cybersecurity Crossword Puzzles
ICS and Hydropower 2024-04-02
Across
- Turbine type operating from fluid pressure.
- System distributing control for efficiency.
- Height of water used to generate pressure.
- Mechanism for moving or controlling a system.
- Protection against digital attacks.
- Interface for human interaction with machines.
- Device detecting changes in environment.
- Device for converting fluid flow into energy.
- A type of turbine used in low-head applications.
Down
- Movement of water through a system.
- Pipe channeling water to turbines.
- Converts mechanical energy to electrical.
- System for remote monitoring and control.
- A communication protocol for devices.
- Type of turbine driven by water jet.
- Programmable controller critical in automation.
- Storage space for water.
- A type of turbine used in medium to high-head applications.
- Security system for network defense.
- Device for remote utility control.
20 Clues: Storage space for water. • Pipe channeling water to turbines. • Device for remote utility control. • Movement of water through a system. • Protection against digital attacks. • Type of turbine driven by water jet. • Security system for network defense. • A communication protocol for devices. • Device detecting changes in environment. • ...
TTS INFORMATIKA 2025-04-10
Across
- Teknologi yang menunjukkan animasi yang berisi unsur budaya
- Memindahkan koneksi internet ke lokasi berbeda sehingga lebih aman saat berselancar
- Mesin pencari dikenal dengan istilah
- Pekerjaan yang menjaga keamanan siber
- Aplikasi pengolah data angka dari Microsoft
- Sintaks pencarian dari Google
- Profesional yang membuat sistem
- Hak kekayaan intelektual berupa lagu atau film
- Simbol atau tanda milik suatu merek
- Mesin pencari selain Google
- Tindakan menyebar konten ke masyarakat
- Hak untuk menggunakan konten tertentu
Down
- Informasi yang mengandung tidak ada kebenaran
- Yang bukan hukum digital (hukum siber – syber law)
- Seseorang yang menciptakan aplikasi
- Kata kunci untuk mencari informasi di internet
- Jenis profesi pembuat perangkat lunak
- Mendeteksi dan menghapus perangkat lunak berbaha
- Profesi bidang data dan informasi
- Bahasa pemrograman web
- Hak cipta dan merek termasuk dalam
21 Clues: Bahasa pemrograman web • Mesin pencari selain Google • Sintaks pencarian dari Google • Profesional yang membuat sistem • Profesi bidang data dan informasi • Hak cipta dan merek termasuk dalam • Seseorang yang menciptakan aplikasi • Simbol atau tanda milik suatu merek • Mesin pencari dikenal dengan istilah • Pekerjaan yang menjaga keamanan siber • ...
IT Terms 2025-05-15
Across
- Internet-based delivery of IT resources.
- Software to manage customer interactions.
- Two-symbol system used by computers.
- Computer system within a larger system.
- Plan for continuing business during disruption.
- Simulates human intelligence in machines.
- Processes and executes instructions (abbr).
- Network of physical devices sharing data.
- Unique address for a device on a network.
- Device connected to a network.
- Visual interface with icons and menus.
- Tech and strategy for analyzing business data.
Down
- Stores data temporarily for quick access.
- Organized collection of electronic data.
- Protects systems from digital threats.
- Converts data into code for security.
- Group of connected computers sharing rules.
- Security device that filters traffic.
- Finding and fixing code issues.
- Set of rules for communication between software components.
20 Clues: Device connected to a network. • Finding and fixing code issues. • Two-symbol system used by computers. • Converts data into code for security. • Security device that filters traffic. • Protects systems from digital threats. • Visual interface with icons and menus. • Computer system within a larger system. • Internet-based delivery of IT resources. • ...
CYBER AWARENESS 2024-11-02
Across
- A group of experts dedicated to responding to computer security incidents.
- The practice of protecting computer systems and networks from digital attacks.
- The process of converting data into an unreadable format to protect it from unauthorized access.
- Acronym for the process of collecting and analyzing publicly available information to gain insights.
- The unauthorized access to computer systems or networks.
- A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- A security system that monitors and controls network traffic.
- The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- Malicious software designed to harm computer systems or networks.
