cybersecurity Crossword Puzzles
August Crossword Puzzle 2024-08-18
Across
- Hero of a movie-turned-musical playing at the Kennedy Center
- Spielberg blockbuster approaching its 50th anniversary
- environmental certification for buildings
- site of the 2024 Olympics
- ___ Sullivan, 14-year-old signed with the Major Soccer League
- new Academic Dean
- ____ Richard, transgender tennis player
Down
- recently infamous cybersecurity company
- students may go to France, for instance (acronym)
- Chamber Chorus trip location
- controversial location for Olympic open-course swimming
- Charlie xcx album associated with the Harris campaign
- new Democratic presidential candidate
13 Clues: new Academic Dean • site of the 2024 Olympics • Chamber Chorus trip location • new Democratic presidential candidate • recently infamous cybersecurity company • ____ Richard, transgender tennis player • environmental certification for buildings • students may go to France, for instance (acronym) • Charlie xcx album associated with the Harris campaign • ...
Elicia's Birthday Crossword 2023-05-04
Across
- the college Elicia is going to
- how many siblings does Elicia have
- career path Elicia wants to enter
- the month Elicia was born
- a birthday dessert
- an instrument Elicia plays
- author of Elicia's favourite books
Down
- how old is elicia turning
- the colour of Elicia's room
- the day of the week Elicia on which was born
- how does elicia take her coffee
- the genre of music Elicia listens to most
12 Clues: a birthday dessert • how old is elicia turning • the month Elicia was born • an instrument Elicia plays • the colour of Elicia's room • the college Elicia is going to • how does elicia take her coffee • career path Elicia wants to enter • how many siblings does Elicia have • author of Elicia's favourite books • the genre of music Elicia listens to most • ...
Banking and SCM 2025-05-16
Across
- Loan charge or bank account earnings
- the person or business that provides goods
- Charges for services or tuition payments
- end user of a product
- the business that sells goods in small quantity
- integrating technology into financial services
- the total amount of goods in stock
Down
- Corporate Purchasing
- online Protection against hackers
- Managing and planning the flow of goods
- put money in business
- Handy, suitable and easy to use
12 Clues: Corporate Purchasing • end user of a product • put money in business • Handy, suitable and easy to use • online Protection against hackers • the total amount of goods in stock • Loan charge or bank account earnings • Managing and planning the flow of goods • Charges for services or tuition payments • the person or business that provides goods • ...
Project Three Part Two 2021-10-15
Across
- Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
- a kind of bullying or harassment that takes place via the internet.
- The skill of writing and solving codes, or the study of codes.
- a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
- cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
- a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
- Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
- the technique of defending vital systems and sensitive data against cyber-attacks.
- any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
- A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.
10 Clues: The skill of writing and solving codes, or the study of codes. • a kind of bullying or harassment that takes place via the internet. • the technique of defending vital systems and sensitive data against cyber-attacks. • A person in an existing photograph or video is replaced with someone else's likeness in synthetic media. • ...
Cybersecurity - LMC Style 2022-10-11
Across
- Malicious software
- ___ Engineering. Hackers us this skill to trick people into revealing private information .
- Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
- A technology used when working remote that secures information going to/from LMC’s servers.
- Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
- A group of computers, printers and devices that are interconnected.
Down
- A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A process of encoding messages to keep them secret, so only “authorized” parties can read it.
- Who do you call for help?
- A sequence of words (spaces and punctuation too) used for authentication.
- Piece of code that replicates itself in order to spread the infection to other connected computers.
13 Clues: Malicious software • Who do you call for help? • A group of computers, printers and devices that are interconnected. • A sequence of words (spaces and punctuation too) used for authentication. • ___ Engineering. Hackers us this skill to trick people into revealing private information . • ...
Cybersecurity (year 09) 2022-12-12
Across
- an attack involving an email designed to look official
- people who are paid to legally hack into computer systems
- malware that collects info about the user and sends it back to criminals
- Manipulating people to get their personal information
- attacker watches their victim to get sensitive information
- malware that hides in legitimate software
Down
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- attack where the criminal tries to maintain a conversation with the victim
- kind of access Computer Misuse Act protects from
- Law that looks after your data
- type of malware that encrypts your data until you pay
- checks incoming and outgoing network traffic
- attack done by flooding a website with lots of requests
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
CyberSecurity Month Crossword 2024-10-10
Across
- You should install this on your computer to detect and remove malicious software
- The process of proving your identity with a username and password
- Software that is designed to disrupt, damage, or gain unauthorized access to your computer
- ___________ backup - A way to protect important files by saving copies offsite or in the cloud
- A set of rules created to ensure security, such as not reusing passwords
Down
- Emails pretending to be from legitimate sources to steal personal info
- This type of "attack" involves tricking people into giving away personal information
- "Public ________ should not be used for sensitive tasks like banking."
- A software designed to protect against malicious software
- A security measure that sends a code to your phone to verify your login
- “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
- What you should never share with others, even if they seem trustworthy
- A strong, unique _______ should be used for each account
- An attack where hackers encrypt your data and demand money to unlock it
- "_____ your devices regularly" - Important action to prevent unauthorized access
15 Clues: A strong, unique _______ should be used for each account • A software designed to protect against malicious software • The process of proving your identity with a username and password • Emails pretending to be from legitimate sources to steal personal info • "Public ________ should not be used for sensitive tasks like banking." • ...
Emily Cybersecurity crossword 2026-04-02
Across
- Proving it’s really you
- emails: A fake email that looks real to steal your info
- A private network that hides your location online
- A system that protects your network from outsiders
- Locking files and asking for money to unlock them
- Keeping information safe and private
- A person who breaks into systems illegally
Down
- Scrambling data so others can’t read it
- A harmful program that spreads between computers
- Software that finds and removes viruses
- A secret word you use to log in
- A bad program that harms your computer
- Software that secretly watches what you do on your device
13 Clues: Proving it’s really you • A secret word you use to log in • Keeping information safe and private • A bad program that harms your computer • Scrambling data so others can’t read it • Software that finds and removes viruses • A person who breaks into systems illegally • A harmful program that spreads between computers • A private network that hides your location online • ...
Testdf puzzlesd 2022-08-15
Across
- A string of words used to gain access to system or service which is easier to remember than a random combination of symbols and letters
- Use this feature in Outlook to report all suspicious email at work
- The act of having the content or recipient address(es) of a previously legitimate delivered email (with an attachment or link) replaced with a malicious version
- Cyberattacks can be targeted at anyone in the organisation. Who is responsible for Cybersecurity in your organisation?
- The Cybersecurity Awareness month occurs in <month>
Down
- A technique to manipulate a person to gain unauthorised access to a system or network and steal sensitive data or disperse malware
- Use this to make your passphrase harder to crack
- Authentication method identifying individuals based on their physical features
- You received an email with a suspicious link, attachment or with misspelling. What could this email be attempting to do?
- A malicious software that can infect your computer resulting in data theft and intrusion of your organisation
10 Clues: Use this to make your passphrase harder to crack • The Cybersecurity Awareness month occurs in <month> • Use this feature in Outlook to report all suspicious email at work • Authentication method identifying individuals based on their physical features • ...
IT Vocabulary 2022-05-04
Across
- a type of social engineering attack often used to steal user data including login credentials and credit card numbers
- device that uses integrated circuit assemblies to store data persistently, typically using flash memory
- responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
- use a computer to gain unauthorized access to data in a system
- a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
- one kind of technology that stores the operating system, applications, and data files
- also referred to as junk email
- a set of computers sharing resources located together.
- attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
- a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.
10 Clues: also referred to as junk email • a set of computers sharing resources located together. • use a computer to gain unauthorized access to data in a system • one kind of technology that stores the operating system, applications, and data files • device that uses integrated circuit assemblies to store data persistently, typically using flash memory • ...
Super Secret Security Crossword Puzzle 2024-05-31
Across
- itelligence exhibited by machines, particularly computer systems.
- one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- "gift" or "present" in Arabic.
- a team of experts that proactively monitor and respond to cybersecurity incidents.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- a technique through which a cybercriminal disguises themselves as a known or trusted source.
10 Clues: "gift" or "present" in Arabic. • itelligence exhibited by machines, particularly computer systems. • a team of experts that proactively monitor and respond to cybersecurity incidents. • a technique through which a cybercriminal disguises themselves as a known or trusted source. • ...
