cyber security Crossword Puzzles

Information Security Puzzle 2015-07-08

Information Security Puzzle crossword puzzle
Across
  1. / Such emails should be immediately deleted and not circulated further.
  2. / This policy requires employees to keep workstations free of confidential information when unattended
  3. / Mare sure that your computed screen is always ____ when unattended.
  4. / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
  5. / An internationally acclaimed certification for information security standards.
  6. / ensures safeguarding the accuracy and completeness of information.
Down
  1. / This should contain a combination of alphabets, numbers and special characters .
  2. / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
  3. / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  4. / This type of information is available on GKE websites, and free for everyone to access.

10 Clues: / ensures safeguarding the accuracy and completeness of information./ Mare sure that your computed screen is always ____ when unattended./ Such emails should be immediately deleted and not circulated further./ An internationally acclaimed certification for information security standards....

Social Security Taxes 2023-03-10

Social Security Taxes crossword puzzle
Across
  1. pay any payment made to individuals because of their personal injury or sickness that does not constitute wages
  2. the excess of the amount of employment taxes required to be deposited over the amount deposited on or before the last date prescribed for the deposit
  3. the block of time, consisting of four quarters beginning July 1 of the second preceding year and ending June 30 of the prior year, used to determine if an employer is a monthly or a semiweekly depositor
  4. any service performed by employees for their employer, regardless of the citizenship or residence of either
  5. the expenses that an employer pays for an employee’s education, such as tuition, fees, and payments for books, supplies, and equipment
Down
  1. the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA
  2. rule that determines if an employer has satisfied the deposit obligation by having no shortfall that exceeds $100 or 2 percent of the amount of employment taxes required to be deposited
  3. an entity defined by law as an individual, a trust or estate, a partnership, or a corporation
  4. also known as a Federal Tax Identification Number, and is used to identify a business entity
  5. any person or organization who employs one or more individuals for the performance of services, unless such services or employment are specifically excepted by law

10 Clues: also known as a Federal Tax Identification Number, and is used to identify a business entityan entity defined by law as an individual, a trust or estate, a partnership, or a corporationthe maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA...

Email Security Crossword 2021-10-15

Email Security Crossword crossword puzzle
Across
  1. Another way to check email authenticity is to look for our company ________.
  2. Always ______ emails that ask for confidential information, asks you to take action, or contains links and attachments.
  3. According to the FBI, ________ was the most common type of cybercrime in 2020.
  4. If an email is not asking you for action or information, send it to _____.
Down
  1. One way to check email authenticity is to check for the sender in your inbox or in _______.
  2. _________ emails are any emails attempting to sell you a service or to get you into a meeting.
  3. Successful phishing campaigns can lead to __________ attacks.
  4. If an email asks for ____________ information, report it to Data Security.
  5. If an email is from a sender you do not want to hear from again, mark it as ____.
  6. One way to determine if an email is suspicious is to check for _____ or attachments.

10 Clues: Successful phishing campaigns can lead to __________ attacks.If an email asks for ____________ information, report it to Data Security.If an email is not asking you for action or information, send it to _____.Another way to check email authenticity is to look for our company ________....

Branch Physical Security 2022-08-23

Branch Physical Security crossword puzzle
Across
  1. Who is our Retail Operations primary contact?
  2. During a robbery, try to remain ________.
  3. Make note of the ______________ used in escape.
  4. ________________ with the robber(s)' instructions.
  5. Activate the alarm ______________________, providing this action will not endanger yourself or others.
  6. Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
  1. The Post Robbery __________________ should be distributed.
  2. Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
  3. Who is our Physical Security Manager?
  4. Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.

10 Clues: Who is our Physical Security Manager?During a robbery, try to remain ________.Who is our Retail Operations primary contact?Make note of the ______________ used in escape.________________ with the robber(s)' instructions.The Post Robbery __________________ should be distributed....

Information Security Crossword 2017-01-13

Information Security Crossword crossword puzzle
Across
  1. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
  2. A person who uses computers to gain unauthorized access to computer systems and networks.
  3. A type of malware that is often disguised as legitimate software.
  4. You may not divulge this information while you are working for an employer or after you leave.
  5. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
Down
  1. Anything that has the potential to cause serious harm to a computer system.
  2. A flaw or weakness that can be used to attack a system or organization.
  3. Personal information related to personal data stored on computer systems
  4. A secret series of characters used to authenticate a person’s identity.
  5. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.

10 Clues: A type of malware that is often disguised as legitimate software.A flaw or weakness that can be used to attack a system or organization.A secret series of characters used to authenticate a person’s identity.Personal information related to personal data stored on computer systems...

National Security Policymaking 2016-12-13

National Security Policymaking crossword puzzle
Across
  1. A policy, beginning in the earl;y 1970s, that sought a relaxation of tensions between the US and the Soviet Union, coupled with firm guarantees of mutual security
  2. A mutual reliance in which actions in a county reverberate and affect the economic well-being of people in other countries
  3. The foreign policy of the US followed throughout most of its history whereby it tried to stay out of other nations' conflicts, particularly European wars
  4. The use of violence to frighten a country's population or government
  5. First reduction in nuclear war
Down
  1. Defense budget cuts during times of peace
  2. An agency created after WWII to coordinate American Intelligence activities abroad and to collect, analyze, and evaluate intelligence
  3. The ratio of what a country pays for imports to what it earns from exports
  4. Policy that involves choice taking about relations with the rest of the world
  5. Being occupied by non-muslim peoples created a magnet for

10 Clues: First reduction in nuclear warDefense budget cuts during times of peaceBeing occupied by non-muslim peoples created a magnet forThe use of violence to frighten a country's population or governmentThe ratio of what a country pays for imports to what it earns from exportsPolicy that involves choice taking about relations with the rest of the world...

Ethics & Computer Security 2019-04-18

Ethics & Computer Security crossword puzzle
Across
  1. the process of gaining root access to the iOS operating system that runs on Apple devices, including the iPad, iPhone and iPod Touch.
  2. the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.
  3. reporting an immoral or illegal activity.
  4. redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website.
  5. any software that brings harm to a computer system.
Down
  1. a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
  2. the process of using an algorithm to transform information to make it unreadable for unauthorized users.
  3. Worm a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
  4. of Ethics the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
  5. a technology that tracks and records consecutive key strokes on a keyboard.

10 Clues: reporting an immoral or illegal activity.any software that brings harm to a computer system.a technology that tracks and records consecutive key strokes on a keyboard.the use of electronic messaging systems to send out unrequested or unwanted messages in bulk....

Computer System Security 2024-03-25

Computer System Security crossword puzzle
Across
  1. Science of studying ciphers
  2. A Secret entry point into a program
  3. Hiding a message inside an image
  4. A collection of parameters required to establish a secure session
  5. A graphical network packet analyser
Down
  1. Allows server & client to authenticate each other
  2. Creates a secure tunnel over a public network
  3. A functions take inputs of variable lengths to return outputs of a fixed length
  4. A signature which is attached to a electronic document
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: Science of studying ciphersHiding a message inside an imageA Secret entry point into a programA graphical network packet analyserCreates a secure tunnel over a public networkAllows server & client to authenticate each otherA signature which is attached to a electronic documentA collection of parameters required to establish a secure session...

Security and commerce 2023-10-27

Security and commerce crossword puzzle
Across
  1. The electronic equivalent of a wallet
  2. A program, that spread by attaching themselves to executable files
  3. Special gift in the email, which is a fraud
  4. Programs, which are disguise as an innocent-looking file
  5. Bank fraud
  6. The illegal copying and distribution of copyrighted things
  7. Shopping basket
Down
  1. Online harassment or abuse in chatrooms
  2. The most common type of e-commerce
  3. Virtual shopping trolley

10 Clues: Bank fraudShopping basketVirtual shopping trolleyThe most common type of e-commerceThe electronic equivalent of a walletOnline harassment or abuse in chatroomsSpecial gift in the email, which is a fraudPrograms, which are disguise as an innocent-looking fileThe illegal copying and distribution of copyrighted things...

Password Security Crossword 2024-09-25

Password Security Crossword crossword puzzle
Across
  1. Use this type of phrase to create a strong password (e.g., “MyD0g$pot!”)
  2. Your MSID password needs to be at least this many characters long
  3. A method to verify your identity using something you know, something you have and/or something you are
Down
  1. Person you can share your password with.
  2. Never use ________ information in your passwords
  3. This type of attack tricks you into revealing your password through fake emails or websites
  4. UHG approved password manager
  5. Always log out of your accounts when using a ______ computer
  6. Your ____ email address should only be used for work purposes
  7. Avoid using the same ________ across multiple accounts

10 Clues: UHG approved password managerPerson you can share your password with.Never use ________ information in your passwordsAvoid using the same ________ across multiple accountsAlways log out of your accounts when using a ______ computerYour ____ email address should only be used for work purposes...

Food Security Crossword 2024-10-17

Food Security Crossword crossword puzzle
Across
  1. Lack of consistent access to enough food
  2. The component in food essential for growth
  3. Crop failure due to extreme weather
  4. Nutrient deficiency resulting from lack of food
  5. Storing crops for future use
Down
  1. Agricultural practice to boost crop yields
  2. Promoting sustainable agriculture
  3. Diversifying crops to reduce risk
  4. Global organization addressing hunger
  5. Condition of having limited food supply

10 Clues: Storing crops for future usePromoting sustainable agricultureDiversifying crops to reduce riskCrop failure due to extreme weatherGlobal organization addressing hungerCondition of having limited food supplyLack of consistent access to enough foodAgricultural practice to boost crop yieldsThe component in food essential for growth...

April (Security) Fools! 2025-04-18

April (Security) Fools! crossword puzzle
Across
  1. Malicious software that locks data and demands payment for its release.
  2. A type of malware disguised as legitimate software.
  3. The process of converting information into a secure format.
  4. A barrier that controls the flow of network traffic.
  5. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
  1. Software that secretly monitors and collects information about a user's activities.
  2. Software designed to disrupt, damage, or gain unauthorized access.
  3. The process of verifying the identity of a user or device.
  4. A network of infected devices controlled by a malicious actor.
  5. Software that detects and removes malicious programs.

10 Clues: A type of malware disguised as legitimate software.A barrier that controls the flow of network traffic.Software that detects and removes malicious programs.The process of verifying the identity of a user or device.The process of converting information into a secure format.A network of infected devices controlled by a malicious actor....

FILL Your Answers 2023-04-21

FILL Your Answers crossword puzzle
Across
  1. winner of women's IPL 2023
  2. acquired by cisco in 2012,cloud-managed sdn platform
  3. cisco's intent to acquire the cloud security company
  4. cisco pinnacle award 2023-one among two winning teams under velocity impact
  5. MFA,SSO,Zero trust security solution
  6. oscar 2023, best original song
Down
  1. cisco's cloud based secure internet gateway platform that provides protection from internet based threats
  2. men's hockey worldcup champion 2023
  3. meet cisco's four times lower energy demands& 2.6 times higher bandwidth.Its a win-win on power consumption and performance
  4. machu picchu-one among the seven wonder's is situated at?
  5. cisco's stock name

11 Clues: cisco's stock namewinner of women's IPL 2023oscar 2023, best original songmen's hockey worldcup champion 2023MFA,SSO,Zero trust security solutionacquired by cisco in 2012,cloud-managed sdn platformcisco's intent to acquire the cloud security companymachu picchu-one among the seven wonder's is situated at?...