- A network of compromised computers controlled by an attacker.
Down
- Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- Malware that encrypts a victim's data and demands a ransom for its decryption.
- Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- The likelihood of a threat exploiting a vulnerability and causing harm.
- A weakness in a system or network that can be exploited by attackers.
- A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- Web A part of the internet that is not indexed by search engines and requires special software to access.
- A group of information security experts who respond to malware attacks or other computer security incidents.
- Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- Illegal activities committed using computer networks or devices.
24 Clues: The unauthorized access to computer systems or networks. • A security system that monitors and controls network traffic. • A network of compromised computers controlled by an attacker. • Illegal activities committed using computer networks or devices. • Malicious software designed to harm computer systems or networks. • ...
Cybersecurity Awareness Month Crossword 2018-09-28
Across
- A form of malware that replicates across computer systems by infecting another piece of software
- Software that runs on the endpoint and prevents malware from accessing the system
- An appliance that sits between your network and the Internet and scans all data passes through
- An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
- These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
- When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
- Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
- These spread across computer systems but self-replicates rather than infecting other software
- A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
- Any software intended to damage, disable or take control of a computer system without the owner’s consent
- This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
- A hacker that sees their activity as political activism
- Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
- A series of software tools that enable an attacker to take control of an operating system at the root level
- A highly targeted phishing attack with information typically acquired through social engineering
- This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
- The process of encoding information so that only authorized individuals can access it
17 Clues: A hacker that sees their activity as political activism • Software that runs on the endpoint and prevents malware from accessing the system • The process of encoding information so that only authorized individuals can access it • These spread across computer systems but self-replicates rather than infecting other software • ...
Technology 2025-06-26
6 Clues: small useful device. • improved or made better. • picture of a screen display. • person who loves technology. • video games in virtual reality. • protection of computers and data.
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Kuis Audit TI 2024-03-04
Across
- sistem manajemen audit yang digunakan Itjen
- Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
- pengendalian proses hanya melihat input dan output
- Salah satu area audit TIK
Down
- Memastikan keselarasan bisnis dan TIK
- pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
- Audit TIK terintegrasi yang dilakukan secara bersamaan
- Audit TIK terintegrasi yang dilakukan secara berurutan
- Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
- singkatan dari pengendalian aplikasi
- Pengujian secara sistematis untuk memberikan keyakinan terbatas
11 Clues: Salah satu area audit TIK • singkatan dari pengendalian aplikasi • Memastikan keselarasan bisnis dan TIK • sistem manajemen audit yang digunakan Itjen • pengendalian proses hanya melihat input dan output • Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK • Audit TIK terintegrasi yang dilakukan secara bersamaan • ...
Vanessa and Jinsik <3 2024-09-06
Across
- How many months have Vanessa and Jinsik been together?
- How many people are in the wedding party?
- Where do Vanessa and Jinsik live?
- How did Vanessa and Jinsik meet?
- How old is Vanessa?
- Where did Jinsik propose?
Down
- What does Jinsik do for work?
- Where are Vanessa and Jinsik going for their honeymoon?
- How old is Jinsik?
- What holiday did Vanessa and Jinsik first spend together?
- How many kids do Vanessa and Jinsik want?
11 Clues: How old is Jinsik? • How old is Vanessa? • Where did Jinsik propose? • What does Jinsik do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • How many months have Vanessa and Jinsik been together? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Group 1 - CSE 167 2022-11-16
Across
- What's the weakest element in Cybersecurity
- The fake folder that acts as bait for hackers.
- The I in the CIA Triad
- The A in the CIA Triad
- All companies should have a ____ framework
Down
- The C in the CIA Triad
- An area that a hacker can use for their benefit
- Websites identify
- A type of key to use in Asymmetric encryption
- How to make a message secret.
- A copy of data that could be lost
11 Clues: Websites identify • The C in the CIA Triad • The I in the CIA Triad • The A in the CIA Triad • How to make a message secret. • A copy of data that could be lost • All companies should have a ____ framework • What's the weakest element in Cybersecurity • A type of key to use in Asymmetric encryption • The fake folder that acts as bait for hackers. • ...