Malachi 2024-12-02
9 Clues: My max squat • What I value • My backup plan • The sport I play • A qoute I live by • What I´m interested in • what i value in a friend • What i do on my free time • what i´d like to major and study for the rest of my life
Computer science 2025-11-06
Across
- machine that can learn and think
- programs that make computer useful
- the language programmers use
- informations and analysed
- protecting data from online threats
- the process of creating and improving software
Down
- a machine that process data and performs tasks
- step-by-step problem solving
- the tools and systems built using science
9 Clues: informations and analysed • the language programmers use • step-by-step problem solving • machine that can learn and think • programs that make computer useful • protecting data from online threats • the tools and systems built using science • a machine that process data and performs tasks • the process of creating and improving software
Cybersecurity (year 09) 2022-12-12
Across
- people who are paid to legally hack into computer systems
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- Manipulating people to get their personal information
- malware that collects info about the user and sends it back to criminals
Down
- type of malware that encrypts your data until you pay
- attack done by flooding a website with lots of requests
- attack where the criminal tries to maintain a conversation with the victim
- Law that looks after your data
- kind of access Computer Misuse Act protects from
- attacker watches their victim to get sensitive information
- an attack involving an email designed to look official
- malware that hides in legitimate software
- checks incoming and outgoing network traffic
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
LETERASI KINANSIAL 2025-11-13
Across
- technologi finansial
- interaksi digital untuk menjaga data pribadi
- uang yang disisihkan untuk masa depan
- perdagangan yang memanfaatkan teknologi informasi dan komunikasi di abad ke-21
- mengelola uang dan mengambil keputusan keuangan yang bijak
- penanaman keuntungan di masa depan
- lembaga yanga mengelola pasar modal
- alat tukar yang sah
- lembaga keuangan bukan bank
Down
- dokumen sebagai bukti simpanan di bank
- internasi sosial
- kemudahan mendapat berita dimana saja kapan saja
- sikap yang perlu di hindari dalam mengelola uang
- daftar pengeluaran dan pemasukan dan pemasukan keuangan
- tantangan dalam transaksi digital
- pembayaran non-tunai menggunakan app di ponsel
- tempat jual beli daring
- berinteraksi menggunakan tenologi digital
- pembayaran memindai kode untuk transaksi
- lembaga keuangan yang menerima simpanan
20 Clues: internasi sosial • alat tukar yang sah • technologi finansial • tempat jual beli daring • lembaga keuangan bukan bank • tantangan dalam transaksi digital • penanaman keuntungan di masa depan • lembaga yanga mengelola pasar modal • uang yang disisihkan untuk masa depan • dokumen sebagai bukti simpanan di bank • lembaga keuangan yang menerima simpanan • ...
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
example 2023-07-06
Across
- A “tunnel” for private network browsing:
- The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- What malware propagates without a host program?
- A _____ review is done quarterly to review privileged access.
- What is the most common attack vector for malware?
- TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- A targeted form of phishing that is customized for specific individuals within a specific organization.
- What does GCSAM stand for?
- Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- Who founded TIAA?
- Malware that limits users access until a ransom is paid.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- Who is the security awareness program’s mascot?
- What is TIAA’s social impact hashtag?
- Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- When somebody sends an e-mail with a link to a bogus website it is called:
- In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- The probability of exposure or loss of assets is considered?
19 Clues: Who founded TIAA? • What does GCSAM stand for? • What is TIAA’s social impact hashtag? • A “tunnel” for private network browsing: • Who is the security awareness program’s mascot? • What malware propagates without a host program? • What is the most common attack vector for malware? • Malware that limits users access until a ransom is paid. • ...
Cyber Security Awareness 2023-03-04
Across
- Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
- A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
- The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
- Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
- The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
- Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
- A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
- Strategies for creating strong, unique passwords and protecting them from unauthorized access.
- Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
- Best practices for keeping digital devices and online accounts clean and secure.
- Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.
12 Clues: Best practices for keeping digital devices and online accounts clean and secure. • Strategies for creating strong, unique passwords and protecting them from unauthorized access. • Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans. • ...
CRACCon2024 2023-12-25
7 Clues: Stolen data • You like to play • Pay to get your data • The popular buzzword • Get paid for hunting bugs • What do you want to learn? • poses as a legitimate sender
technology 2025-05-14
Across
- Fifth-generation mobile network technology
- Distributed ledger technology for cryptocurrencies
- Electric car company founded by Elon Musk
- Internet-based computing service model
- Network of interconnected smart devices
Down
- World’s largest search engine
- Technology protecting networks from attacks
- Computer system mimicking human intelligence
8 Clues: World’s largest search engine • Internet-based computing service model • Network of interconnected smart devices • Electric car company founded by Elon Musk • Fifth-generation mobile network technology • Technology protecting networks from attacks • Computer system mimicking human intelligence • Distributed ledger technology for cryptocurrencies
KM Week 10 2021-10-11
Across
- Smart Nation through Digital _________
- An intellectual property
- ________ citizen through e-participation
- Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
- in the eco-system of Digital Economy.
- A KMS
- A communication tool
Down
- The Government, _____ and Society are closely
- an advantage to move towards digital economy
- One of the KM processes
- structural resource
- An impact/ area of concern for digital society
- We need an update of this to move to a digital future
- Infrastructural resources
- He conceived the concept of KM
15 Clues: A KMS • structural resource • A communication tool • One of the KM processes • An intellectual property • Infrastructural resources • He conceived the concept of KM • in the eco-system of Digital Economy. • Smart Nation through Digital _________ • ________ citizen through e-participation • an advantage to move towards digital economy • The Government, _____ and Society are closely • ...
GEN-Z TRENDS 2025-03-27
Across
- A field combining AI and Engineering
- GenZ slang for stylish outfits
- A famous anime known for its huge number of episodes
- The tech behind chatGPT
- A viral Gen Z meme
- A growing field focused on protecting data and network
Down
- Next level gaming and training
- Usually done in netflix on long series's
- Act of cutting off communication without warning
- Slang for Delusional
- Action packed franchise ni Keanu Reeves
- On top of Gen Z's screen time
- a fusion of biology and technology
- A cruicial skill for GenZ learners
- DCU Counterpart of Iron Man
15 Clues: A viral Gen Z meme • Slang for Delusional • The tech behind chatGPT • DCU Counterpart of Iron Man • On top of Gen Z's screen time • Next level gaming and training • GenZ slang for stylish outfits • a fusion of biology and technology • A cruicial skill for GenZ learners • A field combining AI and Engineering • Action packed franchise ni Keanu Reeves • ...
Solve Our Story 2025-09-28
Across
- How did Amy and David meet?
- Amy’s favorite band?
- What branch of the military was David in?
- Where did Amy go for her bachelorette party?
- What TV show is produced by the bride?
- Bride’s hometown?
- What does Amy’s family call her?
Down
- Where they said “I love you” for the first time?
- Where did Amy go to college?
- Groom’s hometown?
- The hotel bar where Amy and David had their first date?
- What does David have his masters in?
- What does David’s family call him?
- What is David’s favorite sport?
- Where did David go for his bachelor party?
15 Clues: Groom’s hometown? • Bride’s hometown? • Amy’s favorite band? • How did Amy and David meet? • Where did Amy go to college? • What is David’s favorite sport? • What does Amy’s family call her? • What does David’s family call him? • What does David have his masters in? • What TV show is produced by the bride? • What branch of the military was David in? • ...
Cybersecurity Crossword Puzzle 2024-02-01
Across
- Passwords should not contain your
- Sikorsky Facility Security Officer (FSO)
- Strategy to protect sensitive information (operational security)
- Assured File Transfers (AFTs) should only be performed by a trained
- If you see something
- A company's most valuable asset
Down
- Report all security incidents to
- Sikorsky Classified Cybersecurity Manager
- Access is granted based on clearance level and
9 Clues: If you see something • A company's most valuable asset • Report all security incidents to • Passwords should not contain your • Sikorsky Facility Security Officer (FSO) • Sikorsky Classified Cybersecurity Manager • Access is granted based on clearance level and • Strategy to protect sensitive information (operational security) • ...
Crossword 2025-08-10
Across
- New generation of wireless network technology
- New business, often tech-focused and innovative
- Protection against online threats
- Company known for graphics cards and AI chips
- Internet-based computing and storage
- Step-by-step problem-solving procedure in computing
- A digital virtual world concept
Down
- Popular AI language model by OpenAI
- Distributed ledger technology supporting Bitcoin
- Unmanned flying device used for delivery or photos
- Electric car company known for tech innovation
- A type of computing using quantum mechanics
- Intelligence demonstrated by machines.
- Digital or virtual money
14 Clues: Digital or virtual money • A digital virtual world concept • Protection against online threats • Popular AI language model by OpenAI • Internet-based computing and storage • Intelligence demonstrated by machines. • A type of computing using quantum mechanics • New generation of wireless network technology • Company known for graphics cards and AI chips • ...
Topic 3 AI & Competition Law 2024-11-15
Across
- Rules governing AI development and implementation
- When AI systems independently coordinate to avoid competition
- Large technology firms influencing markets
- Control by a major player in a market
- Internet-based computing and storage services
- Technology that mimics human thinking and learning
- Moral principles governing behavior
- Unfair preference in decision-making
Down
- Safeguarding personal information
- Charging different prices based on user data
- Organization for global trade rules
- Ensures fairness and innovation in markets
- Clarity in AI decision-making processes
- Protecting systems and networks from attacks
14 Clues: Safeguarding personal information • Organization for global trade rules • Moral principles governing behavior • Unfair preference in decision-making • Control by a major player in a market • Clarity in AI decision-making processes • Large technology firms influencing markets • Ensures fairness and innovation in markets • Charging different prices based on user data • ...
Sondre's Christmas Crossword 2023-12-26
Across
- Sarah's favorite "The office" character
- Name of the species of the big boi fish Sarah caught
- Month of Sondre's birthday
- One of Sarah's favorite vegetables
- Indie band from Norwich, UK
- Country with the most snow
- Soon to be patented bike
- Homeless cat
- Country that Canada has been at war with for almost 40 years
- Sarah's totally real and true favorite tv-show ;)
Down
- Sondre's field of study
- National park in the west of Canada that Sarah has visited
- Sarah's favorite League of Legends champion
- Sarah's favorite tea
- Good girl
- Good boy
- Subject of the class that had a field trip in Sarah's dream
17 Clues: Good boy • Good girl • Homeless cat • Sarah's favorite tea • Sondre's field of study • Soon to be patented bike • Month of Sondre's birthday • Country with the most snow • Indie band from Norwich, UK • One of Sarah's favorite vegetables • Sarah's favorite "The office" character • Sarah's favorite League of Legends champion • Sarah's totally real and true favorite tv-show ;) • ...
