland

Vocab 2025-10-21

Vocab crossword puzzle
Across
  1. habitat
  2. voter turnout
  3. government crisis
  4. award
Down
  1. equal opportunity
  2. shooting conditions / terms of conditions
  3. species protection
  4. rehabilitation
  5. food security
  6. flooding

10 Clues: awardhabitatfloodingfood securityvoter turnoutrehabilitationequal opportunitygovernment crisisspecies protectionshooting conditions / terms of conditions

Bonus Game 2024-10-22

Bonus Game crossword puzzle
Across
  1. a state of being free from public attention.
  2. it is a consent or authorization to do something.
  3. mfa serves as a ______ to decrease the possibility of a successful cyber attack.
Down
  1. serves as a pass when entering something.
  2. Acronym: One ____ Passwords.
  3. it is a person's name and other facts about who they are.

6 Clues: Acronym: One ____ Passwords.serves as a pass when entering something.a state of being free from public attention.it is a consent or authorization to do something.it is a person's name and other facts about who they are.mfa serves as a ______ to decrease the possibility of a successful cyber attack.

Into the XDR Abyss: A Puzzling Descent 2023-10-06

Into the XDR Abyss: A Puzzling Descent crossword puzzle
Across
  1. The digital playbook's maneuvers (7)
  2. Linking digital dots to paint a threat landscape (9)
  3. When a digital item needs its own space (9)
  4. That "He-Who-Must-Not-Be-Named" of the network (9)
  5. Tune out digital chatter to hear alerts better (6,2,5)
  6. Supercharged defense with the Iron Throne's view (3) (abbr.)
  7. Patterns like Sheldon's knocks on Big Bang Theory. (10)
  8. Darwin would have a digital field day with this (4,8)
  9. Guarding against too good-to-be-true jackpot letters (18)
Down
  1. Computers getting their digital diplomas (15)
  2. Like Rick's adventures in Rick and Morty (14)
  3. Where digital realms intersect and tales intertwine (11)
  4. Letting tech do the heavy digital lifting (8)
  5. Cutting through the cyber fog to see clearly (10)
  6. Demanding the lion's share of digital assets (9,10)
  7. Were Neo's choices in The Matrix really directionless? (7)

16 Clues: The digital playbook's maneuvers (7)When a digital item needs its own space (9)Computers getting their digital diplomas (15)Like Rick's adventures in Rick and Morty (14)Letting tech do the heavy digital lifting (8)Cutting through the cyber fog to see clearly (10)That "He-Who-Must-Not-Be-Named" of the network (9)...

It 2020-03-16

It crossword puzzle
Across
  1. / To say to someone that you will harm someone or do something unpleasant or unwanted
  2. / If you have your parents'______ to order something over the Internet
  3. / When someone abuses or insults you on a regular basis
  4. / To make someone uncomfortable.His bad manners _________ her
  5. / Social Media is a great way to ______ with friends.
  6. / Cyberbullying can have serious ______.
  7. bullying / Bullying that happens online
Down
  1. / Never try to seek ______ on a cyberbully. Don't do to them what they did to you.
  2. / Don't share the _________ for your accounts
  3. / Make sure that you have installed a ______ to keep your device safe from hackers.
  4. / You will use the right __________
  5. / Never give any personal ___________ to people online
  6. / People cyberbully because is less likely to be ______
  7. / Always follow the _____
  8. / Teach other about keeping ______ on the Internet.
  9. / Never agree to meet face-to-face with someone you've met ______ without discussing it with your parents

16 Clues: / Always follow the _____/ You will use the right __________bullying / Bullying that happens online/ Cyberbullying can have serious ______./ Don't share the _________ for your accounts/ Teach other about keeping ______ on the Internet./ Never give any personal ___________ to people online...

