cyber security Crossword Puzzles
Information Security Puzzle 2015-07-08
Across
- / Such emails should be immediately deleted and not circulated further.
- / This policy requires employees to keep workstations free of confidential information when unattended
- / Mare sure that your computed screen is always ____ when unattended.
- / All security incidents should be ____ to ensure the authorities are notified, and appropriate actions taken to minimize impact.
- / An internationally acclaimed certification for information security standards.
- / ensures safeguarding the accuracy and completeness of information.
Down
- / This should contain a combination of alphabets, numbers and special characters .
- / Social ____ uses influence, persuasion or manipulation to deceive people and obtain sensitive information.
- / Is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- / This type of information is available on GKE websites, and free for everyone to access.
10 Clues: / ensures safeguarding the accuracy and completeness of information. • / Mare sure that your computed screen is always ____ when unattended. • / Such emails should be immediately deleted and not circulated further. • / An internationally acclaimed certification for information security standards. • ...
Social Security Taxes 2023-03-10
Across
- pay any payment made to individuals because of their personal injury or sickness that does not constitute wages
- the excess of the amount of employment taxes required to be deposited over the amount deposited on or before the last date prescribed for the deposit
- the block of time, consisting of four quarters beginning July 1 of the second preceding year and ending June 30 of the prior year, used to determine if an employer is a monthly or a semiweekly depositor
- any service performed by employees for their employer, regardless of the citizenship or residence of either
- the expenses that an employer pays for an employee’s education, such as tuition, fees, and payments for books, supplies, and equipment
Down
- the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA
- rule that determines if an employer has satisfied the deposit obligation by having no shortfall that exceeds $100 or 2 percent of the amount of employment taxes required to be deposited
- an entity defined by law as an individual, a trust or estate, a partnership, or a corporation
- also known as a Federal Tax Identification Number, and is used to identify a business entity
- any person or organization who employs one or more individuals for the performance of services, unless such services or employment are specifically excepted by law
10 Clues: also known as a Federal Tax Identification Number, and is used to identify a business entity • an entity defined by law as an individual, a trust or estate, a partnership, or a corporation • the maximum amount of wages during a calendar year that is subject to a particular tax, such as FICA • ...
Email Security Crossword 2021-10-15
Across
- Another way to check email authenticity is to look for our company ________.
- Always ______ emails that ask for confidential information, asks you to take action, or contains links and attachments.
- According to the FBI, ________ was the most common type of cybercrime in 2020.
- If an email is not asking you for action or information, send it to _____.
Down
- One way to check email authenticity is to check for the sender in your inbox or in _______.
- _________ emails are any emails attempting to sell you a service or to get you into a meeting.
- Successful phishing campaigns can lead to __________ attacks.
- If an email asks for ____________ information, report it to Data Security.
- If an email is from a sender you do not want to hear from again, mark it as ____.
- One way to determine if an email is suspicious is to check for _____ or attachments.
10 Clues: Successful phishing campaigns can lead to __________ attacks. • If an email asks for ____________ information, report it to Data Security. • If an email is not asking you for action or information, send it to _____. • Another way to check email authenticity is to look for our company ________. • ...
Branch Physical Security 2022-08-23
Across
- Who is our Retail Operations primary contact?
- During a robbery, try to remain ________.
- Make note of the ______________ used in escape.
- ________________ with the robber(s)' instructions.
- Activate the alarm ______________________, providing this action will not endanger yourself or others.
- Post the ____________ ______________ notice at the main entrance of the branch to notify customers that the branch is closed.
Down
- The Post Robbery __________________ should be distributed.
- Give each witness (associates and/or customers) a Suspect ______________________________ Form to help them recollect what they saw.
- Who is our Physical Security Manager?
- Once the robber has left the building, announce "________ ______ ________", this will alert the team that a robbery has taken place.
10 Clues: Who is our Physical Security Manager? • During a robbery, try to remain ________. • Who is our Retail Operations primary contact? • Make note of the ______________ used in escape. • ________________ with the robber(s)' instructions. • The Post Robbery __________________ should be distributed. • ...
Information Security Crossword 2017-01-13
Across
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
- A person who uses computers to gain unauthorized access to computer systems and networks.
- A type of malware that is often disguised as legitimate software.
- You may not divulge this information while you are working for an employer or after you leave.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
Down
- Anything that has the potential to cause serious harm to a computer system.
- A flaw or weakness that can be used to attack a system or organization.
- Personal information related to personal data stored on computer systems
- A secret series of characters used to authenticate a person’s identity.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • Personal information related to personal data stored on computer systems • ...
National Security Policymaking 2016-12-13
Across
- A policy, beginning in the earl;y 1970s, that sought a relaxation of tensions between the US and the Soviet Union, coupled with firm guarantees of mutual security
- A mutual reliance in which actions in a county reverberate and affect the economic well-being of people in other countries
- The foreign policy of the US followed throughout most of its history whereby it tried to stay out of other nations' conflicts, particularly European wars
- The use of violence to frighten a country's population or government
- First reduction in nuclear war
Down
- Defense budget cuts during times of peace
- An agency created after WWII to coordinate American Intelligence activities abroad and to collect, analyze, and evaluate intelligence
- The ratio of what a country pays for imports to what it earns from exports
- Policy that involves choice taking about relations with the rest of the world
- Being occupied by non-muslim peoples created a magnet for
10 Clues: First reduction in nuclear war • Defense budget cuts during times of peace • Being occupied by non-muslim peoples created a magnet for • The use of violence to frighten a country's population or government • The ratio of what a country pays for imports to what it earns from exports • Policy that involves choice taking about relations with the rest of the world • ...
Ethics & Computer Security 2019-04-18
Across
- the process of gaining root access to the iOS operating system that runs on Apple devices, including the iPad, iPhone and iPod Touch.
- the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.
- reporting an immoral or illegal activity.
- redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website.
- any software that brings harm to a computer system.
Down
- a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
- the process of using an algorithm to transform information to make it unreadable for unauthorized users.
- Worm a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
- of Ethics the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.
- a technology that tracks and records consecutive key strokes on a keyboard.
10 Clues: reporting an immoral or illegal activity. • any software that brings harm to a computer system. • a technology that tracks and records consecutive key strokes on a keyboard. • the use of electronic messaging systems to send out unrequested or unwanted messages in bulk. • ...
Computer System Security 2024-03-25
Across
- Science of studying ciphers
- A Secret entry point into a program
- Hiding a message inside an image
- A collection of parameters required to establish a secure session
- A graphical network packet analyser
Down
- Allows server & client to authenticate each other
- Creates a secure tunnel over a public network
- A functions take inputs of variable lengths to return outputs of a fixed length
- A signature which is attached to a electronic document
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: Science of studying ciphers • Hiding a message inside an image • A Secret entry point into a program • A graphical network packet analyser • Creates a secure tunnel over a public network • Allows server & client to authenticate each other • A signature which is attached to a electronic document • A collection of parameters required to establish a secure session • ...
Security and commerce 2023-10-27
Across
- The electronic equivalent of a wallet
- A program, that spread by attaching themselves to executable files
- Special gift in the email, which is a fraud
- Programs, which are disguise as an innocent-looking file
- Bank fraud
- The illegal copying and distribution of copyrighted things
- Shopping basket
Down
- Online harassment or abuse in chatrooms
- The most common type of e-commerce
- Virtual shopping trolley
10 Clues: Bank fraud • Shopping basket • Virtual shopping trolley • The most common type of e-commerce • The electronic equivalent of a wallet • Online harassment or abuse in chatrooms • Special gift in the email, which is a fraud • Programs, which are disguise as an innocent-looking file • The illegal copying and distribution of copyrighted things • ...
Password Security Crossword 2024-09-25
Across
- Use this type of phrase to create a strong password (e.g., “MyD0g$pot!”)
- Your MSID password needs to be at least this many characters long
- A method to verify your identity using something you know, something you have and/or something you are
Down
- Person you can share your password with.
- Never use ________ information in your passwords
- This type of attack tricks you into revealing your password through fake emails or websites
- UHG approved password manager
- Always log out of your accounts when using a ______ computer
- Your ____ email address should only be used for work purposes
- Avoid using the same ________ across multiple accounts
10 Clues: UHG approved password manager • Person you can share your password with. • Never use ________ information in your passwords • Avoid using the same ________ across multiple accounts • Always log out of your accounts when using a ______ computer • Your ____ email address should only be used for work purposes • ...
Food Security Crossword 2024-10-17
Across
- Lack of consistent access to enough food
- The component in food essential for growth
- Crop failure due to extreme weather
- Nutrient deficiency resulting from lack of food
- Storing crops for future use
Down
- Agricultural practice to boost crop yields
- Promoting sustainable agriculture
- Diversifying crops to reduce risk
- Global organization addressing hunger
- Condition of having limited food supply
10 Clues: Storing crops for future use • Promoting sustainable agriculture • Diversifying crops to reduce risk • Crop failure due to extreme weather • Global organization addressing hunger • Condition of having limited food supply • Lack of consistent access to enough food • Agricultural practice to boost crop yields • The component in food essential for growth • ...