Information Technology 2023-05-10
Across
- Desarrollo
- Comunicaciones
- Computación en la nube
- Apoyo técnico
- Innovar
- Programador
- Analista de malware
- Perspectiva
- Habilidades
- Fuerza laboral
- Ciencia de datos
- Compañías empresariales
- Operaciones comerciales
- Desarrollador web
- Ilimitado
- Implementación
- Productividad
- Ingeniero de software
- Recreación
- Microsoft
Down
- Soporte de escritorio
- Plataformas
- Software
- Sostenibilidad
- Habilidades
- Aplicaciones
- Hoja de cálculo
- Conocimientos técnicos
- Automatización
- Servicio de ayuda
- Programas
- Base de datos
- Gerencia
- Desarrollador de software
- Acceso a la información
- Inteligencia artificial
- Liderazgo
- Tecnología de la información (TI)
- Complejidad
- Ciberseguridad
- Educación
- soporte
- Mantenimiento
- Análisis
- Avance
- Hardware
- Gerente IT
- Conocimiento
- Robótica
49 Clues: Avance • Innovar • soporte • Software • Gerencia • Análisis • Hardware • Robótica • Programas • Liderazgo • Educación • Ilimitado • Microsoft • Desarrollo • Recreación • Plataformas • Habilidades • Programador • Perspectiva • Complejidad • Habilidades • Gerente IT • Aplicaciones • Conocimiento • Apoyo técnico • Base de datos • Mantenimiento • Productividad • Sostenibilidad • Comunicaciones • Automatización • Fuerza laboral • Ciberseguridad • ...
RU ITEC411 Chapter 5 Crime and Security 2025-03-16
Across
- something that will spread one its own
- information gathering software
- a network of computers being controlled
- returning what has been lost to its owner
- something that needs a host to spread
- being locked out of a computer or system until someone is paid
- digital world
- something disguised as something else
- sending out messages impersonating someone or something
- deception for someone's gain
Down
- bad software
- obstructing or ruining something
- to be kept secret
- stealing someone's information for impersonation
- instruction sets
- spying on someone or something
- a soft spot in a piece of software
- manipulatively finding information out about someone or something
- team to manage cybersecurity incidents
- using a spoofed website to steal information
20 Clues: bad software • digital world • instruction sets • to be kept secret • deception for someone's gain • information gathering software • spying on someone or something • obstructing or ruining something • a soft spot in a piece of software • something that needs a host to spread • something disguised as something else • something that will spread one its own • ...
Lushi & John's Wedding 2025-02-22
Across
- Lushi’s favorite dessert
- Favorite shared activity
- Lushi’s favorite cuisine
- John’s go-to drink
- City they live in
- Lushi’s favorite holiday
- Who is older between them
- John’s hometown
- Total number of their dogs
- John’s favorite food
- Name of their corgi
- Color of John’s eyes
- Place where John proposed
Down
- University John attended
- First date restaurant
- Total countries visited together
- John’s favorite video game
- francisco City where they met
- First international trip destination
- John’s work industry
- John’s favorite music band
- Lushi’s favorite color
- Month of their engagement
- Month of dating anniversary
- Their dream honeymoon destination
- John’s middle name
- Lushi’s favorite time of year
- Lushi’s favorite board game
28 Clues: John’s hometown • City they live in • John’s go-to drink • John’s middle name • Name of their corgi • John’s work industry • John’s favorite food • Color of John’s eyes • First date restaurant • Lushi’s favorite color • University John attended • Lushi’s favorite dessert • Favorite shared activity • Lushi’s favorite cuisine • Lushi’s favorite holiday • Month of their engagement • ...
Sorav 2025-05-13
Across
- a key when you put in the computer
- a internet connection
- when you see in screen
- A malicious program designed to harm or disrupt computer system
- actually like a mouse but better
- when you type the input
- use for click or type letter
- a like a browser
- Protection of computer systems and data from unauthorised access and attacks
- like a menu in the website
- open another homepage
Down
- Programs and operating systems that run on computers and devices.
- a device portable
- like a smart home
- The physical components of a computer or electronic device
- charge your device
- type the code
- when you unlock your device
- big object for the computer
- a part of computer
20 Clues: type the code • a like a browser • a device portable • like a smart home • charge your device • a part of computer • a internet connection • open another homepage • when you see in screen • when you type the input • like a menu in the website • when you unlock your device • big object for the computer • use for click or type letter • actually like a mouse but better • ...
Infor 2025-01-26
Across
- Maumere yang mampu mendeskripsi
- Membuka lampiran surel
- orang yang mendeskripsikan peretasan
- Menandakan bahwa hacking merupakan pengertian
- Nama lain dari kesalahan
- Tidak perlu menumpuk keprogaman lain
- pembuatan buku the cookers
- Akroni bobot network
- Adalah kejahatan di dunia
- salah satu kejahatan sosial yang berpengaruh pada kesehatan mental
Down
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data disebut
- Perangkat lunak yang menempel
- Gunakan activit atau activity internasional
- data berasal dari kata dalam bahasa latin datum yang artinya
- Virus yang menyebar di dunia
- keamanan informasi internet adalah
- Pada tahun 1988 sebuah program komputer yang dikenal sebagai
- badan siber dan sandi negara
- Merupakan Malware yang tampak kagoda
- Teknologi keamanan yang lebih baik dengan pembentukan
20 Clues: Akroni bobot network • Membuka lampiran surel • Nama lain dari kesalahan • Adalah kejahatan di dunia • pembuatan buku the cookers • Virus yang menyebar di dunia • badan siber dan sandi negara • Perangkat lunak yang menempel • Maumere yang mampu mendeskripsi • keamanan informasi internet adalah • orang yang mendeskripsikan peretasan • Merupakan Malware yang tampak kagoda • ...
Let's explore the kept.pro Eco System 2024-12-13
Across
- Robyne's call sign
- Required for work from home success
- Tab to find Client Services specific information?
- Name of software platform to help categorize expenses
- One of the flywheel components
- System used by all clients
- Pod name
- Client payroll platform
- What we are
- A kept.pro core value
- Accurate, timely and complete financials are part of this
Down
- One-stop shop for kept.pro information
- Item we are all responsible for
- One of the internal programs we use
- Part of kept.GROW
- Tab where you can find info on Google Workspace
- Name of our outside IT support company
- Tab to find out about kept.pro team members
- Tab to see Google Classroom classes
- Essential for working together
20 Clues: Pod name • What we are • Part of kept.GROW • Robyne's call sign • A kept.pro core value • Client payroll platform • System used by all clients • One of the flywheel components • Essential for working together • Item we are all responsible for • One of the internal programs we use • Required for work from home success • Tab to see Google Classroom classes • ...
SISTEM KOMPUTER 2025-09-08
Across
- : Singkatan dari Central Processing Unit.
- : Bahasa pemrograman yang populer untuk web.
- : Singkatan dari Hypertext Markup Language.
- : Media penyimpanan berbentuk cakram optik.
- : Perangkat yang digunakan untuk memasukkan data ke komputer.
- : Protokol pengiriman surat elektronik.
- : Perangkat lunak untuk mengolah kata.
- : Singkatan dari Uniform Resource Locator.
- : Sistem operasi buatan Microsoft.
- : Istilah untuk keamanan informasi di dunia digital.
- : Jaringan global yang menghubungkan komputer di seluruh dunia.
Down
- : Bahasa pemrograman yang identik dengan logo cangkir kopi.
- : Bagian komputer yang menyimpan data secara permanen.
- : Perangkat keras untuk mencetak dokumen.
- : Singkatan dari Random Access Memory.
- : Sistem operasi berbasis open source.
- : Aplikasi untuk membuat presentasi.
- : Singkatan dari Graphics Interchange Format.
- : Penyimpanan berbasis awan dari Google.
- : Perangkat keras untuk menampilkan hasil proses.
20 Clues: : Sistem operasi buatan Microsoft. • : Aplikasi untuk membuat presentasi. • : Sistem operasi berbasis open source. • : Perangkat lunak untuk mengolah kata. • : Perangkat keras untuk mencetak dokumen. • : Protokol pengiriman surat elektronik. • : Bahasa pemrograman yang populer untuk web. • : Singkatan dari Random Access Memory. • ...
Computing Vocabulary 2019-12-04
Across
- Small device to store data on the go
- The amount of space available
- Most of the time you do it illegally
- Smaller than a rat
- Part of a computer that reads information
- Synonym of information
- We also call it the Web
- System of computer equipment & programs
- Computers that are connected together
Down
- Desktop machine
- Combination of letters and numbers
- Protection system making use of the internet
- Someone who uses a product, machine or service
- Software designed to damage
- A set of mathematical instructions or rules
- Identifying data ; Biscuit
- Computer program
- Central computer from which other computers get information
- Accessing information without permission
- All the equipment necessary to run a computer
20 Clues: Desktop machine • Computer program • Smaller than a rat • Synonym of information • We also call it the Web • Identifying data ; Biscuit • Software designed to damage • The amount of space available • Combination of letters and numbers • Small device to store data on the go • Most of the time you do it illegally • Computers that are connected together • ...
Sip and Solve 2024-04-05
Across
- What month did they begin dating?
- Where is their honeymoon location?
- What is Adonis' middle name?
- What is Eimear's eye colour?
- How they first meet?
- Where do they live?
- What is Eimear's job?
- How many years have they been together?
- What is the name of their dog?
- Where was Eimear born?
Down
- What is Adonis' job?
- What car do they drive?
- Where was their first date?
- What instrument does Eimear learn?
- Where did they get engaged?
- What is Eimear's birth month?
- What is Eimear's middle name?
- What is Adonis' favourite hobby?
- What is Adonis' eye colour?
- What is Adonis' birth month?
- Where was Adonis born?
- Where was their first holiday?