Business brief vocabulary 2021-10-17

Business brief vocabulary crossword puzzle
Across
  1. their risk investment in lots of different items/locations to reduce the possibility of loss.
  2. security protection for computers/websites.
  3. viruses human created computer disease.
  4. of assets taking a person’s/companies possession by an authorized individual/organisation/business.
  5. establish companies Companies exist for a long time/famous/significant brand name e.g. Nike.
  6. liability claims to be at fault due to the product poor design/quality and a subsequent financial or legal claim.
  7. something in return.
  8. espionage obtaining trade secrets illegally.
  9. suicide Brand collapses due to poor decisions.
  10. Cheating. Presenting something that is not true. It results in someone losing something.
  11. risks risk connected to business performance linked to the reputation of the company.
Down
  1. something not exactly legal.
  2. to take/grab someone and demand money.
  3. people who break IT security.
  4. capitalists investment of money/resources linked to the amount of risk.
  5. self confidence without worrying about anything else.
  6. programs that protect against computer viruses.
  7. What you get back from an investment.
  8. recalls taking product from the market by the producer/government.
  9. off a situation which you accept something in a compromise.

20 Clues: something in return.something not exactly legal.people who break IT security.What you get back from an investment.to take/grab someone and demand money.viruses human created computer disease.security protection for computers/websites.espionage obtaining trade secrets illegally.programs that protect against computer viruses....

Government Finance 2023-04-20

Government Finance crossword puzzle
Across
  1. When the government borrows money by selling ____
  2. Taxes people pay on the land and houses they own
  3. General tax levied on consumer's purchases of nearly all products
  4. Social Security, National Defense, Income Security, Medicare, and Health are all _____
  5. Most important resources of state government revenues
  6. Programs that help citizens who meet established eligibility requirements (i.e health, nutritional, income)
  7. Takes the same percentage of tac from anyone no matter how much they make
  8. Spending equal revenues
Down
  1. Government expenditures that must be approved yearly
  2. Tax rate that increases as income increases
  3. Laws that approve spending got a particular activity
  4. Money the government has borrowed and hasn’t paid back
  5. When the government spends more than it collects in revenue
  6. Programs that begin working to stimulate the economy as soon as needer
  7. State spending on their citizen's education
  8. Spending that does not need annual approval
  9. The percentage of tax you pay decreases as you make more money
  10. Tax levied by the government directly on your income
  11. Second largest category of federal expenditures

19 Clues: Spending equal revenuesTax rate that increases as income increasesState spending on their citizen's educationSpending that does not need annual approvalSecond largest category of federal expendituresTaxes people pay on the land and houses they ownWhen the government borrows money by selling ____Government expenditures that must be approved yearly...

NSA 2015-11-20

NSA crossword puzzle
Across
  1. / Windows 2008 has two types of account Local and ___________
  2. / a device designed to control the flow of traffic into and out-of a network
  3. / Ping O’ Death is a ___________ attack.
  4. / Each computer in a DNS domain is uniquely identified by its?
  5. / Virus scanners must determine the ___________ of the file to determine that it is a virus
  6. / ___________ Filtering A Technique employed to ensure that incoming packets are from the network they say they are from
  7. / A group policy that is obtained from a higher level.
  8. / An attack from many agents.
  9. / Failing to install and update security patches could lead to a ____ on your system
  10. / They change their encryption module on replication
Down
  1. / A built in account
  2. / Units that mirror your organization's functional or business structure
  3. / A virus that spreads via Word, Excel, PowerPoint & PDF files
  4. / A built in account
  5. / A Syn Flood attack exploits the TCP ________________
  6. / Software that uses security holes to replicate itself

16 Clues: / A built in account/ A built in account/ An attack from many agents./ Ping O’ Death is a ___________ attack./ They change their encryption module on replication/ A group policy that is obtained from a higher level./ A Syn Flood attack exploits the TCP ________________/ Software that uses security holes to replicate itself...

Business Law 2022-07-08

Business Law crossword puzzle
Across
  1. type of security under which the issuer owes the holder a debt, & is obliged to repay
  2. long term loan that a corporate or govt. raises from the public for capital requirements
  3. something given up for a promise
  4. a person who takes responsibility for another's debt
  5. giving the world notice that the creditor has interest in adulterous property; other creditors beware
  6. district or county which is where the contract was executed
  7. rule adopted by an org. chiefly for the govt. of its members & the regulation of affairs
Down
  1. creditors rights attach as soon as they sign
  2. promises exchanged between parties
  3. promise to keep an offer open that is paid for
  4. distribution of profits by a corp. to its shareholders
  5. control over work is dependent on employer
  6. promise for performance
  7. shares of which ownership of a corporation
  8. security interest or legal rights acquired in one property by a creditor

15 Clues: promise for performancesomething given up for a promisepromises exchanged between partiescontrol over work is dependent on employershares of which ownership of a corporationcreditors rights attach as soon as they signpromise to keep an offer open that is paid fora person who takes responsibility for another's debt...