April (Security) Fools! 2025-04-18
Across
- Malicious software that locks data and demands payment for its release.
- A type of malware disguised as legitimate software.
- The process of converting information into a secure format.
- A barrier that controls the flow of network traffic.
- A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
- Software that secretly monitors and collects information about a user's activities.
- Software designed to disrupt, damage, or gain unauthorized access.
- The process of verifying the identity of a user or device.
- A network of infected devices controlled by a malicious actor.
- Software that detects and removes malicious programs.
10 Clues: A type of malware disguised as legitimate software. • A barrier that controls the flow of network traffic. • Software that detects and removes malicious programs. • The process of verifying the identity of a user or device. • The process of converting information into a secure format. • A network of infected devices controlled by a malicious actor. • ...
FILL Your Answers 2023-04-21
Across
- winner of women's IPL 2023
- acquired by cisco in 2012,cloud-managed sdn platform
- cisco's intent to acquire the cloud security company
- cisco pinnacle award 2023-one among two winning teams under velocity impact
- MFA,SSO,Zero trust security solution
- oscar 2023, best original song
Down
- cisco's cloud based secure internet gateway platform that provides protection from internet based threats
- men's hockey worldcup champion 2023
- meet cisco's four times lower energy demands& 2.6 times higher bandwidth.Its a win-win on power consumption and performance
- machu picchu-one among the seven wonder's is situated at?
- cisco's stock name
11 Clues: cisco's stock name • winner of women's IPL 2023 • oscar 2023, best original song • men's hockey worldcup champion 2023 • MFA,SSO,Zero trust security solution • acquired by cisco in 2012,cloud-managed sdn platform • cisco's intent to acquire the cloud security company • machu picchu-one among the seven wonder's is situated at? • ...
The privacy Act 1993 2017-09-04
Across
- If the information is _________ it needs to be corrected.
- Principle 2, information must be what from the individual?
- Principle 5 is to do with the what and security?
- Principle 5 is to do with storage and what?
Down
- How many principles?
- The principle in which you should not use information gathered for one purpose for another.
- The act is relevant to what type of information?
- What is this Act of 1993?
- The purpose of the act is to focus on the what?
- This principle is about telling a person when you're collecting their information.
- Information should not be _________ to another party.
11 Clues: How many principles? • What is this Act of 1993? • Principle 5 is to do with storage and what? • The purpose of the act is to focus on the what? • The act is relevant to what type of information? • Principle 5 is to do with the what and security? • Information should not be _________ to another party. • If the information is _________ it needs to be corrected. • ...
Crossword Puzzle 2020-08-19
15 Clues: tweak • person • about me • is caring • stay safe • can i get a? • problem solving • digital pigeons • needs a solution • who doesn't love? • accept or decline? • faster than a call • better safe than sorry • lots of them on your phone • doesn't need to be physical
Jobs - Paulina 2021-03-30
15 Clues: sprząta • ratuje ludzi • naprawia rury • naprawia kable • jeździ na wojny • siedzi w sadzie • pomaga doktorowi • pracuje w szpitalu • guard pilnuje czegoś • opiekuje się dziećmi • pracuje w kwiaciarni • ratuje ludzi z pożaru • pracuje w restauracji • critic krytykuje jedzienie • rozmawia z ludzmi lub z dziećmi
Word Within the Word List 32 2013-10-21
15 Clues: sociable • make soft • go against • unorthodox • second self • thought-to-be • heated dispute • speech to oneself • affirm or declare • talking in circles • pledge as security • a flowing together • male head of family • cold-blooded composure • force of a million tons of dynamite
Champion Crossword Puzzle 2016-09-22
14 Clues: rgu • rgu • NPS • rgu • security • training • 2 products • the process • all 4 products • our best product • paid triple ways • summary of great • voice of the customer • one question about you
FNAF 2023-08-15
11 Clues: old fox • new fox • protector • lights on. • lights off. • new guitarist • old guitarist • where you race • security guard • please take this map • pizza!!!!!!!!!!!!!!!!!!!!!!!
CAB 2021-03-04
Across
- Punching,kicking spitiig
- intentionally excluding someone from an online group
- spreading rumors
- the person that just sits and watches someone getting picked on
- someone who sticks up for someone that is getting bullied
- repeatedly sending abusive, insulting, or unwanted messages
- Online arguments using electronic messages with aggressive or abusive language
- Disclosing someone else’s secrets or embarrassing information online without their consent
Down
- pretending to be someone else and sending or posting material
- writing mean messages on social media
- repeated, intense harassment and denigration that includes threats or creates significant fear
- Spreading gossip, lies or rumours about someone to damage their reputation or friendships
- talking someone into revealing secrets or embarrassing information, then publishing it online
- name calling threning
- messing around with your friend and both of you are having fun
15 Clues: spreading rumors • name calling threning • Punching,kicking spitiig • writing mean messages on social media • intentionally excluding someone from an online group • someone who sticks up for someone that is getting bullied • repeatedly sending abusive, insulting, or unwanted messages • pretending to be someone else and sending or posting material • ...
tech crossword 2023-06-07
Across
- a type of computer memory where data is stored
- it is a mobile operating system
- a malicous software that may cause disruption to your computer and leak private information online
- it is any sequence of one or more symbols
- small blocks of data created by a server
- a system that protects the Internet from cyber attacks
- a program that once is executed, would cause major damage to the computer
Down
- a digital representation of text and data
- a collection of data duplicating original values
- a mapping for some domain to bits
- one of the largest technology companies
- an image that is used for representing data
- a hardware used for transmitting digital video and audio from one device to another
- a moving digital image
- a method of transmitting and receiving messages using electronic devices
15 Clues: a moving digital image • it is a mobile operating system • a mapping for some domain to bits • one of the largest technology companies • small blocks of data created by a server • a digital representation of text and data • it is any sequence of one or more symbols • an image that is used for representing data • a type of computer memory where data is stored • ...
Vocabulary revision. unit 6, Light up 2023-04-21
Across
- both countries were about to start a _____ because of their disagreements.
- prejudice or discrimination because of a person's age.
- after the heavy rains, there was a lot of _______in the city.
- the belief that humans may be divided into separate and exclusive biological entities called “races”
- team or group
- starting point
- There was too much _____ in the country because of the bad economy
Down
- People had nothing to eat. A ______ was declared.
- (verb)consists of
- The education system is excellent and the country has almost no _______ among its citizens.
- Cyber _______ is one of the modern-day problems affecting teenagers.
- the practice of ending a personal relationship with someone by suddenly and without explanation withdrawing from all communication.
- (verb) to stay away from someone or something
- the way it develops
- (verb) to get better
15 Clues: team or group • starting point • (verb)consists of • the way it develops • (verb) to get better • (verb) to stay away from someone or something • People had nothing to eat. A ______ was declared. • prejudice or discrimination because of a person's age. • after the heavy rains, there was a lot of _______in the city. • ...
Informatika 2023-03-01
Across
- singkatan dari computational thinking
- perangkat keras (hardware) pada komputer yang berfungsi sebagai alat untuk input data yang berupa huruf, angka dan simbol
- ... bullying adalah perundungan dengan menggunakan teknologi digital
- memudahkan pemerintah dalam melakukan sosialisasi kebijakan merupakan salah satu dampak ... informatika
- STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika)
- bentuk kejahatan online yang dilakukan dengan cara menggunakan kartu kredit orang lain
Down
- salah satu aplikasi media chat
- kemampuan memecah data, proses atau masalah (kompleks)menjadai bagian-bagian yang lebih kecil atau menjadi tugas-tugas yang mudah dikelola
- alat mencetak kertas
- salah satu program aplikasi pengolah angka
10 Clues: alat mencetak kertas • salah satu aplikasi media chat • singkatan dari computational thinking • salah satu program aplikasi pengolah angka • ... bullying adalah perundungan dengan menggunakan teknologi digital • STEAM adalah S (Science), T (Technology), E (Engineering), A (...), M (matematika) • ...
ICT WORDZ 2024-02-23
Across
- Is the gap between those who have access to technology and those who don't
- Also known as home working
- Allows you to make informed decisions
- Moral rules that describe what we believe is right or wrong within a civilized
- Is the legal right of ownership for the creator piece of work
Down
- A establishment of the purchaser's right to use the software
- A type of cyber crime
- Going against moral rules of right and wrong in the society
- Users are licensees. They can't copy, modify or share the product
- Grants a user the right to run an application on a specific machine
10 Clues: A type of cyber crime • Also known as home working • Allows you to make informed decisions • Going against moral rules of right and wrong in the society • A establishment of the purchaser's right to use the software • Is the legal right of ownership for the creator piece of work • Users are licensees. They can't copy, modify or share the product • ...
C2BK Presentation Crossword Puzzle 2024-05-28
Across
- help bullies to understand the harm of bullying
- Have you ever hurt anyone by purpose? Did you keep yourself safe when you reached out to others?