22 Clues: Where do they live? • What is Adonis' job? • How they first meet? • What is Eimear's job? • Where was Adonis born? • Where was Eimear born? • What car do they drive? • Where was their first date? • Where did they get engaged? • What is Adonis' eye colour? • What is Adonis' middle name? • What is Eimear's eye colour? • What is Adonis' birth month? • What is Eimear's birth month? • ...
Pineapple #2 2023-05-05
Across
- slithering coding language
- Pokemon Cards for REAL men
- fictional school with one of the worst student safety track records
- Heath Ledger or an otaku with an ungodly amount of rizz
- rock band that just "Can't Stop"
- Ghibli mastermind Miyazaki
- Your favorite cybersecurity student
- One who is "virtually insane"
- a site that is full of idiots and dank memes
- Psych lead James Roday
- Star Trek captain with a terrible "Rocketman" cover
Down
- that old meme you had as your background for a while
- Cocaine sadly not included anymore
- "Ride of The Valkyries" Composer
- They're finally making GTA VI
- "I think therefore I'm"
- Feline from Fukuhara
- based smash main
- Soulsborne mastermind Miyazaki
- Kentaro Miura's masterpiece
20 Clues: based smash main • Feline from Fukuhara • Psych lead James Roday • "I think therefore I'm" • slithering coding language • Pokemon Cards for REAL men • Ghibli mastermind Miyazaki • Kentaro Miura's masterpiece • They're finally making GTA VI • One who is "virtually insane" • Soulsborne mastermind Miyazaki • "Ride of The Valkyries" Composer • rock band that just "Can't Stop" • ...
TTS INFORMATIKA 2025-04-10
Across
- tugas programer
- Platform untuk diseminasi konten budaya?
- Contoh search engine?
- Metode validasi konten negatif?
- itu konten negatif
- menghindari pelanggaran budaya?
- penting unsur budaya dalam konten digital?
- yang di maksud indexing
- Tugas data scientist?
- pendaftaran HAKI
- itu hak cipta
- Konsekuensi konten negatif?
Down
- Tujuan validasi konten negatif?
- itu ranking?
- diseminasi konten budaya?
- yang di maksud paten
- Tugas cybersecurity engineer?
- konten digital berunsur budaya?
- Tugas web developer?
- Tugas database administrator?
- fungsi utama search engine?.
- itu crawling?
- itu merek dagang
- Tantangan validasi konten negatif?
- Konsekuensi pelanggaran HAKI
25 Clues: itu ranking? • itu crawling? • itu hak cipta • tugas programer • itu merek dagang • pendaftaran HAKI • itu konten negatif • yang di maksud paten • Tugas web developer? • Contoh search engine? • Tugas data scientist? • yang di maksud indexing • diseminasi konten budaya? • Konsekuensi konten negatif? • fungsi utama search engine?. • Konsekuensi pelanggaran HAKI • Tugas cybersecurity engineer? • ...
How well do you know POOL/PACT? 2025-02-19
Across
- Executive Director
- HR Oversight Committee Chair
- POOL/PACT's Learning Management System
- Month of this year's HR Leadership Conference
- Email notice of significant change in law or practice
- POOL/PACT's EAP
- Organization-wide assessment program
- How often this newsletter comes out
- PACT Chair
- Cybersecurity expert
- Type of grant available to members to attend conferences
- Summary of HR services for the fiscal year
- POOL Chair
Down
- Claims management company
- Flagship certificate program for managers
- Location of this year's HR Leadership Conference
- What POOL/PACT HR is currently tracking
- Main HR contact
- This year's Thursday night event at the annual board meeting
- Funding provided to attain HR certification
- Month of POOL/PACT's annual board meeting
21 Clues: PACT Chair • POOL Chair • POOL/PACT's EAP • Main HR contact • Executive Director • Cybersecurity expert • Claims management company • HR Oversight Committee Chair • How often this newsletter comes out • Organization-wide assessment program • POOL/PACT's Learning Management System • What POOL/PACT HR is currently tracking • Flagship certificate program for managers • ...
Puzzle on Digitalisation (Ansgar O & Olivia U) 2025-10-07
Across
- Raw facts or information
- Watching or listening online in real time
- Protecting systems and data from attacks
- Pocket computer with apps and calls
- A new idea or improvement
- Machine ability to mimic human thinking
- Interactive digital classroom display
- Global network of computers
- Entering username and password to access
- Software used to surf the web
Down
- Company behind Windows and Office
- Turning paper or analog into digital form
- Copy of data for safety
- Scannable digital code for quick access
- Engineering of automated machines
- Writing instructions (code) for computers
- Doing several tasks at once
- Connected devices exchanging information
- Remote servers accessed online
- Programmes that run on computers
- Send files from device to the internet
21 Clues: Copy of data for safety • Raw facts or information • A new idea or improvement • Doing several tasks at once • Global network of computers • Software used to surf the web • Remote servers accessed online • Programmes that run on computers • Company behind Windows and Office • Engineering of automated machines • Pocket computer with apps and calls • ...
Exploring our Ecosystem 2025-01-15
Across
- essential for working together
- one of the internal programs we use
- system used by all clients
- name of software platform to help categorize expenses
- what we are
- one-stop shop for kept.pro information
- required for work-from-home success
- accruate, timely and complete financials are a part of this
- tab to find out about kept.pro team members
- a kept.pro core value
Down
- tab to see Google Classroom courses
- name of a pod
- name of our outside IT support
- one of the flywheel components
- client payroll platform
- tab to find Client Services specific information
- tab where you can find info on Google Workspace
- item we are all responsible for
- James' call sign
- part of kept.GROW
20 Clues: what we are • name of a pod • James' call sign • part of kept.GROW • a kept.pro core value • client payroll platform • system used by all clients • name of our outside IT support • essential for working together • one of the flywheel components • item we are all responsible for • tab to see Google Classroom courses • one of the internal programs we use • ...
The Print Puzzler 2025-03-26
Across
- GOAL OF MOST CAMPAIGNS
- A NEW COMPANY
- SIC 27
- NOBODY GETS LEFT OUT
- MORALLY RIGHT AND WRONG
- WHERE PINE LIVES
- RENOWNED BUSINESS PUBLICATION
- MALICIOUS HACKER
- TRY FOR THE FIRST TIME
- WELL KNOWN WISCONSIN PRINTER
- IMPACTS SOCIAL MEDIA
- COMMONLY FOUND ON WALLS OR DESKS
- THE P IN PMS
- BILLBOARDS, TAXIS AND POSTERS
- MAY ONE DAY REPLACE SICS
Down
- A NEW COMPANY
- INTEGRATING SALES AND MARKETING
- ITS ALWAYS RAISED
- PAPER CUTTER
- EMAIL WITH COLOR
- HELD EVERY 4 YEARS IN DUSSELDORF, GERMANY
- COMPANY SIZE
- CRM AND AUTOMATION SW
- USED TO PERSONALIZE YOUR EXPERIENCE
- WHATS IN IT FOR ME
- BOSTON VENUE
- ETHICAL CYBERSECURITY
- ENHANCE YOUR DATA
- BEST WAY TO MEET PEOPLE
29 Clues: SIC 27 • PAPER CUTTER • COMPANY SIZE • BOSTON VENUE • THE P IN PMS • A NEW COMPANY • A NEW COMPANY • EMAIL WITH COLOR • WHERE PINE LIVES • MALICIOUS HACKER • ITS ALWAYS RAISED • ENHANCE YOUR DATA • WHATS IN IT FOR ME • NOBODY GETS LEFT OUT • IMPACTS SOCIAL MEDIA • CRM AND AUTOMATION SW • ETHICAL CYBERSECURITY • GOAL OF MOST CAMPAIGNS • TRY FOR THE FIRST TIME • MORALLY RIGHT AND WRONG • ...
Natalie and Robbie 2024-07-01
Across
- The couple's favorite singer.
- The food Robbie hates but Natalie insists on making.
- Robbie's first roommate.
- The month Robbie proposed.
- Robbie's least favorite household chore.
- The grade Natalie teaches.
- The city they got engaged in.
- What is the name of Natalie and Robbie's cat?
- Who made the first move?
Down
- Who said I love you first?
- The elementary school Natalie and Robbie first met (Forest __)
- Natalie's least favorite household chore.
- Natalie and Robbie's eye color.
- What field does Robbie work in?
- Number of dresses Natalie tried on.
- Number of years Natalie and Robbie dated.
- What college did they attend?
- Total number of bridesmaids and groomsmen.
- The shape of the engagment ring.
- Natalie and Robbie's favorite condiment.
20 Clues: Robbie's first roommate. • Who made the first move? • Who said I love you first? • The month Robbie proposed. • The grade Natalie teaches. • The couple's favorite singer. • The city they got engaged in. • What college did they attend? • Natalie and Robbie's eye color. • What field does Robbie work in? • The shape of the engagment ring. • Number of dresses Natalie tried on. • ...
Unit 11-Cyber Security 2023-09-15
7 Clues: harmful software • digital illegal activity • network security barrier • isolated testing environment • protection of digital resources • unique physical characteristics for authentication • scam in which attackers trick people into disclosing confidential information
Operation DigiVyuh 2025-01-27
Across
- - Converting data into a code to protect it
- - Entity that issues digital certificates
- - Stealing someone's personal information
- - Sending unwanted bulk messages
Down
- - Protecting systems from digital attacks
- - A secure way to sign electronic documents
- - Fraudulent attempt to steal sensitive information
- - Unauthorized access to computer systems
- - Police unit for investigating cyber crimes
- - Part of the IT Act dealing with computer offenses
- - Indian law for cyber crimes (abbreviation)
11 Clues: - Sending unwanted bulk messages • - Protecting systems from digital attacks • - Entity that issues digital certificates • - Unauthorized access to computer systems • - Stealing someone's personal information • - A secure way to sign electronic documents • - Converting data into a code to protect it • - Police unit for investigating cyber crimes • ...
Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10
Across
- Devices used for computing and connecting online.
- Method for delivering messages electronically.
- Process of converting data into a secure code.
- Storing data on remote servers accessed via the Internet.
- Portable electronic device for accessing information.
- Software that performs malicious activities.
- Online platform for social interaction.
Down
- Digital means of connecting people worldwide.
- Measure to protect networks and systems.
- Global system for mobile communication.
- Widespread sharing of digital media.
11 Clues: Widespread sharing of digital media. • Global system for mobile communication. • Online platform for social interaction. • Measure to protect networks and systems. • Software that performs malicious activities. • Digital means of connecting people worldwide. • Method for delivering messages electronically. • Process of converting data into a secure code. • ...
Guess The word 2022-06-27
Across
- The act of obeying an order, rule, or request
- Possibility of loss or injury
- Group of people for decision making
- An event that is either unpleasant or unusual
- An official inspection
- A set of guidelines
Down
- Report certain types of wrongdoing
- Protection of internet-connected system
- of conduct A set of rules
- of interest Clash between personal and professional duties
10 Clues: A set of guidelines • An official inspection • of conduct A set of rules • Possibility of loss or injury • Report certain types of wrongdoing • Group of people for decision making • Protection of internet-connected system • The act of obeying an order, rule, or request • An event that is either unpleasant or unusual • ...
Biometrics 2025-04-03
Across
- basic rights
- safety measures taken for protection
- to take full advantage of and benefit from
- something so easy that you cant mess it up
Down
- software programs that protect you while online
- following a trend just because everyone else is
- weaknesses in a security system
- to illegally enter into someone's computer
- to avoid or get around
- a gap in security
10 Clues: basic rights • a gap in security • to avoid or get around • weaknesses in a security system • safety measures taken for protection • to illegally enter into someone's computer • to take full advantage of and benefit from • something so easy that you cant mess it up • software programs that protect you while online • following a trend just because everyone else is
crossword 01 2025-04-21
Across
- By laws
- The art of sticking to something like a rule
- The act of studying something closely
- To improve or make more precise
Down
- Favoring one thing over other
- The process of reducing danger
- Use of technology to reduce human intervention in a process
- Following regulation
- The quality of doing something well without wasting time
- Protection of digital information from cyberattacks
10 Clues: By laws • Following regulation • Favoring one thing over other • The process of reducing danger • To improve or make more precise • The act of studying something closely • The art of sticking to something like a rule • Protection of digital information from cyberattacks • The quality of doing something well without wasting time • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- impacts availability and requires redundancy
- updates and changes in one component may impact others
- timely removal of access to minimize risks
- older or outdated software
- realizing that you are not encrypting data, using weak passwords and outdated technology
- step-by-step instructions for security measures
- focusing on ensuring you are following regulatory requirements such as HIPPA
- influences user behaviors
- define requirements for security controls and configurations
Down
- guides access provisioning for new employees
- predefinied responses for security incidents
- includes checking things such as your incident response plan to make sure it is sufficient enough
- common during updates or performance issues
- establish organizational stances on security aspects
- specify what items are allowed
- Developing an action plan, implementing new security controls and tracking progress
- specify what items are denied
- Never trust, always verify
- this type of restart requires restarting a particular component
19 Clues: influences user behaviors • older or outdated software • Never trust, always verify • specify what items are denied • specify what items are allowed • timely removal of access to minimize risks • common during updates or performance issues • guides access provisioning for new employees • impacts availability and requires redundancy • ...
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
Spectrum Degree Programs 2023-10-18
6 Clues: Employee relations • Budgeting and money • Protecting computers • Ideas to interest customers • Tracking expenses and payments • Understanding formulas to gather data
If Ever You're Bored 2022-09-07
Across
- my favorite food you cook
- my college major
- my favorite song from Renaissance
- the first food place we've ever been together to
- your first car's name
- our son's name
Down
- place we celebrated when we thought we were going to get accepted into our first "dream" apt.
- my car's name
- my mother's name
- type of car i want in the future
- what we are going to be in the future
- you and Miracle
12 Clues: my car's name • our son's name • you and Miracle • my college major • my mother's name • your first car's name • my favorite food you cook • type of car i want in the future • my favorite song from Renaissance • what we are going to be in the future • the first food place we've ever been together to • ...
Unit 1-3 vocab 2024-03-14
Across
- Watering crops
- Farm animals like cows and chickens
- Picking crops when they're ready
- Person who plays sports
- security Making sure everyone has enough to eat
- rotation Changing what you plant to help the soil
- Computer steps to solve problems
- identity How you show yourself on the internet
- Keeping nature safe for the future
- Food for plants
- Underground water source
Down
- literacy Knowing how to use the internet well
- Trick emails trying to get private info
- Keeping computers safe
- Buying and selling online
- Watching videos on the internet without downloading
- detox Taking a break from screens and devices
- Long time with no rain
- gaming Playing games on the internet with others
- storage Keeping files on the internet, not your computer
20 Clues: Watering crops • Food for plants • Keeping computers safe • Long time with no rain • Person who plays sports • Underground water source • Buying and selling online • Picking crops when they're ready • Computer steps to solve problems • Keeping nature safe for the future • Farm animals like cows and chickens • Trick emails trying to get private info • ...
THE FRIENDS 2023-04-20
Across
- ashley's most used phrase
- what maria gets on her face when she's outside
- a class we all share
- kaylee's biggest feature
- the man the myth the situationship
- the groupchat that we all have together
- the teacher that is better than woolley
- chaine's dead name
- ariany could never live with out this
- kaylee and ashley are poor...
Down
- ashley's stem major
- ariany, kaylee, ashley all have in common
- our last year here:(
- ariany is lacking her...
- what maria is (foreign)
- ariany gives you this when you speak
- emily thinks she looks like this when her hair is up (in spanish)
- chaine is pretty in...
18 Clues: chaine's dead name • ashley's stem major • our last year here:( • a class we all share • chaine is pretty in... • what maria is (foreign) • ariany is lacking her... • kaylee's biggest feature • ashley's most used phrase • kaylee and ashley are poor... • the man the myth the situationship • ariany gives you this when you speak • ariany could never live with out this • ...
Module 1 Introductory Course Telehealth 2017-03-02
Across
- acronym for information and communication technology
- word used interchangeably with telecare
- used to monitor vital signs remotely
- nurses engaged in remote service delivery
- computer-based medical records
- the ability of computers to exchange information
- measures taken to protect computer/computer systems
- the use of smartphones to provide healthcare
Down
- virtual, medical, health, and educational services
- in real time
- emerging umbrella term; intersection of technology and healthcare
- live visual connection between two or more people
- the "e" in this term stands for many things
- term referring to teleconsultations
- electronic component used to provide input and detect changes
15 Clues: in real time • computer-based medical records • term referring to teleconsultations • used to monitor vital signs remotely • word used interchangeably with telecare • nurses engaged in remote service delivery • the "e" in this term stands for many things • the use of smartphones to provide healthcare • the ability of computers to exchange information • ...
Useful Vocab 2023-11-22
Across
- Cooking style
- Newness
- The process of providing or obtaining the food necessary for health and growth
- Small electronic devices with a specific function
- The activity of visiting interesting places, especially as a tourist
- The ability to use, understand, and evaluate information across digital platforms
- Physical activity
- A place where people live or stay, such as a hotel or guesthouse
Down
- Conditions or practices conducive to maintaining health and preventing disease
- Techniques and therapies aimed at controlling stress levels for better mental health
- Place to stay
- Literacy Competence in using digital information
- Security
- Health
- The place to which someone or something is going or being sent
- Schedule
- A planned route or journey
17 Clues: Health • Newness • Security • Schedule • Place to stay • Cooking style • Physical activity • A planned route or journey • Literacy Competence in using digital information • Small electronic devices with a specific function • The place to which someone or something is going or being sent • A place where people live or stay, such as a hotel or guesthouse • ...
Security Audit Quiz SET C 2025-11-18
Across
- NIST CSF function focused on safeguarding assets.
- Level of harm from a compromise.
- Testing to confirm proper implementation.
- The defined boundary of an audit.
- Critical element of CIA triad.
- The probability of a threat exploiting a vulnerability.
- Final step of an audit process.
Down
- Unauthorized attempt to access a system.
- Ability to track actions back to individuals or systems.
- Adhering to required standards or regulations.
- A potential cause of an unwanted incident.
- A weakness that can be exploited.
- U.S. body responsible for cybersecurity standards.
- Checking compliance to documented requirements.
- measures implemented to reduce risk.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • A weakness that can be exploited. • The defined boundary of an audit. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
Internet 2023-09-14
Across
- - Electronic communication method.
- - Protecting against online threats.
- - A secret code to access accounts.
- - Real-time text-based conversation online.
- - Software used to access the internet.
- - Malicious software that can harm your computer.
- - Small digital images used to express emotions.
- - Prefix for media platforms like Facebook and Twitter.
- - Device that directs internet traffic.
Down
- - Wireless internet connection.
- - Online buying and selling of goods.
- - Watching videos or listening to music online.
- - A collection of web pages.
- - Getting files from the internet to your device.
- - What you do on Google to find information.
15 Clues: - A collection of web pages. • - Wireless internet connection. • - Electronic communication method. • - A secret code to access accounts. • - Protecting against online threats. • - Online buying and selling of goods. • - Software used to access the internet. • - Device that directs internet traffic. • - Real-time text-based conversation online. • ...