Climate and Food Production 2022-11-24

Climate and Food Production crossword puzzle
Across
  1. The amount of crop harvested per area of land
  2. Climate change is one of these factors that threaten food security
  3. The type of fertiliser best used for sustainable farming practices
  4. the presence of salt on the surface of the land or in rivers
  5. The availability and access to enough nutritious food to maintain a healthy life
  6. Most crops will not grow with this present in the soil
  7. A decline in the quality of land so it becomes unproductive
  8. One of the main crops grown in Western Australia
  9. A natural underground water source
Down
  1. Includes rainfall and temperature
  2. The supply of water by artificial means to agricultural areas where there is a shortage
  3. A glass building that houses plants and vegetables
  4. A threat to food security
  5. When agriculture meets the current and future generational needs
  6. A method to store rainwater on farms

15 Clues: A threat to food securityIncludes rainfall and temperatureA natural underground water sourceA method to store rainwater on farmsThe amount of crop harvested per area of landOne of the main crops grown in Western AustraliaA glass building that houses plants and vegetablesMost crops will not grow with this present in the soil...

CROSSWORD 2024-05-20

CROSSWORD crossword puzzle
Across
  1. - What improvements can be made to the audiovisual experience?
  2. - What steps can be taken to improve accessibility for people with disabilities?
  3. - How can we create a more exclusive experience for certain attendees?
  4. - How can parking facilities be made more convenient and spacious?
  5. - How can the cleanliness of restrooms and common areas be maintained?
  6. - How an public transportation options be improved for the arena?
  7. - How can security be improved without inconveniencing attendees?
Down
  1. - What can be done to enhance mobile connectivity for visitors?
  2. - How can we cater to diverse tastes in food and beverages?
  3. - How can the ticketing experience be made more efficient?
  4. - How can we reduce crowd congestion at the Mall of Asia Arena?
  5. - How can navigation within the arena be made easier for visitors?
  6. - What eco-friendly initiatives can the arena implement?
  7. - What additional entertainment options could be offered around event times?
  8. - What can be done to improve seating comfort for attendees?

15 Clues: - What eco-friendly initiatives can the arena implement?- How can the ticketing experience be made more efficient?- How can we cater to diverse tastes in food and beverages?- What can be done to improve seating comfort for attendees?- What improvements can be made to the audiovisual experience?...

Understanding our neighbours 2024-03-18

Understanding our neighbours crossword puzzle
Across
  1. Indonesia has plans to relocate its _ _ _ _ _ _ _ from Jakarta to Nusantara
  2. What is the event that affect Singapore the most with Indonesia
  3. SAF and NS foster _ _ _ _ _ _ _ _ _ _ _ _ among Singaporeans, crucial for national unity
  4. The current King of Malaysia is Sultan of which state?
  5. _ _ _ _ _ _ _ _ _ _ in SAF and NS is key to maintaining Singapore's defense readiness
  6. Building _ _ _ _ _ in Singapore's defense capabilities through rigorous training
  7. Indonesia and Singapore develop joint initiatives to address regional security challenges, such as _ _ _ _ _ _ _-terrorism and maritime safety
Down
  1. What Political Coalitions is the Current Prime Minister from?
  2. The Defense Cooperation Agreement enables Singapore Armed Forces to conduct _ _ _ _ _ _ _ _ training in Indonesia
  3. Major area of cooperation between Malaysia and Singapore?
  4. Current president of Indonesia
  5. Crucial for _ _ _ _ _ _ _ _ defense and the credibility of Singapore's commitment to it
  6. Essential to ensuring _ _ _ _ _ _ _ _ in a small nation like Singapore
  7. What does SEZ stands for?
  8. What is the challenges that is a point of contention between Malaysia and Singapore?