The privacy Act 1993 2017-09-04

The privacy Act 1993 crossword puzzle
Across
  1. If the information is _________ it needs to be corrected.
  2. Principle 2, information must be what from the individual?
  3. Principle 5 is to do with the what and security?
  4. Principle 5 is to do with storage and what?
Down
  1. How many principles?
  2. The principle in which you should not use information gathered for one purpose for another.
  3. The act is relevant to what type of information?
  4. What is this Act of 1993?
  5. The purpose of the act is to focus on the what?
  6. This principle is about telling a person when you're collecting their information.
  7. Information should not be _________ to another party.

11 Clues: How many principles?What is this Act of 1993?Principle 5 is to do with storage and what?The purpose of the act is to focus on the what?The act is relevant to what type of information?Principle 5 is to do with the what and security?Information should not be _________ to another party.If the information is _________ it needs to be corrected....

Crossword Puzzle 2020-08-19

Crossword Puzzle crossword puzzle
Across
  1. accept or decline?
  2. stay safe
  3. can i get a?
  4. about me
  5. lots of them on your phone
  6. tweak
  7. faster than a call
Down
  1. better safe than sorry
  2. is caring
  3. problem solving
  4. doesn't need to be physical
  5. needs a solution
  6. who doesn't love?
  7. digital pigeons
  8. person

15 Clues: tweakpersonabout meis caringstay safecan i get a?problem solvingdigital pigeonsneeds a solutionwho doesn't love?accept or decline?faster than a callbetter safe than sorrylots of them on your phonedoesn't need to be physical

Jobs - Paulina 2021-03-30

Jobs - Paulina crossword puzzle
Across
  1. naprawia kable
  2. sprząta
  3. naprawia rury
  4. guard pilnuje czegoś
  5. pomaga doktorowi
  6. pracuje w restauracji
  7. rozmawia z ludzmi lub z dziećmi
  8. critic krytykuje jedzienie
  9. pracuje w kwiaciarni
Down
  1. jeździ na wojny
  2. ratuje ludzi
  3. ratuje ludzi z pożaru
  4. siedzi w sadzie
  5. opiekuje się dziećmi
  6. pracuje w szpitalu

15 Clues: sprzątaratuje ludzinaprawia rurynaprawia kablejeździ na wojnysiedzi w sadziepomaga doktorowipracuje w szpitaluguard pilnuje czegośopiekuje się dziećmipracuje w kwiaciarniratuje ludzi z pożarupracuje w restauracjicritic krytykuje jedzienierozmawia z ludzmi lub z dziećmi

Word Within the Word List 32 2013-10-21

Word Within the Word List 32 crossword puzzle
Across
  1. sociable
  2. pledge as security
  3. male head of family
  4. affirm or declare
  5. a flowing together
  6. force of a million tons of dynamite
  7. make soft
Down
  1. second self
  2. speech to oneself
  3. talking in circles
  4. thought-to-be
  5. go against
  6. unorthodox
  7. heated dispute
  8. cold-blooded composure

15 Clues: sociablemake softgo againstunorthodoxsecond selfthought-to-beheated disputespeech to oneselfaffirm or declaretalking in circlespledge as securitya flowing togethermale head of familycold-blooded composureforce of a million tons of dynamite

Champion Crossword Puzzle 2016-09-22

Champion Crossword Puzzle crossword puzzle
Across
  1. voice of the customer
  2. NPS
  3. the process
  4. paid triple ways
  5. rgu
  6. 2 products
Down
  1. security
  2. our best product
  3. rgu
  4. rgu
  5. training
  6. one question about you
  7. all 4 products
  8. summary of great

14 Clues: rgurguNPSrgusecuritytraining2 productsthe processall 4 productsour best productpaid triple wayssummary of greatvoice of the customerone question about you

FNAF 2023-08-15

FNAF crossword puzzle
Across
  1. lights off.
  2. new guitarist
  3. protector
  4. new fox
  5. security guard
  6. old guitarist
  7. pizza!!!!!!!!!!!!!!!!!!!!!!!
Down
  1. old fox
  2. please take this map
  3. where you race
  4. lights on.

11 Clues: old foxnew foxprotectorlights on.lights off.new guitaristold guitaristwhere you racesecurity guardplease take this mappizza!!!!!!!!!!!!!!!!!!!!!!!

CAB 2021-03-04

CAB crossword puzzle
Across
  1. Punching,kicking spitiig
  2. intentionally excluding someone from an online group
  3. spreading rumors
  4. the person that just sits and watches someone getting picked on
  5. someone who sticks up for someone that is getting bullied
  6. repeatedly sending abusive, insulting, or unwanted messages
  7. Online arguments using electronic messages with aggressive or abusive language
  8. Disclosing someone else’s secrets or embarrassing information online without their consent
Down
  1. pretending to be someone else and sending or posting material
  2. writing mean messages on social media
  3. repeated, intense harassment and denigration that includes threats or creates significant fear
  4. Spreading gossip, lies or rumours about someone to damage their reputation or friendships
  5. talking someone into revealing secrets or embarrassing information, then publishing it online
  6. name calling threning
  7. messing around with your friend and both of you are having fun

15 Clues: spreading rumorsname calling threningPunching,kicking spitiigwriting mean messages on social mediaintentionally excluding someone from an online groupsomeone who sticks up for someone that is getting bulliedrepeatedly sending abusive, insulting, or unwanted messagespretending to be someone else and sending or posting material...

tech crossword 2023-06-07

tech crossword crossword puzzle
Across
  1. a type of computer memory where data is stored
  2. it is a mobile operating system
  3. a malicous software that may cause disruption to your computer and leak private information online
  4. it is any sequence of one or more symbols
  5. small blocks of data created by a server
  6. a system that protects the Internet from cyber attacks
  7. a program that once is executed, would cause major damage to the computer
Down
  1. a digital representation of text and data
  2. a collection of data duplicating original values
  3. a mapping for some domain to bits
  4. one of the largest technology companies
  5. an image that is used for representing data
  6. a hardware used for transmitting digital video and audio from one device to another
  7. a moving digital image
  8. a method of transmitting and receiving messages using electronic devices

15 Clues: a moving digital imageit is a mobile operating systema mapping for some domain to bitsone of the largest technology companiessmall blocks of data created by a servera digital representation of text and datait is any sequence of one or more symbolsan image that is used for representing dataa type of computer memory where data is stored...

Vocabulary revision. unit 6, Light up 2023-04-21

Vocabulary revision. unit 6, Light up crossword puzzle
Across
  1. both countries were about to start a _____ because of their disagreements.
  2. prejudice or discrimination because of a person's age.
  3. after the heavy rains, there was a lot of _______in the city.
  4. the belief that humans may be divided into separate and exclusive biological entities called “races”
  5. team or group
  6. starting point
  7. There was too much _____ in the country because of the bad economy
Down
  1. People had nothing to eat. A ______ was declared.
  2. (verb)consists of
  3. The education system is excellent and the country has almost no _______ among its citizens.
  4. Cyber _______ is one of the modern-day problems affecting teenagers.
  5. the practice of ending a personal relationship with someone by suddenly and without explanation withdrawing from all communication.
  6. (verb) to stay away from someone or something
  7. the way it develops
  8. (verb) to get better

15 Clues: team or groupstarting point(verb)consists ofthe way it develops(verb) to get better(verb) to stay away from someone or somethingPeople had nothing to eat. A ______ was declared.prejudice or discrimination because of a person's age.after the heavy rains, there was a lot of _______in the city....

Informatika 2023-03-01

Informatika crossword puzzle
Across
  1. singkatan dari computational thinking
  2. perangkat keras (hardware) pada komputer yang berfungsi sebagai alat untuk input data yang berupa huruf, angka dan simbol
  3. ... bullying adalah perundungan dengan menggunakan teknologi digital
  4. memudahkan pemerintah dalam melakukan sosialisasi kebijakan merupakan salah satu dampak ... informatika
  5. STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)
  6. bentuk kejahatan online yang dilakukan dengan cara menggunakan kartu kredit orang lain
Down
  1. salah satu aplikasi media chat
  2. kemampuan memecah data, proses atau masalah (kompleks)menjadai bagian-bagian yang lebih kecil atau menjadi tugas-tugas yang mudah dikelola
  3. alat mencetak kertas
  4. salah satu program aplikasi pengolah angka

10 Clues: alat mencetak kertassalah satu aplikasi media chatsingkatan dari computational thinkingsalah satu program aplikasi pengolah angka... bullying adalah perundungan dengan menggunakan teknologi digitalSTEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)...

ICT WORDZ 2024-02-23

ICT WORDZ crossword puzzle
Across
  1. Is the gap between those who have access to technology and those who don't
  2. Also known as home working
  3. Allows you to make informed decisions
  4. Moral rules that describe what we believe is right or wrong within a civilized
  5. Is the legal right of ownership for the creator piece of work
Down
  1. A establishment of the purchaser's right to use the software
  2. A type of cyber crime
  3. Going against moral rules of right and wrong in the society
  4. Users are licensees. They can't copy, modify or share the product
  5. Grants a user the right to run an application on a specific machine

10 Clues: A type of cyber crimeAlso known as home workingAllows you to make informed decisionsGoing against moral rules of right and wrong in the societyA establishment of the purchaser's right to use the softwareIs the legal right of ownership for the creator piece of workUsers are licensees. They can't copy, modify or share the product...

C2BK Presentation Crossword Puzzle 2024-05-28

C2BK Presentation Crossword Puzzle crossword puzzle
Across
  1. help bullies to understand the harm of bullying
  2. Have you ever hurt anyone by purpose? Did you keep yourself safe when you reached out to others?
  3. the person who helps the victim, who you can become
  4. the person who bullies
  5. the person who is being bullied
  6. the person who helps the bully
Down
  1. the person who does not interact with bullying
  2. the name for bullying that happens online
  3. something that you can ask for from your teachers and friends that will make you and the situation better
  4. false information that you shouldn’t spread

10 Clues: the person who bulliesthe person who helps the bullythe person who is being bulliedthe name for bullying that happens onlinefalse information that you shouldn’t spreadthe person who does not interact with bullyinghelp bullies to understand the harm of bullyingthe person who helps the victim, who you can become...

Let's Solve 2025-02-19

Let's Solve crossword puzzle
Across
  1. ,An online identity created by user to share information such as thoughts photos videos etc.
  2. ,A relationship between friend.
  3. ,To gain access you must make sure you are computer or device is connected to the INTERNET
  4. ,__________________ is to chat share and exchange thought, Idea or information.
Down
  1. ,A mix of letter numbers and symbols to keep pure account Secure.
  2. ,Never share _____________ information.
  3. ,Ability and knowledge to safely access digital
  4. bullying ,A form of online bullying.
  5. ,Doing this prevent access to information and resecure.
  6. ,A Traile of information and data as a result of you active.

