cyber security Crossword Puzzles
My Thing 2021-12-30
Across
- Clues of a story
- Skinny
- Positive particle in a nucleus
- Valueable luck charm
- High security storage "room"
- Footwear
- Infamous red liquid
- Country of the pharaohs
- Type of fence
Down
- Grey Iron compound
- Large water body
- Famous valuable element
- Sour fruit
- Greek name for "Earth"
- Largest planet
- Prefix meaning "inside"
- God of war
- Old axis power
- Age of history
19 Clues: Skinny • Footwear • Sour fruit • God of war • Type of fence • Largest planet • Old axis power • Age of history • Clues of a story • Large water body • Grey Iron compound • Infamous red liquid • Valueable luck charm • Greek name for "Earth" • Famous valuable element • Prefix meaning "inside" • Country of the pharaohs • High security storage "room" • Positive particle in a nucleus
In our home 2024-11-28
19 Clues: tween • brush it • new human • spread it • forty six • adult soon • limit this • not so loud • home must be • always early • sweep or mop • needs a break • always with us • security guard • don't hold it up • just begin to walk • wash before or after bath • must be healthy and filling • dispose of it as you go about
Fun Puzzle 2019-10-29
Across
- solves PC issues
- Report lost of firm property
- Likes to chase mice
- Search employees names
- Doctor
- Large marsupial
- Has a trunk
- Need help
- Abbrev. Chief Operating Officer
Down
- Annual festival of lights
- goes into checking
- Check voice messages
- Man's best friend
- Payed through employer
- Flying mammal
- Breast cancer month
16 Clues: Doctor • Need help • Has a trunk • Flying mammal • Large marsupial • solves PC issues • Man's best friend • goes into checking • Likes to chase mice • Breast cancer month • Check voice messages • Search employees names • Payed through employer • Annual festival of lights • Report lost of firm property • Abbrev. Chief Operating Officer
Banking Operations 2023-05-02
Across
- What is the term for a security that has no maturity date and pays a fixed rate of interest?
- What is the term for the practice of buying and holding securities for a long period of time?
- What is the term for the maximum amount of a security a buyer is willing to pay?
- What is the term for the process of analyzing financial information to make investment decisions?
- What is the term for a measure of the risk associated with a specific investment?
Down
- What is the term for the process of comparing a company's financial performance to its industry peers?
- What is the term for a type of investment that allows individuals to invest in a pool of securities?
- What is the term for the value of a security that is not backed by collateral?
- What is the term for the difference between a company's assets and liabilities?
- What is the term for a company's ability to pay its short-term liabilities?
- What term describes financial institutions that are not regulated by traditional banking laws?
- What is the term for a financial instrument that pays a fixed rate of interest?
12 Clues: What is the term for a company's ability to pay its short-term liabilities? • What is the term for the value of a security that is not backed by collateral? • What is the term for the difference between a company's assets and liabilities? • What is the term for a financial instrument that pays a fixed rate of interest? • ...
Identity Theft 2016-12-10
Across
- a number in the format 000-00-0000, unique for each and every person, that is used to track Social Security benefits and for other identification purposes.
- shielding your identity
- Do this to your receipts and old credit cards.
- When criminals watch from a nearby location as you punch in your cell # to a hotel or rental car company.
- the fraudulent acquisition and use of a person's private identifying information, usually for their own financial gain.
- charges/bills that you may have noticed.. that you, yourself did NOT pay for.
Down
- These should always be difficult so that identity thieves cannot guess them easily.
- When you install this and virus-detection software on your home computer, you are protecting yourself from criminals who may be trying to access your private information via computer.
- When someone steals this, they have the access to fraudently apply for credit, file taxes, or get medical services.
- If you suspect that your identity has been stolen, you should contact authorities immediately.
- the condition of being protected from identity thefts and other people who could cause you to lose financial security
- This occurs when someone steals your Social Security Number to obtain medical treatment or other medical services.
12 Clues: shielding your identity • Do this to your receipts and old credit cards. • charges/bills that you may have noticed.. that you, yourself did NOT pay for. • These should always be difficult so that identity thieves cannot guess them easily. • If you suspect that your identity has been stolen, you should contact authorities immediately. • ...
Crossword #3 2014-07-13
Across
- The ratio of the change in an option's price to the decrease in its time to expiration. also called time decay.
- A person who acts as an intermediary between the buyer and seller of a security, insurance product, or mutual fund, often paid by commission
- The total market value of a company's outstanding equity.
- The amount and frequency of fluctuations in the price of a security, commodity, or a market within a specified time period.
- A sales charge assessed on certain investments to cover selling costs.
- The date by which the issuer of a bond promises to repay the bond’s face value
- To cash in mutual fund shares by selling them back to the fund at their current share price (net asset value).
Down
- The overall general upward price movement of goods and services in an economy.
- Anything having commercial or exchange value that is owned by an individual, institution, or busines
- Bringing a portfolio back to its original (or a desired) asset allocation mix.
- An owner of units in an investment
- The lowest price any investor or dealer has declared that he will sell a given security/commodity for.
- The purchase or sale of an equal number of puts and calls, with the same strike price and expiration dates.
13 Clues: An owner of units in an investment • The total market value of a company's outstanding equity. • A sales charge assessed on certain investments to cover selling costs. • The overall general upward price movement of goods and services in an economy. • Bringing a portfolio back to its original (or a desired) asset allocation mix. • ...
Orion Brower , National Security Final 2022-05-13
Across
- Thwarting of foreign agencies.
- , Case officer responsible for handling agents in operations.
- Clean , steps an agent may take to see if their under surveillance.
- , someone that lives out of their original country.
- Agent , Agent that pretends to be a spy when he / she is on the opposite side.
- , forger of passports, and liscences.
- , Person used once unknowingly for an intelligence operation.
- , bribery
- , Agent sent to their country to spy for the other side.
- drop , Drop off point
- , Intercepted communication
- of station , government official who is the head of a team.
- of influence , Agent that uses their position to influence the public.
- Only , some meant to be read by a specific agent.
- , guide
Down
- Agent , risk taker
- , Commander
- in place , informant
- , spy
- , science of writing
- , Slang for British members of the secret intelligence service.
- , British slang
- , bodyguard
- , Valuable
- officer , intelligence officer who recruits and manages spies.
- , Agent that searches graves for names of the deceased.
26 Clues: , spy • , guide • , bribery • , Valuable • , bodyguard • , Commander • , British slang • Agent , risk taker • in place , informant • , science of writing • drop , Drop off point • , Intercepted communication • Thwarting of foreign agencies. • , forger of passports, and liscences. • Only , some meant to be read by a specific agent. • , someone that lives out of their original country. • ...
RU ITEC411- Crime and Security 2023-11-29
Across
- Software that build on to another software.
- Utilizing cyberattacks for acts of war
- Manipulating people to release personal information.
- A collection of computers on the internet that have malware that transmits to a central host owned by a hacker
- biological characteristics that are different for each individual.
- Created by a Cornell University grad student who released it on the internet
- A hacker whose intentions are malicious and unethical.
- software that does not need to build on to another software to carry out its function.
- Malware that takes note of user activities on the users device or machine.
- Stealing a person's social security number, drivers license number, or phone number.
- Multiple step login process
- Malware that seizes all files and prompts the user a message demanding a request in order to have the files released.
Down
- Attracting users to false websites where people collect their personal data
- searching for weaknesses and vulnerabilities in a system for your organization
- A hacker that helps improve security and finds system vulnerabilities for a good cause.
- Microsoft windows, macOS, and linux are examples of an
- A person who purposefully releases computer viruses and gets into computer systems without permission.
- Under this law it is illegal to enter a device without autherization
- Fake spam emails pretending to be from an important organization, including a false link for a user to click.
- Malware that seems to be safe but actually is malicous
20 Clues: Multiple step login process • Utilizing cyberattacks for acts of war • Software that build on to another software. • Manipulating people to release personal information. • Microsoft windows, macOS, and linux are examples of an • A hacker whose intentions are malicious and unethical. • Malware that seems to be safe but actually is malicous • ...
Online Safety, Security, and Ethics 2020-10-19
Across
- The search engine of Donald Duck
- Defined as the information superhighway
- A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web
- It causes harm to a computer system or network
- A malicious program that transfers from one computer to another
- An unwanted email mostly from bots or advertisers
- The process of interactively searching for and retrieving requested information via a computer from databases that are online.
- A search engine that plants trees
- It is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application
- The search engine of the God of Thunder
Down
- Disguises as a useful program but once downloaded or installed leaves your PC unprotected
- A program designed to send you advertisements, mostly as pop-ups
- A program that runs in the background without you knowing it
- An anti-virus or anti-malware software product that starts and end with n.
- It covers the key issues in developing a successful research project
- A software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- A program designed to replicate itself and transfer from one computer to another
- An essential techniques for carrying out convincing research
- An unwanted acquisition of sensitive personal information
- It is designed to detect and destroy computer viruses
20 Clues: The search engine of Donald Duck • A search engine that plants trees • Defined as the information superhighway • The search engine of the God of Thunder • It causes harm to a computer system or network • An unwanted email mostly from bots or advertisers • It is designed to detect and destroy computer viruses • An unwanted acquisition of sensitive personal information • ...
Child Development 2.02 Safety & Security 2020-09-30
Across
- In an unharmed, uninjured, or undamaged condition
- of security A feeling of being safe
- Security Commission An agency that helps people find jobs
- volience Violence within the home which includes the use of physical and sexual violence, threats and intimidation, emotional abuse and denying of finances
- events Things that happen once in a while but are major events
- Untroubled by feelings of fear or doubt
- devices Relating to devices, systems, or circuits that employ components such as vacuum tubes, integrated circuits, or transistors in their design e.g., are computer, Ipod, etc.
- group A group that provides not only financial support but also spiritual, volunteer and community support
- safety Rules for the safe use of the Internet for children
- poisoning A medical condition caused by toxic levels of the metal lead in the blood
- poisoning Results from eating foods that contain bacteria or their toxic byproducts
Down
- safety Free from bodily harm
- needs A basic need for the sense of security
- Cross An international organization dedicated to the medical care of the sick or wounded in wars and natural disasters
- environment A surrounding or situation where harm, damage, or loss is unlikely
- The exchange of information between people by means of speaking, writing, or using a common system of signs or behavior
- To deprive somebody of air or prevent somebody from breathing, or be unable to breathe
- A portable weapon that fires ammunition such as a pistol or rifle
- from danger Feeling free from harm
- Hazadous material that may be found in homes build prior to 1978
- Services A government agency that provides social services to individuals or a community
- To make something safe for children to use, or safe against damage or tampering by children
- The process of doing something in order to achieve a purpose
- Way A national network of local organizations that work to advance the common good by focusing on education, income and health
- allergies An immune system response to a food that the body perceives as harmful
- Department An agency that provides medical care to people who cannot afford medical help
26 Clues: safety Free from bodily harm • from danger Feeling free from harm • of security A feeling of being safe • Untroubled by feelings of fear or doubt • needs A basic need for the sense of security • In an unharmed, uninjured, or undamaged condition • Security Commission An agency that helps people find jobs • safety Rules for the safe use of the Internet for children • ...
Food Security and Geographical Concepts 2023-03-26
Across
- similar to a paddock
- A substance needed to destroy insects
- weed killers
- drones are modern forms of this
- Indigenous potato
- wheat and canola are these
- drained away
- Unit of heredity
- To change
- the B part of BOLTSS
- The C in SPICESS
- the process of providing the food necessary for health
- when earth objects are worn away
- growing of trees as part of the farm
- measure soil moisture
- fuel made from organic matter
- Required to prevent droughts
- the production and discharge of something
Down
- describes soil without nutrients
- The P in SPICESS
- The tropic that runs through Australia
- Type of Dairy
- Country with the lowest emission of CO2
- represented by a line on a climate graph
- Tropic above the equator
- Type of rice that provides Vitamin A
- Object used to take a photo from above
- the variety of life in a particular area
- a tax on imported goods and services
- name of map that concentrates on mountains
- insect used for farming practices
- Revolution that has improved farming
- Concentration of salts in soil or water
- The G IN GPS
- to lift up
35 Clues: To change • to lift up • weed killers • drained away • The G IN GPS • Type of Dairy • The P in SPICESS • Unit of heredity • The C in SPICESS • Indigenous potato • similar to a paddock • the B part of BOLTSS • measure soil moisture • Tropic above the equator • wheat and canola are these • Required to prevent droughts • fuel made from organic matter • drones are modern forms of this • ...