15 Clues: What does SEZ stands for?Current president of IndonesiaThe current King of Malaysia is Sultan of which state?Major area of cooperation between Malaysia and Singapore?What Political Coalitions is the Current Prime Minister from?What is the event that affect Singapore the most with Indonesia...

crossword 2024-10-09

crossword crossword puzzle
Across
  1. Encryption Standard :A symmetric-key algorithm for data encryption
  2. communication from an unknown source as being from a known one.
  3. Notification: A legal requirement to inform affected individuals after a data breach.
  4. :A network of compromised computers controlled by a hacker.
  5. Management:Processes for responding to and managing security incidents.
  6. Security:Measures to protect physical assets and locations from unauthorized access.
  7. vulnerability that is exploited before the vendor knows about it
  8. list of approved entities allowed access to a system.
Down
  1. a computer network into smaller parts for security.
  2. :Information used to verify a user’s identity, like a password.
  3. Authority (CA):An entity that issues digital certificates for secure communications.
  4. Hash:A fixed-size string generated from data to ensure integrity.
  5. Code:Software intended to harm or exploit any programmable device.
  6. code injection technique used to attack databases.
  7. state of being unidentifiable within a network or system.

15 Clues: code injection technique used to attack databases.a computer network into smaller parts for security.list of approved entities allowed access to a system.state of being unidentifiable within a network or system.:A network of compromised computers controlled by a hacker.:Information used to verify a user’s identity, like a password....

crossword 2024-10-09

crossword crossword puzzle
Across
  1. A list of approved entities allowed access to a system.
  2. A vulnerability that is exploited before the vendor knows about it
  3. Processes for responding to and managing security incidents.
  4. Information used to verify a user’s identity, like a password.
  5. A network of compromised computers controlled by a hacker.
  6. Disguising communication from an unknown source as being from a known one.
  7. A code injection technique used to attack databases.
  8. Measures to protect physical assets and locations from unauthorized access.
  9. The state of being unidentifiable within a network or system.
  10. A symmetric-key algorithm for data encryption
Down
  1. A legal requirement to inform affected individuals after a data breach.
  2. A fixed-size string generated from data to ensure integrity.
  3. Dividing a computer network into smaller parts for security.
  4. An entity that issues digital certificates for secure communications.
  5. Software intended to harm or exploit any programmable device.

15 Clues: A symmetric-key algorithm for data encryptionA code injection technique used to attack databases.A list of approved entities allowed access to a system.A network of compromised computers controlled by a hacker.A fixed-size string generated from data to ensure integrity.Dividing a computer network into smaller parts for security....

about the work 2024-11-11

about the work crossword puzzle
Across
  1. performs a number of important functions to ensure security and order in society.\
  2. Performs on stage
  3. He is engaged in creative activities in various fields of art
  4. This is a leader who manages people and processes.
  5. controls the flight of the aircraft
  6. produces agricultural products for sale on leased or own land
  7. maintenance, repair, adjustment and inspection of various mechanical systems
  8. Selection of flowers and plants
Down
  1. Driving a vehicle
  2. He is engaged in the management and control of various technical devices
  3. Preparation of drinks
  4. занимается учётом и хранением книг, а также выдачей их всем желающим для работы или простого чтения.
  5. is engaged in ensuring the safety of the facility
  6. He is engaged in the translation and adaptation of written text or oral speech from one language to another
  7. He must guide his student in coordinating his personal goals with academic ones.

15 Clues: Driving a vehiclePerforms on stagePreparation of drinksSelection of flowers and plantscontrols the flight of the aircraftis engaged in ensuring the safety of the facilityThis is a leader who manages people and processes.He is engaged in creative activities in various fields of artproduces agricultural products for sale on leased or own land...