10 Clues: ,A relationship between friend.bullying ,A form of online bullying.,Never share _____________ information.,Ability and knowledge to safely access digital,Doing this prevent access to information and resecure.,A Traile of information and data as a result of you active.,A mix of letter numbers and symbols to keep pure account Secure....

B1_Unit10 dictation 2025-05-05

B1_Unit10 dictation crossword puzzle
Across
  1. To transfer files from the Internet onto your computer.
  2. To add new software to your computer.
  3. To turn a computer off and then turn on again.
  4. To make specific changes and prepare a device or software for use.
  5. When a program or computer stops working suddenly.
  6. To make a copy of important files in case something goes wrong.
Down
  1. This program helps protect your computer from cyber attacks.
  2. To remove an unnecessary app from your computer.
  3. To sign up for something (for ex. a Youtube Channel) to get updates or information regularly.
  4. To install the latest version of a program.

10 Clues: To add new software to your computer.To install the latest version of a program.To turn a computer off and then turn on again.To remove an unnecessary app from your computer.When a program or computer stops working suddenly.To transfer files from the Internet onto your computer.This program helps protect your computer from cyber attacks....

engineering crosswords 2024-12-03

engineering crosswords crossword puzzle
Across
  1. A step-by-step procedure for solving a problem.
  2. Relating to computers, networks, or information technology.
  3. The process of creating and writing computer software.
  4. A set of connected parts working together as a whole.
  5. The act of introducing something new or improving existing technology.
Down
  1. The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
  2. The capacity to do work or power machines.
  3. The use of technology to perform tasks without human intervention.
  4. A machine capable of carrying out a complex series of actions.
  5. written instructions for a computer to execute

10 Clues: The capacity to do work or power machines.written instructions for a computer to executeA step-by-step procedure for solving a problem.A set of connected parts working together as a whole.The process of creating and writing computer software.Relating to computers, networks, or information technology....

Crossword On Internet and Technology 2025-10-03

Crossword On Internet and Technology crossword puzzle
Across
  1. Protection of digital systems from theft or damage
  2. The introduction of new ideas or methods
  3. A digital world where people interact with each other, digital objects and environments in real time
  4. An important and sudden discovery or progress
  5. The right to keep personal information secure
Down
  1. Old-fashioned; no longer useful
  2. A person who is connected to the internet or who is using electronic devices
  3. Happening in many places or among many people
  4. A person who is knowledgeable and skilled in the use of technology
  5. Cyber attacks that trick people into giving away personal data

10 Clues: Old-fashioned; no longer usefulThe introduction of new ideas or methodsHappening in many places or among many peopleAn important and sudden discovery or progressThe right to keep personal information secureProtection of digital systems from theft or damageCyber attacks that trick people into giving away personal data...

Definitions for computer 2021-10-06

Definitions for computer crossword puzzle
Across
  1. to gain information from someone else in a bad way
  2. parts of a computer or substance
  3. to pertain something
  4. small and portable soli device that can be inserted onto a USB
  5. the key to the computer system which stands for Central Processing Unit
  6. storage information
  7. a reason or limited use of copyrighting
  8. the way to communicate with other networks
  9. this is used to store memory and has lots of small chips
  10. when you take or steal information from someone else and copy it to make it look like yours
Down
  1. a website that allows to delete, gain, revise a content using a web browser
  2. a local network area
  3. a security use to protect the use of your network and data
  4. the right to make copies of music, artistic work and words
  5. stands for wide network area which is a computer network that connects smaller networks
  6. a storage device
  7. a security device that can help protect the computer
  8. used to connect cables to a computer
  9. this is often seen in messages and posts

19 Clues: a storage devicestorage informationa local network areato pertain somethingparts of a computer or substanceused to connect cables to a computera reason or limited use of copyrightingthis is often seen in messages and poststhe way to communicate with other networksto gain information from someone else in a bad way...

key terms geography 2025-09-15

key terms geography crossword puzzle
Across
  1. The influence of geography on international politics and power relations.
  2. The study of population structure and change.
  3. A location with meaning attached to it.
  4. ratio The ratio of dependent people to working-age people.
  5. resource management Using resources without depleting them for future generations.
  6. A city with a population over 10 million.
  7. Renovation of poor urban areas attracting wealthier residents.
  8. heat island effect Cities are warmer than surrounding rural areas due to human activity.
  9. commons Areas outside national jurisdiction shared by all (oceans, atmosphere, Antarctica, space).
  10. Increasing interconnectedness of people, places and economies worldwide.
  11. / outsider How included or excluded someone feels in a place.
  12. Growth in the proportion of people living in towns and cities.
Down
  1. Mutual reliance between countries or regions for goods, services, labour or capital.
  2. Unequal distribution of wealth, opportunities or resources between groups or places.
  3. governance International cooperation to manage global issues through laws, norms and institutions.
  4. Movement from urban areas to rural areas.
  5. security Reliable access to sufficient, nutritious food.
  6. of place The emotional attachment people have to a place.
  7. (non-governmental organisation) Independent organisation addressing social, environmental or humanitarian issues.
  8. security Reliable access to essential resources.

20 Clues: A location with meaning attached to it.Movement from urban areas to rural areas.A city with a population over 10 million.The study of population structure and change.security Reliable access to essential resources.security Reliable access to sufficient, nutritious food.of place The emotional attachment people have to a place....

CYBER-CRIME / INTERNET ADDICTION 2016-08-17

CYBER-CRIME / INTERNET ADDICTION crossword puzzle
Across
  1. This is the system a computer need to start working or “thinking”
  2. A file, document or picture you add to an email.
  3. This helps you to look for any kind of information online.
  4. This is an annoying email that many people get in their emails inbox.
  5. The action of using emails to take someone’s financial information.
  6. This is the place where you can leave online notes for friends.
  7. A program you need to stop receiving annoying emails.
Down
  1. A computer system that helps you to protect against phishing.
  2. A computer user who illegally have access to computer systems
  3. A message you send to your friend and he/she can read it a few second later.
  4. A dangerous computer program. When it is in your computer you cannot open any file.
  5. A series of unimportant letters and numbers to log in a webpage and that people don’t know.
  6. This is where emails are sent to.

13 Clues: This is where emails are sent to.A file, document or picture you add to an email.A program you need to stop receiving annoying emails.This helps you to look for any kind of information online.A computer system that helps you to protect against phishing.A computer user who illegally have access to computer systems...

Cyber Law CIA I 2021-09-01

Cyber Law CIA I crossword puzzle
Across
  1. A network is usually private or restricted, specially created for an enterprise or an organization.
  2. A collection of web pages and other created content having a common domain.
  3. A situation where a person gets verbally or physically threaten on the internet,causing the other person a mental imbalance.
  4. People who are frequent users of the internet.
  5. A right especially to protect the rights and expression of the original work done by the creator.
  6. A security system present in the computer which supervises the operation and network traffic as per precoded rules.
  7. The process of exploiting the computer system or any private network.
  8. A way to protect data for the concerned user to access it.
Down
  1. A structured set of files just like a stack held in a computer, which is accessible in various ways.
  2. The conversion of text, pictures, or sound in the digital form.
  3. An environment in which communication occurs through a computer network.
  4. the right/powers to make rules and authority to interpret and apply them.
  5. It is a stated obligation and everyone has to abide by it.

13 Clues: People who are frequent users of the internet.It is a stated obligation and everyone has to abide by it.A way to protect data for the concerned user to access it.The conversion of text, pictures, or sound in the digital form.The process of exploiting the computer system or any private network....

Spring Into Cyber Acrostic 2025-02-19

Spring Into Cyber Acrostic crossword puzzle
Across
  1. Irish holiday celebrated on March 17th.
  2. A tool or method used by hackers to take advantage of security flaws.
  3. A type of malware that locks files and demands payment.
  4. A type of cyberattack that overwhelms a network with traffic (abbr.)
  5. Animal often associated with March's unpredictable weather, with 'In like a lamb'
  6. The secure way to remotely connect to a corporate network.
Down
  1. The NCAA basketball tournament nickname (two words).
  2. Data-Link's year of incorporation, with Nineteen _________.
  3. Phase of the moon associated with strange happenings (two words)
  4. The process of verifying a user's identity online.
  5. A method used by hackers to secretly monitor network traffic.
  6. A festive procession often held on holidays.
  7. Season that begins in March

13 Clues: Season that begins in MarchIrish holiday celebrated on March 17th.A festive procession often held on holidays.The process of verifying a user's identity online.The NCAA basketball tournament nickname (two words).A type of malware that locks files and demands payment.The secure way to remotely connect to a corporate network....

Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11

Encrypting the You Matter Most Cybersecurity Crossword Challenge! crossword puzzle
Across
  1. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
  2. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
  3. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
  4. _____-force attack is a technique used to guess a password by trying many possible combinations
  5. Gain access to someone else’s computer or device without permission
  6. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
  7. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
  8. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
  9. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
  10. A location on the internet where you can save your data (rather than on your computer or device)
Down
  1. A program or device used to detect and prevent unauthorized access to a network
  2. A sequence of characters (or words) used to stop criminals from accessing your accounts
  3. A method of protecting data by converting it into unreadable code that only authorized parties can read
  4. Malicious software that could harm your computer or gadget
  5. What is a form of malware that monitors and records a user's activities without their knowledge?
  6. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
  7. A security incident where sensitive information is leaked to the public is a data ______
  8. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor

18 Clues: Malicious software that could harm your computer or gadgetGain access to someone else’s computer or device without permissionA program or device used to detect and prevent unauthorized access to a networkThe program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)...

Cybersecurity Awareness Month Crossword Puzzle 2025-09-19

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
  2. The best way to keep Cornerstone secure is to become a ________ ___________.
  3. All customer and bank information that is no longer required must be ____________.
  4. an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
  5. A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
  6. Malicious software designed to harm, exploit or otherwise compromise a computer system.
  7. the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
  8. Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
  9. Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
  10. A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
  11. Create strong ___________ or passphrases and never share them with anyone else.
Down
  1. A type of malware that encrypts a victim's files and demands payment for the decryption key.
  2. the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
  3. Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
  4. Someone who tries to access data that they aren't authorized to view.
  5. All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
  6. ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
  7. The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.

18 Clues: Someone who tries to access data that they aren't authorized to view.The best way to keep Cornerstone secure is to become a ________ ___________.Create strong ___________ or passphrases and never share them with anyone else.All customer and bank information that is no longer required must be ____________....

Vocabulary: UNIT 5 2021-07-04

Vocabulary: UNIT 5 crossword puzzle
Across
  1. We can use it to listen to the news o to listen to music.
  2. Cyber world that contains a lot of information.
  3. We can do this by airplane, train or car.
  4. Means of transport. It can fly.
Down
  1. To communicate with other people.
  2. Similar to a letter but we send this via internet.
  3. Long ago people wrote this to communicate with friends.
  4. We can listen to them on the radio or turn on the T.V to hear this.