RU ITEC411 Crime and Security 2025-03-12
Across
- a group of compromised devices that have a singular central host
- ensuring data is not changed unintentionally and is consistent
- malware that secretly monitors activity on a device
- things such as fingerprints, retina patterns, DNA
- abbreviation for the Act that requires the design of telecommunications equipment to allow the gov't to intercept phonecalls
- broad term for things such as a virus, worm, trojan horse, etc.
- hackers with good intentions
- software that allows access to a device bypassing security
- malware that attaches to another software
- fraudulent spam that arrives via text message
Down
- use of hacking to promote a particular political agenda
- verifying someone or something is what they claim to be
- opposite of decryption
- malware that removes access to files on a computer and demands payment to return access
- hackers with malicious intent
- tricking people into giving you information accidentally/unknowingly
- software designed to fix a bug
- fradulent spam that takes place via email
- malware that does not need to attach to another software and spreads like a disease
- abbreviation for attack in which hackers take down a service with excessive requests
20 Clues: opposite of decryption • hackers with good intentions • hackers with malicious intent • software designed to fix a bug • fradulent spam that takes place via email • malware that attaches to another software • fraudulent spam that arrives via text message • things such as fingerprints, retina patterns, DNA • malware that secretly monitors activity on a device • ...
HAVE FUN WITH SECURITY 101!! 2025-06-09
Across
- BOLO= BE ON ____ OUT.
- WHMIS= WORKPLACE _____ MATERIALS INFORMATION SYSTEM.
- LEARN TO READ PEOPLE'S FACIAL ____,BODY LANGUAGE AND BEHAVIOURS
- TO BOOK A DAY OFF IN ADVANCE YOU MUST____A TIME OFF REQUEST.
- YOUR REPORT SHOULD BE SHORT BUT DETAILED AND INCLUDE ONLY ____
- OUR SECTION SUPERVISOR IS ALSO KNOWN AS OUR _____.
- ____PASSES WILL BE ISSUED BY THE RECEPTION DESK.
- ARRIVE FOR ____ON TIME AND PREPARED EACH DAY.
- YOUR REPORT SHOULD BE OBJECTIVE AND NOT INCLUDE YOUR ____
- CEMS= COMMISSIONAIRES_____ MANAGEMENT SYSTEMS.
Down
- CHECK YOUR ____ FOR KEYS BEFORE YOU LEAVE!
- DOR= DAILY______ REPORT.
- STAY AWARE OF YOUR SURROUNDINGS BY USING ALL OF YOUR _____
- COPP'S= ____OTTAWA POICIES AND PROCEDURES.
- WHEN OBSERVING PEOPLE YOUR PRIMARY GOAL IS TO GATHER___ FOR YOUR NOTES
- ABLOY KEYS WILL BE ISSUED TO ____PERSONNEL ONLY.
- VERIFY THE IDENTITY OF A VISITOR BY REQUESTING A VALID _____ ISSUED IDENTIFICATION CARD.
- NEVER REPORT FOR DUTY WITHOUT YOUR ___.
- THE ELEVATORS AT CPC ARE EQUIPED WITH EMERGENCY PHONES THAT ARE MONITORED AT THE ___DESK.
- MFO= ____ OF FIELD OPERATIONS.
20 Clues: BOLO= BE ON ____ OUT. • DOR= DAILY______ REPORT. • MFO= ____ OF FIELD OPERATIONS. • NEVER REPORT FOR DUTY WITHOUT YOUR ___. • CHECK YOUR ____ FOR KEYS BEFORE YOU LEAVE! • COPP'S= ____OTTAWA POICIES AND PROCEDURES. • ARRIVE FOR ____ON TIME AND PREPARED EACH DAY. • CEMS= COMMISSIONAIRES_____ MANAGEMENT SYSTEMS. • ABLOY KEYS WILL BE ISSUED TO ____PERSONNEL ONLY. • ...
Safety and Security in Aviation 2025-06-27
Across
- Flat vertical partition that separates the passenger cabin from the galley and toilets or another class.
- Straight and off to each side of aircraft to sustain the aircraft in flight.
- When a pilot decides not to land and climbs back into the air to make another attempt.
- Seat located by each main emergency exit door for flight attendants.
- Abbreviation for when a flight is expected to land.
- Type of system that uses a special liquid under extremely high pressure to power certain parts of an aircraft.
- Flight that is within a country.
- Disturbed air currents that can affect the stability of the aircraft.
- Seats that offer the utmost in privacy and comfort, essentially its own mini cabin.
Down
- Main body of the aircraft for crew, passengers or cargo and fuel.
- Area usually below the passenger deck where cargo and baggage are carried.
- Where the pilots sit and control the aircraft.
- Distance from one seat to the seat in front.
- When two or more airlines advertise space on a flight at a certain time.
- Flight controls attached to wings that move in opposite directions.
- Electrical power and air conditioning needed on the ground before the engines are started uses this.
- Kit given to those in business or first class for long haul journeys.
- Device with a central hub and radiating blades producing thrust and gives forward motion to the aircraft.
- Flight between countries.
- The back of the plane.
20 Clues: The back of the plane. • Flight between countries. • Flight that is within a country. • Distance from one seat to the seat in front. • Where the pilots sit and control the aircraft. • Abbreviation for when a flight is expected to land. • Main body of the aircraft for crew, passengers or cargo and fuel. • ...
Data Privacy and security crossword 2025-02-03
Across
- A type of attack where hackers trick individuals into revealing sensitive information
- The practice of protecting systems, networks, and data from digital attacks
- Ensuring that data is accurate and reliable
- A type of attack that floods a network with traffic to disrupt service
- A type of security breach where data is accessed without authorization
- A legal requirement to protect sensitive customer information
- A method of disguising communication to hide its content
- A process of converting data into a code to prevent unauthorized access
- A type of attack where an attacker pretends to be a trusted entity
- A type of software designed to detect and remove malicious programs
- A method of verifying someone's identity using two forms of verification
Down
- Protecting sensitive information from unauthorized access
- A type of software update designed to fix security vulnerabilities
- Ensuring that systems and data are accessible when needed
- the use of technologies, policies, and controls to protect data, applications, and infrastructure in cloud environments
- A weakness in a system that can be exploited by attackers
- A process of regularly backing up data to prevent loss
- A legal framework that protects personal data in the European Union
- A person who attempts to gain unauthorized access to systems or data
- A type of malware that encrypts files and demands payment for decryption
- A secure method of transmitting data over the internet
21 Clues: Ensuring that data is accurate and reliable • A process of regularly backing up data to prevent loss • A secure method of transmitting data over the internet • A method of disguising communication to hide its content • Protecting sensitive information from unauthorized access • Ensuring that systems and data are accessible when needed • ...
RU ITEC411- Crime and Security 2024-10-16
Across
- Software created with the intent to harm computer hardware/software
- Ensuring data that should be private remains private
- Hackers who use their skills to improve system security
- The process of verifying the identity of a person
- A type of testing performed by security professionals that attempts to gain outside access to an application to violate it in one form or another
- Biological characteristics that are unique to each individual
Down
- The main federal computer-crime law passed in 1980
- The exchange of goods/services over the internet
- The --------- system controls access to a computer's hardware, applications, and files.
- A way in which one can transform readable data into an unreadable cypher
- Hackers whose activities are destructive
- The Act which makes foreign libel judgments unenforceable in the United States if they violate the First Amendment
- Sending millions of emails in an attempt to steal a users information by having them click on a fraudulent link/email/etc.
- These people developed coding standards for secure software development
- The type of theft in which a criminal uses the identity of an unknowing innocent person
- The last name of the British man who was arrested in America for being a CEO of a British online Gambling site
- A computer virus used by the U.S and Isreal to damage centrifuges use by Iran to enrich uranium
- Hacking to promote a political cause
- The use of false domains/URLs to steal personal/financial information
- An application is ------ if it has a digital certificate attached to it
20 Clues: Hacking to promote a political cause • Hackers whose activities are destructive • The exchange of goods/services over the internet • The process of verifying the identity of a person • The main federal computer-crime law passed in 1980 • Ensuring data that should be private remains private • Hackers who use their skills to improve system security • ...
Industrial Security Concept Crossword Puzzle 2025-10-13
Across
- - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
- - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
- - A chance of being injured or harmed
- - used as a form of identification and access control
- - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
- - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
- - genuine key stolen from the owner
- - means to secretly listen to record a conversation using a hidden electronic device
- - term used in England for lock picker, safecrackers, and penetrators of restricted areas
- - a house like structures above the perimeter barrier
Down
- - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
- - inability to withstand the effects of a hostile environment
- - it is the communication channel that conveys the information from all sensors in the system
- - indication of impending danger or harm
- - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
- - the monitoring of telephone conversation by a third party, often by covert means
- - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
- - any information and material, the unauthorized disclosure of which would endanger national security
- - a metallic container used for safekeeping of documents or small items in office or installation
- - is the potential that a chosen action will lead to a loss
20 Clues: - genuine key stolen from the owner • - A chance of being injured or harmed • - indication of impending danger or harm • - used as a form of identification and access control • - a house like structures above the perimeter barrier • - is the potential that a chosen action will lead to a loss • - inability to withstand the effects of a hostile environment • ...
Industrial Security Concept Crossword Puzzle 2025-10-13
Across
- - a portable and detachable lock having a pivoted or sliding hasp which possess through a staple, ring, or the like and is made fast or secured
- - it shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize the possibility of physical theft or damage to life
- - A chance of being injured or harmed
- - used as a form of identification and access control
- - it is a mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room
- - heavily constructed fire and burglar resistant container usually part of the building structure used to keep and protect cash, document and negotiable instruments
- - genuine key stolen from the owner
- - means to secretly listen to record a conversation using a hidden electronic device
- - term used in England for lock picker, safecrackers, and penetrators of restricted areas
- - a house like structures above the perimeter barrier
Down
- - it is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys
- - inability to withstand the effects of a hostile environment
- - it is the communication channel that conveys the information from all sensors in the system
- - indication of impending danger or harm
- - the actual alarm may be audible ir silent, a bell, buzzer, phone ringing, or flashing of light
- - the monitoring of telephone conversation by a third party, often by covert means
- - an any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation
- - any information and material, the unauthorized disclosure of which would endanger national security
- - a metallic container used for safekeeping of documents or small items in office or installation
- - is the potential that a chosen action will lead to a loss
20 Clues: - genuine key stolen from the owner • - A chance of being injured or harmed • - indication of impending danger or harm • - used as a form of identification and access control • - a house like structures above the perimeter barrier • - is the potential that a chosen action will lead to a loss • - inability to withstand the effects of a hostile environment • ...