SETU’s Women in Tech Cybersecurity Crossword 2025-11-10
Across
- British codebreaker who worked with Turing
- Classic cryptography participant
- Led Apollo software engineering
- First computer programmer, namesake of a U.S. DoD language
- Founded the Institute for Women and Technology
- Google's 'Security Princess', Project Zero lead
- Expert in cybersecurity workforce development
Down
- Emerging computing paradigm exploiting superposition
- Researcher in formal methods and cryptography
- Pioneered Microsoft’s bug bounty program
- Coined 'debugging' after removing a moth from a computer
- Insider adversary model in threat modelling
- Created the Spanning Tree Protocol; 'Mother of the Internet'
- Digital forensics and OSINT expert
- The eavesdropper in cryptography scenarios
15 Clues: Led Apollo software engineering • Classic cryptography participant • Digital forensics and OSINT expert • Pioneered Microsoft’s bug bounty program • British codebreaker who worked with Turing • The eavesdropper in cryptography scenarios • Insider adversary model in threat modelling • Researcher in formal methods and cryptography • ...
IJTIMOIY MEDIADA TAHdID VA XAVF-XATARLAR 2025-11-06
Across
- Ijtimoiy tarmoqlarda foydalanuvchini himoyalovchi asosiy narsa
- Raqamli sohada xavfsizlikni ta’minlovchi davlat tizimi
- Kiberxavfsizlikni ta’minlash uchun ishlatiladigan raqamli vosita
- Tarmoqdagi foydalanuvchini ifodalovchi belgilar majmuasi
- Ma’lumotni himoya qiluvchi belgilar ketma-ketligi
- “Axborot xavfsizligi” fanining inglizcha nomi
- Ijtimoiy mediadan ortiqcha foydalanish oqibatida paydo bo‘ladigan ruhiy holat
- MADANIYAT Yoshlarning ijtimoiy tarmoqlardan to‘g‘ri foydalanish madaniyati
Down
- Internetdagi yolg‘on profil nomi
- Foydalanuvchini tanimasdan do‘stlik so‘rovi yuboruvchi shaxs
- Internetdagi zararli dasturlar turi (🦠)
- Ijtimoiy tarmoqlarda shaxsga nisbatan haqoratli yozish — onlayn zo‘ravonlik nomi
- Shaxsiy axborotni o‘g‘irlash bilan shug‘ullanuvchi kiberjinoyatchi
- Axborotni ruxsatsiz olish — bu qanday jinoyat
- Internet orqali noto‘g‘ri yoki yolg‘on axborot tarqatish
15 Clues: Internetdagi yolg‘on profil nomi • Internetdagi zararli dasturlar turi (🦠) • Axborotni ruxsatsiz olish — bu qanday jinoyat • “Axborot xavfsizligi” fanining inglizcha nomi • Ma’lumotni himoya qiluvchi belgilar ketma-ketligi • Raqamli sohada xavfsizlikni ta’minlovchi davlat tizimi • Tarmoqdagi foydalanuvchini ifodalovchi belgilar majmuasi • ...
11.2 Cabinet Departments and Independent Agencies 2021-04-22
Across
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
- providing the military forces needed to deter war and protect the security of our country.
- the health of all Americans and providing essential human services.
- enforcing the laws of the United States federal government
- representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
- manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
- national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
- manage the liquidity of a business.
Down
- planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
- integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
- oversees the American farming industry
- the management and distribution of the federal budget for education initiatives.
- what is the title of the head of the executive branch departments?
- laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.
14 Clues: manage the liquidity of a business. • oversees the American farming industry • enforcing the laws of the United States federal government • what is the title of the head of the executive branch departments? • the health of all Americans and providing essential human services. • the management and distribution of the federal budget for education initiatives. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk
- A process or set of rules
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- To protect data encoding the information.
15 Clues: It's used to talk • Intenet of things. • The smallest technology. • A process or set of rules • Aereal no tipulated devices • Smallest unity of information • To protect data encoding the information. • Programmable machine to automate processes • Generally, the not physical about a computer. • Small electronic devices that make your life easier. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk
- A process or set of rules
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- To protect data encoding the information.
15 Clues: It's used to talk • Intenet of things. • The smallest technology. • A process or set of rules • Aereal no tipulated devices • Smallest unity of information • To protect data encoding the information. • Programmable machine to automate processes • Generally, the not physical about a computer. • Small electronic devices that make your life easier. • ...
AI 2024-07-12
Across
- A celestial body or a digital storage?
- Computer's systematic steps for problem-solving
- Digital lock and key
- What AI craves to learn and grow
- Dogecoin or Shiba Inu
- Satellite navigator
- Physical form of AI doing everything from vaccuming to surgery
- Will probably take over the world by 2050
Down
- AI that creates content faster than your caffeinated coworker
- Your digital pal who's always up for a chat, no matter what (7 lette
- Identity recognition with a touch!
- Digital Bodyguard
- Pocket sized device that tells you everything from time to time
- Next-gen computing
- Augmented reality
15 Clues: Digital Bodyguard • Augmented reality • Next-gen computing • Satellite navigator • Digital lock and key • Dogecoin or Shiba Inu • What AI craves to learn and grow • Identity recognition with a touch! • A celestial body or a digital storage? • Will probably take over the world by 2050 • Computer's systematic steps for problem-solving • ...
Cybersecurity Awareness Month 2023 2023-09-21
Across
- An email attack in which a cybercriminal attempts to disguise themselves as a trusted source..
- Cybersecurity Awareness Month
- A person who uses computers to gain unauthorized access to data.
- A form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious software to a smartphone.
- This type of information includes your name, address, phone number, email address, bank account information, IP address, etc.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A person who commits fraud or participates in a dishonest scheme.
- The practice of protecting critical systems and sensitive information from digital attacks.
- A manipulation technique that exploits human error to gain private information, access or valuables.(Two words)
Down
- This is the most common form of cybercrime. Roughly 90% of all data breaches start with one of these emails.
- The fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to trick individuals in to revealing personal information, such as bank details and card numbers.
- A sequence of words or text used to control access to a computer; similar to a password.
- Facebook, Instagram, TikTok, etc.(Two words)
- This type of information includes race or ethnicity, health and medical information, political or religious beliefs, etc.
- The address of a webpage. Check the validity of it before clicking on it.
15 Clues: Cybersecurity Awareness Month • Facebook, Instagram, TikTok, etc.(Two words) • A person who uses computers to gain unauthorized access to data. • A person who commits fraud or participates in a dishonest scheme. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cybersecurity 2022-09-08
smple 2023-09-20
DIGITAL CITIZENSHIP DAY 2024-10-14
Across
- anything shared online, like text or images
- someone who impacts others through social media
- controls for who sees your info
- tricking you to share personal info
- being real, even online!
- your computer's protective wall against threats
- someone who stirs up trouble online
- a virtual way to connect with someone new
- unauthorized access to someone else's computer or account
- hurtful words sent through screens
Down
- protection against online threats
- the trace you leave behind online
- a tool that keeps your online actions private
- legal protection for creative works and ideas
- tiny pictures that express feelings!
- your secret code for online access
- time spent gazing at your device
- unwanted emails that clutter your inbox
- your personal space on websites
19 Clues: being real, even online! • controls for who sees your info • your personal space on websites • time spent gazing at your device • protection against online threats • the trace you leave behind online • your secret code for online access • hurtful words sent through screens • tricking you to share personal info • someone who stirs up trouble online • ...
Cybersecurity 2 Honors Vocab 2026-03-02
Across
- = files that appear to be legitimate programs, but really contain malicious code.
- = a broader, often scheduled release of software that includes, but is not limited to, patches.
- = specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
- = the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using cryptographic algorithms.
- = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
- = refers to the extent to which individuals understand that there are potential threats to the information systems they use and the measures they should take to mitigate those threats.
- = a collection of internet connected devices such as computers, smartphones, or IoT devices infected with malware and controlled remotely by a single attacker
Down
- = proactive strategies, policies, and technologies implemented to reduce the likelihood and impact of cyber threats on an organization's digital assets
- = the process of securing a system by reducing its surface of vulnerability
- = program that blocks access to files or block use of the device until a ransom is paid
- = a network security system that acts as a barrier between a trusted internal network and untrusted external networks (like the Internet).
- = any potential malicious act, event, or person aiming to illegally access, damage, disrupt, or steal data, networks, or digital devices
- = a set of rules, regulations, and guidelines that dictate how an organization protects its data and IT infrastructure.
- Day = an attack that takes advantage of code flaws that have VERY recently been discovered.
- = The use of bogus emails and websites to trick you into confidential information
- = is a programmatic approach to educating staff on information security risks, including e-learning, newsletters, and simulations (e.g., phishing campaigns) to change behavior and reduce human error.
- = a set of changes (code updates) to a computer program or its supporting data designed to update, fix, or improve it.
- Control = a security method that regulates who or what can view or use resources in a computing environment.
- = any code or application designed to damage, disrupt, or steal data from computer systems
19 Clues: = the process of securing a system by reducing its surface of vulnerability • = files that appear to be legitimate programs, but really contain malicious code. • = The use of bogus emails and websites to trick you into confidential information • = program that blocks access to files or block use of the device until a ransom is paid • ...
Guess The Word 2022-06-27
Across
- blower Report certain types of wrongdoing
- Group of people for decision making
- of conduct A set of rules
- The act of obeying an order, rule, or request
- Possibility of loss or injury
Down
- A set of guidelines
- Protection of internet-connected system
- An official inspection
- An event that is either unpleasant or unusual
- of interest Clash between personal and professional duties
10 Clues: A set of guidelines • An official inspection • of conduct A set of rules • Possibility of loss or injury • Group of people for decision making • Protection of internet-connected system • blower Report certain types of wrongdoing • An event that is either unpleasant or unusual • The act of obeying an order, rule, or request • ...