- the person who helps the victim, who you can become
- the person who bullies
- the person who is being bullied
- the person who helps the bully
Down
- the person who does not interact with bullying
- the name for bullying that happens online
- something that you can ask for from your teachers and friends that will make you and the situation better
- false information that you shouldn’t spread
10 Clues: the person who bullies • the person who helps the bully • the person who is being bullied • the name for bullying that happens online • false information that you shouldn’t spread • the person who does not interact with bullying • help bullies to understand the harm of bullying • the person who helps the victim, who you can become • ...
Let's Solve 2025-02-19
Across
- ,An online identity created by user to share information such as thoughts photos videos etc.
- ,A relationship between friend.
- ,To gain access you must make sure you are computer or device is connected to the INTERNET
- ,__________________ is to chat share and exchange thought, Idea or information.
Down
- ,A mix of letter numbers and symbols to keep pure account Secure.
- ,Never share _____________ information.
- ,Ability and knowledge to safely access digital
- bullying ,A form of online bullying.
- ,Doing this prevent access to information and resecure.
- ,A Traile of information and data as a result of you active.
10 Clues: ,A relationship between friend. • bullying ,A form of online bullying. • ,Never share _____________ information. • ,Ability and knowledge to safely access digital • ,Doing this prevent access to information and resecure. • ,A Traile of information and data as a result of you active. • ,A mix of letter numbers and symbols to keep pure account Secure. • ...
B1_Unit10 dictation 2025-05-05
Across
- To transfer files from the Internet onto your computer.
- To add new software to your computer.
- To turn a computer off and then turn on again.
- To make specific changes and prepare a device or software for use.
- When a program or computer stops working suddenly.
- To make a copy of important files in case something goes wrong.
Down
- This program helps protect your computer from cyber attacks.
- To remove an unnecessary app from your computer.
- To sign up for something (for ex. a Youtube Channel) to get updates or information regularly.
- To install the latest version of a program.
10 Clues: To add new software to your computer. • To install the latest version of a program. • To turn a computer off and then turn on again. • To remove an unnecessary app from your computer. • When a program or computer stops working suddenly. • To transfer files from the Internet onto your computer. • This program helps protect your computer from cyber attacks. • ...
engineering crosswords 2024-12-03
Across
- A step-by-step procedure for solving a problem.
- Relating to computers, networks, or information technology.
- The process of creating and writing computer software.
- A set of connected parts working together as a whole.
- The act of introducing something new or improving existing technology.
Down
- The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
- The capacity to do work or power machines.
- The use of technology to perform tasks without human intervention.
- A machine capable of carrying out a complex series of actions.
- written instructions for a computer to execute
10 Clues: The capacity to do work or power machines. • written instructions for a computer to execute • A step-by-step procedure for solving a problem. • A set of connected parts working together as a whole. • The process of creating and writing computer software. • Relating to computers, networks, or information technology. • ...
Crossword On Internet and Technology 2025-10-03
Across
- Protection of digital systems from theft or damage
- The introduction of new ideas or methods
- A digital world where people interact with each other, digital objects and environments in real time
- An important and sudden discovery or progress
- The right to keep personal information secure
Down
- Old-fashioned; no longer useful
- A person who is connected to the internet or who is using electronic devices
- Happening in many places or among many people
- A person who is knowledgeable and skilled in the use of technology
- Cyber attacks that trick people into giving away personal data
10 Clues: Old-fashioned; no longer useful • The introduction of new ideas or methods • Happening in many places or among many people • An important and sudden discovery or progress • The right to keep personal information secure • Protection of digital systems from theft or damage • Cyber attacks that trick people into giving away personal data • ...
Definitions for computer 2021-10-06
Across
- to gain information from someone else in a bad way
- parts of a computer or substance
- to pertain something
- small and portable soli device that can be inserted onto a USB
- the key to the computer system which stands for Central Processing Unit
- storage information
- a reason or limited use of copyrighting
- the way to communicate with other networks
- this is used to store memory and has lots of small chips
- when you take or steal information from someone else and copy it to make it look like yours
Down
- a website that allows to delete, gain, revise a content using a web browser
- a local network area
- a security use to protect the use of your network and data
- the right to make copies of music, artistic work and words
- stands for wide network area which is a computer network that connects smaller networks
- a storage device
- a security device that can help protect the computer
- used to connect cables to a computer
- this is often seen in messages and posts
19 Clues: a storage device • storage information • a local network area • to pertain something • parts of a computer or substance • used to connect cables to a computer • a reason or limited use of copyrighting • this is often seen in messages and posts • the way to communicate with other networks • to gain information from someone else in a bad way • ...
key terms geography 2025-09-15
Across
- The influence of geography on international politics and power relations.
- The study of population structure and change.
- A location with meaning attached to it.
- ratio The ratio of dependent people to working-age people.
- resource management Using resources without depleting them for future generations.
- A city with a population over 10 million.
- Renovation of poor urban areas attracting wealthier residents.
- heat island effect Cities are warmer than surrounding rural areas due to human activity.
- commons Areas outside national jurisdiction shared by all (oceans, atmosphere, Antarctica, space).
- Increasing interconnectedness of people, places and economies worldwide.
- / outsider How included or excluded someone feels in a place.
- Growth in the proportion of people living in towns and cities.
Down
- Mutual reliance between countries or regions for goods, services, labour or capital.
- Unequal distribution of wealth, opportunities or resources between groups or places.
- governance International cooperation to manage global issues through laws, norms and institutions.
- Movement from urban areas to rural areas.
- security Reliable access to sufficient, nutritious food.
- of place The emotional attachment people have to a place.
- (non-governmental organisation) Independent organisation addressing social, environmental or humanitarian issues.
- security Reliable access to essential resources.
20 Clues: A location with meaning attached to it. • Movement from urban areas to rural areas. • A city with a population over 10 million. • The study of population structure and change. • security Reliable access to essential resources. • security Reliable access to sufficient, nutritious food. • of place The emotional attachment people have to a place. • ...
CYBER-CRIME / INTERNET ADDICTION 2016-08-17
Across
- This is the system a computer need to start working or “thinking”
- A file, document or picture you add to an email.
- This helps you to look for any kind of information online.
- This is an annoying email that many people get in their emails inbox.
- The action of using emails to take someone’s financial information.
- This is the place where you can leave online notes for friends.
- A program you need to stop receiving annoying emails.
Down
- A computer system that helps you to protect against phishing.
- A computer user who illegally have access to computer systems
- A message you send to your friend and he/she can read it a few second later.
- A dangerous computer program. When it is in your computer you cannot open any file.
- A series of unimportant letters and numbers to log in a webpage and that people don’t know.
- This is where emails are sent to.
13 Clues: This is where emails are sent to. • A file, document or picture you add to an email. • A program you need to stop receiving annoying emails. • This helps you to look for any kind of information online. • A computer system that helps you to protect against phishing. • A computer user who illegally have access to computer systems • ...
Cyber Law CIA I 2021-09-01
Across
- A network is usually private or restricted, specially created for an enterprise or an organization.
- A collection of web pages and other created content having a common domain.
- A situation where a person gets verbally or physically threaten on the internet,causing the other person a mental imbalance.
- People who are frequent users of the internet.
- A right especially to protect the rights and expression of the original work done by the creator.
- A security system present in the computer which supervises the operation and network traffic as per precoded rules.
- The process of exploiting the computer system or any private network.
- A way to protect data for the concerned user to access it.
Down
- A structured set of files just like a stack held in a computer, which is accessible in various ways.
- The conversion of text, pictures, or sound in the digital form.
- An environment in which communication occurs through a computer network.
- the right/powers to make rules and authority to interpret and apply them.
- It is a stated obligation and everyone has to abide by it.
13 Clues: People who are frequent users of the internet. • It is a stated obligation and everyone has to abide by it. • A way to protect data for the concerned user to access it. • The conversion of text, pictures, or sound in the digital form. • The process of exploiting the computer system or any private network. • ...
Spring Into Cyber Acrostic 2025-02-19
Across
- Irish holiday celebrated on March 17th.
- A tool or method used by hackers to take advantage of security flaws.
- A type of malware that locks files and demands payment.
- A type of cyberattack that overwhelms a network with traffic (abbr.)
- Animal often associated with March's unpredictable weather, with 'In like a lamb'
- The secure way to remotely connect to a corporate network.
Down
- The NCAA basketball tournament nickname (two words).
- Data-Link's year of incorporation, with Nineteen _________.
- Phase of the moon associated with strange happenings (two words)
- The process of verifying a user's identity online.
- A method used by hackers to secretly monitor network traffic.
- A festive procession often held on holidays.
- Season that begins in March
13 Clues: Season that begins in March • Irish holiday celebrated on March 17th. • A festive procession often held on holidays. • The process of verifying a user's identity online. • The NCAA basketball tournament nickname (two words). • A type of malware that locks files and demands payment. • The secure way to remotely connect to a corporate network. • ...
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
Cybersecurity Awareness Month Crossword Puzzle 2025-09-19
Across
- A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
- The best way to keep Cornerstone secure is to become a ________ ___________.