Security and the Dark Web 2025-12-05
Across
- Practices to protect sensitive information from leaks
- The most common cryptocurrency used in Dark Web transactions
- An intermediary that forwards requests between client and server
- Creates a secure tunnel for internet traffic
- Internet content not indexed by search engines (e.g., private databases)
- A method of encrypting data in multiple layers for anonymity
- Converting data into a secure format to prevent unauthorized access
- Identifying users based on unique browser or device characteristics
- The first relay in a Tor circuit
- The last relay before traffic reaches its destination
- The path data takes through multiple Tor nodes
- Converting encrypted data back to its original form
- Any server in the Tor network that forwards encrypted traffic
- A network designed to conceal user identity and activity
- A Tor node that helps bypass censorship by hiding Tor usage
- Digital currency often used for anonymous transactions on the Dark Web
- The publicly accessible, indexed portion of the internet
Down
- A third-party service that holds funds during Dark Web transactions
- A hidden part of the internet accessible only through special software like Tor
- A special-use domain suffix for Tor hidden services
- Private overlay networks requiring special configurations for access
- Servers that maintain lists of Tor nodes
- Software enabling anonymous communication via layered encryption
- A website hosted on the Dark Web using a .onion domain
- Data about data, such as timestamps or IP addresses
- A relay that passes traffic between entry and exit nodes
- A modified Firefox browser designed for accessing the Tor network
- Online platforms on the Dark Web for trading goods/services
28 Clues: The first relay in a Tor circuit • Servers that maintain lists of Tor nodes • Creates a secure tunnel for internet traffic • The path data takes through multiple Tor nodes • A special-use domain suffix for Tor hidden services • Data about data, such as timestamps or IP addresses • Converting encrypted data back to its original form • ...
RU ITEC411 - Crime and Security 2025-11-25
Across
- Software that secretly gathers information from a computer system
- Illegal access into a telephone system to make unauthorized calls
- A temporary fix for a program
- A cybercrime involving pretending to be someone to trick victims or access sensitive information
- When a program or system suddenly stops functioning
- A weakness in a computer system
- Multiple computers working together to solve a complex challenge
- Technologies that use an individual's traits for identity verification
- To remove or alter data that contains sensitive information
Down
- Software that prevents users from accessing their data until payment is made
- A method of bypassing a computer’s security measures
- An attack that uses identity deception to access sensitive information
- The process of converting plaintext into ciphertext
- Software designed for harmful intent toward computer systems
- Someone without permission who breaks into a computer system
- An attack that redirects users to fake websites
- Using two or more types of verification for authentication
- Harmful software that can self-replicate and spread
- Moral principles that prevent harm when using computer technologies
- A network of devices controlled by bots from hijacked computers
20 Clues: A temporary fix for a program • A weakness in a computer system • An attack that redirects users to fake websites • The process of converting plaintext into ciphertext • When a program or system suddenly stops functioning • Harmful software that can self-replicate and spread • A method of bypassing a computer’s security measures • ...
Cyber-bullying 2012-10-09
Cyber somthing 2023-01-11
6 Clues: alongside • on purpose • harmful and gradual • capable or floating • a rapid and often excessive spread or increase • existing in or spreading through every part or something
Cyber Safety 2023-01-12
6 Clues: Malicious software • Malware damages your… • A type of malware which replicates itself • A type of malware which disguised itself as files • A type of malware which doesn’t require user interaction • A technique that hackers use to stop data during transaction and collect it
Cyber Awareness 2023-05-05
Across
- Using technology to bully or harass someone online
- A secret code that you use to protect your online accounts
- A person who uses their computer skills to gain unauthorized access to systems or networks
- A type of malware that can harm your computer and steal your personal information
Down
- The practice of protecting computers, networks, and online systems from unauthorized access or attack
- Unsolicited emails or messages that are sent to a large number of people
6 Clues: Using technology to bully or harass someone online • A secret code that you use to protect your online accounts • Unsolicited emails or messages that are sent to a large number of people • A type of malware that can harm your computer and steal your personal information • ...
Cyber bullying 2024-12-02
Across
- having this will make it so that you don't get hacked
- Bullying that happens online.
- this number if for teen crisis text line for louisiana
Down
- this will make it so that you can limit your phone time.
- being aware of the dangers online and avoiding them.
- doing this will make it so that you can not be cyberbullyed.
6 Clues: Bullying that happens online. • being aware of the dangers online and avoiding them. • having this will make it so that you don't get hacked • this number if for teen crisis text line for louisiana • this will make it so that you can limit your phone time. • doing this will make it so that you can not be cyberbullyed.
Cyber Tips 2025-04-28
Across
- protecting your data from harm, theft, or destruction
- a secret string of characters used to verify a user's identity and grant access to a computer system
- a network security system that acts as a barrier between a trusted internal network and an untrusted external network, such as the internet
Down
- a person who breaks into a computer system.-
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
- when the hackers make you disclose confidential data, like your passwords or credit card numbers, by pretending to be someone you can trust
6 Clues: a person who breaks into a computer system.- • protecting your data from harm, theft, or destruction • a secret string of characters used to verify a user's identity and grant access to a computer system • a type of malicious software, or malware, that spreads between computers and causes damage to data and software. • ...
cyber ethics 2025-06-08
Across
- Using the internet responsibly and respectfully.
- A computer virus is a program or a set of program that disrupts the normal functioning of a computer.
- The trail of data you leave online.
- Copying software illegally.
Down
- Accessing the internet in an illegal manner.
- Illegally downloading o sharing software or media.
6 Clues: Copying software illegally. • The trail of data you leave online. • Accessing the internet in an illegal manner. • Using the internet responsibly and respectfully. • Illegally downloading o sharing software or media. • A computer virus is a program or a set of program that disrupts the normal functioning of a computer.
cashless society 2024-09-03
Across
- goods for sale
- cash safely
- makes people high value
- can easy withdraw
- payment
- are conducted without the usage of cash
- big sums
- its own advantages and weakness
Down
- transactions
- the usage of cash
- with cashless
- devices or codes for security
- rates are lower
- digital
- money cost more
- digital
- make life easier
- internet
- used for electronic transaction
19 Clues: digital • digital • payment • internet • big sums • cash safely • transactions • with cashless • goods for sale • rates are lower • money cost more • make life easier • the usage of cash • can easy withdraw • makes people high value • devices or codes for security • used for electronic transaction • its own advantages and weakness • are conducted without the usage of cash
Government 2025-01-31
Across
- Rules enforced by government.
- Protection from harm.
- Right to enforce rules.
- Choosing leaders.
- Ability to influence.
- Directing actions.
- Elected officials govern.
- Public assistance.
- Guiding a group.
Down
- Fair treatment.
- Managing government.
- People’s government.
- Decision-making in government.
- Controlling behavior with rules.
- A course of action.
- Acting for citizens.
- Freedoms granted to people.
- Lawfulness and peace.
18 Clues: Fair treatment. • Guiding a group. • Choosing leaders. • Directing actions. • Public assistance. • A course of action. • Managing government. • People’s government. • Acting for citizens. • Protection from harm. • Ability to influence. • Lawfulness and peace. • Right to enforce rules. • Elected officials govern. • Freedoms granted to people. • Rules enforced by government. • ...
Chapter 5 - Physical Security 2022-01-06
Across
- place designed to store and manage large quantities of data
- different types of fire based on fuel
- device with bars to alternately block and entryway
- The first security goal
- servers and networking equipment are installed here
- vertical cylinders to prevent vehicles from passing
Down
- Fire class caused by electrical fire
- unauthorized person walking into facility right behind and authorized person
- Fire class that burns paper and wood
- A defense placed around property
- video cameras to monitor a facility; not public
- concrete walls to prevent vehicles from passing
- NSA developed methods for EMR spying
- control system that uses 2 interlocking doors
14 Clues: The first security goal • A defense placed around property • Fire class caused by electrical fire • Fire class that burns paper and wood • NSA developed methods for EMR spying • different types of fire based on fuel • control system that uses 2 interlocking doors • video cameras to monitor a facility; not public • concrete walls to prevent vehicles from passing • ...
Occupations (Security, Investigation & Law) 2013-02-20
Across
- Sherlock Holmes is a...
- He works at the police station.
- James Bond is an...
- “Baywatch” is a TV series about...
- (US) A lawyer
- He protects a person, place or thing from danger or attack.
Down
- He takes decisions in a court.
- In the TV series ”CSI”, main characters are...
- He works at the police station (2)
- She works at the police station.
- He stops fires.
- Withney Houston's famous movie: “The ...”
- Ally McBeal is a famous...
- He stops fires (2).
14 Clues: (US) A lawyer • He stops fires. • James Bond is an... • He stops fires (2). • Sherlock Holmes is a... • Ally McBeal is a famous... • He takes decisions in a court. • He works at the police station. • She works at the police station. • He works at the police station (2) • “Baywatch” is a TV series about... • Withney Houston's famous movie: “The ...” • ...
Information Security Event Puzzle 2024-10-21
Across
- process of giving someone the ability to access a resource
- process of restarting a computer
- the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data
- computer program with a graphical user interface for displaying and navigating between web pages
- the process of converting information or data into a code, especially to prevent unauthorized access
- a ______ password contains letters numbers and special characters
Down
- any information in the medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment
- information that, when used alone or with other relevant data, can identify an individual
- facts and statistics collected together for reference or analysis
- a form of social engineering and a scam where attackers deceive people into revealing sensitive information[1] or installing malware such as viruses, worms, adware, or ransomware
- computers short term memory
- the capacity of data/information which can be carried through a channel (typically from website or server) in a given time interval
- the connection of at least two computer systems, either by a cable or a wireless connection
- process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
14 Clues: computers short term memory • process of restarting a computer • process of giving someone the ability to access a resource • facts and statistics collected together for reference or analysis • a ______ password contains letters numbers and special characters • information that, when used alone or with other relevant data, can identify an individual • ...
ParaCommando Kruiswoordraadsel 2014-03-11
Across
- Belgium Luxemburg International Security Assistance Force
- Militair voertuig
- Operatie Kolwezi 78
- Auschwitz en Birkenau
- Opleidingskamp van de para-commando
- Vertrekplaats voor vliegtuigsprong
- legeroefening
- onbemande vliegtuig(afk)
Down
- De beste vriend van een para
- meerdere compagnieën
- legervervoermiddel
- Thuishaven school voor onderofficieren
- voormalig Belgische Koning
- Militaire helikopter
- Hoofddeksel van de chutist
- Eskadron in het Belgisch Leger
- Parachute
- M56
- graad in het leger
19 Clues: M56 • Parachute • legeroefening • Militair voertuig • legervervoermiddel • graad in het leger • Operatie Kolwezi 78 • meerdere compagnieën • Militaire helikopter • Auschwitz en Birkenau • onbemande vliegtuig(afk) • voormalig Belgische Koning • Hoofddeksel van de chutist • De beste vriend van een para • Eskadron in het Belgisch Leger • Vertrekplaats voor vliegtuigsprong • ...
Human Rights Jack 2023-07-28
Across
- No _______
- The right to _____
- Martin _____ King Jr
- No _____ detainment
- Food and ______ for all
- ______ rights
- Don't _______
- A right to ________
Down
- your _________ are protected by law
- The right to ____
- The right to ______ Assembly
- You must be the _____ you want in the world (Gandi)
- ________ to Move
- We're all equal before the ___
- No one can ___ your human rights
- _____ security
- Mahatma _____
- ______ until proven guilty
- Nelson _____
19 Clues: No _______ • Nelson _____ • ______ rights • Mahatma _____ • Don't _______ • _____ security • ________ to Move • The right to ____ • The right to _____ • No _____ detainment • A right to ________ • Martin _____ King Jr • Food and ______ for all • ______ until proven guilty • The right to ______ Assembly • We're all equal before the ___ • No one can ___ your human rights • ...
Cybermobbing 2019-04-30
Across
- wie heißt die Person die an der Situation Schuld ist?
- Was solltest du machen wenn du bemerkst das eine Person gemobbt wird?
- Wo solltest du es am besten melden?
- Menschen auf die man sich in der Situation verlassen kann
- Was hat man wenn man gemobbt wird?
Down
- Ein anderes Wort für Cybermobbing?
- Was sollte man haben, wenn man gemobbt wird um es der Polizei zu zeigen?
7 Clues: Ein anderes Wort für Cybermobbing? • Was hat man wenn man gemobbt wird? • Wo solltest du es am besten melden? • wie heißt die Person die an der Situation Schuld ist? • Menschen auf die man sich in der Situation verlassen kann • Was solltest du machen wenn du bemerkst das eine Person gemobbt wird? • ...