8 Clues: Means of transport. It can fly.To communicate with other people.We can do this by airplane, train or car.Cyber world that contains a lot of information.Similar to a letter but we send this via internet.Long ago people wrote this to communicate with friends.We can use it to listen to the news o to listen to music....

prior knowledge 2021-10-04

prior knowledge crossword puzzle
Across
  1. the practice of analysing large databases in order to generate new information.
  2. what YouTuber say at the end of videos
  3. when you hurt some one on the internet like social media
  4. what you use to get things in games
  5. the action or process of earning revenue from an asset, business, etc.
Down
  1. to get more in an app
  2. being able to get the location of something
  3. what you do to scam messages and annoying people

8 Clues: to get more in an appwhat you use to get things in gameswhat YouTuber say at the end of videosbeing able to get the location of somethingwhat you do to scam messages and annoying peoplewhen you hurt some one on the internet like social mediathe action or process of earning revenue from an asset, business, etc....

New Deal Crossword 2024-04-09

New Deal Crossword crossword puzzle
Across
  1. amount of people employed by the CCC
  2. worked to improve the nation's public land from 1933 to 1942
  3. the maximum amount of time in prison after submitting a false Social Security Statement
  4. month when the Federal Emergency Relief Administration dissolved
  5. head of the TERA, FERA, and WPA
  6. the amount of time a man would work in the CCC
Down
  1. the year the Social Security Act was passed
  2. the president who instilled the New Deal Programs
  3. amount of funds given by the Federal Emergency Relief Administration after inflation adjustment
  4. acronym for the Federal Emergency Relief Administration
  5. enacted in august of 1935

11 Clues: enacted in august of 1935head of the TERA, FERA, and WPAamount of people employed by the CCCthe year the Social Security Act was passedthe amount of time a man would work in the CCCthe president who instilled the New Deal Programsacronym for the Federal Emergency Relief Administrationworked to improve the nation's public land from 1933 to 1942...

PenFed 2022-01-27

PenFed crossword puzzle
Across
  1. leader
  2. long FI call
  3. a thief
  4. chatroom
  5. break/lunchtime
  6. where to find phone numbers
Down
  1. address request
  2. computer program
  3. what an upset ch call turns into
  4. who you are
  5. reader board
  6. not enough security
  7. PenFed scam
  8. add additional fraud
  9. face chris uses

15 Clues: leadera thiefchatroomwho you arePenFed scamreader boardlong FI calladdress requestface chris usesbreak/lunchtimecomputer programnot enough securityadd additional fraudwhere to find phone numberswhat an upset ch call turns into

Word Within a Word List 32 2012-10-01

Word Within a Word List 32 crossword puzzle
Across
  1. a flowing together
  2. sociable
  3. heated dispute
  4. thought-to-be
  5. unorthodox
  6. male head of family
  7. pledge as security
  8. force of a million tons of dynamite
  9. speech to oneself
Down
  1. make soft
  2. go against
  3. ego second self
  4. talking in circles
  5. cold-blooded composure
  6. affirm or declare

15 Clues: sociablemake softgo againstunorthodoxthought-to-beheated disputeego second selfaffirm or declarespeech to oneselfa flowing togethertalking in circlespledge as securitymale head of familycold-blooded composureforce of a million tons of dynamite

Word Within a Word List 32 2012-10-01

Word Within a Word List 32 crossword puzzle
Across
  1. make soft
  2. force of a million tons of dynamite
  3. a flowing together
  4. pledge as security
  5. second self
  6. talking in circles
  7. go against
  8. unorthodox
  9. thought-to-be
Down
  1. speech to oneself
  2. heated dispute
  3. male head of family
  4. affirm or declare
  5. cold-blooded composure
  6. sociable

15 Clues: sociablemake softgo againstunorthodoxsecond selfthought-to-beheated disputespeech to oneselfaffirm or declarea flowing togetherpledge as securitytalking in circlesmale head of familycold-blooded composureforce of a million tons of dynamite

Organelle Recap 2023-11-21

Organelle Recap crossword puzzle
Across
  1. Packaging/Transport
  2. Protection (like security guard)
  3. Liquid (like water in fish bowl)
  4. Role in cell division
  5. Power
  6. Controls cell
  7. Structure (plant only)
  8. Make proteins
Down
  1. Photosynthesis (plant only)
  2. Transport materials, make proteins
  3. Protect nucleus
  4. Makes ribosomes
  5. Transport materials, make fats
  6. Storage
  7. Digestion

15 Clues: PowerStorageDigestionControls cellMake proteinsProtect nucleusMakes ribosomesPackaging/TransportRole in cell divisionStructure (plant only)Photosynthesis (plant only)Transport materials, make fatsProtection (like security guard)Liquid (like water in fish bowl)Transport materials, make proteins

El viaje 2022-12-12

El viaje crossword puzzle
Across
  1. To withdraw money
  2. Passenger
  3. S/he/it takes a trip
  4. S/he/it takes the taxi
  5. Security
  6. S/he takes the plane
  7. Flight
Down
  1. Hotel
  2. Airport
  3. To Travel
  4. Suitcase
  5. S/he takes the bus
  6. S/he/it takes the train
  7. Trip
  8. Passport

15 Clues: TripHotelFlightAirportSuitcaseSecurityPassportPassengerTo TravelTo withdraw moneyS/he takes the busS/he/it takes a tripS/he takes the planeS/he/it takes the taxiS/he/it takes the train

Network concept and Cyber ethics 2025-05-31

Network concept and Cyber ethics crossword puzzle
Across
  1. A network within a small area, like a home or school
  2. A set of rules for data communication between devices
  3. A security system that controls incoming and outgoing network traffic
  4. Global network connecting millions of computers
  5. Unauthorized access to computer systems
  6. Bullying or harassment using digital technology
  7. Illegal copying or downloading of software or media
  8. Secret string of characters used for authentication
Down
  1. A network that covers a large geographic area
  2. A computer that provides data to other computers
  3. A computer that receives data from a server
  4. The right to keep personal information secure online
  5. Fraudulent attempt to obtain sensitive information via fake messages
  6. Device that converts digital data into signals for transmission
  7. copying someone’s work or ideas without permission or credit
  8. Permission given to collect or use data
  9. Device that forwards data packets between networks
  10. Malicious software designed to damage or disrupt systems

18 Clues: Permission given to collect or use dataUnauthorized access to computer systemsA computer that receives data from a serverA network that covers a large geographic areaGlobal network connecting millions of computersBullying or harassment using digital technologyA computer that provides data to other computers...

Cyber Safety Module 2020-06-05

Cyber Safety Module crossword puzzle
Across
  1. A small window, usually displaying an ad
  2. An online room where people can login to talk to each other
  3. An online personal log or journal
  4. A type of malicious code or software that looks legitimate but can take control of your computer
  5. A malicious software program infecting a user's computer and performing malicious actions
  6. Getting information from a computer from somewhere on the internet and transferring it to your computer
Down
  1. A combination of numbers, letter and special characters that is known only to you and gives you access to a computer, website or network
  2. A social media platform
  3. Using the internet to harass, demean, bullying and insult someone

9 Clues: A social media platformAn online personal log or journalA small window, usually displaying an adAn online room where people can login to talk to each otherUsing the internet to harass, demean, bullying and insult someoneA malicious software program infecting a user's computer and performing malicious actions...

CWSI Cyber CrossWord 2025-03-25

CWSI Cyber CrossWord crossword puzzle
Across
  1. Foundation of both cybersecurity and team collaboration
  2. Common attack vector for phishing and scams
  3. What you should never do with suspicious links or attachments
  4. A vulnerability in software waiting to be exploited
  5. Guidelines that govern secure workplace behavior
Down
  1. A physical or digital object used for multi-factor authentication
  2. What hackers see unaware employees as
  3. A potential danger that exploits system vulnerabilities
  4. The chance that a threat will exploit a vulnerability

9 Clues: What hackers see unaware employees asCommon attack vector for phishing and scamsGuidelines that govern secure workplace behaviorA vulnerability in software waiting to be exploitedThe chance that a threat will exploit a vulnerabilityFoundation of both cybersecurity and team collaborationA potential danger that exploits system vulnerabilities...

American Express Travelers Cheque 2021-11-22

American Express Travelers Cheque crossword puzzle
Across
  1. What code do you need on the Cheque
  2. What is one security feature
  3. _____ Express uses the Cheques
  4. How do you verify
  5. How many security features do they have
Down
  1. What do you have to do for the signatures
  2. Is the process where you validate both the presenter and the cheque
  3. Can you have counterfeit Cheques

8 Clues: How do you verifyWhat is one security feature_____ Express uses the ChequesCan you have counterfeit ChequesWhat code do you need on the ChequeHow many security features do they haveWhat do you have to do for the signaturesIs the process where you validate both the presenter and the cheque

Vocabulary pag 72 2024-04-17

Vocabulary pag 72 crossword puzzle
Across
  1. or evidence used to prove or disprove a fact.
  2. observe or carefully analyze something to obtain information.
  3. in charge of investigating crimes and collecting evidence.
  4. of illegally taking another person's property without his or her consent.
  5. of seeking information and collecting evidence to solve a criminal case.
  6. a solution or answer to a problem or situation.
  7. used to inflict damage or cause injury.
  8. to the act of illegally taking another person's property without their consent.
  9. of killing someone intentionally and illegally.
  10. actively follow or search for someone, especially a criminal.
Down
  1. and distinctive prints on your fingertips.
  2. to identify people and as evidence in criminal cases.
  3. where people convicted of crimes are imprisoned.
  4. officers-Members of law enforcement agencies charged with maintaining peace and security.
  5. Guard-Professional in charge of protecting property and people.
  6. person who commits crimes or breaks the law.
  7. capture or detain someone, especially a criminal.

17 Clues: used to inflict damage or cause injury.and distinctive prints on your fingertips.person who commits crimes or breaks the law.or evidence used to prove or disprove a fact.a solution or answer to a problem or situation.of killing someone intentionally and illegally.where people convicted of crimes are imprisoned....

Vocabulary words of Computer 2021-10-06

Vocabulary words of Computer crossword puzzle
Across
  1. stands for random access memory and it is a memory stored in that you can modify and edit it and it is sometimes used to store working data and machine codes.It stores the information you are using on your computer actively.
  2. is a small device that has flash memory that is to store data and it can also transfer the data to another computer
  3. stands for local area network and it is a network that is in areas like school and the computers can connect and share information
  4. It’s a device that can get connected to your computer and you use it with your computer
  5. it’s like trash emails that a person sends to many people and the person advertises hoping the receiver will buy the item.
  6. stands for wide area network and it is a big network and allows you to share information and communicate from computers to computers in other locations.
  7. makes your computer perform better and it is fast.
  8. it is when you have permission to copy from the owner.
  9. known as Universal serial bus and you can transfer or take your data and connect to other peripheral devices
  10. is a website were the community of users can edit and add content.For example google something random you will see Wikipedia with it and its loaded with information about the thing you googled
Down
  1. It is getting unauthorized data like passwords, private information, from other people in a computer or device.Or it can be exploiting in games using hacks.
  2. it is a security device that protects your computer making sure no suspicious things enter or cyber-attacks.
  3. stands for solid state driver is a storage and stores data persistently
  4. Fair use gives permission to use copyrighted work for a group of people without the work owner’s permission but only for uses like teaching, research, news report, and more.
  5. the rules for an acceptable way that you are going to use the internet.
  6. keeps your data and network safe from viruses or threats.
  7. is a recognizable area of a bigger program.
  8. it is copying someone's work and claiming that you made it and it was your idea.
  9. stands for central processing unit and it is the part of the computer that recovers and executes instructions.
  10. known as Hard disk drive and it is a type of storage thats in your computer and it can store and retrieve data they store like software programs and some other files

20 Clues: is a recognizable area of a bigger program.makes your computer perform better and it is fast.it is when you have permission to copy from the owner.keeps your data and network safe from viruses or threats.stands for solid state driver is a storage and stores data persistentlythe rules for an acceptable way that you are going to use the internet....