Crossword #2 2025-09-07
Across
- Harvest Fest's star performer
- Office responsible for prospective student tours
- Java's "fruity" event during Laurentian Weekend
- "My Son The Doctor" opening band
- Department found on the third floor of Johnson Hall of Science
Down
- Recently deceased Italian designer
- SLU's newest major
- Theme cottage newly relocated to 72 Park St
- The Singing _____, famous for their red blazers
- Editor-in-chief Donnellan-Doser
10 Clues: SLU's newest major • Harvest Fest's star performer • Editor-in-chief Donnellan-Doser • "My Son The Doctor" opening band • Recently deceased Italian designer • Theme cottage newly relocated to 72 Park St • The Singing _____, famous for their red blazers • Java's "fruity" event during Laurentian Weekend • Office responsible for prospective student tours • ...
FY26-Q1 2025-10-15
Across
- Workstation compliance training goes live in this month
- Under privacy law, it means “forget about me”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- Top-performing Market for SBS
- Helps out with meeting notes
Down
- If DORA’s vertical, NIS2 must be this
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- January training: “Call ___”
- CCPA fine was issued in this country
11 Clues: January training: “Call ___” • Helps out with meeting notes • Top-performing Market for SBS • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Complete by November: “Secure use of ___” • Cybersecurity Awareness Month theme this year • Under privacy law, it means “forget about me” • Leaves the forum when they don’t consent to one • ...
NAVFAC Capabilities 2023-02-15
Across
- ________Facilities and Equipment Engineering
- Definition: detailed coordination of a complex operation involving people, facilities, or supplies.
- Definition: a proposed or planned undertaking
- Definition: Relating to impact of human activity on the natural world
- Definition: Protection against criminal or unauthorized use of electronic data
- Definition: Basic physical and organizational structures and facilities
- ________ Handling Ashore Procurement
Down
- NAVFAC Capabilities: _________ & Facility Operations
- _______ and Facilities Operations
- _________ Vehicles provide transportation services
- Real Estate _________ and Management
- NAVFAC Capabilities: ______ & Construction
- NEPA regulations requirement
13 Clues: NEPA regulations requirement • _______ and Facilities Operations • Real Estate _________ and Management • ________ Handling Ashore Procurement • NAVFAC Capabilities: ______ & Construction • ________Facilities and Equipment Engineering • Definition: a proposed or planned undertaking • _________ Vehicles provide transportation services • ...
Reasons why Singapore is Safe / Not Safe 2024-07-23
Across
- emphasis on racial and religious [] reduces radicalisation
- [] to regional terrorist hotspots
- strong [] measures and proactive Internal [] Department
Down
- reduced vigilance over time
- public cooperation via programmes like []
- online platforms spreading [] ideologies
- advanced surveillance and cybersecurity[]
7 Clues: reduced vigilance over time • [] to regional terrorist hotspots • online platforms spreading [] ideologies • public cooperation via programmes like [] • advanced surveillance and cybersecurity[] • strong [] measures and proactive Internal [] Department • emphasis on racial and religious [] reduces radicalisation
Module 1 Introductory Course Telehealth 2017-03-02
Across
- acronym for information and communication technology
- word used interchangeably with telecare
- used to monitor vital signs remotely
- nurses engaged in remote service delivery
- computer-based medical records
- the ability of computers to exchange information
- measures taken to protect computer/computer systems
- the use of smartphones to provide healthcare
Down
- virtual, medical, health, and educational services
- in real time
- emerging umbrella term; intersection of technology and healthcare
- live visual connection between two or more people
- the "e" in this term stands for many things
- term referring to teleconsultations
- electronic component used to provide input and detect changes
15 Clues: in real time • computer-based medical records • term referring to teleconsultations • used to monitor vital signs remotely • word used interchangeably with telecare • nurses engaged in remote service delivery • the "e" in this term stands for many things • the use of smartphones to provide healthcare • the ability of computers to exchange information • ...
Reynolds and Reynolds Puzzle 2025-06-17
Across
- On Auto Selling accessories at the dealership
- AI Flare of genius in automotive intelligence
- Experts in Dealership Cybersecurity and IT Management
- Access to every touchpoint your customers have with your entire dealership
- Trak Stores, tracks, and audits your keys. First word.
- Provide customers accurate service estimates in seconds (abbr.)
- Pay All-in-one payment processing solution for dealerships
- Podcast Featuring Greg Uland
Down
- Sales stage before signatures
- Parts Runner
- Just ask Avery
- _ _ _ _ Newsletter
- Pad Sign and store deal documents electronically from the beginning.
- Anywhere Dealership-wide approach to sell and service vehicles
- IGNITE RMS
15 Clues: IGNITE RMS • Parts Runner • Just ask Avery • _ _ _ _ Newsletter • Podcast Featuring Greg Uland • Sales stage before signatures • On Auto Selling accessories at the dealership • AI Flare of genius in automotive intelligence • Experts in Dealership Cybersecurity and IT Management • Trak Stores, tracks, and audits your keys. First word. • ...
Computer number system and Internet 2025-05-29
Across
- Number system that consists of 16 digits
- Also known as unethical hackers
- Using illegal methods to get money
- Code that a computer only understands
- A popular antivirus software
- Harming using information technology in a deliberate manner
- Attacked first and then forced to pay money to stop attacks
Down
- Number system that consists of 8 digits
- Illegal entry into a computer system
- Number system consisting of 10 digits
- A program that disrupts the normal functioning
- Program designed to protect networks and computers
- Misusing someone's personal information
- Hoaxing or misleading a person
- To conduct terrorism through computers and internet
15 Clues: A popular antivirus software • Hoaxing or misleading a person • Also known as unethical hackers • Using illegal methods to get money • Illegal entry into a computer system • Number system consisting of 10 digits • Code that a computer only understands • Number system that consists of 8 digits • Misusing someone's personal information • ...
Security Audit Quiz 2025-11-18
Across
- The probability of a threat exploiting a vulnerability.
- NIST CSF function focused on safeguarding assets
- Final step of an audit process.
- Checking compliance to documented requirements.
- A weakness that can be exploited.
- A potential cause of an unwanted incident.
- Ability to track actions back to individuals or systems.
- U.S. body responsible for cybersecurity standards.
Down
- The defined boundary of an audit.
- measures implemented to reduce risk.
- Level of harm from a compromise.
- Unauthorized attempt to access a system.
- Critical element of CIA triad.
- Testing to confirm proper implementation.
- Adhering to required standards or regulations.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • The defined boundary of an audit. • A weakness that can be exploited. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
Cybersecurity 2022-09-08
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an extra layer of security • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • A scammer is trying to rush you
CYBER CROSSSWORD 2022-10-29
7 Clues: gatekeeper of computer • stealing of information • information technology security • imitating others to gain some information • using computer power to generate cryptocurrency • one who illegally tries to breach others' system • malware preventing users from accessing their system
2016-06-23
Across
- if someone gives you _______
- play tennis with it
- live next door to you
- step by step
- to measure heart rate
- another word for drunk
- there was a ______ of items on the shelf
Down
- put on the internet to stop viruses and bullies
- fellow members
- you are so _______ for not feeding the pet
- the ____ in the supermarket was packed full of people
- given to you after you buy an item
- not clear of plain
- an optical instrument
- a wedge like tool with a cutting edge at the end of the blade
- a French expression for accomplishment Or success
16 Clues: step by step • fellow members • not clear of plain • play tennis with it • live next door to you • an optical instrument • to measure heart rate • another word for drunk • if someone gives you _______ • given to you after you buy an item • there was a ______ of items on the shelf • you are so _______ for not feeding the pet • put on the internet to stop viruses and bullies • ...
Technology Vocabulary Words 2023-05-08
Across
- a global computer network
- Central processing unit
- an electronic device for storing and processing data
- a series of coded software instructions
- stores data on a disk
- a programing language
- Artificial intelligence
- example- crome
- you send this on a computer
Down
- interconnected computing devices that can exchange data
- an organized collection of information on a computer system
- a device used for multiple purposes
- the state of being protected against the criminal or unauthorized use of electronic data
- physical components of a computer
- facts and statistics collected together for reference or analysis
- a set of instructions used to operate computer tasks
16 Clues: example- crome • stores data on a disk • a programing language • Central processing unit • Artificial intelligence • a global computer network • you send this on a computer • physical components of a computer • a device used for multiple purposes • a series of coded software instructions • an electronic device for storing and processing data • ...
The Big Friday Crossword 2025-04-25
Across
- - The best of AI
- – A unit of image resolution equivalent to 1000000 pixels
- League - Inclusive rights to Europe’s second tier football competition
- – Your grandparents love this brand
- – Isaac newton
- – You can see my insides but I don’t exist. Yet you can still make calls.
- – A big partner specialising in computing and gaming.
- – the biggest show out at the moment available on Now Entertainment through EE
- – Free with ess plus up
Down
- – and chill
- – Assumptive sell
- – Find Ted Lasso here
- – Movie star who has close ties to EE
- – Im not fast but I still work
- – Cybersecurity with…
- – Nintendo’s newest console launch
16 Clues: – and chill • – Isaac newton • - The best of AI • – Assumptive sell • – Find Ted Lasso here • – Cybersecurity with… • – Free with ess plus up • – Im not fast but I still work • – Nintendo’s newest console launch • – Your grandparents love this brand • – Movie star who has close ties to EE • – A big partner specialising in computing and gaming. • ...