Think Before You Click: Cyber Threats Crossword 2025-03-20

Think Before You Click: Cyber Threats Crossword crossword puzzle
Across
  1. Unsolicited and irrelevant emails sent to many users
  2. Security system controlling network traffic
  3. Malware that blocks access or threatens to leak data unless ransom paid
  4. Report suspicious emails quickly to your __________ team.
  5. Don’t share __________ info, colleagues won’t ask via personal email.
  6. Fraudulent attempt to obtain sensitive information by pretending to be trustworthy
  7. Saving passwords in unsecured files or browsers is unsafe, use a __________ instead.
  8. Disguising communication from unknown source as trusted
  9. Fraud attempt to get sensitive info via SMS
Down
  1. Don’t download strange __________ from unexpected emails — it might be malware!
  2. Don’t click on strange _____ in emails — it might be a phishing trick.
  3. If a site warns it’s unsafe, don’t ignore the browser’s __________.
  4. Clicking ‘unsubscribe’ in spam emails may __________ your email to attackers.
  5. Phishing attack targeted at specific individual or organization
  6. A secret word or phrase used to gain access to a system

15 Clues: Security system controlling network trafficFraud attempt to get sensitive info via SMSUnsolicited and irrelevant emails sent to many usersDisguising communication from unknown source as trustedA secret word or phrase used to gain access to a systemReport suspicious emails quickly to your __________ team....

Chapter 3 section 1 2013-10-02

Chapter 3 section 1 crossword puzzle
Across
  1. include sending letters of appreciation and presenting awards
  2. result from a desire to reach our ultimate potential
  3. include love, friendship and reputation
  4. includes economic security, mental security, protection from harm
  5. in order to build trust you need to take___________to let the customers get to know you
  6. always keep your_______ when trying to build trust
  7. the most basic need includes food, water and shelter
Down
  1. what type of selling needs to emphasize the relationship between salesperson and buyer
  2. personal selling needs to have what type of communication
  3. based on the desire to have a specific product or service
  4. based on the customers logical reasoning
  5. you shoud___________ time for small talk with customers to build trust

12 Clues: include love, friendship and reputationbased on the customers logical reasoningalways keep your_______ when trying to build trustresult from a desire to reach our ultimate potentialthe most basic need includes food, water and shelterpersonal selling needs to have what type of communicationbased on the desire to have a specific product or service...

Fuller Leadership Crossword 2022-02-14

Fuller Leadership Crossword crossword puzzle
Across
  1. Nutrition Services Supervisor
  2. Quality of Life Supervisor
  3. 2nd Floor Manager
  4. Director of Nursing
  5. Assistant Administrator
  6. 3rd Floor Manager
  7. Financial Counselor/Office Supervisor
  8. Security Supervisor
  9. Nutrition Services Supervisor
  10. Administrator
Down
  1. 4th Floor Manager
  2. Assistant Administrator
  3. 5th Floor Manager
  4. Environmental Services Supervisor
  5. Infection Prevention
  6. Therapy Supervisor

16 Clues: Administrator4th Floor Manager5th Floor Manager2nd Floor Manager3rd Floor ManagerTherapy SupervisorDirector of NursingSecurity SupervisorInfection PreventionAssistant AdministratorAssistant AdministratorQuality of Life SupervisorNutrition Services SupervisorNutrition Services SupervisorEnvironmental Services Supervisor...

#18 Hospital Staff 2025-09-11

#18 Hospital Staff crossword puzzle
Across
  1. Protect hospital grounds
  2. Operate hospital machines
  3. Move patients safely
  4. Organize treatment
  5. Support patient needs
Down
  1. Greet visitors
  2. Prepare medicines
  3. Provide medical care
  4. Create healthy menus
  5. Give spiritual comfort
  6. Guide physical activity
  7. Keep rooms safe
  8. Offer kindness
  9. Daily support and help

14 Clues: Greet visitorsOffer kindnessKeep rooms safePrepare medicinesOrganize treatmentProvide medical careCreate healthy menusMove patients safelySupport patient needsGive spiritual comfortDaily support and helpGuide physical activityProtect hospital groundsOperate hospital machines

crossword 2018-05-21

crossword crossword puzzle
Across
  1. once passengers are though immigration and security they are now in
  2. what is the three letter code for kerikeri
  3. In 2014 how may passengers did auckland international airport carry
  4. whats the number runways at the auckland airport
  5. for parking facilities which do you think would cost more short or long term
  6. what is the liquid measurement that your aloud to carry
  7. true or false both travellers and non-travellers have access to all landslide facilities
Down
  1. whats the third phase of flight
  2. what side does this definition belong to-this is the area before departing passengers pass through security.
  3. true or false landslide offers lounges
  4. what do you put your gels and liquids in
  5. whats hours does the airport operate
  6. what does AVSEC stand for
  7. auckland city is how far away from the airport
  8. how many airbridges does auckland international airport have
  9. what jet engine aircrafts do these belong to,737,767,777,787
  10. what is the three letter code for hamilton

17 Clues: what does AVSEC stand forwhats the third phase of flightwhats hours does the airport operatetrue or false landslide offers loungeswhat do you put your gels and liquids inwhat is the three letter code for kerikeriwhat is the three letter code for hamiltonauckland city is how far away from the airportwhats the number runways at the auckland airport...