Office 2022-03-10

Office crossword puzzle
Across
  1. making people happy (2words)
  2. online meeting tool
  3. melody's saying (4words)
  4. has keys
Down
  1. get money
  2. used for viewing data
  3. bossy person (2words)
  4. people you work with
  5. sit upon
  6. job security
  7. david's favorite city
  8. needed workspace
  9. birthday in mar
  10. transfer labs

14 Clues: sit uponhas keysget moneyjob securitytransfer labsbirthday in marneeded workspaceonline meeting toolpeople you work withused for viewing databossy person (2words)david's favorite citymelody's saying (4words)making people happy (2words)

CH 11, LO 1 and 2 2021-04-14

CH 11, LO 1 and 2 crossword puzzle
Across
  1. debts that are owed to creditors
  2. when a business has received cash vefore providing goods or performing work
  3. must be paid with cash or goods/services within one year
  4. a written promise by a business to pay a debt wwithin one year or less
  5. the income tax deducted from gross pay
  6. medical benefits
Down
  1. old age, survivors, and disability insurance
  2. do not need to be paid within one year
  3. helps summarize the earnings, withholdings, and net pay for each employee
  4. also known as the Social Security Act, created the Social Security tax
  5. total amount of salary, wages, commissions, and bonuses earned by an employee during a pay period
  6. also called employee compensation
  7. the amount an employee gets to keep

13 Clues: medical benefitsdebts that are owed to creditorsalso called employee compensationthe amount an employee gets to keepdo not need to be paid within one yearthe income tax deducted from gross payold age, survivors, and disability insurancemust be paid with cash or goods/services within one year...

The United Nations 2025-12-02

The United Nations crossword puzzle
Across
  1. Education, Science and Culture organization;
  2. The city where the UN Headquarters is located;
  3. The UN's main policymaking and representative organ;
  4. The 15-member body responsible for maintaining international peace and security;
  5. Principal judicial organ of the UN, based in The Hague (abbrev.);
  6. UN agency for children;
  7. The authority on matters of global health;
Down
  1. The current Secretary-General of the UN;
  2. The five permanent members of the Security Council hold this power;
  3. The first UN peacekeeping mission (1948) was established in this country;
  4. The UN organ responsible for coordinating the economic, social, and related work of 15 specialized agencies;
  5. The official language used by the UN, along with Arabic, Chinese, English, Russian, and Spanish;
  6. Programme that works to eliminate poverty.

13 Clues: UN agency for children;The current Secretary-General of the UN;Programme that works to eliminate poverty.The authority on matters of global health;Education, Science and Culture organization;The city where the UN Headquarters is located;The UN's main policymaking and representative organ;...

x 2026-01-19

x crossword puzzle
Across
  1. Name for a data incident.
  2. Only giving systems and data to those who genuinely need them.
  3. How staff learn to handle personal data safely.
  4. Duty to keep personal information private and secure.
  5. Right to limit how personal data is used.
  6. Building data protection in from the very start, not as an afterthought
Down
  1. Length of time personal data is kept before deletion.
  2. A basic but vital security control that should never be shared.
  3. Safe disposal of confidential paper records.
  4. Clear permission given for personal data to be collected and used.
  5. Choices staff make every day that affect data security choices.
  6. Protecting data so only authorised parties can read it.
  7. A deceptive attempt to trick staff into revealing sensitive information.

13 Clues: Name for a data incident.Right to limit how personal data is used.Safe disposal of confidential paper records.How staff learn to handle personal data safely.Length of time personal data is kept before deletion.Duty to keep personal information private and secure.Protecting data so only authorised parties can read it....

digital ciizenship 2021-01-29

digital ciizenship crossword puzzle
Across
  1. reliable information
  2. protecting yourself
  3. group of people
  4. real world
  5. being safe online
  6. being safe
Down
  1. passwords
  2. opposite of plagiarism
  3. being tricked
  4. evaluate media
  5. online community
  6. to keep someone away digitally

12 Clues: passwordsreal worldbeing safebeing trickedevaluate mediagroup of peopleonline communitybeing safe onlineprotecting yourselfreliable informationopposite of plagiarismto keep someone away digitally

Ch. 1-3 Narnia 2023-11-13

Ch. 1-3 Narnia crossword puzzle
Across
  1. curious
  2. packages
  3. crazy
  4. layer of gold
  5. light meal, Eng. custom
Down
  1. scarf
  2. radio without cords
  3. "tell me"
  4. male deer
  5. from now on
  6. to put to sleep, sense of security
  7. trick

12 Clues: scarfcrazytrickcuriouspackages"tell me"male deerfrom now onlayer of goldradio without cordslight meal, Eng. customto put to sleep, sense of security

PHRASAL VERBS 2020-05-18

PHRASAL VERBS crossword puzzle
Across
  1. sentarse
  2. despertarse
  3. wait
  4. levantarse
  5. break or separate into pieces
Down
  1. have a friendly relationship
  2. reparar
  3. ponerse de pie
  4. request
  5. become happy
  6. copy as a security measure
  7. devolverle algo a alguién

12 Clues: waitrepararrequestsentarselevantarsedespertarsebecome happyponerse de piedevolverle algo a alguiéncopy as a security measurehave a friendly relationshipbreak or separate into pieces

Inventions That Wouldn't Exist Without Black People 2026-02-19

Inventions That Wouldn't Exist Without Black People crossword puzzle
Across
  1. VOIP(Facetime, Skype, Teams)
  2. Video game cartridge
  3. The elevator
  4. Golf Tee
  5. Caller ID
  6. Refrigerated trucks
Down
  1. Home security
  2. Dry Cleaning
  3. Blood Banks
  4. Color Computer Monitor
  5. Traffic lights
  6. Haircare products

12 Clues: Golf TeeCaller IDBlood BanksDry CleaningThe elevatorHome securityTraffic lightsHaircare productsRefrigerated trucksVideo game cartridgeColor Computer MonitorVOIP(Facetime, Skype, Teams)

Cyber Bulying 2018-04-26

Cyber Bulying crossword puzzle
Across
  1. Που επιδρά ο διαδικτυακός εκφοβισμός ;
  2. Αυτός που ασκεί τον εκφοβισμό
  3. Αντιμετωπίζει την επιθετικότητα
  4. Μπορεί να δεχτεί εκεί τον εκφοβισμό
  5. Αυτός που δέχεται τον εκφοβισμό
Down
  1. Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.

6 Clues: Αυτός που ασκεί τον εκφοβισμόΑντιμετωπίζει την επιθετικότηταΑυτός που δέχεται τον εκφοβισμόΜπορεί να δεχτεί εκεί τον εκφοβισμόΠου επιδρά ο διαδικτυακός εκφοβισμός ;Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.

cyber wellness 2022-06-23

cyber wellness crossword puzzle
Across
  1. Hostile or violent behaviour.
  2. Refusing to go out.
  3. The condition of being addicted to a particular activity.
Down
  1. Feeling a fairly strong and persistent pain.
  2. Regularly having problems sleeping.
  3. A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.

6 Clues: Refusing to go out.Hostile or violent behaviour.Regularly having problems sleeping.Feeling a fairly strong and persistent pain.The condition of being addicted to a particular activity.A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.

cyber seguridad 2020-12-01

cyber seguridad crossword puzzle
Across
  1. this prevents viruses from entering the computer
  2. is the eassiest way to hack somebody are key numbers to enter intagram for example
  3. this way hackers can get confidential
Down
  1. is when you recieve an email fake thats ..... .....
  2. It is something to protect yourself from hackers and not to steal data
  3. when somebady spy you because you dowland something eligal or some trap that the hacker put you

6 Clues: this way hackers can get confidentialthis prevents viruses from entering the computeris when you recieve an email fake thats ..... .....It is something to protect yourself from hackers and not to steal datais the eassiest way to hack somebody are key numbers to enter intagram for example...

cyber seguridad 2020-12-01

cyber seguridad crossword puzzle
Across
  1. this prevents viruses from entering the computer
  2. is the eassiest way to hack somebody are key numbers to enter intagram for example
  3. this way hackers can get confidential
Down
  1. is when you recieve an email fake thats ..... .....
  2. It is something to protect yourself from hackers and not to steal data
  3. when somebady spy you because you dowland something eligal or some trap that the hacker put you

6 Clues: this way hackers can get confidentialthis prevents viruses from entering the computeris when you recieve an email fake thats ..... .....It is something to protect yourself from hackers and not to steal datais the eassiest way to hack somebody are key numbers to enter intagram for example...

Cyber Safety 2024-06-04

Cyber Safety crossword puzzle
Across
  1. Unwanted or unsolicited email messages.
  2. Unauthorized intrusion into a computer system or network.
  3. Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
  1. Digital method of exchanging messages over the internet.
  2. Measures taken to protect a system against unauthorized access or attacks.
  3. A secret word or phrase used to gain access to a system.

6 Clues: Unwanted or unsolicited email messages.Digital method of exchanging messages over the internet.A secret word or phrase used to gain access to a system.Unauthorized intrusion into a computer system or network.Measures taken to protect a system against unauthorized access or attacks....

Cyber Safety 2023-05-18

Cyber Safety crossword puzzle
Across
  1. Stealing someone's work without giving credit
  2. Online fights through messaging
Down
  1. Pretending to be someone else
  2. Getting a fake email
  3. An abbreviation Laughing out loud
  4. Something that ruins your computer

6 Clues: Getting a fake emailPretending to be someone elseOnline fights through messagingAn abbreviation Laughing out loudSomething that ruins your computerStealing someone's work without giving credit

Cyber World 2023-07-12

Cyber World crossword puzzle
Across
  1. change the case of the letter when pressed
  2. an input device
  3. Read Access Memory
Down
  1. The brain of the computer.
  2. An output device
  3. The ________ is a mean of sending information to the computer

6 Clues: an input deviceAn output deviceRead Access MemoryThe brain of the computer.change the case of the letter when pressedThe ________ is a mean of sending information to the computer

LDM Team Member Trivia Puzzle 2022-01-06

LDM Team Member Trivia Puzzle crossword puzzle
Across
  1. Just like the meaning of her name - a bird, who freely flies in the sky.
  2. Name is shared with a well known 19th century US writer.
  3. An important vitamin is the first letter of this persons name.
  4. Matured through an army stint, served during his late teens.
  5. Once spent an entire week in Oklahoma as a working cowboy.
  6. For a period of time this person slept with a M16 rifle under the pillow.
  7. A smiling person easy to work with.
  8. Enjoys learning new things about almost any topic.
  9. Family owns a vineyard.
Down
  1. Lifelong Bruins fan.
  2. Started at Cisco in 1999
  3. Spent time watching white tigers with chess grandmaster Garry Kasparov.
  4. Holds Master's degree in finance & accounting
  5. Backpacked ~400 miles in the last 2 years.
  6. Worked as a coffee roaster while studying computer networking in school.
  7. A wanna-be professional football player but not quite cutting it.
  8. Wanted to be cricketer before becoming curious about cyber threats.
  9. Son of a former catholic priest
  10. Unadorned royalty.