Revision Help 2013-05-21
Across
- The first part of this word is a bad guy from Doctor Who
- 0800 1111
Down
- What the social network film is about (The film with Andrew Garfield in)
- A website to help you with any problems
- This is what it says on a button if you see cyber bullying
- This is the settings YOU should have on your account/s
- Sort of the sound that birds make
7 Clues: 0800 1111 • Sort of the sound that birds make • A website to help you with any problems • This is the settings YOU should have on your account/s • The first part of this word is a bad guy from Doctor Who • This is what it says on a button if you see cyber bullying • What the social network film is about (The film with Andrew Garfield in)
Queenbee Cybersecurity 2025-03-17
Across
- An hacker sends a ___________ email requesting the victim for sensitive information
- A _________ access by a third party is called a cyber attack
- Trojan is an example of __________ attack
Down
- Users need to use unique __________ passwords to strengthen defence against attacks
- ________ are dummy computers systems to deceive attackers
- A virtual wall between the computer and the internet is called as _______
- A person who performs a cybersecurity attack is called a _______
7 Clues: Trojan is an example of __________ attack • ________ are dummy computers systems to deceive attackers • A _________ access by a third party is called a cyber attack • A person who performs a cybersecurity attack is called a _______ • A virtual wall between the computer and the internet is called as _______ • ...
Solve this 2025-09-13
Surepayroll 2022-08-17
Across
- CHECK TYPE
- A KIND OF SIGN
- TECHNOLOGY
- CASE TYPE FOR NEW FEIN
- VERIFICATION CODE
- PROCESSES THE PAYROLL
- STATE WITH NO TAX
- AKA WITHHOLDING
- HELP ARTICLES
Down
- CHANGES A PHONE NUMBER
- SIGNER ON ACCOUNT
- SECURITY TYPE IN SPAPPS
- PREVIOUS QUARTER CORRECTION
- EMAIL REGARDING TRUIST
- 2% HEALTHCARE
- MOST LIKELY A RESELLER
- NOT AUTHO
- CASE TO ADD A STATE
- FEDERAL UNEMPLOYMENT
- SIGNATURE ON POA
- CALIFORNIA UNEMPLOYMENT
21 Clues: NOT AUTHO • CHECK TYPE • TECHNOLOGY • 2% HEALTHCARE • HELP ARTICLES • A KIND OF SIGN • AKA WITHHOLDING • SIGNATURE ON POA • SIGNER ON ACCOUNT • VERIFICATION CODE • STATE WITH NO TAX • CASE TO ADD A STATE • FEDERAL UNEMPLOYMENT • PROCESSES THE PAYROLL • CHANGES A PHONE NUMBER • EMAIL REGARDING TRUIST • MOST LIKELY A RESELLER • CASE TYPE FOR NEW FEIN • SECURITY TYPE IN SPAPPS • CALIFORNIA UNEMPLOYMENT • ...
Airside/Landslide crossword 2019-02-11
Across
- not allowed
- A lavatory
- fast food
- connected
- a traveller
- passengers board onto
- drinking area
- what you put your personal belongings in
- proof of identification
- luggage you carry on board
- money exchange
Down
- airport goods
- knowledge
- communication
- cash and deposit
- moving stairway
- travelling up and down
- a reminder of a place visited
- safe freedom from danger or risk
- hot beverage
20 Clues: knowledge • fast food • connected • A lavatory • not allowed • a traveller • hot beverage • airport goods • communication • drinking area • money exchange • moving stairway • cash and deposit • passengers board onto • travelling up and down • proof of identification • luggage you carry on board • a reminder of a place visited • safe freedom from danger or risk • what you put your personal belongings in
Crossword Puzzle 2020-10-06
Across
- I understand.
- Bread is made of different kinds of it
- another word for necessary
- choose
- fall over
- guard
- only one
- time to get your self together
- at once
- steal
- fear
- I got a letter in an...
Down
- he was sentenced to two years in prison
- stumble
- opposite of thin
- where’s my heart?
- hardly
- I‘m happily married in a...
- somewhere
- stay
- number
21 Clues: stay • fear • guard • steal • choose • hardly • number • stumble • at once • only one • fall over • somewhere • I understand. • opposite of thin • where’s my heart? • I got a letter in an... • another word for necessary • I‘m happily married in a... • time to get your self together • Bread is made of different kinds of it • he was sentenced to two years in prison
Vocabulary Homework 2023-02-08
Across
- facts; statistics
- vast; huge
- to glorify; to elevate
- counterfeit; false
- story; narration
- protected; safe
- to misunderstand; to misjudge
- mortgage; security
- renovation; repair
- to wound; to cut
- to rush; to plunge
Down
- to sit on the fence; to hem and haw
- thorough; all inclusive
- friendly; neighborly
- daze; stupor
- to beg; to plead
- to expel; to remove
- to snuff out; to smother
- mortgage; security
- opening; outlet
- sad; sorry
21 Clues: vast; huge • sad; sorry • daze; stupor • opening; outlet • protected; safe • to beg; to plead • story; narration • to wound; to cut • facts; statistics • mortgage; security • counterfeit; false • mortgage; security • renovation; repair • to rush; to plunge • to expel; to remove • friendly; neighborly • to glorify; to elevate • thorough; all inclusive • to snuff out; to smother • ...
Henry V Act 5 2023-03-03
Across
- leaving no opportunity for denial or refusal
- enclosing; restricting
- security; certainty
- common people of ancient Rome
- harvest; cultivation
- faithfulness; consistency
- unseeded or uncultivated
- severely disfigured; damaged
- approve; make officially valid
Down
- obstacle; hindrance
- call to mind
- make greater; increase
- royal; kingly
- union; relationship
- attempt; strive
- marriage; wedding
- surrounded; encircled
- general sense or meaning
- obscurities; uncertainties
- across; from side to the other
20 Clues: call to mind • royal; kingly • attempt; strive • marriage; wedding • obstacle; hindrance • security; certainty • union; relationship • harvest; cultivation • surrounded; encircled • make greater; increase • enclosing; restricting • general sense or meaning • unseeded or uncultivated • faithfulness; consistency • obscurities; uncertainties • severely disfigured; damaged • ...
Vocab Chapter Five 2014-03-20
Across
- broodje
- toegeven
- beschrijven
- gezondheid
- frisdrank
- aardrijkskunde
- economie
- lokaal
- per
- patat
- boete
- karnemelk
- smaakloos
- sinaasappel
- kaas
- pakje
- spijbelaar
- onderwijzen
- biologie
Down
- fles
- buitenwijk
- thee
- pap
- boterham
- behalve
- wiskunde
- salade
- kunst
- vegetarische
- tonijn
- veertiendagen
- chips
- kopje
- hek
- koekje
- verdienen
- duits
- beveiliging
- meestal
- geven/om
- nogal
41 Clues: pap • per • hek • fles • thee • kaas • kunst • chips • kopje • patat • boete • duits • pakje • nogal • salade • tonijn • lokaal • koekje • broodje • behalve • meestal • toegeven • boterham • wiskunde • economie • geven/om • biologie • frisdrank • karnemelk • verdienen • smaakloos • buitenwijk • gezondheid • spijbelaar • beschrijven • beveiliging • sinaasappel • onderwijzen • vegetarische • veertiendagen • aardrijkskunde
Vocabulario de Viajes 2014-10-26
30 Clues: late • gate • pilot • plane • cabin • aboard • ticket • flight • luggage • to land • customs • copilot • on time • fly over • to board • suitcase • passenger • sometimes • to get off • to have to • to take off • full flight • flight crew • area airline • luggage cart • boarding time • security guard • ticket counter • metal detector • escala to have a layover
Hotels 2014-12-15
Across
- duša
- vienvietīgs numurs
- svinības
- gulta
- apsardze
- nakts auditors
- spilveni
- modināšanas zvans
- ieņemt istabu
- divvietīgs
- istaba
- automašīnu novietotājs
- minī bārs
- ierodas
- atlaide
Down
- reģistrācija
- izsūtāmais zēns
- viesi
- istabene
- operātors
- pamatcena
- cilvēks kas pieņem pasūtijumus
- skats uz dārzu
- smēķētāju istaba
- toilet
- dienas auditors
- kāzas
- deju zāle
- durvju vīrs
- līgums
- pasākumi
- seifs
32 Clues: duša • viesi • gulta • kāzas • seifs • toilet • līgums • istaba • ierodas • atlaide • istabene • svinības • apsardze • spilveni • pasākumi • operātors • pamatcena • deju zāle • minī bārs • divvietīgs • durvju vīrs • reģistrācija • ieņemt istabu • skats uz dārzu • nakts auditors • izsūtāmais zēns • dienas auditors • smēķētāju istaba • modināšanas zvans • vienvietīgs numurs • automašīnu novietotājs • cilvēks kas pieņem pasūtijumus
values 2015-07-28
34 Clues: 1st • rich • safe • nice • calm • bond • equal • smart • truth • smart • group • agape • happy • belief • impact • health • 3 or 4 • unique • leader • pretty • honesty • treated • enjoying • yourself • Reliance • important • to can do • Well-being • Others god • looks wealthy • where you live • Development growing • people that you love • Accepted by Others having friends
Words often Confused 2022-04-07
Across
- accuracy and detail
- in a fixed position
- part of something
- at that time
- a conjunction used in comparisons
- simple
- revealed
- quiet order and security
- head of school
- gleamed / glowed
- progressive form of they
- beyond
- they are
Down
- still and peaceful
- writing paper
- a place
- rule of conduct
- flys in the sky
- wholly or entirely: to a great extent
- past tense of throw
20 Clues: simple • beyond • a place • revealed • they are • at that time • writing paper • head of school • rule of conduct • flys in the sky • part of something • still and peaceful • accuracy and detail • in a fixed position • past tense of throw • gleamed / glowed • quiet order and security • progressive form of they • a conjunction used in comparisons • wholly or entirely: to a great extent
Hurt Locker 2021-12-13
Across
- Metal Frag
- Bin Laden
- Weapon Systems
- Covers Movement
- Non-military
- Suit Material
- Setting
- Tour of Duty
- Clearance and Access
- Military Unit
- Standard Issue
- Standard Pattern
Down
- Slender Tower
- PTSD
- Shooting Location
- Position of Protection
- Security Service
- Fuse Removal
- 2003 Battle Locale
- Director
- Increases Visibility
- Dictator
- Batttleworn Skirmish
- Protagonist
- Surgically Implanted
- Storage of Loss
- Provides Cover Fire
27 Clues: PTSD • Setting • Director • Dictator • Bin Laden • Metal Frag • Protagonist • Fuse Removal • Non-military • Tour of Duty • Slender Tower • Suit Material • Military Unit • Weapon Systems • Standard Issue • Covers Movement • Storage of Loss • Security Service • Standard Pattern • Shooting Location • 2003 Battle Locale • Provides Cover Fire • Increases Visibility • Batttleworn Skirmish • Clearance and Access • ...
2.2 Crossword Puzzle. 2023-10-09
Across
- "www.example"
- 40 mbps limit
- set of installation rules
- design drawings
- application common look
- sending texts
- fire fox
- web browsers
- organized data
- high definition audio
- create graphic presentations
- citrix
Down
- word proccecors
- cd key
- installation contract
- prepare reports
- microsoft publisher
- security feature
- tree- structured data
- copyrighted software
- Transmits phone calls
- keyboard
- VLC player
- sender to receiver
- information organizer
25 Clues: cd key • citrix • keyboard • fire fox • VLC player • web browsers • "www.example" • 40 mbps limit • sending texts • organized data • word proccecors • prepare reports • design drawings • security feature • sender to receiver • microsoft publisher • copyrighted software • installation contract • tree- structured data • Transmits phone calls • high definition audio • information organizer • application common look • ...