FY26 Q1 2025-10-14
Across
- January training: “Call ___”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- CCPA fine was issued in this country
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- Workstation compliance training goes live in this month
- If DORA’s vertical, NIS2 must be this
Down
- Under privacy law, it means “forget about me”
- Top-performing MU for SBS
- Fined 5.8 million AUD over data breach
11 Clues: Top-performing MU for SBS • January training: “Call ___” • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Fined 5.8 million AUD over data breach • Complete by November: “Secure use of ___” • Under privacy law, it means “forget about me” • Cybersecurity Awareness Month theme this year • Leaves the forum when they don’t consent to one • ...
Information and Cyber Security 2021-03-29
Across
- uses asymmetric key encryption
- person who performs a social engineering attack
- What will freezing your credit not affect?
- For online shopping it's best to use...?
Down
- most valuable to companies looking to sell you something
- Requires a carrier file to self-replicate
- What information do you need to set up a wireless access point?
- When is it ok to reuse a password?
- Cyber security month
- Weakest link in cybersecurity
- Continually bombarding a targeted network with fake requests
11 Clues: Cyber security month • Weakest link in cybersecurity • uses asymmetric key encryption • When is it ok to reuse a password? • For online shopping it's best to use...? • Requires a carrier file to self-replicate • What will freezing your credit not affect? • person who performs a social engineering attack • most valuable to companies looking to sell you something • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Total Defence Crossword Puzzle 2025-02-15
Across
- The state of being safe from harm.
- The country that practices Total Defence.
- A serious situation that needs immediate action.
- People who serve in the army to protect the country.
- Living together peacefully despite differences.
- Protection against threats or danger.
Down
- Protecting computers and networks from attacks.
- Working together to achieve a common goal.
- Being prepared for any situation.
- The quality of being strong, physically or mentally.
- The ability to recover from challenges or difficulties.
11 Clues: Being prepared for any situation. • The state of being safe from harm. • Protection against threats or danger. • The country that practices Total Defence. • Working together to achieve a common goal. • Protecting computers and networks from attacks. • Living together peacefully despite differences. • A serious situation that needs immediate action. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk to someone that is far from you.
- A process or set of rules that solve a specific problem.
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- It's used to protect data encoding the information.
15 Clues: Intenet of things. • The smallest technology. • Aereal no tipulated devices • Smallest unity of information • Programmable machine to automate processes • Generally, the not physical about a computer. • It's used to talk to someone that is far from you. • It's used to protect data encoding the information. • Small electronic devices that make your life easier. • ...
Electricity back 2023-05-30
Across
- Measures the voltage in a circuit
- Measurement of electrical power
- Power lines connecting power supplies to homes in a large area
- A place to plug in a device
- Power used by a device
- Makes your hair stand up, gives a shock
- Online protection
Down
- Too much power at one time
- Transfers electricity from one circuit to another with more or less power
- Portable power supply, can power a remote
- Anything that makes power, like a generator or a battery
- Protects us from electric shocks
- Measures the current in a circuit
- Adjusts the power in a circuit
- Happens again and again
15 Clues: Online protection • Power used by a device • Happens again and again • Too much power at one time • A place to plug in a device • Adjusts the power in a circuit • Measurement of electrical power • Protects us from electric shocks • Measures the voltage in a circuit • Measures the current in a circuit • Makes your hair stand up, gives a shock • ...
soca 2023-03-13
Across
- Type Gryphons plan & organize ______-___-___ competitions
- ______ organized the SOC Open House.
- SEED hosts the ___-___-Series
- SOCC’s _____ department is in charge of planning events
- Programming competition only for freshmen
- SOCA is In charge of ________ relations
- Gryphons aims to promote ________ to students that are passionate about IT
- SOCC is in charge of maintaining and building ________ relations
Down
- SPAI is part of the AI Singapore Student ________
- SPAI attended and presented at the ____ Conference.
- SOCA’s ________ department is the first point of contact with outside organizations.
- SEED stands for Sharing, _______, Enriching, Development
- Gryphon’s Mascot
- SPAI created its own Project _____.