19 Clues: Unadorned royalty.Lifelong Bruins fan.Family owns a vineyard.Started at Cisco in 1999Son of a former catholic priestA smiling person easy to work with.Backpacked ~400 miles in the last 2 years.Holds Master's degree in finance & accountingEnjoys learning new things about almost any topic.Name is shared with a well known 19th century US writer....

perkembangan transaksi ekonomi di era digital 2025-10-16

perkembangan transaksi ekonomi di era digital crossword puzzle
Across
  1. MARKETING Strategi pemasaran yang menargetkan pengguna media sosial.
  2. Transaksi yang memanfaatkan Quick Response Code (Kode Respon Cepat).
  3. Matauang kripto yang paling populer.
  4. Singkatan untuk Pembayaran Non Tunai.
  5. Konsumen yang melakukan pembelian secara daring (online).
  6. Platform yang memfasilitasi pertemuan antara penjual dan pembeli secara online.
  7. Proses jual beli barang atau jasa menggunakan jaringan internet.
  8. BANKING Penggunaan teknologi mobile untuk layanan keuangan.
  9. LENDING Suatu kegiatan pinjam meminjam dana yang dilakukan secara online.
  10. Layanan perbankan yang dapat diakses melalui ponsel pintar.
Down
  1. Istilah yang merujuk pada segala sesuatu yang berhubungan dengan dunia maya atau internet.
  2. CHANNEL Layanan yang menyediakan fasilitas transfer uang antar rekening tanpa melalui bank konvensional.
  3. Metode otentikasi menggunakan sidik jari atau wajah.
  4. Teknologi dasar yang mendukung mata uang kripto seperti Bitcoin.
  5. Istilah untuk dompet digital.
  6. Pembayaran yang dilakukan secara online tanpa menggunakan uang tunai fisik.
  7. Pelaku usaha yang memanfaatkan media digital untuk memasarkan produknya.
  8. Singkatan dari Financial Technology.
  9. CRIME Kejahatan di dunia maya yang bertujuan mencuri data atau informasi penting.
  10. Bentuk keamanan data yang mengubah informasi menjadi kode rahasia.

20 Clues: Istilah untuk dompet digital.Matauang kripto yang paling populer.Singkatan dari Financial Technology.Singkatan untuk Pembayaran Non Tunai.Metode otentikasi menggunakan sidik jari atau wajah.Konsumen yang melakukan pembelian secara daring (online).BANKING Penggunaan teknologi mobile untuk layanan keuangan....

NZST Airport Operations 2020-03-30

NZST Airport Operations crossword puzzle
Across
  1. Stage 3: Check the _____ to check the baggage allowance
  2. Printing the labels and attaching to bags is known as
  3. Complete the job title: Customer Service _______
  4. The first stage of check in is the ______
  5. These are not included in your hand luggage allowance
Down
  1. Skis, surf boards and golf clubs are ______ baggage
  2. In stage two the CSA will ask for ID such as a ________
  3. When pax are through security, they are now ______
  4. Stage 7 Tell pax which _____ to go to
  5. Where is New Zealand's busiest Airport?
  6. In Stage 5 the CSA asks security and ___goods questions

11 Clues: Stage 7 Tell pax which _____ to go toWhere is New Zealand's busiest Airport?The first stage of check in is the ______Complete the job title: Customer Service _______When pax are through security, they are now ______Skis, surf boards and golf clubs are ______ baggagePrinting the labels and attaching to bags is known as...

Confientiality 2025-02-06

Confientiality crossword puzzle
Across
  1. insurance information
  2. Data information which may arise from employment-related physicals, drug tests and
  3. work history, date of birth, social security number, criminal record,
  4. information
  5. or Sensitive Data information about an employee prior to employment such as a résumé,
  6. of information
  7. involves individuals hired to steal trade secrets, new products or
Down
  1. Data records of an employee’s performance on the job such as performance reports,
  2. religion, etc.
  3. actions, supervisory notations Corporate Espionage form of espionage conducted for commercial purposes rather than security;
  4. of rules or promises which limits access or places restrictions on certain

11 Clues: informationreligion, etc.of informationinsurance informationinvolves individuals hired to steal trade secrets, new products orwork history, date of birth, social security number, criminal record,of rules or promises which limits access or places restrictions on certainData records of an employee’s performance on the job such as performance reports,...

Dystopia Escape Room Crossword puzzle 2022-01-15

Dystopia Escape Room Crossword puzzle crossword puzzle
Across
  1. Term for mega-technological genre: “cyber-__________”.
  2. Biased information used to promote a political point of view.
  3. Type of government that has total control over people’s lives.
  4. Opposite of individuality.
  5. A dystopia typically exists as an __________ of a perfect world.
  6. The word “utopia” was created from 2 __________ words, eutopia & outopia.
Down
  1. Utopia was originally named for a fictional __________.
  2. Kim Jong-Un is practically worshipped by citizens, making him the figure ________ of North Korea.
  3. Opposite of dystopia.
  4. Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of a dystopian __________.
  5. Dystopian literature takes a current trend to the __________.
  6. Propaganda creates an emotional response as opposed to a __________ response.
  7. Dystopias often occur after an __________ event like a plague or nuclear warfare.
  8. Sir Thomas __________
  9. A dystopian government often uses mass __________ to spy on its citizens.

15 Clues: Opposite of dystopia.Sir Thomas __________Opposite of individuality.Term for mega-technological genre: “cyber-__________”.Utopia was originally named for a fictional __________.Dystopian literature takes a current trend to the __________.Biased information used to promote a political point of view....

JOBS 2013-05-02

JOBS crossword puzzle
Across
  1. / helps the doctor
  2. / cuts hair
  3. / plays intruments
  4. / flies planes
  5. / serves food
  6. / informs about the news
  7. / helps sick people
Down
  1. player / plays soccer
  2. / goes to school
  3. / works in the house
  4. / doesn't work anymore
  5. /sells products
  6. officer /controls security
  7. / teaches English
  8. / participates in movies

15 Clues: / cuts hair/ serves food/ flies planes/sells products/ goes to school/ teaches English/ helps the doctor/ plays intruments/ helps sick people/ works in the houseplayer / plays soccer/ doesn't work anymore/ informs about the news/ participates in moviesofficer /controls security

List 32 Vocabulary Words 2021-10-20

List 32 Vocabulary Words crossword puzzle
Across
  1. talking in circles
  2. ego second self
  3. force of a million pounds of dynamite
  4. sociable
  5. pledge as security
  6. male head of family
  7. speech to oneself
Down
  1. cold-blooded composure
  2. a flowing together
  3. affirm or declare
  4. go against
  5. make soft
  6. unorthodox
  7. heated dispute
  8. thought-to-be

15 Clues: sociablemake softgo againstunorthodoxthought-to-beheated disputeego second selfaffirm or declarespeech to oneselfa flowing togethertalking in circlespledge as securitymale head of familycold-blooded composureforce of a million pounds of dynamite

Sure! Here's the list of terms in one line, separated by a single space: righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression 2025-05-21

Sure! Here's the list of terms in one line, separated by a single space:  righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression crossword puzzle
Across
  1. next to, adjoining
  2. separation, disconnection
  3. advancement, development
  4. memorials, statues
  5. idol worship, paganism
  6. ancestry, lineage
  7. legacy moral inheritance, ethical heritage
  8. inheritance, heritage
  9. virtuous, moral
Down
  1. secondary result, side effect
  2. stability financial security, fiscal balance
  3. identity group belonging, shared culture
  4. generosity, cordiality
  5. maintain, protect
  6. barren, sterile

15 Clues: barren, sterilevirtuous, moralmaintain, protectancestry, lineagenext to, adjoiningmemorials, statuesinheritance, heritagegenerosity, cordialityidol worship, paganismadvancement, developmentseparation, disconnectionsecondary result, side effectidentity group belonging, shared culturelegacy moral inheritance, ethical heritage...

Unit 6: Tidy your room!! 2020-10-26

Unit 6: Tidy your room!! crossword puzzle
Across
  1. Security implement used to cover your mouth and nose.
  2. car A vehicle used by the police.
  3. Security implement used to protect your head.
  4. A person who extinguishes fires.
Down
  1. A vehicle which transport injured people.
  2. Metal rings used for souring prisoners.
  3. A vehicle used by firefighters.
  4. A person who helps doctors and cares for sick people.

8 Clues: A vehicle used by firefighters.A person who extinguishes fires.car A vehicle used by the police.Metal rings used for souring prisoners.A vehicle which transport injured people.Security implement used to protect your head.Security implement used to cover your mouth and nose.A person who helps doctors and cares for sick people.