- All customer and bank information that is no longer required must be ____________.
- an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
- A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
- Malicious software designed to harm, exploit or otherwise compromise a computer system.
- the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
- Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
- Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
- A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
- Create strong ___________ or passphrases and never share them with anyone else.
Down
- A type of malware that encrypts a victim's files and demands payment for the decryption key.
- the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
- Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
- Someone who tries to access data that they aren't authorized to view.
- All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
- ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
- The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.
18 Clues: Someone who tries to access data that they aren't authorized to view. • The best way to keep Cornerstone secure is to become a ________ ___________. • Create strong ___________ or passphrases and never share them with anyone else. • All customer and bank information that is no longer required must be ____________. • ...
Vocabulary: UNIT 5 2021-07-04
Across
- We can use it to listen to the news o to listen to music.
- Cyber world that contains a lot of information.
- We can do this by airplane, train or car.
- Means of transport. It can fly.
Down
- To communicate with other people.
- Similar to a letter but we send this via internet.
- Long ago people wrote this to communicate with friends.
- We can listen to them on the radio or turn on the T.V to hear this.
8 Clues: Means of transport. It can fly. • To communicate with other people. • We can do this by airplane, train or car. • Cyber world that contains a lot of information. • Similar to a letter but we send this via internet. • Long ago people wrote this to communicate with friends. • We can use it to listen to the news o to listen to music. • ...
prior knowledge 2021-10-04
Across
- the practice of analysing large databases in order to generate new information.
- what YouTuber say at the end of videos
- when you hurt some one on the internet like social media
- what you use to get things in games
- the action or process of earning revenue from an asset, business, etc.
Down
- to get more in an app
- being able to get the location of something
- what you do to scam messages and annoying people
8 Clues: to get more in an app • what you use to get things in games • what YouTuber say at the end of videos • being able to get the location of something • what you do to scam messages and annoying people • when you hurt some one on the internet like social media • the action or process of earning revenue from an asset, business, etc. • ...
New Deal Crossword 2024-04-09
Across
- amount of people employed by the CCC
- worked to improve the nation's public land from 1933 to 1942
- the maximum amount of time in prison after submitting a false Social Security Statement
- month when the Federal Emergency Relief Administration dissolved
- head of the TERA, FERA, and WPA
- the amount of time a man would work in the CCC
Down
- the year the Social Security Act was passed
- the president who instilled the New Deal Programs
- amount of funds given by the Federal Emergency Relief Administration after inflation adjustment
- acronym for the Federal Emergency Relief Administration
- enacted in august of 1935
11 Clues: enacted in august of 1935 • head of the TERA, FERA, and WPA • amount of people employed by the CCC • the year the Social Security Act was passed • the amount of time a man would work in the CCC • the president who instilled the New Deal Programs • acronym for the Federal Emergency Relief Administration • worked to improve the nation's public land from 1933 to 1942 • ...
PenFed 2022-01-27
15 Clues: leader • a thief • chatroom • who you are • PenFed scam • reader board • long FI call • address request • face chris uses • break/lunchtime • computer program • not enough security • add additional fraud • where to find phone numbers • what an upset ch call turns into
Word Within a Word List 32 2012-10-01
15 Clues: sociable • make soft • go against • unorthodox • thought-to-be • heated dispute • ego second self • affirm or declare • speech to oneself • a flowing together • talking in circles • pledge as security • male head of family • cold-blooded composure • force of a million tons of dynamite
Word Within a Word List 32 2012-10-01
15 Clues: sociable • make soft • go against • unorthodox • second self • thought-to-be • heated dispute • speech to oneself • affirm or declare • a flowing together • pledge as security • talking in circles • male head of family • cold-blooded composure • force of a million tons of dynamite
Organelle Recap 2023-11-21
Across
- Packaging/Transport
- Protection (like security guard)
- Liquid (like water in fish bowl)
- Role in cell division
- Power
- Controls cell
- Structure (plant only)
- Make proteins
Down
- Photosynthesis (plant only)
- Transport materials, make proteins
- Protect nucleus
- Makes ribosomes
- Transport materials, make fats
- Storage
- Digestion
15 Clues: Power • Storage • Digestion • Controls cell • Make proteins • Protect nucleus • Makes ribosomes • Packaging/Transport • Role in cell division • Structure (plant only) • Photosynthesis (plant only) • Transport materials, make fats • Protection (like security guard) • Liquid (like water in fish bowl) • Transport materials, make proteins
El viaje 2022-12-12
15 Clues: Trip • Hotel • Flight • Airport • Suitcase • Security • Passport • Passenger • To Travel • To withdraw money • S/he takes the bus • S/he/it takes a trip • S/he takes the plane • S/he/it takes the taxi • S/he/it takes the train
Network concept and Cyber ethics 2025-05-31
Across
- A network within a small area, like a home or school
- A set of rules for data communication between devices
- A security system that controls incoming and outgoing network traffic
- Global network connecting millions of computers
- Unauthorized access to computer systems
- Bullying or harassment using digital technology
- Illegal copying or downloading of software or media
- Secret string of characters used for authentication
Down
- A network that covers a large geographic area
- A computer that provides data to other computers
- A computer that receives data from a server
- The right to keep personal information secure online
- Fraudulent attempt to obtain sensitive information via fake messages
- Device that converts digital data into signals for transmission
- copying someone’s work or ideas without permission or credit
- Permission given to collect or use data
- Device that forwards data packets between networks
- Malicious software designed to damage or disrupt systems
18 Clues: Permission given to collect or use data • Unauthorized access to computer systems • A computer that receives data from a server • A network that covers a large geographic area • Global network connecting millions of computers • Bullying or harassment using digital technology • A computer that provides data to other computers • ...
Cyber Safety Module 2020-06-05
Across
- A small window, usually displaying an ad
- An online room where people can login to talk to each other
- An online personal log or journal
- A type of malicious code or software that looks legitimate but can take control of your computer
- A malicious software program infecting a user's computer and performing malicious actions
- Getting information from a computer from somewhere on the internet and transferring it to your computer
Down
- A combination of numbers, letter and special characters that is known only to you and gives you access to a computer, website or network
- A social media platform
- Using the internet to harass, demean, bullying and insult someone
9 Clues: A social media platform • An online personal log or journal • A small window, usually displaying an ad • An online room where people can login to talk to each other • Using the internet to harass, demean, bullying and insult someone • A malicious software program infecting a user's computer and performing malicious actions • ...
CWSI Cyber CrossWord 2025-03-25
Across
- Foundation of both cybersecurity and team collaboration
- Common attack vector for phishing and scams
- What you should never do with suspicious links or attachments
- A vulnerability in software waiting to be exploited
- Guidelines that govern secure workplace behavior
Down
- A physical or digital object used for multi-factor authentication
- What hackers see unaware employees as
- A potential danger that exploits system vulnerabilities
- The chance that a threat will exploit a vulnerability
9 Clues: What hackers see unaware employees as • Common attack vector for phishing and scams • Guidelines that govern secure workplace behavior • A vulnerability in software waiting to be exploited • The chance that a threat will exploit a vulnerability • Foundation of both cybersecurity and team collaboration • A potential danger that exploits system vulnerabilities • ...
American Express Travelers Cheque 2021-11-22
8 Clues: How do you verify • What is one security feature • _____ Express uses the Cheques • Can you have counterfeit Cheques • What code do you need on the Cheque • How many security features do they have • What do you have to do for the signatures • Is the process where you validate both the presenter and the cheque
Vocabulary pag 72 2024-04-17
Across
- or evidence used to prove or disprove a fact.
- observe or carefully analyze something to obtain information.
- in charge of investigating crimes and collecting evidence.
- of illegally taking another person's property without his or her consent.
- of seeking information and collecting evidence to solve a criminal case.
- a solution or answer to a problem or situation.
- used to inflict damage or cause injury.
- to the act of illegally taking another person's property without their consent.
- of killing someone intentionally and illegally.
- actively follow or search for someone, especially a criminal.
Down
- and distinctive prints on your fingertips.
- to identify people and as evidence in criminal cases.
- where people convicted of crimes are imprisoned.
- officers-Members of law enforcement agencies charged with maintaining peace and security.
- Guard-Professional in charge of protecting property and people.
- person who commits crimes or breaks the law.
- capture or detain someone, especially a criminal.
17 Clues: used to inflict damage or cause injury. • and distinctive prints on your fingertips. • person who commits crimes or breaks the law. • or evidence used to prove or disprove a fact. • a solution or answer to a problem or situation. • of killing someone intentionally and illegally. • where people convicted of crimes are imprisoned. • ...
Vocabulary words of Computer 2021-10-06
Across
- stands for random access memory and it is a memory stored in that you can modify and edit it and it is sometimes used to store working data and machine codes.It stores the information you are using on your computer actively.
- is a small device that has flash memory that is to store data and it can also transfer the data to another computer
- stands for local area network and it is a network that is in areas like school and the computers can connect and share information
- It’s a device that can get connected to your computer and you use it with your computer
- it’s like trash emails that a person sends to many people and the person advertises hoping the receiver will buy the item.