- SOCC organized Freshman Orientation ______
15 Clues: Gryphon’s Mascot • SEED hosts the ___-___-Series • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations • Programming competition only for freshmen • SOCC organized Freshman Orientation ______ • SPAI is part of the AI Singapore Student ________ • SPAI attended and presented at the ____ Conference. • ...
BACO Conference Team Builder 2024-11-20
Across
- – The process of identifying and analyzing risks.
- – Violation of a law, duty, or agreement.
- – Abbreviation for Foreign Corrupt Practices Act.
- – Consequences for failing to follow regulations.
- – Recording and documenting compliance breaches.
- – Procedures to ensure proper operation of systems.
- – A professional responsible for managing compliance.
- – Protecting systems and data from cyber threats.
Down
- – Measures to prevent illicit financial activities.
- – A group responsible for overseeing ethical practices.
- – An in-house review of processes and systems.
- – The act of making information known.
- – Adherence to moral and ethical principles.
- – A set of rules outlining acceptable behaviors.
- – Relating to rules issued by governing bodies.
15 Clues: – The act of making information known. • – Violation of a law, duty, or agreement. • – Adherence to moral and ethical principles. • – An in-house review of processes and systems. • – Relating to rules issued by governing bodies. • – Recording and documenting compliance breaches. • – A set of rules outlining acceptable behaviors. • ...
PAW 2024 Crossword Puzzle 2024-05-16
Across
- Always access and transmit patient data ________.
- When faxing, ensure that the fax _____-sheet is free of any PHI.
- If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
- Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
- Always verify the source of emails and links ______ clicking.
- All access to personal health information must be limited to what is _________ to perform your job duties.
- Loss of _____ by patients and families may be one of the consequences of a privacy breach.
- When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
- The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
- If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
- When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
- A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
- Check twice that all information is the correct information for the correct person _____ to releasing it.
- If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
- All access to personal health information must be for a ____ -related need-to-know.
- Consent must be _________, whether it is written or verbal.
- ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
- Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
- Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
- If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
20 Clues: Always access and transmit patient data ________. • Consent must be _________, whether it is written or verbal. • Always verify the source of emails and links ______ clicking. • When faxing, ensure that the fax _____-sheet is free of any PHI. • All access to personal health information must be for a ____ -related need-to-know. • ...
Cybersecurity Fundamental Chapter 6 2022-10-27
Across
- protect data and information.
- writes data across multiple drives
- can actually improve availability.
- a system or component that is continuously operational for a given length of time.
- as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
- access to data and information reduces the possibility of a threat.
Down
- the most comprehensive protection.
- detects data errors
- assigns all resources of an organization into a group based on common characteristics.
- the weak links in the chain that can cause disruption of the organization's operations.
- analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- changing the controls and procedures at different layers.
- involves reducing the severity of the loss or the likelihood of the loss from occurring.
- combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
- ensures system availability in the event of a component failure.
- systems and services are available 99.999% of the time.
- store duplicate data on second drive.
17 Clues: detects data errors • protect data and information. • the most comprehensive protection. • writes data across multiple drives • can actually improve availability. • store duplicate data on second drive. • systems and services are available 99.999% of the time. • changing the controls and procedures at different layers. • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
English assignment 2024-11-25
Across
- the essence of knowledge
- deployed for the purpose of dealing harm
- a branch of IT tasked with protection of virtual assets
- a core part of identity of something
- a simplified idea for ease of use
Down
- another word for confidential
- given permissions based on confirmed identity
- a way of viewing and dealing with an issue
- to construct a new product
- a broad group within a company; battles a common issue
10 Clues: the essence of knowledge • to construct a new product • another word for confidential • a simplified idea for ease of use • a core part of identity of something • deployed for the purpose of dealing harm • a way of viewing and dealing with an issue • given permissions based on confirmed identity • a broad group within a company; battles a common issue • ...
FOP Crossword Puzzle 2023-03-28
Across
- SOCC is in charge of maintaining and building ________ relations.
- SPAI created its own Project _____.
- Gryphons plan & organize ______-___-___ competitions.