GLOBAL IT TRENDS 2026-01-04
Across
- Digital money technology(10)
- AI that creates original content like text or images (10)
- Secure login method(10)
- Computing over the internet(14)
- Software delivered via browser(4)
- AI that can reason, plan, and act autonomously (7).
- Automated customer support bots(8)
Down
- Internet-connected smart devices(3)
- A robot designed to work alongside humans (5)
- Online threat protection(9)
- Tool for automating container deployment(10)
- Type of computing that uses qubits to solve complex problems (7)
- Securing digital systems(13)
- High-speed satellite internet service (8)
- Technology using virtual worlds(9)
- Combining software development and IT operations(6)
16 Clues: Secure login method(10) • Online threat protection(9) • Digital money technology(10) • Securing digital systems(13) • Computing over the internet(14) • Software delivered via browser(4) • Technology using virtual worlds(9) • Automated customer support bots(8) • Internet-connected smart devices(3) • High-speed satellite internet service (8) • ...
Science & Technological Progress 2025-11-27
Across
- reality – Technology that overlays digital images onto the real world.
- engineer(ing) – Modifying genes to change biological traits.
- – Conducting tests to discover something new.
- – A new idea, method, or device.
- – A major scientific discovery.
- – Science at the level of atoms and molecules.
- reality – A computer-generated 3D environment.
- – Protecting computer networks from attacks.
Down
- – Using machines to perform tasks without human input.
- – Technology dealing with robot design and use.
- exploration – Study and travel beyond Earth.
- – Highly advanced; modern.
- concerns – Moral issues linked to new technology.
- – Information used for analysis.
- – Technology applied to living organisms.
- (Artificial intelligence) – Machines that can think or learn.
16 Clues: – Highly advanced; modern. • – A major scientific discovery. • – Information used for analysis. • – A new idea, method, or device. • – Technology applied to living organisms. • exploration – Study and travel beyond Earth. • – Protecting computer networks from attacks. • – Conducting tests to discover something new. • – Science at the level of atoms and molecules. • ...
Current affairs: Recent global and national event. 2025-10-28
Across
- Process where people vote for leaders.
- Measure of a country's economic output (abbr).
- Biological preparation to boost immunity.
- Penalties applied by countries for policy reasons.
Down
- Practice of protecting internet systems.
- Artificial Intelligence (abbr).
- International climate conference in 2023 (abbr).
- General rise in prices over time.
8 Clues: Artificial Intelligence (abbr). • General rise in prices over time. • Process where people vote for leaders. • Practice of protecting internet systems. • Biological preparation to boost immunity. • Measure of a country's economic output (abbr). • International climate conference in 2023 (abbr). • Penalties applied by countries for policy reasons.
CHPW Cybersecurity 2019-10-28
Across
- caused by programming weaknesses in software
- CHPW's secure email gateway
- software that redirects your browse, or monitor the websites you visit
Down
- software that captures your keystrokes
- people who seek to exploit weaknesses in software and computer systems
- when to report if your computer or mobile device becomes lost or stolen
- code that exploits programming weaknesses of software
- type of malicious code
8 Clues: type of malicious code • CHPW's secure email gateway • software that captures your keystrokes • caused by programming weaknesses in software • code that exploits programming weaknesses of software • people who seek to exploit weaknesses in software and computer systems • software that redirects your browse, or monitor the websites you visit • ...
CyberSecurity 1 2024-08-15
Across
- online bullying
- a user that did not have permission
- intent to do something to be helpful
- someone who accesses things that are not theirs
- intent to do something for bad reasons
- a user who did have permission
Down
- Acronym for Personal Identifiable Information
- a user who did not have permission but did not cause harm
8 Clues: online bullying • a user who did have permission • a user that did not have permission • intent to do something to be helpful • intent to do something for bad reasons • Acronym for Personal Identifiable Information • someone who accesses things that are not theirs • a user who did not have permission but did not cause harm
Cybersecurity 1 2024-05-07
Across
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A weakness or flaw in a system that can be exploited by attackers.
- The process of converting data into a code to prevent unauthorized access.
Down
- The process of verifying the identity of a user or system.
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
- A secret combination of characters used to authenticate users and protect accounts.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
Cybersecurity Crosswords 2024-10-17
Across
- Any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization
- Program that maliciously takes advantage of vulnerabilities or security flaws in software
- The act of disguising a communication from an unknown source as being from a known, trusted source by impersonating a domain
- Two or more ways of authentication e.g. pincodes,OTPs
Down
- The process of protecting information or data by scrambling it in such a way that only the parties who have the key to unscramble it can access it
- Fraudulent Email sent to people to share their personal info by pretending to be legitimate business or person
- A type of malware or malicious software that can replicate rapidly and spread across devices within a network
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages
8 Clues: Two or more ways of authentication e.g. pincodes,OTPs • Program that maliciously takes advantage of vulnerabilities or security flaws in software • Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages • ...
CyberSecurity 1 2025-02-05
Across
- A type of attack where a hacker overloads a server with traffic to make it crash.
- A type of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- A method of encoding data to protect its confidentiality.
- A security method that requires two forms of identification, such as a password and a fingerprint.
- A commonly used firewall bypass technique that hides the source IP address.
Down
- The practice of defending systems and networks from digital attacks.
- A system that detects and prevents unauthorized access to computer networks.
- The act of impersonating a legitimate entity to steal sensitive information.
8 Clues: A method of encoding data to protect its confidentiality. • The practice of defending systems and networks from digital attacks. • A commonly used firewall bypass technique that hides the source IP address. • A system that detects and prevents unauthorized access to computer networks. • ...
Cybersecurity Crossword 2025-10-29
Across
- someone who attempts to gain access to your system without authorization
- the key to your accounts and information
- the kinds of links you want to avoid
- malicious programs that can infect your workstation
Down
- knowing what you are interacting with
- an attempt to get your information through emails and malicious means
- programs that run on your computer
- how you ensure your password cannot be guessed
8 Clues: programs that run on your computer • the kinds of links you want to avoid • knowing what you are interacting with • the key to your accounts and information • how you ensure your password cannot be guessed • malicious programs that can infect your workstation • an attempt to get your information through emails and malicious means • ...
CyberSecurity Awareness 2020-09-29
Across
- a method used to get you to click on malware
- everyone must use their's when entering building
- information not meant for sharing
- often hidden in email attachments
Down
- take sensitive conversations somewhere _______
- meant for specific employees only
- unique way of authenticating yourself
- when our information is compromised
8 Clues: meant for specific employees only • information not meant for sharing • often hidden in email attachments • when our information is compromised • unique way of authenticating yourself • a method used to get you to click on malware • take sensitive conversations somewhere _______ • everyone must use their's when entering building
Cybersecurity Awareness 2021-09-24
Cybersecurity Crossword 2024-10-29
Across
- Any software designed intentionally to cause damage to a computer, server, or network.
- A type of malware that encrypts your files and demands payment for their release.
- Rubber Ducky devices often perform a ______ injection attack in order to run unauthorized commands.
- An attacker sends a fake email pretending to be a trusted entity in a ______ attack.
Down
- A ______ records each key pressed on a keyboard, often to steal passwords.
- A process of converting information into ciphertext to prevent unauthorized access, usually applied in ransomware attacks.
- Short range wireless technology used in wireless earbuds and smartwatches but can be hacked by also used by devices like Flipper Zero.
- Artificial intelligence can create a ______, where someone’s face or voice is replaced or altered to appear realistic.
8 Clues: A ______ records each key pressed on a keyboard, often to steal passwords. • A type of malware that encrypts your files and demands payment for their release. • An attacker sends a fake email pretending to be a trusted entity in a ______ attack. • Any software designed intentionally to cause damage to a computer, server, or network. • ...
Cybersecurity Safeguards 2024-03-19
Across
- something you create so only you can access accounts
- believing someone will keep you safe
- ridges that help you grab onto objects
- all the information about you that makes you different from other people
Down
- another word for internet safety
- to keep safe from harm
- to be free from danger or harm
- information you don't want everyone to know
8 Clues: to keep safe from harm • to be free from danger or harm • another word for internet safety • believing someone will keep you safe • ridges that help you grab onto objects • information you don't want everyone to know • something you create so only you can access accounts • all the information about you that makes you different from other people
Cybersecurity Crossword 2025-07-15
Across
- A type of malicious software that demands money to unlock your files.
- The process of turning data into something more secure so people can't understand it.
- Software that secretly monitors your actions on a computer or phone.
Down
- A harmful program that tricks you into thinking it's something safe.
- A hidden method of accessing a computer system without the user's knowledge.
- A digital document that verifies the identity of a website or server.
- Self-replicating malware that spreads across networks, often causing damage.
- A scam that uses fake emails or websites to steal personal information.
8 Clues: A harmful program that tricks you into thinking it's something safe. • Software that secretly monitors your actions on a computer or phone. • A digital document that verifies the identity of a website or server. • A type of malicious software that demands money to unlock your files. • A scam that uses fake emails or websites to steal personal information. • ...
cybersecurity Kader 2026-01-04
Across
- A person who uses computers to gain unauthorized access to data
- A network security device that monitors traffic and blocks unauthorized access
- A software error or flaw that can be exploited by hackers
- A temporary code or object used to verify your identity
Down
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an email.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system
- A type of malware that locks your files and demands payment to release them
- The process of scrambling data so it becomes unreadable without a specific key
8 Clues: A temporary code or object used to verify your identity • A software error or flaw that can be exploited by hackers • A person who uses computers to gain unauthorized access to data • A type of malware that locks your files and demands payment to release them • A network security device that monitors traffic and blocks unauthorized access • ...