- stands for wide area network and it is a big network and allows you to share information and communicate from computers to computers in other locations.
- makes your computer perform better and it is fast.
- it is when you have permission to copy from the owner.
- known as Universal serial bus and you can transfer or take your data and connect to other peripheral devices
- is a website were the community of users can edit and add content.For example google something random you will see Wikipedia with it and its loaded with information about the thing you googled
Down
- It is getting unauthorized data like passwords, private information, from other people in a computer or device.Or it can be exploiting in games using hacks.
- it is a security device that protects your computer making sure no suspicious things enter or cyber-attacks.
- stands for solid state driver is a storage and stores data persistently
- Fair use gives permission to use copyrighted work for a group of people without the work owner’s permission but only for uses like teaching, research, news report, and more.
- the rules for an acceptable way that you are going to use the internet.
- keeps your data and network safe from viruses or threats.
- is a recognizable area of a bigger program.
- it is copying someone's work and claiming that you made it and it was your idea.
- stands for central processing unit and it is the part of the computer that recovers and executes instructions.
- known as Hard disk drive and it is a type of storage thats in your computer and it can store and retrieve data they store like software programs and some other files
20 Clues: is a recognizable area of a bigger program. • makes your computer perform better and it is fast. • it is when you have permission to copy from the owner. • keeps your data and network safe from viruses or threats. • stands for solid state driver is a storage and stores data persistently • the rules for an acceptable way that you are going to use the internet. • ...
Office 2022-03-10
14 Clues: sit upon • has keys • get money • job security • transfer labs • birthday in mar • needed workspace • online meeting tool • people you work with • used for viewing data • bossy person (2words) • david's favorite city • melody's saying (4words) • making people happy (2words)
CH 11, LO 1 and 2 2021-04-14
Across
- debts that are owed to creditors
- when a business has received cash vefore providing goods or performing work
- must be paid with cash or goods/services within one year
- a written promise by a business to pay a debt wwithin one year or less
- the income tax deducted from gross pay
- medical benefits
Down
- old age, survivors, and disability insurance
- do not need to be paid within one year
- helps summarize the earnings, withholdings, and net pay for each employee
- also known as the Social Security Act, created the Social Security tax
- total amount of salary, wages, commissions, and bonuses earned by an employee during a pay period
- also called employee compensation
- the amount an employee gets to keep
13 Clues: medical benefits • debts that are owed to creditors • also called employee compensation • the amount an employee gets to keep • do not need to be paid within one year • the income tax deducted from gross pay • old age, survivors, and disability insurance • must be paid with cash or goods/services within one year • ...
The United Nations 2025-12-02
Across
- Education, Science and Culture organization;
- The city where the UN Headquarters is located;
- The UN's main policymaking and representative organ;
- The 15-member body responsible for maintaining international peace and security;
- Principal judicial organ of the UN, based in The Hague (abbrev.);
- UN agency for children;
- The authority on matters of global health;
Down
- The current Secretary-General of the UN;
- The five permanent members of the Security Council hold this power;
- The first UN peacekeeping mission (1948) was established in this country;
- The UN organ responsible for coordinating the economic, social, and related work of 15 specialized agencies;
- The official language used by the UN, along with Arabic, Chinese, English, Russian, and Spanish;
- Programme that works to eliminate poverty.
13 Clues: UN agency for children; • The current Secretary-General of the UN; • Programme that works to eliminate poverty. • The authority on matters of global health; • Education, Science and Culture organization; • The city where the UN Headquarters is located; • The UN's main policymaking and representative organ; • ...
x 2026-01-19
Across
- Name for a data incident.
- Only giving systems and data to those who genuinely need them.
- How staff learn to handle personal data safely.
- Duty to keep personal information private and secure.
- Right to limit how personal data is used.
- Building data protection in from the very start, not as an afterthought
Down
- Length of time personal data is kept before deletion.
- A basic but vital security control that should never be shared.
- Safe disposal of confidential paper records.
- Clear permission given for personal data to be collected and used.
- Choices staff make every day that affect data security choices.
- Protecting data so only authorised parties can read it.
- A deceptive attempt to trick staff into revealing sensitive information.
13 Clues: Name for a data incident. • Right to limit how personal data is used. • Safe disposal of confidential paper records. • How staff learn to handle personal data safely. • Length of time personal data is kept before deletion. • Duty to keep personal information private and secure. • Protecting data so only authorised parties can read it. • ...
digital ciizenship 2021-01-29
12 Clues: passwords • real world • being safe • being tricked • evaluate media • group of people • online community • being safe online • protecting yourself • reliable information • opposite of plagiarism • to keep someone away digitally
Ch. 1-3 Narnia 2023-11-13
12 Clues: scarf • crazy • trick • curious • packages • "tell me" • male deer • from now on • layer of gold • radio without cords • light meal, Eng. custom • to put to sleep, sense of security
PHRASAL VERBS 2020-05-18
12 Clues: wait • reparar • request • sentarse • levantarse • despertarse • become happy • ponerse de pie • devolverle algo a alguién • copy as a security measure • have a friendly relationship • break or separate into pieces
Inventions That Wouldn't Exist Without Black People 2026-02-19
12 Clues: Golf Tee • Caller ID • Blood Banks • Dry Cleaning • The elevator • Home security • Traffic lights • Haircare products • Refrigerated trucks • Video game cartridge • Color Computer Monitor • VOIP(Facetime, Skype, Teams)
Cyber Bulying 2018-04-26
6 Clues: Αυτός που ασκεί τον εκφοβισμό • Αντιμετωπίζει την επιθετικότητα • Αυτός που δέχεται τον εκφοβισμό • Μπορεί να δεχτεί εκεί τον εκφοβισμό • Που επιδρά ο διαδικτυακός εκφοβισμός ; • Όταν δέχεσαι διαδικτυακό εκφοβισμό καλείς σε αυτούς.
cyber wellness 2022-06-23
Across
- Hostile or violent behaviour.
- Refusing to go out.
- The condition of being addicted to a particular activity.
Down
- Feeling a fairly strong and persistent pain.
- Regularly having problems sleeping.
- A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.
6 Clues: Refusing to go out. • Hostile or violent behaviour. • Regularly having problems sleeping. • Feeling a fairly strong and persistent pain. • The condition of being addicted to a particular activity. • A common vision condition in which you can see objects near to you clearly, but objects farther away are blurry.
cyber seguridad 2020-12-01
Across
- this prevents viruses from entering the computer
- is the eassiest way to hack somebody are key numbers to enter intagram for example
- this way hackers can get confidential
Down
- is when you recieve an email fake thats ..... .....
- It is something to protect yourself from hackers and not to steal data
- when somebady spy you because you dowland something eligal or some trap that the hacker put you
6 Clues: this way hackers can get confidential • this prevents viruses from entering the computer • is when you recieve an email fake thats ..... ..... • It is something to protect yourself from hackers and not to steal data • is the eassiest way to hack somebody are key numbers to enter intagram for example • ...
cyber seguridad 2020-12-01
Across
- this prevents viruses from entering the computer
- is the eassiest way to hack somebody are key numbers to enter intagram for example
- this way hackers can get confidential
Down
- is when you recieve an email fake thats ..... .....
- It is something to protect yourself from hackers and not to steal data
- when somebady spy you because you dowland something eligal or some trap that the hacker put you
6 Clues: this way hackers can get confidential • this prevents viruses from entering the computer • is when you recieve an email fake thats ..... ..... • It is something to protect yourself from hackers and not to steal data • is the eassiest way to hack somebody are key numbers to enter intagram for example • ...
Cyber Safety 2024-06-04
Across
- Unwanted or unsolicited email messages.
- Unauthorized intrusion into a computer system or network.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
- Digital method of exchanging messages over the internet.
- Measures taken to protect a system against unauthorized access or attacks.
- A secret word or phrase used to gain access to a system.
6 Clues: Unwanted or unsolicited email messages. • Digital method of exchanging messages over the internet. • A secret word or phrase used to gain access to a system. • Unauthorized intrusion into a computer system or network. • Measures taken to protect a system against unauthorized access or attacks. • ...
Cyber Safety 2023-05-18
6 Clues: Getting a fake email • Pretending to be someone else • Online fights through messaging • An abbreviation Laughing out loud • Something that ruins your computer • Stealing someone's work without giving credit
Cyber World 2023-07-12
6 Clues: an input device • An output device • Read Access Memory • The brain of the computer. • change the case of the letter when pressed • The ________ is a mean of sending information to the computer
LDM Team Member Trivia Puzzle 2022-01-06
Across
- Just like the meaning of her name - a bird, who freely flies in the sky.
- Name is shared with a well known 19th century US writer.
- An important vitamin is the first letter of this persons name.
- Matured through an army stint, served during his late teens.
- Once spent an entire week in Oklahoma as a working cowboy.
- For a period of time this person slept with a M16 rifle under the pillow.