- SOCC organized Freshman Orientation ______.
- ______ organized the SOC Open House.
- Gryphons aims to promote ________ to students that are passionate about IT.
Down
- Programming competition only for freshmen.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
- SOCA is In charge of ________ relations.
- SEED hosts the ___-___-Series.
- SEED stands for Sharing, _______, Enriching, Development.
- DISM’s SIG.
- SPAI attended and presented at the ____ Conference.
- SPAI is part of the AI Singapore Student ________.
- SOCA’s ________ department is the first point of contact with outside organizations.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • Programming competition only for freshmen. • SOCC organized Freshman Orientation ______. • SPAI is part of the AI Singapore Student ________. • SPAI attended and presented at the ____ Conference. • ...
Viruses 2018-04-10
Across
- to preserve or keep safe from harm
- protection from hackers and viruses
- identify the presence of something concealed
- a malware that replicates itself in order to spread
- "in the ____" meaning it is still a threat to your computer
- software that is intended to damage or disable computers
- distributed denial of service
Down
- set of instructions for a computer
- tools, machinery, and other durable equipment
- electronic device for storing and processing data
- someone who uses computers to gain unauthorized access to data
- fake emails
- messages delivered by electronics
- a type of virus that disguises itself as something else
- corrupts your system and can be easily spread
15 Clues: fake emails • distributed denial of service • messages delivered by electronics • set of instructions for a computer • to preserve or keep safe from harm • protection from hackers and viruses • identify the presence of something concealed • tools, machinery, and other durable equipment • corrupts your system and can be easily spread • ...
XoXo Your BIg 2024-10-12
Across
- What do you call a fake noodle?
- Home to summer fun and seaside charm
- I named my car this
- My fav littles major
- America favorite fighting frenchman
- My favorite subject in school
Down
- What do you call a dinosaur with a extensive vocab
- My favorite little name
- My favorite day of the week
- What do you call a bear with no teeth?
- My favorite animal
- I call this salty place home
- My favorite color is
- I’m a dark elixir that many drink to kickstart their day
- I’m a sturdy substance often found underfoot, shaping landscapes and used for building
15 Clues: My favorite animal • I named my car this • My favorite color is • My fav littles major • My favorite little name • My favorite day of the week • I call this salty place home • My favorite subject in school • What do you call a fake noodle? • America favorite fighting frenchman • Home to summer fun and seaside charm • What do you call a bear with no teeth? • ...
Browsing safely 2025-05-26
Across
- Collection of technologies to prevent cybercrimes
- Prevents unauthorised access
- Process of befriending children on social media
- Committing crimes in your name after stealing your identity
- Conducting Terrorism online to cause fear and panic
- Illegal entry into computer systems
- A password valid for few minutes
- Designed to identify,prevent and remove viruses
- Hoaxing or misleading people online
Down
- Computer programs used to corrupt a computer system
- Criminal activity to harm a computer or internet connection
- Unethical hackers
- threat for people who use internet for online shopping,cash transactions and banking services
- Act of harming or harassing people online
- Tricking financial organisation to steal money online
15 Clues: Unethical hackers • Prevents unauthorised access • A password valid for few minutes • Illegal entry into computer systems • Hoaxing or misleading people online • Act of harming or harassing people online • Process of befriending children on social media • Designed to identify,prevent and remove viruses • Collection of technologies to prevent cybercrimes • ...
Online Bankling 2025-11-27
7 Clues: Email-based scam • Monthly account reports • A type of money transfer • Illegal financial activity • Protects data during transfer • Protection of computers, networks, and data from digital attacks. • A process used to verify a user’s identity before granting access.
PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17
Across
- Orang yang merancang dan mengembangkan perangkat lunak.