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. mediums
  2. decodes
  3. sender to receiver, creation
  4. protocol levels
  5. sending
Down
  1. common clock
  2. server, user's identity
  3. data
  4. interface, transmitter
  5. security

10 Clues: datamediumsdecodessendingsecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysender to receiver, creation

Chapter 16 2026-02-12

Chapter 16 crossword puzzle
Across
  1. affect
  2. safety
  3. clear
  4. heavy load
  5. self-operating
Down
  1. felt sorry for
  2. carry out
  3. spending too much
  4. money-saving
  5. move

10 Clues: moveclearaffectsafetycarry outheavy loadmoney-savingfelt sorry forself-operatingspending too much

Vocabulary 2026-02-12

Vocabulary crossword puzzle
Across
  1. affect
  2. safety
  3. clear
  4. heavy load
  5. self-operating
Down
  1. felt sorry for
  2. carry out
  3. spending to much
  4. money-saving
  5. move

10 Clues: moveclearaffectsafetycarry outheavy loadmoney-savingfelt sorry forself-operatingspending to much

KNOW YOUR CODES 2018-12-12

KNOW YOUR CODES crossword puzzle
Across
  1. FIRE
  2. EVACUATION
  3. BOMB THREAT
  4. SECURITY EMERGENCY
  5. PLAN D
  6. CHEMICAL SPILL
Down
  1. CODE 11
  2. OUT OF CONTROL PERSON
  3. CODE 99
  4. INFANT/CHILD ABDUCTION
  5. PATIENT LOCATION ALERT

11 Clues: FIREPLAN DCODE 11CODE 99EVACUATIONBOMB THREATCHEMICAL SPILLSECURITY EMERGENCYOUT OF CONTROL PERSONINFANT/CHILD ABDUCTIONPATIENT LOCATION ALERT

The Functions Performed Within Communication Systems 2021-07-07

The Functions Performed Within Communication Systems crossword puzzle
Across
  1. sent by the sender to receiver
  2. data
  3. origin
  4. interface, transmitter
  5. common clock
  6. server, user's identity
  7. security
Down
  1. decodes
  2. protocol levels
  3. bringing something to existence
  4. mediums

11 Clues: dataorigindecodesmediumssecuritycommon clockprotocol levelsinterface, transmitterserver, user's identitysent by the sender to receiverbringing something to existence

FinTech Portal 2023-05-24

FinTech Portal crossword puzzle
Across
  1. Adoption Customer Resistance to Change
  2. Budget Overruns
  3. Integration Challenges
Down
  1. Payment Processing Failures
  2. Regulatory Compliance
  3. Security Breach

6 Clues: Budget OverrunsSecurity BreachRegulatory ComplianceIntegration ChallengesPayment Processing FailuresAdoption Customer Resistance to Change

302 2017-01-30

302 crossword puzzle
Across
  1. unnecessary
  2. knowledgeable
  3. risk-taker
  4. plan
Down
  1. self-employed
  2. move jobs
  3. continuing
  4. protection
  5. possibility

9 Clues: planmove jobscontinuingprotectionrisk-takerunnecessarypossibilityself-employedknowledgeable

Family 2024-09-09

Family crossword puzzle
Across
  1. smell
  2. community
  3. pleasant
  4. famous city in France.
  5. weather
  6. emotion
Down
  1. security
  2. hike
  3. emotion
  4. sea

10 Clues: seahikesmellemotionweatheremotionsecuritypleasantcommunityfamous city in France.

Technology 2025-12-20

Technology crossword puzzle
Across
  1. Useable on doors
  2. Addicted
  3. Head braker
  4. Opposite of slow
  5. Television
  6. The name of the puzzle
Down
  1. Oposite of start
  2. Film,take pictures
  3. Manage
  4. Security
  5. Structure & Organization
  6. A girls best friend
  7. Computers,phones and technology

13 Clues: ManageAddictedSecurityTelevisionHead brakerOposite of startUseable on doorsOpposite of slowFilm,take picturesA girls best friendThe name of the puzzleStructure & OrganizationComputers,phones and technology

10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) 2024-01-17

10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) crossword puzzle
Across
  1. California physician and critic of FDR who wanted the government to help the elderly more.
  2. Economic upturn, after a depression
  3. Catholic priest and radio host who didn't think FDR was going far enough in his reforms.
  4. Process in which a neutral party hears arguments from two opposing sides and makes a decision that both must accept
  5. Something that provides security against misfortune.
  6. This was abolished under the Fair Labor Standards Act.
  7. Spending borrowed money rather than raising taxes.
  8. Attempt to resolve conflict between hostile people or groups.
Down
  1. Role of government to work out conflicts among competing interest groups.
  2. FDR's wife
  3. To provide money for a project.
  4. Type of strike that is a method of boycotting work by sitting down at work and refusing to leave.
  5. Act passed by Congress to provide financial security to older Americans.
  6. Appointing extra judges who will rule in favor of your policies.
  7. Law passed that guaranteed workers the right to unionize.
  8. Former governor of Louisiana and critic of FDR.
  9. Works Progress Administration
  10. Because of that.
  11. Something that promotes well-being or is a useful aid

19 Clues: FDR's wifeBecause of that.Works Progress AdministrationTo provide money for a project.Economic upturn, after a depressionFormer governor of Louisiana and critic of FDR.Spending borrowed money rather than raising taxes.Something that provides security against misfortune.Something that promotes well-being or is a useful aid...

Chapter 11 test study guide 2025-04-09

Chapter 11 test study guide crossword puzzle
Across
  1. The rising stock prices convinced many people to ___________ in stocks.
  2. federal __________ insurance corporation
  3. ____________ borrowed their money from banks.
  4. Many people supported the New Deal, but the ____________ world did not.
  5. The WPA also gave jobs to ________ artists and writers.
  6. Many investors did not have the money to buy stocks, so they bought on _________.
  7. In 1930 Congress passed the _________ Tariff.
  8. Most people during the dustbowl left __________ to head for California.
  9. By the late 1920s, ____________ prices were very high.
  10. In 1935 Roosevelt created a new set of programs, often called the ______________.
Down
  1. homeless shelters during the depression
  2. In August 1935, Congress passed the __________ act.
  3. The United States slid into an economic crisis called the __________.
  4. In April, Congress created the _____________ administration
  5. The _________ improved a little by the mid-1930s, but the Great Depression continued.
  6. The social security act placed a _____ on workers and employers.
  7. an organized system for buying and selling shares, or blocks of investments, in corporations
  8. The Hawley-Smoot was a tax on ___________.
  9. The money from the social security act was used to pay monthly ________ to retired people.

19 Clues: homeless shelters during the depressionfederal __________ insurance corporationThe Hawley-Smoot was a tax on ___________.____________ borrowed their money from banks.In 1930 Congress passed the _________ Tariff.In August 1935, Congress passed the __________ act.By the late 1920s, ____________ prices were very high....

wow 2022-09-12

wow crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service
  2. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  3. Customizable additions to software for extra functionality.
  4. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  5. The deliberate use of someone else's identity, typically for financial gain.
  6. A simple form of code for software that can be written in word editors.
  7. Hacking that is meant to do minimal damage and is usually done out of curiosity.
  8. A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
  9. When an attacker inputs many passwords in the hope that it is eventually guessed correctly.
  10. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
Down
  1. Software that has their code listed as free to use, share, and modify.
  2. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  3. Admin control: Having _____ control of any given system.
  4. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
  5. A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. Software that can only be run for a limited amount of time before it expires.
  8. A previously unknown, bug, flaw, or backdoor in software. An attack happens once this flaw is exploited and attackers release malware before the flaw can be patched.
  9. The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
  10. A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.

20 Clues: Admin control: Having _____ control of any given system.Customizable additions to software for extra functionality.Software that has their code listed as free to use, share, and modify.A simple form of code for software that can be written in word editors.A secret word or phrase that is used to access a computer system or service...

Chapter 14 2016-04-18

Chapter 14 crossword puzzle
Across
  1. tax, a tax on the value of a property
  2. income tax, a tax on a persons earnings
  3. tax, a tax on the dollar value of a good or service being sold
  4. of a tax, a final burden of a tax
  5. spending, spending on certain programs that is mandated or required by existing law
  6. tax on imported goods
  7. budget, budget in which revenue is equal to spending
Down
  1. budget, budget for day-to-day expenses
  2. security, old-age survivors and disability insurance
  3. a required payment to a local, state, or national government
  4. tax, a tax on money or property that one living person gives to another
  5. spending, spending category about which government planners can make choices
  6. budget, budget for major capital or investment expenditures
  7. taxes that fund social security and medicare
  8. income tax, a tax on the value of a company's profits
  9. base, income property, good, or service that is subject to a tax
  10. income received by a government from taxes and non-taxed resources

17 Clues: tax on imported goodsof a tax, a final burden of a taxtax, a tax on the value of a propertybudget, budget for day-to-day expensesincome tax, a tax on a persons earningstaxes that fund social security and medicaresecurity, old-age survivors and disability insurancebudget, budget in which revenue is equal to spending...

Patients Matter Crossword Puzzle 2019-01-31

Patients Matter Crossword Puzzle crossword puzzle
Across
  1. What does the P stand for in PHI as defined by HIPAA?
  2. Last Name of our Information Security Director
  3. Sending e-mails to gain relevant information
  4. Log to track and manage risks (Two words)
  5. unplanned interruption to an IT Service or a reduction in the Quality of an IT Service
  6. Internal control reports on the services provided by a service organization (Two words)
  7. What is the open Slack Channel to contact ITGRC? (No characters)
Down
  1. We have an obligation to destroy data
  2. Last Name of our Director of Enterprise Risk Management
  3. I can travel anywhere in the world with my laptop?
  4. Last Name of our Security Officer
  5. What does the C stand for in ITGRC?
  6. Who should I contact if I suspect fraud, misuse, or accidental disclosure?
  7. Last Name of our Privacy Officer
  8. Which ITGRC area do I contact for an acceptable use request?
  9. Office of Consumer Rights
  10. Last Name of our Investigations Lead

17 Clues: Office of Consumer RightsLast Name of our Privacy OfficerLast Name of our Security OfficerWhat does the C stand for in ITGRC?Last Name of our Investigations LeadWe have an obligation to destroy dataLog to track and manage risks (Two words)Sending e-mails to gain relevant informationLast Name of our Information Security Director...

Government and National budget 2025-01-18

Government and National budget crossword puzzle
Across
  1. Refers to the people who own and control factors of production.
  2. increase in the level of production of a country.
  3. Government expenditure to keep country safe.
  4. The government that deals with safety and security of the whole country.
  5. A payment made to a business by the government to assist it.
  6. The government that deals with education of a specific province.
  7. The compulsory payment made to government by an individual or business on the income or profit that they earn.
  8. The minster who presents the national budget.
Down
  1. A list of expected income and intended expenditure.
  2. The government that deals issues within a town or municipal area.
  3. Tax charged on luxury/non-essential items.
  4. A situation in which something is unfair/unequal.
  5. Taxes paid directly to the government.
  6. The sums of money paid by the government for a particular purpose, for example pensioners.
  7. Tax charged when goods are bought and sold.
  8. Tax charged by companies.
  9. Tax charged on salaries and wages by households.

17 Clues: Tax charged by companies.Taxes paid directly to the government.Tax charged on luxury/non-essential items.Tax charged when goods are bought and sold.Government expenditure to keep country safe.The minster who presents the national budget.Tax charged on salaries and wages by households.increase in the level of production of a country....