- A smiling person easy to work with.
- Enjoys learning new things about almost any topic.
- Family owns a vineyard.
Down
- Lifelong Bruins fan.
- Started at Cisco in 1999
- Spent time watching white tigers with chess grandmaster Garry Kasparov.
- Holds Master's degree in finance & accounting
- Backpacked ~400 miles in the last 2 years.
- Worked as a coffee roaster while studying computer networking in school.
- A wanna-be professional football player but not quite cutting it.
- Wanted to be cricketer before becoming curious about cyber threats.
- Son of a former catholic priest
- Unadorned royalty.
19 Clues: Unadorned royalty. • Lifelong Bruins fan. • Family owns a vineyard. • Started at Cisco in 1999 • Son of a former catholic priest • A smiling person easy to work with. • Backpacked ~400 miles in the last 2 years. • Holds Master's degree in finance & accounting • Enjoys learning new things about almost any topic. • Name is shared with a well known 19th century US writer. • ...
perkembangan transaksi ekonomi di era digital 2025-10-16
Across
- MARKETING Strategi pemasaran yang menargetkan pengguna media sosial.
- Transaksi yang memanfaatkan Quick Response Code (Kode Respon Cepat).
- Matauang kripto yang paling populer.
- Singkatan untuk Pembayaran Non Tunai.
- Konsumen yang melakukan pembelian secara daring (online).
- Platform yang memfasilitasi pertemuan antara penjual dan pembeli secara online.
- Proses jual beli barang atau jasa menggunakan jaringan internet.
- BANKING Penggunaan teknologi mobile untuk layanan keuangan.
- LENDING Suatu kegiatan pinjam meminjam dana yang dilakukan secara online.
- Layanan perbankan yang dapat diakses melalui ponsel pintar.
Down
- Istilah yang merujuk pada segala sesuatu yang berhubungan dengan dunia maya atau internet.
- CHANNEL Layanan yang menyediakan fasilitas transfer uang antar rekening tanpa melalui bank konvensional.
- Metode otentikasi menggunakan sidik jari atau wajah.
- Teknologi dasar yang mendukung mata uang kripto seperti Bitcoin.
- Istilah untuk dompet digital.
- Pembayaran yang dilakukan secara online tanpa menggunakan uang tunai fisik.
- Pelaku usaha yang memanfaatkan media digital untuk memasarkan produknya.
- Singkatan dari Financial Technology.
- CRIME Kejahatan di dunia maya yang bertujuan mencuri data atau informasi penting.
- Bentuk keamanan data yang mengubah informasi menjadi kode rahasia.
20 Clues: Istilah untuk dompet digital. • Matauang kripto yang paling populer. • Singkatan dari Financial Technology. • Singkatan untuk Pembayaran Non Tunai. • Metode otentikasi menggunakan sidik jari atau wajah. • Konsumen yang melakukan pembelian secara daring (online). • BANKING Penggunaan teknologi mobile untuk layanan keuangan. • ...
NZST Airport Operations 2020-03-30
Across
- Stage 3: Check the _____ to check the baggage allowance
- Printing the labels and attaching to bags is known as
- Complete the job title: Customer Service _______
- The first stage of check in is the ______
- These are not included in your hand luggage allowance
Down
- Skis, surf boards and golf clubs are ______ baggage
- In stage two the CSA will ask for ID such as a ________
- When pax are through security, they are now ______
- Stage 7 Tell pax which _____ to go to
- Where is New Zealand's busiest Airport?
- In Stage 5 the CSA asks security and ___goods questions
11 Clues: Stage 7 Tell pax which _____ to go to • Where is New Zealand's busiest Airport? • The first stage of check in is the ______ • Complete the job title: Customer Service _______ • When pax are through security, they are now ______ • Skis, surf boards and golf clubs are ______ baggage • Printing the labels and attaching to bags is known as • ...
Confientiality 2025-02-06
Across
- insurance information
- Data information which may arise from employment-related physicals, drug tests and
- work history, date of birth, social security number, criminal record,
- information
- or Sensitive Data information about an employee prior to employment such as a résumé,
- of information
- involves individuals hired to steal trade secrets, new products or
Down
- Data records of an employee’s performance on the job such as performance reports,
- religion, etc.
- actions, supervisory notations Corporate Espionage form of espionage conducted for commercial purposes rather than security;
- of rules or promises which limits access or places restrictions on certain
11 Clues: information • religion, etc. • of information • insurance information • involves individuals hired to steal trade secrets, new products or • work history, date of birth, social security number, criminal record, • of rules or promises which limits access or places restrictions on certain • Data records of an employee’s performance on the job such as performance reports, • ...
Dystopia Escape Room Crossword puzzle 2022-01-15
Across
- Term for mega-technological genre: “cyber-__________”.
- Biased information used to promote a political point of view.
- Type of government that has total control over people’s lives.
- Opposite of individuality.
- A dystopia typically exists as an __________ of a perfect world.
- The word “utopia” was created from 2 __________ words, eutopia & outopia.
Down
- Utopia was originally named for a fictional __________.
- Kim Jong-Un is practically worshipped by citizens, making him the figure ________ of North Korea.
- Opposite of dystopia.
- Katniss from The Hunger Games, Tris from Divergent, and Jonas from The Giver are all examples of a dystopian __________.
- Dystopian literature takes a current trend to the __________.
- Propaganda creates an emotional response as opposed to a __________ response.
- Dystopias often occur after an __________ event like a plague or nuclear warfare.
- Sir Thomas __________
- A dystopian government often uses mass __________ to spy on its citizens.
15 Clues: Opposite of dystopia. • Sir Thomas __________ • Opposite of individuality. • Term for mega-technological genre: “cyber-__________”. • Utopia was originally named for a fictional __________. • Dystopian literature takes a current trend to the __________. • Biased information used to promote a political point of view. • ...
JOBS 2013-05-02
15 Clues: / cuts hair • / serves food • / flies planes • /sells products • / goes to school • / teaches English • / helps the doctor • / plays intruments • / helps sick people • / works in the house • player / plays soccer • / doesn't work anymore • / informs about the news • / participates in movies • officer /controls security
List 32 Vocabulary Words 2021-10-20
15 Clues: sociable • make soft • go against • unorthodox • thought-to-be • heated dispute • ego second self • affirm or declare • speech to oneself • a flowing together • talking in circles • pledge as security • male head of family • cold-blooded composure • force of a million pounds of dynamite
Sure! Here's the list of terms in one line, separated by a single space: righteous idolatry hospitality genealogy communal identity byproduct monuments spiritual legacy economic stability infertile preserve legacy adjacent disconnect progression 2025-05-21
Across
- next to, adjoining
- separation, disconnection
- advancement, development
- memorials, statues
- idol worship, paganism
- ancestry, lineage
- legacy moral inheritance, ethical heritage
- inheritance, heritage
- virtuous, moral
Down
- secondary result, side effect
- stability financial security, fiscal balance
- identity group belonging, shared culture
- generosity, cordiality
- maintain, protect
- barren, sterile
15 Clues: barren, sterile • virtuous, moral • maintain, protect • ancestry, lineage • next to, adjoining • memorials, statues • inheritance, heritage • generosity, cordiality • idol worship, paganism • advancement, development • separation, disconnection • secondary result, side effect • identity group belonging, shared culture • legacy moral inheritance, ethical heritage • ...
Unit 6: Tidy your room!! 2020-10-26
Across
- Security implement used to cover your mouth and nose.
- car A vehicle used by the police.
- Security implement used to protect your head.
- A person who extinguishes fires.
Down
- A vehicle which transport injured people.
- Metal rings used for souring prisoners.
- A vehicle used by firefighters.
- A person who helps doctors and cares for sick people.
8 Clues: A vehicle used by firefighters. • A person who extinguishes fires. • car A vehicle used by the police. • Metal rings used for souring prisoners. • A vehicle which transport injured people. • Security implement used to protect your head. • Security implement used to cover your mouth and nose. • A person who helps doctors and cares for sick people.
The Functions Performed Within Communication Systems 2021-07-07
10 Clues: data • mediums • decodes • sending • security • common clock • protocol levels • interface, transmitter • server, user's identity • sender to receiver, creation
Chapter 16 2026-02-12
Vocabulary 2026-02-12
KNOW YOUR CODES 2018-12-12
11 Clues: FIRE • PLAN D • CODE 11 • CODE 99 • EVACUATION • BOMB THREAT • CHEMICAL SPILL • SECURITY EMERGENCY • OUT OF CONTROL PERSON • INFANT/CHILD ABDUCTION • PATIENT LOCATION ALERT
The Functions Performed Within Communication Systems 2021-07-07
11 Clues: data • origin • decodes • mediums • security • common clock • protocol levels • interface, transmitter • server, user's identity • sent by the sender to receiver • bringing something to existence
FinTech Portal 2023-05-24
6 Clues: Budget Overruns • Security Breach • Regulatory Compliance • Integration Challenges • Payment Processing Failures • Adoption Customer Resistance to Change
Technology 2025-12-20
13 Clues: Manage • Addicted • Security • Television • Head braker • Oposite of start • Useable on doors • Opposite of slow • Film,take pictures • A girls best friend • The name of the puzzle • Structure & Organization • Computers,phones and technology
10.2 & 3: The Second New Deal & The New Deal Coalition (pp. 320-327) 2024-01-17
Across
- California physician and critic of FDR who wanted the government to help the elderly more.