- Orang yang ahli dalam merancang rangkaian listrik.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang spesialis dalam keamanan informasi.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan cloud computing. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan layanan keamanan jaringan. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
WeWork Noble House Community 2022-06-25
Across
- Solving the world's 1 gigaton refrigerant problem
- Pioneer of global content service and distribution
- Offering lead generation services from B2B telemarketing to inside sales
- Supporting diverse clean energy entrepreneurs to thrive
Down
- #DemiMasaDepan #MakingEducationAffordable
- Consumer intelligence platform specializing in mobile advertising
- SaaS platform that makes cybersecurity accessible to all
- Logistics service provider
- Language learning platform, mainly Chinese
- Consumer electronics company, well-known for its technologically advanced smartwatch
10 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • SaaS platform that makes cybersecurity accessible to all • ...
PROFESI DAN PELUANG USAHA 2023-11-17
Across
- Orang yang spesialis dalam keamanan informasi.
- Orang yang merancang dan mengembangkan perangkat lunak.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang ahli dalam merancang rangkaian listrik.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan layanan cloud computing. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan keamanan jaringan. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
Enterprise manual 2022-06-21
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
Enterprise manual 2022-06-21
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
AI 2025-11-07
Across
- Kemampuan AI untuk membuat teks, gambar, atau musik disebut …
- Informasi yang bersifat pribadi dan rahasia disebut …
- Salah satu etika AI: tidak boleh … manusia
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang meniru cara berpikir manusia
- AI yang bisa bermain game disebut … AI
- Cybersecurity melindungi dari serangan …
- Teknologi yang memungkinkan komputer memahami bahasa manusia
- AI yang bisa meniru gaya tulisan disebut … AI
- Sistem yang menyimpan dan mengelola data disebut …
- AI yang bisa membuat video dari teks disebut … AI
- AI yang digunakan untuk menganalisis data disebut … AI
- AI bisa belajar dari … yang diberikan
- Sistem yang memverifikasi identitas pengguna, seperti kata sandi
- Cybersecurity melindungi dari serangan …
- AI yang bisa menghasilkan musik disebut … AI
- AI yang bisa mengenali objek dalam gambar disebut … AI
- Teknologi yang digunakan untuk melacak aktivitas pengguna disebut …
- AI harus digunakan secara … dan bertanggung jawab
- AI yang bisa memahami emosi disebut … AI
- Salah satu contoh penggunaan AI di sekolah adalah … otomatis
Down
- AI yang digunakan untuk mengenali suara disebut ...
- Salah satu risiko AI adalah … pekerjaan manusia
- AI yang digunakan untuk membuat gambar dari teks disebut … AI
- Program jahat yang merusak sistem komputer
- Salah satu bentuk pelanggaran etika AI adalah … data tanpa izin
- AI yang bisa menerjemahkan bahasa disebut … AI
- Serangan yang menipu pengguna agar memberikan informasi disebut …
- Kata lain dari keamanan informasi digital
- AI yang bisa berbicara dan menjawab disebut … AI
- AI bisa digunakan untuk membantu … tugas manusia
- Sistem keamanan yang menggunakan sidik jari disebut …
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang digunakan untuk mengenali wajah
- Salah satu risiko AI adalah penyebaran … palsu
- Kata sandi yang kuat harus sulit untuk …
- AI yang bisa membuat desain disebut … AI
- Sistem yang menyimpan data secara online disebut …
- Data pribadi harus dijaga agar tidak …
- AI yang digunakan untuk chatbot disebut … AI
- Serangan digital yang bertujuan mencuri data disebut …
41 Clues: AI bisa belajar dari … yang diberikan • AI yang bisa bermain game disebut … AI • Data pribadi harus dijaga agar tidak … • Cybersecurity melindungi dari serangan … • Kata sandi yang kuat harus sulit untuk … • AI yang bisa membuat desain disebut … AI • Cybersecurity melindungi dari serangan … • AI yang bisa memahami emosi disebut … AI • ...
Security Awareness Month 2025 2025-10-07
Across
- the credit card security audit we do
- Fastpass uses ____ to authenticate me to Okta.
- passwords should ____ be stored in plaintext
- the button to report a suspicious email
- the wiki code for the AI Knowledge Base
- our password manager tool
- phiches use ___ to pressure people to click or reply.
- Crowd____ is our AV software.
Down
- a pass____ is more memorable than a password
- the data classification for pii and credit card data
- ___@kayak.com where support tickets can be emailed
- ask-kayak-____ is the Slack channel for cybersecurity questions.