Cybersecurity Terms 2024-03-07
Across
- Secure network connection
- Harmful software
- Unique human identifiers
- Wireless network connection
- Secure Socket Layer
- Software update fix
- Keystroke monitoring software
- Data recovery copy
Down
- Malicious data encryption
- Network of compromised devices
- Malicious software
- Denial of Service attack
- Engineering Manipulating users for access
- Malicious software disguised
- Intrusion Detection System
- Secure data encoding
- Deceptive email attacks
- Unsolicited email messages
- Unauthorized access seeker
- Network security barrier
20 Clues: Harmful software • Malicious software • Data recovery copy • Secure Socket Layer • Software update fix • Secure data encoding • Deceptive email attacks • Denial of Service attack • Unique human identifiers • Network security barrier • Malicious data encryption • Secure network connection • Intrusion Detection System • Unsolicited email messages • Unauthorized access seeker • ...
Detective Riddles 2025-01-19
Across
- - почивам си
- - забелязвам
- - изоставен
- - сигурност, охрана
- - за съжаление
- - достатъчно
- - отрова
- - самоубийство
- - поръчвам
- - непознат
- - хвърлям
- - връщам се
- - асансьор
- - стъкло
- - запалвам
- - разбивам
- - изведнъж
- - съдържам
Down
- - изненадан
- - обаче
- - убийство, убивам
- - по време на
- - чукам
- - квартал
- - извинявам се
- - продължавам
- - повтарям
- - сграда
- - подозрителен, съмнителен
- - докато
- - гледам към, с изглед към
- - бележка
- - набирам номер
33 Clues: - обаче • - чукам • - сграда • - отрова • - докато • - стъкло • - квартал • - хвърлям • - бележка • - повтарям • - поръчвам • - непознат • - асансьор • - запалвам • - разбивам • - изведнъж • - съдържам • - изненадан • - изоставен • - връщам се • - почивам си • - забелязвам • - достатъчно • - по време на • - продължавам • - извинявам се • - за съжаление • - самоубийство • - набирам номер • - убийство, убивам • - сигурност, охрана • ...
Gov Acronyms Josiah and Kalani 2024-10-24
Across
- Ewwwww Immigrants
- Houses for cities and stuff
- Department that has trains
- Department for Veterans
- DEFENSE
- Agency for Disaster Relief
- National Aeronautical and Space Agency
- Administration made for small businesses
- CIA
- Doctors and stuff
- Protect the Motherland
- Is that a bird or a plane?
Down
- United States Mail
- International Police
- FBI
- JUSTICE
- Airport Security Agency
- Freddie Mac
- Fannie Mae
- Administration for food
20 Clues: FBI • CIA • JUSTICE • DEFENSE • Fannie Mae • Freddie Mac • Ewwwww Immigrants • Doctors and stuff • United States Mail • International Police • Protect the Motherland • Department for Veterans • Airport Security Agency • Administration for food • Department that has trains • Agency for Disaster Relief • Is that a bird or a plane? • Houses for cities and stuff • National Aeronautical and Space Agency • ...
crossword 2024-10-21
Across
- ICT-related field of study
- Cloud computing platform
- ICT-related job role
- Internet protocol
- ICT professional
- Computer virus type
- ICT acronym for "Information and Communication Technology" ()
- Computer input device
- Website design principle
- Digital image format
Down
- Network security threat
- Cybersecurity measure
- Database management system
- Programming language
- Mobile operating system
- Network topology
- Data transmission speed
- Computer hardware component
- Software development method
- Data storage unit
20 Clues: ICT professional • Network topology • Internet protocol • Data storage unit • Computer virus type • ICT-related job role • Programming language • Digital image format • Cybersecurity measure • Computer input device • Network security threat • Mobile operating system • Data transmission speed • Cloud computing platform • Website design principle • ICT-related field of study • ...
A l'aeroport 2025-10-27
Across
- to thank the flight attendant
- an airline
- Customs
- To land
- the counter
- to find the gate
- to claim luggage
- the terminal
- to declare something
- a flight
- to fasten the seat belt
Down
- to go through Customs
- information
- to go through security
- To take off
- to go through passport control
- to check one’s bags
- to leave on time
- boarding pass
- to leave the plane
20 Clues: Customs • To land • a flight • an airline • information • To take off • the counter • the terminal • boarding pass • to leave on time • to find the gate • to claim luggage • to leave the plane • to check one’s bags • to declare something • to go through Customs • to go through security • to fasten the seat belt • to thank the flight attendant • to go through passport control
L'aéroport 2025-06-09
Across
- Security agent
- Conveyor belt or moving walkway
- Gate
- Waiting room
- Runway
- Shop
- Male passenger
- A pilot
- Seats
- Male flight attendant
- To fly
- Female passenger
- Cockpit
- Airport
Down
- Female flight attendant
- Plane ticket
- Information
- Registration/Check-in
- Passport
- Window
- Suitcases or baggage
- To go
- Food
- Drinks
- Airplane
- Baggage Carousel
- Escalator
- Suitcase
- To travel
- Sky
30 Clues: Sky • Gate • Food • Shop • To go • Seats • Window • Runway • Drinks • To fly • A pilot • Cockpit • Airport • Passport • Airplane • Suitcase • Escalator • To travel • Information • Plane ticket • Waiting room • Security agent • Male passenger • Baggage Carousel • Female passenger • Suitcases or baggage • Registration/Check-in • Male flight attendant • Female flight attendant • Conveyor belt or moving walkway
"How I Lost My Heart (and My Phone) in 10 Seconds or Less" 2024-09-11
Across
- What we’re all talking about here.
- The thing you keep too simple.
- Saving data to the cloud or external source.
Down
- How you should lock your phone if lost.
- Second layer of security.
- Four digits of doom if not randomized.
- All those files you’ll lose if your phone vanishes.
- The thing you forget to do to your device.
8 Clues: Second layer of security. • The thing you keep too simple. • What we’re all talking about here. • Four digits of doom if not randomized. • How you should lock your phone if lost. • The thing you forget to do to your device. • Saving data to the cloud or external source. • All those files you’ll lose if your phone vanishes.
President Biden, his Cabinet and Beyond 2023-01-31
Across
- people who previously served in the military
- Father of the Constitution
- Attorney General of the United States
- cabinet department that works with the Army, Navy, and Marines
- ______________ Becerra, the Sec. of Health and Human Services
- The 22nd Amendment deals with limiting the President to serving _____ terms.
- Secretary of Housing and Urban Development
- type of policy dealt with by the Department of Treasury
- Department of Housing and ___________ Development.
- The Department of Defense was originally named the _______ Department.
- college used to elect the President
- major concern of the Department of Agriculture
- Secretary of Veterans Affairs
- First Native American to hold the position of the Secretary of Interior.
- Department headed by Secretary Tom Vilsack
- state that receives a portion of its water from the Colorado River.
- Author of the Constitution
- Secretary of the Energy Department
Down
- ___________ or unusual punishment
- Inventor and member of the committee to write the Declaration of Independence
- President that started the Department of Homeland Security
- organizations of workers looking to protect themselves at the workplace
- a period of time when an area struggles with a low level of precipitation.
- Secretary of the Department of Homeland Security
- Secretary of State
- Secretary of the Treasury
- Gina of the Department of Commerce
- the process of an immigrant becoming a citizen
- congressional body that approves presidential appointments
- Department of __________ Security
- policy type worked with by the Sec. of State
- Main focus the Department of Education
- the group that advises the President.
- First African American to serve as the Secretary of Defense
- Pete of the Department of Transportation
- money required by the government from a person's income
- Secretary of Education
- _____________ II deals with the Executive Branch of the government.
- the river that is struggling to keep up with the demands put on it by the region's population
- Secretary of Labor
- form of air transportation
41 Clues: Secretary of State • Secretary of Labor • Secretary of Education • Secretary of the Treasury • Father of the Constitution • Author of the Constitution • form of air transportation • Secretary of Veterans Affairs • ___________ or unusual punishment • Department of __________ Security • Gina of the Department of Commerce • Secretary of the Energy Department • ...
Society & Aging 2015-11-16
Across
- people aged 85 and older
- legal responsibility for another person's welfare
- temporary care for dependent older people to allow the caregiver some time off
- residential facilities for older adults that provide limited supportive care and permit a high degree of independence
- as applied to Social Security, a fair return to beneficiaries depending on how much they contribute to the system
- an individual's written statement specifying or limiting his or her medical treatment in a situation without hope of recovery
- people aged 65 to 74
- the predicted length of life usually from some specific point in time such as birth
- a pension system, public or private, in which future retirement benefits owed are paid out of money saved up in advance
- prejudice or negative stereotypes about people based on chronological age
- rituals that mark major life events, thereby reinforcing shared norms about age grading
Down
- the excess of social security payroll taxes collected over the amount paid out, including excess funds accumulated from prior years
- a rise in the average age of the population; alternatively, an increase in the proportion of the population made up of people over age 65
- a maximum number of cell divisions that normal cells undergo as typically measured in a laboratory dish
- those people, usually women, who have obligations to care for children as well as older parents or in-laws
- a view holding that the more active people are, the more likely they are to be satisfied with life
- the medical specialty treating the diseases of old age
- the intellectual ability to solve novel tasks or problems
- a group of people born within a bounded period of years, such as the baby boom generation
- the federal government program that pays for acute health care for older people
20 Clues: people aged 65 to 74 • people aged 85 and older • legal responsibility for another person's welfare • the medical specialty treating the diseases of old age • the intellectual ability to solve novel tasks or problems • prejudice or negative stereotypes about people based on chronological age • ...
DOMESTIC & INTERNATIONAL AIRPORTS (LANDSIDE AND AIRSIDE) 2017-09-11
Across
- Located in the airside of airports, where it provides a calm and quiet place for travellers to contemplate.
- the side of an airport terminal beyond passport and customs control.
- Part of regulations for passengers to access airside facilities they must present along with a boarding pass.
- Airport hospitality ambassadors and are available through out the terminals to assist passengers.
- Wireless hotspots in the airport terminals that keeps passengers connected.
- Several airlines have these at airports globally for passengers travelling business or first class or have joined airline VIP clubs.
- the part of an airport farthest from the aircraft, the boundary of which is the security check, customs, passport control, etc.
- May at times require coins, phone-cards or credit cards to operate.
- YEN Dollars is and example of Japan's what?
- One of the important things that passengers may never leave unattended in public areas, especially in an airport.
Down
- A facility in an airport that sells everything from accessories to necessities and are located throughout an airport.
- They differ around the world in terms facilities that are available landslide and airside.
- A service established in !977 by the NZ Government that is responsible for aviation security.
- Can be the first point of contact of passengers with the airport.
- One of the most common items that are always required to be taken out of bags to be scanned on the x-ray security screening.
- This facility is only offered to departing and arriving international travellers.
- Another way of saying Food and Beverage outlets.
- Free baggage carriers that are available through out the terminals.
- A company located in the check-in area which enables travellers to have their luggage sealed in transparent polythene to protect it through out the journey.
- Its symbol on an airport map legend is that of a circle with a dollar sign centred in the middle.
20 Clues: YEN Dollars is and example of Japan's what? • Another way of saying Food and Beverage outlets. • Can be the first point of contact of passengers with the airport. • Free baggage carriers that are available through out the terminals. • May at times require coins, phone-cards or credit cards to operate. • ...
Juan Wilkins 12/9/2024 2024-12-10
Across
- What type of backup – backs up the disk sector by sector to create an exact image of the disk’s contents?
- what policy is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached?
- Most Linux distributions have a built-in firewall called?
- what might be blocked if a computer or server is not communicating with certain applications or services?
- What file must you edit to change password options in Fedora Linux?
- What tool is to delete unneeded files in Windows?
- what is the most widely used method for encrypting data?
- Temporary files (typically located in the \Temp and \Windows\Temp folders) accumulate and should be?
- What memory disk storage is used when there is not enough RAM for a particular operation or for all processes currently in use?