- Economic upturn, after a depression
- Catholic priest and radio host who didn't think FDR was going far enough in his reforms.
- Process in which a neutral party hears arguments from two opposing sides and makes a decision that both must accept
- Something that provides security against misfortune.
- This was abolished under the Fair Labor Standards Act.
- Spending borrowed money rather than raising taxes.
- Attempt to resolve conflict between hostile people or groups.
Down
- Role of government to work out conflicts among competing interest groups.
- FDR's wife
- To provide money for a project.
- Type of strike that is a method of boycotting work by sitting down at work and refusing to leave.
- Act passed by Congress to provide financial security to older Americans.
- Appointing extra judges who will rule in favor of your policies.
- Law passed that guaranteed workers the right to unionize.
- Former governor of Louisiana and critic of FDR.
- Works Progress Administration
- Because of that.
- Something that promotes well-being or is a useful aid
19 Clues: FDR's wife • Because of that. • Works Progress Administration • To provide money for a project. • Economic upturn, after a depression • Former governor of Louisiana and critic of FDR. • Spending borrowed money rather than raising taxes. • Something that provides security against misfortune. • Something that promotes well-being or is a useful aid • ...
Chapter 11 test study guide 2025-04-09
Across
- The rising stock prices convinced many people to ___________ in stocks.
- federal __________ insurance corporation
- ____________ borrowed their money from banks.
- Many people supported the New Deal, but the ____________ world did not.
- The WPA also gave jobs to ________ artists and writers.
- Many investors did not have the money to buy stocks, so they bought on _________.
- In 1930 Congress passed the _________ Tariff.
- Most people during the dustbowl left __________ to head for California.
- By the late 1920s, ____________ prices were very high.
- In 1935 Roosevelt created a new set of programs, often called the ______________.
Down
- homeless shelters during the depression
- In August 1935, Congress passed the __________ act.
- The United States slid into an economic crisis called the __________.
- In April, Congress created the _____________ administration
- The _________ improved a little by the mid-1930s, but the Great Depression continued.
- The social security act placed a _____ on workers and employers.
- an organized system for buying and selling shares, or blocks of investments, in corporations
- The Hawley-Smoot was a tax on ___________.
- The money from the social security act was used to pay monthly ________ to retired people.
19 Clues: homeless shelters during the depression • federal __________ insurance corporation • The Hawley-Smoot was a tax on ___________. • ____________ borrowed their money from banks. • In 1930 Congress passed the _________ Tariff. • In August 1935, Congress passed the __________ act. • By the late 1920s, ____________ prices were very high. • ...
wow 2022-09-12
Across
- A secret word or phrase that is used to access a computer system or service
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- Customizable additions to software for extra functionality.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- The deliberate use of someone else's identity, typically for financial gain.
- A simple form of code for software that can be written in word editors.
- Hacking that is meant to do minimal damage and is usually done out of curiosity.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- When an attacker inputs many passwords in the hope that it is eventually guessed correctly.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
Down
- Software that has their code listed as free to use, share, and modify.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- Admin control: Having _____ control of any given system.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Software that can only be run for a limited amount of time before it expires.
- A previously unknown, bug, flaw, or backdoor in software. An attack happens once this flaw is exploited and attackers release malware before the flaw can be patched.
- The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
20 Clues: Admin control: Having _____ control of any given system. • Customizable additions to software for extra functionality. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service • ...
Chapter 14 2016-04-18
Across
- tax, a tax on the value of a property
- income tax, a tax on a persons earnings
- tax, a tax on the dollar value of a good or service being sold
- of a tax, a final burden of a tax
- spending, spending on certain programs that is mandated or required by existing law
- tax on imported goods
- budget, budget in which revenue is equal to spending
Down
- budget, budget for day-to-day expenses
- security, old-age survivors and disability insurance
- a required payment to a local, state, or national government
- tax, a tax on money or property that one living person gives to another
- spending, spending category about which government planners can make choices
- budget, budget for major capital or investment expenditures
- taxes that fund social security and medicare
- income tax, a tax on the value of a company's profits
- base, income property, good, or service that is subject to a tax
- income received by a government from taxes and non-taxed resources
17 Clues: tax on imported goods • of a tax, a final burden of a tax • tax, a tax on the value of a property • budget, budget for day-to-day expenses • income tax, a tax on a persons earnings • taxes that fund social security and medicare • security, old-age survivors and disability insurance • budget, budget in which revenue is equal to spending • ...
Patients Matter Crossword Puzzle 2019-01-31
Across
- What does the P stand for in PHI as defined by HIPAA?
- Last Name of our Information Security Director
- Sending e-mails to gain relevant information
- Log to track and manage risks (Two words)
- unplanned interruption to an IT Service or a reduction in the Quality of an IT Service
- Internal control reports on the services provided by a service organization (Two words)
- What is the open Slack Channel to contact ITGRC? (No characters)
Down
- We have an obligation to destroy data
- Last Name of our Director of Enterprise Risk Management
- I can travel anywhere in the world with my laptop?
- Last Name of our Security Officer
- What does the C stand for in ITGRC?
- Who should I contact if I suspect fraud, misuse, or accidental disclosure?
- Last Name of our Privacy Officer
- Which ITGRC area do I contact for an acceptable use request?
- Office of Consumer Rights
- Last Name of our Investigations Lead
17 Clues: Office of Consumer Rights • Last Name of our Privacy Officer • Last Name of our Security Officer • What does the C stand for in ITGRC? • Last Name of our Investigations Lead • We have an obligation to destroy data • Log to track and manage risks (Two words) • Sending e-mails to gain relevant information • Last Name of our Information Security Director • ...
Government and National budget 2025-01-18
Across
- Refers to the people who own and control factors of production.
- increase in the level of production of a country.
- Government expenditure to keep country safe.
- The government that deals with safety and security of the whole country.
- A payment made to a business by the government to assist it.
- The government that deals with education of a specific province.
- The compulsory payment made to government by an individual or business on the income or profit that they earn.
- The minster who presents the national budget.
Down
- A list of expected income and intended expenditure.
- The government that deals issues within a town or municipal area.
- Tax charged on luxury/non-essential items.
- A situation in which something is unfair/unequal.
- Taxes paid directly to the government.
- The sums of money paid by the government for a particular purpose, for example pensioners.
- Tax charged when goods are bought and sold.
- Tax charged by companies.
- Tax charged on salaries and wages by households.
17 Clues: Tax charged by companies. • Taxes paid directly to the government. • Tax charged on luxury/non-essential items. • Tax charged when goods are bought and sold. • Government expenditure to keep country safe. • The minster who presents the national budget. • Tax charged on salaries and wages by households. • increase in the level of production of a country. • ...
Spring Firm Meeting 2024 2024-04-09
Across
- BPB was founded in nineteen
- An activity that often uses talents from a variety of departments
- What every company and high net worth family needs
- An area that helps high-net-worth people manage their financial lives
- Where most of the firm’s new business is originated
- A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- A type of organization that serves the community, we do their taxes and audits
- Something BayBridge Real Estate Capital helps clients manage, find or refinance
- What we all aspire to do
- An acronym for a special type of insurance that is tax mitigation tool
- How our HR department helps clients
- He is the CEO and grew up in the firm
- A type of advisory service that helps buyers and sellers of companies
- The largest group in the firm and a typical entry point for multiple services
- Something PWA advisors help client protect
- A software platform MST helps implement at companies
- One approach our tax controversy team takes with the IRS
- A specialty area of PWA
- An acronym for solving repetitive tasks with robotics
- How PWA creates a comprehensive approach
Down
- What many of our MST services entail
- A type of entity that provides tax benefits for manufacturers and distributors that expert products
- Where our first office was located
- What assurance and cyber teams often do
- A lifechanging client event we can help with from planning to tax preparation to estate planning
- A governmental agency that scares of our clients but not us
- Part of the name of several affiliates
- A type of tax credit for manufacturing or product improvement
- One of the firm’s key service areas
- A core value brought to life by our participation in the DCC and Bounce Back from Cancer
- Diversity, equity and blank
- A charity event the firm teams have contributed $2 million to since it started 14 years ago
- Present blank analysis
- Investigating, often in fraud or legal situations
- An area of tax that especially impacts clients with operations in multiple states
- The area of tax services BPB is probably most famous for
- A service that several departments have in their names
- A special type of audit for public companies
- Managed blank and Technology
- Firm members speak in practice in more than this many languages
40 Clues: Present blank analysis • A specialty area of PWA • What we all aspire to do • BPB was founded in nineteen • Diversity, equity and blank • Managed blank and Technology • Where our first office was located • One of the firm’s key service areas • How our HR department helps clients • What many of our MST services entail • He is the CEO and grew up in the firm • ...