Spring Firm Meeting 2024 2024-04-09

Spring Firm Meeting 2024 crossword puzzle
Across
  1. BPB was founded in nineteen
  2. An activity that often uses talents from a variety of departments
  3. What every company and high net worth family needs
  4. An area that helps high-net-worth people manage their financial lives
  5. Where most of the firm’s new business is originated
  6. A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
  7. A type of organization that serves the community, we do their taxes and audits
  8. Something BayBridge Real Estate Capital helps clients manage, find or refinance
  9. What we all aspire to do
  10. An acronym for a special type of insurance that is tax mitigation tool
  11. How our HR department helps clients
  12. He is the CEO and grew up in the firm
  13. A type of advisory service that helps buyers and sellers of companies
  14. The largest group in the firm and a typical entry point for multiple services
  15. Something PWA advisors help client protect
  16. A software platform MST helps implement at companies
  17. One approach our tax controversy team takes with the IRS
  18. A specialty area of PWA
  19. An acronym for solving repetitive tasks with robotics
  20. How PWA creates a comprehensive approach
Down
  1. What many of our MST services entail
  2. A type of entity that provides tax benefits for manufacturers and distributors that expert products
  3. Where our first office was located
  4. What assurance and cyber teams often do
  5. A lifechanging client event we can help with from planning to tax preparation to estate planning
  6. A governmental agency that scares of our clients but not us
  7. Part of the name of several affiliates
  8. A type of tax credit for manufacturing or product improvement
  9. One of the firm’s key service areas
  10. A core value brought to life by our participation in the DCC and Bounce Back from Cancer
  11. Diversity, equity and blank
  12. A charity event the firm teams have contributed $2 million to since it started 14 years ago
  13. Present blank analysis
  14. Investigating, often in fraud or legal situations
  15. An area of tax that especially impacts clients with operations in multiple states
  16. The area of tax services BPB is probably most famous for
  17. A service that several departments have in their names
  18. A special type of audit for public companies
  19. Managed blank and Technology
  20. Firm members speak in practice in more than this many languages

40 Clues: Present blank analysisA specialty area of PWAWhat we all aspire to doBPB was founded in nineteenDiversity, equity and blankManaged blank and TechnologyWhere our first office was locatedOne of the firm’s key service areasHow our HR department helps clientsWhat many of our MST services entailHe is the CEO and grew up in the firm...

Inventions Crossword 2025-10-30

Inventions Crossword crossword puzzle
Across
  1. the _____ Brothers’ first flight occurred in 1903
  2. the assembly line was introduced by Henry ________________
  3. airplanes improved trade and global ________________
  4. the first flight lasted only ______________ seconds__
  5. computers made it easier to process and access ________________
  6. the printing press was invented by ________________
  7. buying and selling online is called e-
  8. the oven discovered accidentally by Percy Spencer was the ________________
  9. the first computer (Z1) was invented by Konrad ______________
  10. the first photograph was taken by Joseph ________________
  11. the name of Karl Benz’s first car was ________________
  12. the telegraph was invented by Samuel ________________
  13. _______ launched in the year 2004
  14. the television was invented by Philo ________________
  15. before Facebook, a popular social network was ________________
  16. the first practical steam engine was built by Thomas ________________
  17. one modern risk of computers is cyber ________________
  18. the first mobile phone call was made by Martin ________________
  19. the inventor who improved the steam engine was James ________________
  20. the _____ engine was invented in the year 1712
  21. the radio was invented by Guglielmo ________________
  22. the first mobile phone was the size of a ________________
  23. the first automobile was built by Karl ________________
  24. Gutenberg’s press made books more ________________
  25. the invention that captures images and memories is the ________________
  26. the early Internet network was known as ________________
  27. the first ______ was built in the year 1936
Down
  1. the radio made mass ________________ possible
  2. Facebook was created by Mark ________________
  3. one negative result of industrial steam power was more ________________
  4. the airplane was invented by the ________________ brothers
  5. the first major book printed using movable type was the Gutenberg ________________
  6. steam engines allowed for faster ________________
  7. the telephone was invented by Alexander Graham ________________
  8. James Watt added a separate ________________ to improve efficiency
  9. the inventor of the World Wide Web was Tim ________________
  10. the light bulb was invented by Thomas ________________
  11. a light bulb works because of a heated ________________
  12. _____ stands for the World Wide Web
  13. Bell’s first words were “Mr. , come here”
  14. steam engines provided power for early ________________
  15. one negative result of cars was increased ________________
  16. the first mobile phone was produced by ________________
  17. the printing press spread knowledge and improved access to ________________
  18. the telephone revolutionized long-distance ________________
  19. the British inventor who also made a light bulb was Joseph ________________
  20. the first online pages were known as ________________
  21. the automobile increased personal ________________
  22. the light bulb was safer than candles because of reduced fire ________________
  23. the light _____ was invented in the year 1879
  24. Facebook originally started as a platform limited to ________________ students

51 Clues: _______ launched in the year 2004_____ stands for the World Wide Webbuying and selling online is called e-Bell’s first words were “Mr. , come here”the first ______ was built in the year 1936the radio made mass ________________ possibleFacebook was created by Mark ________________the light _____ was invented in the year 1879...

FIRE / SEXTING / CYBER BULLYING 2015-09-09

FIRE / SEXTING / CYBER BULLYING crossword puzzle
Across
  1. Cyber bullying and ..... are new concepts affecting youth
  2. Can happen to you if you extinguish fire with water
  3. Doors and ...... should be used as exit points in fire
  4. Acronym used to remember how to use fire extinghuiser
Down
  1. To be practiced at home and school in case of fire
  2. In case of fire, with no smoke, go towards escape route .....
  3. Children should not play with matches and ..., it causes fire
  4. Sexting messages may be classified as child ......
  5. Stay low in case of fire and crawl on hands and .....
  6. How many times a year fire drills should be practiced

10 Clues: To be practiced at home and school in case of fireSexting messages may be classified as child ......Can happen to you if you extinguish fire with waterStay low in case of fire and crawl on hands and .....How many times a year fire drills should be practicedAcronym used to remember how to use fire extinghuiser...

CyberSecurity Puzzle 2024-06-06

CyberSecurity Puzzle crossword puzzle
Across
  1. __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
  2. SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
  3. OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
  4. EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
  1. CYBER ATTACK CAN CAUSE HUGE ____________
  2. IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
  3. IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
  4. HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
  5. MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
  6. ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.

10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS....

Emerging careers 2025-05-13

Emerging careers crossword puzzle
Across
  1. Using big data insights to drive strategic financial decisions
  2. When companies can't pay debts, CAs in this field handle restructuring proceedings
  3. Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
  4. CAs provide funding, compliance, and scaling advice to these new ventures
  5. Accounting specialty investigating financial fraud and disputes
  6. Environmental, Social, Governance framework CAs use to assess sustainability reporting
Down
  1. Digital assets requiring specialized tax and regulatory expertise from modern CAs
  2. Ensuring adherence to laws and regulations like GST or SEBI guidelines
  3. Assessment and management of financial, operational or cyber threats
  4. Corporate combinations where CAs perform financial due diligence

10 Clues: Using big data insights to drive strategic financial decisionsAccounting specialty investigating financial fraud and disputesCorporate combinations where CAs perform financial due diligenceAssessment and management of financial, operational or cyber threatsEnsuring adherence to laws and regulations like GST or SEBI guidelines...

cyberbullying 2025-06-19

cyberbullying crossword puzzle
Across
  1. something on the internet mostly on social media like youtube
  2. something two or more people can do to you
  3. someone who helps the bully or ignores the problem
  4. something on the internet that has almost all you info
  5. a person who makes people feel bad on the internet
Down
  1. someone who shares kind words and fights off the bully
  2. something that people play games on or go on social media
  3. a person who try's to find your info online
  4. related to computers
  5. is a option you can chose if you feel unsafe or if your being cyberbullied

10 Clues: related to computerssomething two or more people can do to youa person who try's to find your info onlinesomeone who helps the bully or ignores the problema person who makes people feel bad on the internetsomeone who shares kind words and fights off the bullysomething on the internet that has almost all you info...

Industry 5.0 2025-01-21

Industry 5.0 crossword puzzle
Across
  1. A global network that connects smart devices and systems
  2. A major goal of Industry 5.0 focusing on reducing waste
  3. Robots designed to work alongside humans
  4. Technology that allows humans to interact with machines via speech or gestures
  5. Machines and systems that can learn and make decisions
  6. The integration of digital and physical systems in manufacturing
Down
  1. Industry 5.0 promotes this environmental concern in manufacturing
  2. A key technology that enables secure and transparent transactions
  3. A key concept of Industry 5.0 that focuses on human-centered approaches
  4. The process of using data to make better decisions

10 Clues: Robots designed to work alongside humansThe process of using data to make better decisionsMachines and systems that can learn and make decisionsA major goal of Industry 5.0 focusing on reducing wasteA global network that connects smart devices and systemsThe integration of digital and physical systems in manufacturing...

teach 2025-09-07

teach crossword puzzle
Across
  1. Prefix for anything involving virtual or digital threats.
  2. Online test to tell humans from bots — often asks you to “spot the traffic light” .
  3. Microsoft’s OS that introduced the Start menu.
  4. A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
  5. The annoying lag between click and response (7).
  6. The coder’s social network for sharing repos (6).
Down
  1. Microsoft’s old web browser — or the Windows file manager.
  2. The digital ledger tech behind Bitcoin and more.
  3. Coffee-inspired programming language once said to “run everywhere” (4).
  4. Open-source OS mascot is a penguin named Tux (5).

10 Clues: Microsoft’s OS that introduced the Start menu.The digital ledger tech behind Bitcoin and more.The annoying lag between click and response (7).Open-source OS mascot is a penguin named Tux (5).The coder’s social network for sharing repos (6).Prefix for anything involving virtual or digital threats....

The Cyber Word Hunt 2025-10-22

The Cyber Word Hunt crossword puzzle
Across
  1. : Field concerned with protecting systems and data from online attacks
  2. : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
  3. : The act of checking and improving quality in AML processes
  4. : Cyber attack that tricks users into revealing personal info via fake emails
  5. : The shift from traditional banking to online banking is called digital ___
Down
  1. : Process of verifying user identity before accessing an online account
  2. : Sending money electronically through a banking app
  3. : Device most commonly used to access digital banking apps
  4. : A new generation of online-only banks with no physical branches
  5. : Department that manages IT risk, compliance, and governance

10 Clues: : Sending money electronically through a banking app: Device most commonly used to access digital banking apps: The act of checking and improving quality in AML processes: Department that manages IT risk, compliance, and governance: A new generation of online-only banks with no physical branches...

PenFed Fun 2022-09-05

PenFed Fun crossword puzzle
Across
  1. who we are
  2. must be _______ out of state
  3. not enough security
  4. member services
  5. Paris' Dog's name
  6. transfer
  7. computer program
  8. who you gonna call?
Down
  1. leader
  2. a thief
  3. add more fraud
  4. famous fraudster
  5. reader board
  6. block of calls from 8-11am

14 Clues: leadera thieftransferwho we arereader boardadd more fraudmember servicesfamous fraudstercomputer programParis' Dog's namenot enough securitywho you gonna call?block of calls from 8-11ammust be _______ out of state

Shirley Homes Chapter 5 2021-04-08

Shirley Homes Chapter 5 crossword puzzle
Across
  1. Shirley had a good _____ , so she took great photos
  2. Jeff was very nervous and started to ____
  3. Anna and her boyfriend kissed each other. They were very happy and ______
  4. When the investigator saw Anna in the pub, she decided to create a new _____
  5. Shirley wanted to watch Anna, so she wore a bright student ____
Down
  1. They suspected Anna, but couldn't ____ it
  2. When Jeff knew who the cyber thief was, he got really ____
  3. Anna was a clever young woman, not _____
  4. Anna had her lunch in the pub. There were a lot of people there, so it was _____

9 Clues: Anna was a clever young woman, not _____They suspected Anna, but couldn't ____ itJeff was very nervous and started to ____Shirley had a good _____ , so she took great photosWhen Jeff knew who the cyber thief was, he got really ____Shirley wanted to watch Anna, so she wore a bright student ____...