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern). WHAT AM I?
- What require periodic maintenance and updates to maintain security, reliability, and performance levels?
Down
- what prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets?
- what the user has (smart card or key). WHAT AM I?
- What type of backup backs up any files that have changed since the last full or incremental backup?
- What type of backup only backs up files that have changed since the last full backup?
- what the user knows (username/password).WHAT AM I?
- What has a built-in firewall that can be accessed through the Security & Privacy app in System Preferences?
- is a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity. WHAT AM I?
- what authentication uses keys, but the OS generates the keys?
- A common tool used by many Linux administrators is called?
20 Clues: what the user has (smart card or key). WHAT AM I? • What tool is to delete unneeded files in Windows? • what the user knows (username/password).WHAT AM I? • what is the most widely used method for encrypting data? • Most Linux distributions have a built-in firewall called? • A common tool used by many Linux administrators is called? • ...
Investing - Allison O 2025-03-25
Across
- initial public offering
- measures the price performance of a basket of securities
- Contribute money post tax. Money grows tax free.
- Worked for a certain amount of time with a company, to own 100% of the money your matched money
- type of security representing ownership in a company
- A market in which prices are falling and a pessimistic outlook overall.
- portion of a company's earnings distributed to shareholders as a return on their investment, usually in cash
- Federal Insurance Contributions Act
- Provides retirement, survivor, and disability benefits to millions of Americans
- A collection of stocks, bonds, or other assets that trades on a stock exchange
- Most often issued by companies to raise capital without giving away a percentage of their company.
- The profit realized from the sale of a capital asset like stocks or real estate.
Down
- Spreading investments across different assets to reduce risk exposure
- A sustained period of rising prices and optimistic sentiment in a financial market
- A sum of money saved or made available for a particular purpose.
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security.
- A way to value a company by comparing the price of a stock to its earnings
- The ease with which an asset or security can be converted into cash without affecting its market price.
- An individual who allocates capital into various financial assets.
- An individual who buys and sells with the intention of profiting from short-term price fluctuations.
- offered by unions or public sector employers
- An investor's ability and willingness to endure fluctuations in the value of their investments
- Investing all the money you have available at that given time, and putting it into the market
- A financial marketplace where investors can buy and sell shares of publicly traded companies.
- A unit of ownership in a company, dividing its ownership into equal parts
25 Clues: initial public offering • Federal Insurance Contributions Act • offered by unions or public sector employers • Contribute money post tax. Money grows tax free. • type of security representing ownership in a company • measures the price performance of a basket of securities • A sum of money saved or made available for a particular purpose. • ...
4.1 Explain the importance of basic network security concepts 2025-09-03
Across
- Regulation for protecting personal data in the EU
- Industrial devices connected to networks
- Weakness that could be exploited
- Physical method to secure rooms or racks
- Review to ensure policies and controls are followed
- Authentication that changes codes at regular intervals
- Digital proof of identity used in secure communication
- Single login grants access to multiple systems
- Standard for exchanging authentication data
- Device used for physical monitoring and security
- Technology used to control industrial equipment
- Standard for securing payment card information
- Refers to data moving across a network
- Process of verifying who a user is
- Centralized AAA protocol for network access
- Decoy system to attract attackers
- Potential danger to systems or data
- Security model of confidentiality, integrity, availability
- Group of honeypots working together
- Protects data by converting it into unreadable form
- Separate network for visitors with limited access
Down
- Assigning permissions based on a user’s job function
- Likelihood of a threat exploiting a vulnerability
- Restricts access based on physical location
- Code or method used to take advantage of a weakness
- Separating networks for security and performance
- Determines what resources a user is allowed to access
- Everyday smart devices connected to networks
- System for monitoring and controlling industrial processes
- Certificate created and trusted by its own issuer
- Industrial control system for automation and management
- Requirement that data stays within a certain region
- Principle of granting minimum necessary permissions
- Framework of CAs, certs, and keys for encryption
- Requires two or more factors for authentication
- System of policies and tools for identity management
- Directory protocol often used for authentication
- Cisco protocol for centralized authentication
- Refers to data stored on a device or disk
- Policy allowing employees to use personal devices
40 Clues: Weakness that could be exploited • Decoy system to attract attackers • Process of verifying who a user is • Potential danger to systems or data • Group of honeypots working together • Refers to data moving across a network • Industrial devices connected to networks • Physical method to secure rooms or racks • Refers to data stored on a device or disk • ...
Financing family 2022-06-09
14 Clues: ODC • G in ESG • product owner • cloud experts • new aquisition • famous striker • entrance to DCP • security champion • max number in TGIF • old name for bjørvika • indian mixed rice dish • New initative in Guide • norwegian favorite food • place between sumatra and bali
Civil law vocabulary 2022-05-01
14 Clues: offer • cancelled • infered from • contract to buy • one that offers • responsible for • a security deposit • hidden, undisclosed • paying off all debt • give formal consent • part of an agreement • contract modification • in accordance with a law • loss of possession of property
Form 8. Unit 16 2022-04-07
10 Clues: toll • fuajee • kohane • vahekäik • rabav;jahmatav • turvalisus;julgeolek • reisi sihtkoht;eesmärk • õpipoiss;väljaõppel olija • võõrastemaja;noortehotell • ilmarändur;omal käel reisija
HUMAN RIGHTS 2020-11-12
Across
- the right to be employed
- tranquillity/non war
- the right to state your opinion
- same rights/fairness
- existence
- protection/assurance
- social equality
Down
- to own
- liberty
- the right to relaxation
- freedom from intrusion
- variety of behaviour/opinion
- freedom to have your own ideas
- non-discrimination
- philosophy based on faith
- formal learning
- soundness of body/mind
17 Clues: to own • liberty • existence • formal learning • social equality • non-discrimination • tranquillity/non war • same rights/fairness • protection/assurance • freedom from intrusion • soundness of body/mind • the right to relaxation • the right to be employed • philosophy based on faith • variety of behaviour/opinion • freedom to have your own ideas • the right to state your opinion
Peanuts! 2021-11-05
Across
- imaginary fighter plane
- Lucy's family name
- Charlie Brown's lament
- Linus' security
- Snoopy's sib
- Snoopy's animal avatar
- Charlie Brown cooled down
- Peppermint Patty's character
- brother to Linus and Lucy
Down
- Lucy's crush
- Spike's digs
- Schroeder's musical crush
- Charlie Brown's BFF
- Charlie Brown's baseball job
- Patty's flavor
- Snoopy's imaginary night
- Charlie Brown's Halloween take
17 Clues: Lucy's crush • Spike's digs • Snoopy's sib • Patty's flavor • Linus' security • Lucy's family name • Charlie Brown's BFF • Charlie Brown's lament • Snoopy's animal avatar • imaginary fighter plane • Snoopy's imaginary night • Schroeder's musical crush • Charlie Brown cooled down • brother to Linus and Lucy • Charlie Brown's baseball job • Peppermint Patty's character • ...
WTLS 2021-05-05
Across
- Parameters SA and SP belong to __
- Peer requests ___ from originator.
- sec- ____ has exactly same function as that on the WDP layer.
- Parameters DA and DP belong to ___
- ___ provides security for privacy, data integrity and authentication.
- WTLS establishes connection between 2 ____ .
- Security association in WTLS exists between the mobile ___ enabled device.
Down
- sec- ____ primitive indicates that the handshake is completed for originator's side amd wants to switch into new side.
- WTLS is optimized for low ____ and high delay-bearer methods.
- Before data is exchanged via WTLS ____ has to be established.
- after setting up a secure connection between 2 peers, ___ can be exchanged.
- WTLS supports ______ .
- Sequence of service primitives are needed for a ___ handshake.
- WTLS takes into account the low processing power and very limited memory capacity of memory capacity of mobile devices for _____ algorithms.
14 Clues: WTLS supports ______ . • Parameters SA and SP belong to __ • Peer requests ___ from originator. • Parameters DA and DP belong to ___ • WTLS establishes connection between 2 ____ . • WTLS is optimized for low ____ and high delay-bearer methods. • Before data is exchanged via WTLS ____ has to be established. • sec- ____ has exactly same function as that on the WDP layer. • ...
The Bully-Busters 2021-11-17
Across
- We need to ___ all the people that are bullying in the world.
- This type of bullying is used by kicking, hitting, and fighting.
- An adult is "never gonna ___ you up"(rick astley) when you need help.
- The word is goodbye.
- Bullying mostly goes on at ____.
- We need to stop ____ now.
Down
- ____can stop bulling but we gust don't try hard enough.
- People stay at ___ because they are scared of getting bulled.
- This type of bullying is used by spreading rumours about some one.
- People have bin getting bulled for a ___ time.
- This type of bullying is used by saying something mean to some one and making them feel bad.
- This type of bullying is used with social media.
12 Clues: The word is goodbye. • We need to stop ____ now. • Bullying mostly goes on at ____. • People have bin getting bulled for a ___ time. • This type of bullying is used with social media. • ____can stop bulling but we gust don't try hard enough. • People stay at ___ because they are scared of getting bulled. • We need to ___ all the people that are bullying in the world. • ...
Religion Project 2022-12-18
Across
- your personal space.
- spiritually in action for family empowered.
- appreciating someone else’s space.
- someone older than you, who you know and trust.
- some parts of your body that you feel comfortable with that people can touch to a certain extent. Ex. your hand for a high five.
- being well put together.
Down
- Using the internet for the right reasons. To keep your information private.
- Using the internet to bring people down.
- Putting other people’s ideas and thoughts before yours.
- any part of your body you feel uncomfortable getting touched.
- Feeling in the wrong
- Using your words to tell someone that you don’t like what they’re doing.
12 Clues: your personal space. • Feeling in the wrong • being well put together. • appreciating someone else’s space. • Using the internet to bring people down. • spiritually in action for family empowered. • someone older than you, who you know and trust. • Putting other people’s ideas and thoughts before yours. • any part of your body you feel uncomfortable getting touched. • ...
travel confirmation 2022-09-26
Across
- plane is not running on time
- where and when you are leaving somewhere
- this is when you get your ticket and hand in your suitcase
- getting on the plane
- you need to be scanned and have your documents checked
- you can pay extra to go here, get a seat, get some food and drink, and space to relax
Down
- you will read or hear this when it is too late to board the plane
- a line of people waiting to be seen or board
- passport control
- where and when you will get somewhere
- a security check - 'anything to declare?'
11 Clues: passport control • getting on the plane • plane is not running on time • where and when you will get somewhere • where and when you are leaving somewhere • a security check - 'anything to declare?' • a line of people waiting to be seen or board • you need to be scanned and have your documents checked • this is when you get your ticket and hand in your suitcase • ...
Business credit essentials 2024-11-28
Across
- A fallback assurance in case of borrower’s failure to pay.
- A third-party commitment to pay in case of borrower default.
- A credit evaluation model used alongside the 5Cs.
- One of the 5Cs, showing financial commitment by the borrower.
- Assets pledged by borrowers as security for a loan.
Down
- Legal paperwork required for securing a loan.
- One of the 5Cs, assessing integrity and trustworthiness.
- The duration of the loan, linked to the risk of default.
- Contract defining terms and conditions of a loan.
- A principle ensuring lenders have equal claim on borrower assets.
10 Clues: Legal paperwork required for securing a loan. • A credit evaluation model used alongside the 5Cs. • Contract defining terms and conditions of a loan. • Assets pledged by borrowers as security for a loan. • One of the 5Cs, assessing integrity and trustworthiness. • The duration of the loan, linked to the risk of default. • ...
Cybersecurity Awareness 2025-10-15
Across
- Fraudulent attempt to obtain sensitive information via email.
- A type of malicious software that locks files and demands payment.
- When employees unknowingly help hackers, it's called an ___ threat.
- Regularly updating this can patch security vulnerabilities.
- Security appliance that limits access to data or systems.
Down
- A secret word or phrase used to gain access to a system.