Inventions Crossword 2025-10-30
Across
- the _____ Brothers’ first flight occurred in 1903
- the assembly line was introduced by Henry ________________
- airplanes improved trade and global ________________
- the first flight lasted only ______________ seconds__
- computers made it easier to process and access ________________
- the printing press was invented by ________________
- buying and selling online is called e-
- the oven discovered accidentally by Percy Spencer was the ________________
- the first computer (Z1) was invented by Konrad ______________
- the first photograph was taken by Joseph ________________
- the name of Karl Benz’s first car was ________________
- the telegraph was invented by Samuel ________________
- _______ launched in the year 2004
- the television was invented by Philo ________________
- before Facebook, a popular social network was ________________
- the first practical steam engine was built by Thomas ________________
- one modern risk of computers is cyber ________________
- the first mobile phone call was made by Martin ________________
- the inventor who improved the steam engine was James ________________
- the _____ engine was invented in the year 1712
- the radio was invented by Guglielmo ________________
- the first mobile phone was the size of a ________________
- the first automobile was built by Karl ________________
- Gutenberg’s press made books more ________________
- the invention that captures images and memories is the ________________
- the early Internet network was known as ________________
- the first ______ was built in the year 1936
Down
- the radio made mass ________________ possible
- Facebook was created by Mark ________________
- one negative result of industrial steam power was more ________________
- the airplane was invented by the ________________ brothers
- the first major book printed using movable type was the Gutenberg ________________
- steam engines allowed for faster ________________
- the telephone was invented by Alexander Graham ________________
- James Watt added a separate ________________ to improve efficiency
- the inventor of the World Wide Web was Tim ________________
- the light bulb was invented by Thomas ________________
- a light bulb works because of a heated ________________
- _____ stands for the World Wide Web
- Bell’s first words were “Mr. , come here”
- steam engines provided power for early ________________
- one negative result of cars was increased ________________
- the first mobile phone was produced by ________________
- the printing press spread knowledge and improved access to ________________
- the telephone revolutionized long-distance ________________
- the British inventor who also made a light bulb was Joseph ________________
- the first online pages were known as ________________
- the automobile increased personal ________________
- the light bulb was safer than candles because of reduced fire ________________
- the light _____ was invented in the year 1879
- Facebook originally started as a platform limited to ________________ students
51 Clues: _______ launched in the year 2004 • _____ stands for the World Wide Web • buying and selling online is called e- • Bell’s first words were “Mr. , come here” • the first ______ was built in the year 1936 • the radio made mass ________________ possible • Facebook was created by Mark ________________ • the light _____ was invented in the year 1879 • ...
FIRE / SEXTING / CYBER BULLYING 2015-09-09
Across
- Cyber bullying and ..... are new concepts affecting youth
- Can happen to you if you extinguish fire with water
- Doors and ...... should be used as exit points in fire
- Acronym used to remember how to use fire extinghuiser
Down
- To be practiced at home and school in case of fire
- In case of fire, with no smoke, go towards escape route .....
- Children should not play with matches and ..., it causes fire
- Sexting messages may be classified as child ......
- Stay low in case of fire and crawl on hands and .....
- How many times a year fire drills should be practiced
10 Clues: To be practiced at home and school in case of fire • Sexting messages may be classified as child ...... • Can happen to you if you extinguish fire with water • Stay low in case of fire and crawl on hands and ..... • How many times a year fire drills should be practiced • Acronym used to remember how to use fire extinghuiser • ...
CyberSecurity Puzzle 2024-06-06
Across
- __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
- SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
- OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
- EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
- CYBER ATTACK CAN CAUSE HUGE ____________
- IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
- IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
- HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
- MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
- ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.
10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________ • SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION. • OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL. • IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION. • ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS. • ...
Emerging careers 2025-05-13
Across
- Using big data insights to drive strategic financial decisions
- When companies can't pay debts, CAs in this field handle restructuring proceedings
- Technology transforming audits and transactions, requiring CAs to verify decentralized ledgers
- CAs provide funding, compliance, and scaling advice to these new ventures
- Accounting specialty investigating financial fraud and disputes
- Environmental, Social, Governance framework CAs use to assess sustainability reporting
Down
- Digital assets requiring specialized tax and regulatory expertise from modern CAs
- Ensuring adherence to laws and regulations like GST or SEBI guidelines
- Assessment and management of financial, operational or cyber threats
- Corporate combinations where CAs perform financial due diligence
10 Clues: Using big data insights to drive strategic financial decisions • Accounting specialty investigating financial fraud and disputes • Corporate combinations where CAs perform financial due diligence • Assessment and management of financial, operational or cyber threats • Ensuring adherence to laws and regulations like GST or SEBI guidelines • ...
cyberbullying 2025-06-19
Across
- something on the internet mostly on social media like youtube
- something two or more people can do to you
- someone who helps the bully or ignores the problem
- something on the internet that has almost all you info
- a person who makes people feel bad on the internet
Down
- someone who shares kind words and fights off the bully
- something that people play games on or go on social media
- a person who try's to find your info online
- related to computers
- is a option you can chose if you feel unsafe or if your being cyberbullied
10 Clues: related to computers • something two or more people can do to you • a person who try's to find your info online • someone who helps the bully or ignores the problem • a person who makes people feel bad on the internet • someone who shares kind words and fights off the bully • something on the internet that has almost all you info • ...
Industry 5.0 2025-01-21
Across
- A global network that connects smart devices and systems
- A major goal of Industry 5.0 focusing on reducing waste
- Robots designed to work alongside humans
- Technology that allows humans to interact with machines via speech or gestures
- Machines and systems that can learn and make decisions
- The integration of digital and physical systems in manufacturing
Down
- Industry 5.0 promotes this environmental concern in manufacturing
- A key technology that enables secure and transparent transactions
- A key concept of Industry 5.0 that focuses on human-centered approaches
- The process of using data to make better decisions
10 Clues: Robots designed to work alongside humans • The process of using data to make better decisions • Machines and systems that can learn and make decisions • A major goal of Industry 5.0 focusing on reducing waste • A global network that connects smart devices and systems • The integration of digital and physical systems in manufacturing • ...
teach 2025-09-07
Across
- Prefix for anything involving virtual or digital threats.
- Online test to tell humans from bots — often asks you to “spot the traffic light” .
- Microsoft’s OS that introduced the Start menu.
- A DSA structure with LIFO order — also what “overflows” on a famous Q&A site (5).
- The annoying lag between click and response (7).
- The coder’s social network for sharing repos (6).
Down
- Microsoft’s old web browser — or the Windows file manager.
- The digital ledger tech behind Bitcoin and more.
- Coffee-inspired programming language once said to “run everywhere” (4).
- Open-source OS mascot is a penguin named Tux (5).
10 Clues: Microsoft’s OS that introduced the Start menu. • The digital ledger tech behind Bitcoin and more. • The annoying lag between click and response (7). • Open-source OS mascot is a penguin named Tux (5). • The coder’s social network for sharing repos (6). • Prefix for anything involving virtual or digital threats. • ...
The Cyber Word Hunt 2025-10-22
Across
- : Field concerned with protecting systems and data from online attacks
- : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
- : The act of checking and improving quality in AML processes
- : Cyber attack that tricks users into revealing personal info via fake emails
- : The shift from traditional banking to online banking is called digital ___
Down
- : Process of verifying user identity before accessing an online account
- : Sending money electronically through a banking app
- : Device most commonly used to access digital banking apps
- : A new generation of online-only banks with no physical branches
- : Department that manages IT risk, compliance, and governance
10 Clues: : Sending money electronically through a banking app • : Device most commonly used to access digital banking apps • : The act of checking and improving quality in AML processes • : Department that manages IT risk, compliance, and governance • : A new generation of online-only banks with no physical branches • ...
PenFed Fun 2022-09-05
14 Clues: leader • a thief • transfer • who we are • reader board • add more fraud • member services • famous fraudster • computer program • Paris' Dog's name • not enough security • who you gonna call? • block of calls from 8-11am • must be _______ out of state
Shirley Homes Chapter 5 2021-04-08
Across
- Shirley had a good _____ , so she took great photos
- Jeff was very nervous and started to ____
- Anna and her boyfriend kissed each other. They were very happy and ______
- When the investigator saw Anna in the pub, she decided to create a new _____
- Shirley wanted to watch Anna, so she wore a bright student ____
Down
- They suspected Anna, but couldn't ____ it
- When Jeff knew who the cyber thief was, he got really ____
- Anna was a clever young woman, not _____
- Anna had her lunch in the pub. There were a lot of people there, so it was _____
9 Clues: Anna was a clever young woman, not _____ • They suspected Anna, but couldn't ____ it • Jeff was very nervous and started to ____ • Shirley had a good _____ , so she took great photos • When Jeff knew who the cyber thief was, he got really ____ • Shirley wanted to watch Anna, so she wore a bright student ____ • ...