Vocabulary pag 72 2024-04-17

Vocabulary pag 72 crossword puzzle
Across
  1. refers to the act of illegally taking another person's property without their consent.
  2. institution where people convicted of crimes are imprisoned.
  3. process of seeking information and collecting evidence to solve a criminal case.
  4. professional in charge of investigating crimes and collecting evidence.
  5. object used to inflict damage or cause injury.
  6. act of killing someone intentionally and illegally.
  7. act of illegally taking another person's property without his or her consent.
  8. used to identify people and as evidence in criminal cases.
  9. information or evidence used to prove or disprove a fact.
Down
  1. to observe or carefully analyze something to obtain information.
  2. a person who commits crimes or breaks the law.
  3. unique and distinctive prints on your fingertips.
  4. find a solution or answer to a problem or situation.
  5. to capture or detain someone, especially a criminal.
  6. Guard- professional in charge of protecting property and people.
  7. to actively follow or search for someone, especially a criminal.
  8. officers-members of law enforcement agencies charged with maintaining peace and security.

17 Clues: a person who commits crimes or breaks the law.object used to inflict damage or cause injury.unique and distinctive prints on your fingertips.act of killing someone intentionally and illegally.find a solution or answer to a problem or situation.to capture or detain someone, especially a criminal....

Cybersecurity Glosary 2025-10-07

Cybersecurity Glosary crossword puzzle
Across
  1. Security principle ensuring that data is not altered or tampered with
  2. Type of malware that locks data until a payment is made
  3. Permission to access certain resources or perform actions
  4. Fraudulent attempt to get sensitive information by pretending to be a trusted empty
  5. Company that provides users access to the Internet
  6. Malicious program disguised as legitimate software
  7. Network of connected devices that communicate over the Internet
  8. Unauthorized takeover of a system, network or online session
  9. Process that converts data into unreadable code to protect it
  10. Manipulating people to reveal confidential information
Down
  1. Weak Points in a system that attackers can exploit
  2. Security principle ensuring that systems and data are accesible when needed
  3. Process of verifying someone's identity before granting access
  4. Secret string of characters used for authentication
  5. Probability that a threat will exploit a vulnerability
  6. Software that secretly collects user data and send it to others
  7. Risks that come from employees or people inside an organization

17 Clues: Weak Points in a system that attackers can exploitCompany that provides users access to the InternetMalicious program disguised as legitimate softwareSecret string of characters used for authenticationProbability that a threat will exploit a vulnerabilityManipulating people to reveal confidential information...

Words from FMC-010 2025-11-07

Words from FMC-010 crossword puzzle
Across
  1. The amount of safety you take with your money
  2. A card linked to your money, you can also use online banking
  3. The amount of money you take from the bank
  4. The length of time until a loan must be paid
  5. The maximum amount of money
  6. The amount of chance you take with your money
  7. Someone who borrows money from someone
  8. The percentage of interest each month or annum
  9. An agreement that has a set end date
Down
  1. something pledged as security for repayment of a loan
  2. The rate that stays the same no matter what
  3. The interest rate that changes by the market
  4. Someone who lends you money
  5. The amount of money the bank pays when you buy a house
  6. A card that is directly linked to your banks money that you have to pay back every month
  7. Changing the way you pack back the bank or someone
  8. The original amount of money borrowed

17 Clues: The maximum amount of moneySomeone who lends you moneyAn agreement that has a set end dateThe original amount of money borrowedSomeone who borrows money from someoneThe amount of money you take from the bankThe rate that stays the same no matter whatThe interest rate that changes by the marketThe length of time until a loan must be paid...