- Portable devices like USBs can carry this kind of malicious code.
- A common workplace policy: "Don't write your password on a ___."
- Two-step process to verify identity.
- You should never connect to public ___ without using a VPN.
10 Clues: Two-step process to verify identity. • A secret word or phrase used to gain access to a system. • Security appliance that limits access to data or systems. • You should never connect to public ___ without using a VPN. • Regularly updating this can patch security vulnerabilities. • Fraudulent attempt to obtain sensitive information via email. • ...
Cybersecurity Techniques 2024-11-06
Across
- A protocol designed to provide privacy and security over the internet by encapsulating traffic
- The latest security protocol for Wi-Fi, enhancing protections against attacks.
- An advanced Linux technology used for monitoring and packet observability in real-time.
- A term related to busting common misconceptions in the open and secure cyberspace.
Down
- Data collected from devices or systems for monitoring and analysis, used in intelligent security
- Malicious software designed to infiltrate or damage computer systems.
- The practice of collecting, analyzing, and preserving digital evidence.
7 Clues: Malicious software designed to infiltrate or damage computer systems. • The practice of collecting, analyzing, and preserving digital evidence. • The latest security protocol for Wi-Fi, enhancing protections against attacks. • A term related to busting common misconceptions in the open and secure cyberspace. • ...
Federal Protection Agency 2023-02-15
5 Clues: Became president in 1901 • The leader of the Federal Security Agency • What decade did the federal Security Agency end • What decade did the Federal Security Agency founded • What economic event caused the Federal Security Agency to be made
Big Brother society 2022-02-23
Across
- English for "reconnaissance"
- illegal
- freedom from risk
- private life
- to stop from doing
- not trusting
- to keep under observation
- observation
- approval
- to be afraid of
- to observe
- danger or risk
Down
- upsetting
- society characterized by oppression
- conduct of a person
- dictatorial
- consciousness
- omnipresent, everywhere
- liberties
- omnipresent
- of the face
- worried
- bad dream
- to perpetrate
- to frighten
25 Clues: illegal • worried • approval • upsetting • liberties • bad dream • to observe • dictatorial • omnipresent • of the face • observation • to frighten • private life • not trusting • consciousness • to perpetrate • danger or risk • to be afraid of • freedom from risk • to stop from doing • conduct of a person • omnipresent, everywhere • to keep under observation • English for "reconnaissance" • ...
The Friday Challenge 2017-01-18
Across
- Attention deficit disorder
- Structure of wallet cards
- Translation service
- Additional information heading
- Name of our London Marathon runner
- CABG
- Fludrocortisone
- Anticoagulant
Down
- Security questions
- AF
- Three dots
- Medical information priority
- Disc Product option
- Athena delivery
- Percentage discount if can't pay SF
- Separation punctuation for disc entries
- Common form of arthritis
- We aim to, in ten working days
- MAFUS & Perry
- My love
- NHS Number
21 Clues: AF • CABG • My love • Three dots • NHS Number • MAFUS & Perry • Anticoagulant • Athena delivery • Fludrocortisone • Security questions • Translation service • Disc Product option • Common form of arthritis • Structure of wallet cards • Attention deficit disorder • Medical information priority • Additional information heading • We aim to, in ten working days • Name of our London Marathon runner • ...
NZST Domestic & International Airports 2018-06-21
Across
- The wall of a a/c
- Air Bridges
- Unaccompanied Minor
- Where a/c's park
- Pax
- A is Alpha
- Special Need
- A Airline
- Prayers/Praying
- Secure area for dept. international pax
- Ramp Operations Role
- For International Travelers
Down
- Doesn't show for flight
- MH is what Airline
- Pubic has free access
- Get on a plane
- Identification I.D
- has a bump
- Aviation Security Service
- Busiest Airport Country
20 Clues: Pax • A Airline • A is Alpha • has a bump • Air Bridges • Special Need • Get on a plane • Prayers/Praying • Where a/c's park • The wall of a a/c • MH is what Airline • Identification I.D • Unaccompanied Minor • Ramp Operations Role • Pubic has free access • Doesn't show for flight • Busiest Airport Country • Aviation Security Service • For International Travelers • Secure area for dept. international pax
Song Lyric Crossword 2019-04-05
Across
- what they compare love
- what they call you
- antonym protect
- the movie it comes from
- the song comes from a...
- synonym protection
- synonym insecurities
- somewhat like lonely
- stroll synonym
Down
- moving your body with a rhythm
- pumps blood
- pride
- showing sympathy
- the song is from...
- antonym of connect
- antonym preserve
- synonym problems
- what the song is about
- water drops
- low speed
20 Clues: pride • low speed • pumps blood • water drops • stroll synonym • antonym protect • showing sympathy • antonym preserve • synonym problems • what they call you • antonym of connect • synonym protection • the song is from... • synonym insecurities • somewhat like lonely • what they compare love • what the song is about • the movie it comes from • the song comes from a... • moving your body with a rhythm
Cybersecurity Crossword Puzzle 2024-03-14
Across
- Malicious software disguise
- Data unscrambling process
- Malicious software infection
- Identity verification process
- Access security code
- Malicious software programs
- Internal threat actors
- Data hostage software
- Website tracking data
- Deceptive online attacks
Down
- Online terrorism actors
- Activist hackers
- Data protection method
- Personal information protection
- Electronic waste disposal
- Online harassment
- Self-replicating malware program
- Wireless internet connection
- Persistent online harassment
- Unsolicited email messages
20 Clues: Activist hackers • Online harassment • Access security code • Data hostage software • Website tracking data • Data protection method • Internal threat actors • Online terrorism actors • Deceptive online attacks • Data unscrambling process • Electronic waste disposal • Unsolicited email messages • Malicious software disguise • Malicious software programs • Malicious software infection • ...
Muhammed Hoca Gazetesi'nin Ekidir/ Satılamaz 2024-10-16
Across
- Guess the future.
- Make a choice.
- Investigating for knowledge.
- Creates designs.
- Construct something.
- Gain knowledge.
- Moving air.
- Designs systems.
- Find a solution.
- Do a task or job.
- Ask for something strongly.
Down
- Make or manufacture.
- Organize and control.
- Find something new.
- Related to the sun.
- Performs surgeries.
- Assist or support.
- Repair something.
- Make something new.
- Improve or create.
- Security Protecting data.
21 Clues: Moving air. • Make a choice. • Gain knowledge. • Creates designs. • Designs systems. • Find a solution. • Guess the future. • Repair something. • Do a task or job. • Assist or support. • Improve or create. • Find something new. • Related to the sun. • Performs surgeries. • Make something new. • Make or manufacture. • Construct something. • Organize and control. • Security Protecting data. • ...
De viaje 2022-11-06
Across
- una maleta to pack a suitcase
- un viaje to go on a trip
- monumentos to see monuments
- leave
- key
- aisle
- de credito credit card
- employee
- de seguridad security
- un coche rent a car
- place
- y vuelta round-trip
- customs
Down
- dinero withdraw money
- restaurant
- en un hotel stay at a hotel
- airport
- passenger
- airline
- mountain
- el avión to go by plane
- flight
- island
- tour guide
- room
25 Clues: key • room • leave • aisle • place • flight • island • airport • airline • customs • mountain • employee • passenger • restaurant • tour guide • y vuelta round-trip • un coche rent a car • de credito credit card • de seguridad security • en un hotel stay at a hotel • el avión to go by plane • dinero withdraw money • una maleta to pack a suitcase • un viaje to go on a trip • ...
Colors 2022-05-18
Across
- power and elegance
- warmth and heat
- dependability and security
- force and passion
- Wisdom and brave
- nature and growth
- neutrality and balance
- optimism and happiness
- innocence and spirituality
- nobility and wealth
Down
- open spaces and freedom
- purity and silence
- strength and support
- ceremony and mystery
- energy and encouragement
- conservative and background color
- love and kindness
- strength and dominance
- achievement and triumph
- purity or innocence
20 Clues: warmth and heat • Wisdom and brave • force and passion • love and kindness • nature and growth • power and elegance • purity and silence • purity or innocence • nobility and wealth • strength and support • ceremony and mystery • strength and dominance • neutrality and balance • optimism and happiness • open spaces and freedom • achievement and triumph • energy and encouragement • ...
book day 2023-05-17
Across
- asas pendawaian
- engineering ethics fourth edition
- networking basics 2 edition
- sistem bekalan elektrik dan pengagihan
- instrumentasi
- design for hackers
- perak good food guide
- key concepts in information & communication technology
- design for software
- embedded system
- cybersecurity
Down
- website optimization
- compliance
- koleksi menu orang bujang
- computer network security
- wireless communication principles & practise
- intelectuals creativity & intolerance
- teknologi biotenaga
- writing for impact
- android phones for dummies
20 Clues: compliance • instrumentasi • cybersecurity • asas pendawaian • embedded system • design for hackers • writing for impact • teknologi biotenaga • design for software • website optimization • perak good food guide • koleksi menu orang bujang • computer network security • android phones for dummies • networking basics 2 edition • engineering ethics fourth edition • ...
FIND THE WORDS 2023-05-17
Across
- Asas Pendawaian
- Engineering Ethics Fourth Edition
- Networking Basics 2 Edition
- Sistem Bekalan Elektrik&Pengagihan
- Instrumentasi
- Design for Hackers
- Perak Good Food Guide
- Key Concepts in Information&Communication Technology
- Design for Software
- Embedded System
- Cybersecurity
Down
- Website Optimization
- Compliance
- Koleksi Menu Orang Bujang
- Computer Network Security
- Wireless Communication Principles&Practise
- Intelectuals Creativity&Intolerance
- Teknologi Biotenaga
- Writing for Impact
- Android Phones for Dummies
20 Clues: Compliance • Instrumentasi • Cybersecurity • Asas Pendawaian • Embedded System • Design for Hackers • Writing for Impact • Teknologi Biotenaga • Design for Software • Website Optimization • Perak Good Food Guide • Koleksi Menu Orang Bujang • Computer Network Security • Android Phones for Dummies • Networking Basics 2 Edition • Engineering Ethics Fourth Edition • ...
vocabulario 2024-11-04
Across
- get in line
- take a trip
- flight attendant
- go on vacation
- tourist office
- go through customs
- take a taxi
- board
- airport
- bathing suit
- gate
- monitor
- passport
Down
- train station
- passenger
- ticket
- departure
- luggage
- arrival
- confirm a flight
- flight
- itinerary
- boarding pass
- bus stop
- go through security
- check luggage
- travel agent
- suitcase
- travel
29 Clues: gate • board • ticket • flight • travel • luggage • arrival • airport • monitor • bus stop • suitcase • passport • passenger • departure • itinerary • get in line • take a trip • take a taxi • travel agent • bathing suit • train station • boarding pass • check luggage • go on vacation • tourist office • confirm a flight • flight attendant • go through customs • go through security
08 en el aereopuerto 2024-12-18
Across
- – gate
- – To travel
- – check-in
- – Airport
- – Vacation / Holidays
- – Ticket
- – Adventure
- – Taxi
- – Reservation
- – Flight attendant
- – Train
- – Trip
- – in-flight
- – To board
- – To take off
- – Airplane
- – Pilot
Down
- – Airline
- – Suitcase
- – To wait
- – Customer service
- – Security
- – Departure
- – Entertainment
- – Rest / Relaxation
- – Sala VIP
- – Destination
- Dutyfree
- – To land
- – Waiting room
30 Clues: – gate • – Taxi • – Trip • – Train • – Pilot • – Ticket • Dutyfree • – Airline • – To wait • – Airport • – To land • – Suitcase • – check-in • – Security • – Sala VIP • – To board • – Airplane • – To travel • – Departure • – Adventure • – in-flight • – Destination • – Reservation • – To take off • – Waiting room • – Entertainment • – Customer service • – Flight attendant • – Rest / Relaxation • – Vacation / Holidays
SECURITY AWARENESS 2022-06-30
Across
- Bite-sized ..., some shorter than 1 min.
- course completion is ... for all staff.
- In which month is the deadline to complete the Security Awareness training?
- How often is the Security awareness training updated?
Down
- Multi-language support with ... via any device at any time.
- How to access the Security Awareness training?
6 Clues: course completion is ... for all staff. • Bite-sized ..., some shorter than 1 min. • How to access the Security Awareness training? • How often is the Security awareness training updated? • Multi-language support with ... via any device at any time. • In which month is the deadline to complete the Security Awareness training?
No No Bully! 2013-06-30
Across
- avoid or keep something from happening
- something brilliant, bright, or something special in a person
- type of bullying that involves making someone feel ashamed or afraid
Down
- type of bullying that involves harmful words or images put on an electronic device
- type of bullying that involves hurting a person's body or possessions
- Make fun of or attempt to provoke a person
- spread a rumor or talk about another person
7 Clues: avoid or keep something from happening • Make fun of or attempt to provoke a person • spread a rumor or talk about another person • something brilliant, bright, or something special in a person • type of bullying that involves making someone feel ashamed or afraid • type of bullying that involves hurting a person's body or possessions • ...
Types of bullying 2022-10-24
Across
- pressure when someone feels under pressure from others
- bullying hurting someone online through technology
- bullying is making someone feel hurt physically
- of suicide when someone doesn’t act like themselves like skipping practices or saying bad things
Down
- bullying making someone feel down about themselves due to hurtful words
- harassment touching someone in a way that makes them feel uncomfortable
- making when someone Makes their own decisions
7 Clues: making when someone Makes their own decisions • bullying is making someone feel hurt physically • bullying hurting someone online through technology • pressure when someone feels under pressure from others • bullying making someone feel down about themselves due to hurtful words • harassment touching someone in a way that makes them feel uncomfortable • ...
Safer Internet 2019-05-10
Across
- Was verstehtunter versuche über gefälschte Webseiten, E-Mails an persönliche Daten eines Internet-Benutzers zu gelangen und damit Identitätsdiebstahl zu begehen.
- Um welches Thema geht es
Down
- Wie kann man sich am besten vor mobbing schützen
- Wo wird Cyber Mobbing verübt
- Wie schütze ich meine Bilder vor fremden
- Wo kann liket man Bilder und kann welche von sich posten
- Wo kann man mit seinen Freunden chatten
7 Clues: Um welches Thema geht es • Wo wird Cyber Mobbing verübt • Wo kann man mit seinen Freunden chatten • Wie schütze ich meine Bilder vor fremden • Wie kann man sich am besten vor mobbing schützen • Wo kann liket man Bilder und kann welche von sich posten • ...
Digital Citizens 2025-06-04
Across
- always ask for ... to post a photo online
- When using the internet, you are known as a digital ...
- Who do you tell when someone online makes you feel scared
Down
- You have the right to feel ... when you're online
- When you post something online it becomes part of your digital ...
- You should keep your passwords ...
- When someone is mean to others online they are a cyber ...
7 Clues: You should keep your passwords ... • always ask for ... to post a photo online • You have the right to feel ... when you're online • When using the internet, you are known as a digital ... • Who do you tell when someone online makes you feel scared • When someone is mean to others online they are a cyber ... • ...
Chapter 2 Investments 2022-11-21
Across
- piece of ownership in a company or mutual fund
- an analysis of the company stock, its price, price movement
- bank account that allows the account owner to make deposits, write checks, and withdraw money
- document guaranteeing payment of a specific amount of money
- putting money aside so its available when you need it
- people who lend money to the business in return for a contracted rate of interest
- largest category of deposit instiution
- ownership stake, residual cash flow
- an analysis of the company itself, its operations
- securities that represent part ownership or equity in a corporation
- investing can help you beat this
- security that matures in a year
- for sophisticated investors who borrow money to purchase securities
- people who do the work
- allow customers to pay for purchases and withdraw cash
- taking measures to make money grow
Down
- you want to buy or sell stock when it reaches a certain amount
- you order to buy or sell an order at a certain price
- document guaranteeing that a buyer will pay the seller the agreed-upon amount
- mechanism a nation uses to provide and manage money for itself
- any organization that provides services related to money
- nations central bank
- money for real estate, equipment, and so on
- nonprofit financial institution that is privately owned
- written order for the bank to pay a certain amount to a person or organization
- prearranged amount of credit that is available for a business to use
- people who buy shares of stock in the company
- you want to buy or sell a certain number of shares
- where a government agency owns you money
- need to pay for security purchases within 3 business days
- anything of value that is accepted in return for goods or services
- security that pays interest over terms
32 Clues: nations central bank • people who do the work • security that matures in a year • investing can help you beat this • taking measures to make money grow • ownership stake, residual cash flow • largest category of deposit instiution • security that pays interest over terms • where a government agency owns you money • money for real estate, equipment, and so on • ...
Cybersecurity 2022-11-22
Across
- A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
- A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
- A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
- An executable program that is advertised as performing one activity but which actually performs a malicious activity.
- An attacker who controls a botnet.
- Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
- Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- Software that helps prevent computers from becoming infected by different types of spyware.
- Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
- A logical computer network of zombies under the control of an attacker.
- An infected computer that is under the remote control of an attacker.
- A publicly released software security update intended to repair a vulnerability.
Down
- Software code that gives access to a program or a service that circumvents normal security protections.
- Malware that prevents a user's device from properly operating until a fee is paid.
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
- Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
- Hardware or software designed to limit the spread of malware.
- Computer code that lies dormant until it is triggered by a specific logical event.
- A general term used to describe software that spies on users by gathering information without consent.
- Software that is a cumulative package of all patches and feature updates.
20 Clues: An attacker who controls a botnet. • Hardware or software designed to limit the spread of malware. • An infected computer that is under the remote control of an attacker. • A logical computer network of zombies under the control of an attacker. • Software that is a cumulative package of all patches and feature updates. • ...
Economies Crossword 2022-10-04
Across
- retirement savings plans that serve employees of public schools and tax-exempt organizations
- an interest-bearing deposit account held at a bank or other financial institution.
- a consistent means of measuring the value of things
- a savings account that holds a fixed amount of money for a fixed period of time, such as six months, one year, or five years, and in exchange, the issuing bank pays interest.
- a state-sponsored investment plan that enables you to save money for a beneficiary and pay for education expenses.
- a financial institution that is licensed to accept checking and savings deposits and make loans
- an intermediary instrument or system used to facilitate the sale, purchase, or trade of goods between parties.
- a type of tax-advantaged
- a savings product that earns interest on a lump sum for a fixed period of time.
Down
- a retirement savings and investing plan that employers offer.
- A store of value is an asset, commodity, or currency that maintains its value without depreciating.
- a debt security, similar to an IOU.
- grant loans where borrowers can use their vehicle title as. collateral or as security for repayment.
- a financial vehicle that pools assets from shareholders to invest in securities like stocks, bonds, money market instruments, and other assets.
- a number from 300 to 850 that rates a consumer’s creditworthniess
- a security that represents the ownership of a fraction of the issuing corporation.
- a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
- Every purchase you made over time.
- is a detailed breakdown of your credit history prepared by a credit bureau.
- is a risk management strategy that mixes a wide variety of investments within a portfolio.
- a company that lends customers small amounts of money at high interest rates, on the agreement that the loan will be repaid when the borrower receives their next paycheck.
- type of financial cooperative that provides traditional banking services.
22 Clues: a type of tax-advantaged • Every purchase you made over time. • a debt security, similar to an IOU. • a consistent means of measuring the value of things • a retirement savings and investing plan that employers offer. • a number from 300 to 850 that rates a consumer’s creditworthniess • type of financial cooperative that provides traditional banking services. • ...
Investing - Allison O 2025-03-25
Across
- A market in which prices are falling and a pessimistic outlook overall.
- Provides retirement, survivor, and disability benefits to millions of Americans
- type of security representing ownership in a company
- measures the price performance of a basket of securities
- A sustained period of rising prices and optimistic sentiment in a financial market
- A unit of ownership in a company, dividing its ownership into equal parts
- Spreading investments across different assets to reduce risk exposure
- An individual who allocates capital into various financial assets.
- Federal Insurance Contributions Act
- offered by unions or public sector employers
- A way to value a company by comparing the price of a stock to its earnings
- A sum of money saved or made available for a particular purpose.
Down
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security.
- An investor's ability and willingness to endure fluctuations in the value of their investments
- Investing all the money you have available at that given time, and putting it into the market
- Worked for a certain amount of time with a company, to own 100% of the money your matched money
- bond Most often issued by companies to raise capital without giving away a percentage of their company.
- The ease with which an asset or security can be converted into cash without affecting its market price.
- The profit realized from the sale of a capital asset like stocks or real estate.
- A financial marketplace where investors can buy and sell shares of publicly traded companies.
- Contribute money post tax. Money grows tax free.
- portion of a company's earnings distributed to shareholders as a return on their investment, usually in cash
- An individual who buys and sells with the intention of profiting from short-term price fluctuations.
- initial public offering
24 Clues: initial public offering • Federal Insurance Contributions Act • offered by unions or public sector employers • Contribute money post tax. Money grows tax free. • type of security representing ownership in a company • measures the price performance of a basket of securities • A sum of money saved or made available for a particular purpose. • ...
Investing-Luke Brennan 2025-03-24
Across
- optimistic
- the distribution of some of a company's earnings to a class of its shareholders
- You pay in, employer pays in, sometimes the State pays in.
- don't give you ownership rights. They represent a loan from the buyer (you) to the issuer
- Post tax
- process of offering shares of a private corporation to the public in a new stock issuance.
- Government Medical Health Plan
- Which president created social security
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities.
- a strategy in which you invest your money in equal amounts, at regular intervals
- The total value of a company's stock.
- The increase in the value of an asset, usually recognized when it is sold for a higher amount.
Down
- the availability of cash or the ease with which an asset can be converted to cash.
- measures the price performance of a basket of securities
- A sum of money saved or made available for a particular purpose.
- providing retirement, survivor, and disability benefits to millions of Americans.
- If you leave your company, you can rollover your 401k funds to your new company’s 401k plan
- Pre Tax
- Social Security & Medicare together is called
- A collection of stocks, bonds, or other assets that trades on a stock exchange
- A place where people buy and sell pieces of companies, called shares, to make money
- Pessimistic
- worked for a certain amount of time with a company, to own 100% of the money your company matched in your 401k.
- A security that represents the ownership of a fraction of a corporation.
- When you turn 73, you must take the Minimum out of the account annually
- Investing all the money you have available at that given time, and putting it into the market
26 Clues: Pre Tax • Post tax • optimistic • Pessimistic • Government Medical Health Plan • The total value of a company's stock. • Which president created social security • Social Security & Medicare together is called • measures the price performance of a basket of securities • You pay in, employer pays in, sometimes the State pays in. • ...
Darsy Lanza- Grade 6- ity or -y 2021-03-15
14 Clues: wet • humans • damage • forever • a chance • only one • growing up • the most of • popularidad • smooth, o slimy • where you come from • the tallent to do something • careful management of avaible resources • the state of being free from danger or threat
De viaje en el aeropuerto 2022-04-10
Across
- gate
- welcome
- traveler
- revisaron mi equipaje en___________.
- destination
- flight
- layover
- passenger
- subir a una avión
- delayed
- passage
Down
- security check
- goodbye;farewell
- plan de los lugares de interés para un viaje
- arrival
- persona que trabaja en una avión
- documento oficial que necesitas para viajar to travel
- las cosas que llevas contigo en un viaje
18 Clues: gate • flight • arrival • welcome • layover • delayed • passage • traveler • passenger • destination • security check • goodbye;farewell • subir a una avión • persona que trabaja en una avión • revisaron mi equipaje en___________. • las cosas que llevas contigo en un viaje • plan de los lugares de interés para un viaje • documento oficial que necesitas para viajar to travel