- our remote access tool
- ai tool to search all of kayak
- The Acceptable ____ Policy sets employee security rules
15 Clues: our remote access tool • our password manager tool • Crowd____ is our AV software. • ai tool to search all of kayak • the credit card security audit we do • the button to report a suspicious email • the wiki code for the AI Knowledge Base • a pass____ is more memorable than a password • passwords should ____ be stored in plaintext • ...
Starhub 2025-04-06
Across
- Division offering network and cybersecurity solutions
- What class are we in?
- The forecasted revenue was derived from ____ reports
- Streaming platform competing with PAYTV
Down
- The last presenter of the group
- Key transformation strategy Starhub is undergoing:___ +
- Type of strategy Starhub uses to shift from Telco to Digital solutions player
- Our recommendation on Starhub's shares
- The bargaining power of buyers is ___
9 Clues: What class are we in? • The last presenter of the group • The bargaining power of buyers is ___ • Our recommendation on Starhub's shares • Streaming platform competing with PAYTV • The forecasted revenue was derived from ____ reports • Division offering network and cybersecurity solutions • Key transformation strategy Starhub is undergoing:___ + • ...
R&D India Market Place 2022-11-09
Across
- own your_______
- ____ is at the core of our purpose, culture and business.
- Reducing the operational carbon emissions in our supply chain
- chairman and CEO
- one of our core values
- internal tool for mobility, projects and mentorships
Down
- IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
- We are Globally recognised for____
- one of our 6 long term commitments
9 Clues: own your_______ • chairman and CEO • one of our core values • We are Globally recognised for____ • one of our 6 long term commitments • internal tool for mobility, projects and mentorships • ____ is at the core of our purpose, culture and business. • Reducing the operational carbon emissions in our supply chain • ...
Cybersecurity 2020-08-21
Across
- They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
- the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
- it is the practice of protecting systems, networks and programs from digital attacks.
Down
- an electronic device to store and process data, in the way that the user wishes.
- Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.
5 Clues: an electronic device to store and process data, in the way that the user wishes. • it is the practice of protecting systems, networks and programs from digital attacks. • the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements. • ...
CYBERSECURITY 2021-09-28
crossword! 2024-02-03
Across
- Usually consists of 8 bits
- Invisible barrier for women advancing in the workplace
- left no crumbs
- Mentor applications are due on the _
- Film about under-recognized Black women at NASA who were a key part of its success
- Most commonly-used programming language
Down
- practice of protecting systems, networks, and programs from digital attacks
- Purdue's first women-centric hackathon ;)
- When women are generally paid less than men
- women in _
10 Clues: women in _ • left no crumbs • Usually consists of 8 bits • Mentor applications are due on the _ • Most commonly-used programming language • Purdue's first women-centric hackathon ;) • When women are generally paid less than men • Invisible barrier for women advancing in the workplace • practice of protecting systems, networks, and programs from digital attacks • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- A type of computer memory.
- A small portable computer.
Down
- Securing computer systems against unauthorized access.
- A popular operating system.
- The brain of a computer.
- Term for gaining access to a secure network through.
- Malicious software used to gain unauthorised access to computer systems.
- Desired outcomes.
10 Clues: Desired outcomes. • The brain of a computer. • A type of computer memory. • A small portable computer. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • ...
Technology & Innovation 2025-08-09
Across
- – The state of relying on something
- OFFICE – Working physically at a company's premises
- – Protection of computer systems from attacks
- – Introduction of new methods, ideas, or products
- – A mobile phone with advanced features
Down
- – Process of learning and acquiring knowledge
- – State of being free from public attention
- WORK – Working from home or another location outside the office
- – Short for Artificial Intelligence
- – Application of scientific knowledge for practical purposes
10 Clues: – The state of relying on something • – Short for Artificial Intelligence • – A mobile phone with advanced features • – State of being free from public attention • – Process of learning and acquiring knowledge • – Protection of computer systems from attacks • – Introduction of new methods, ideas, or products • OFFICE – Working physically at a company's premises • ...
Senior Management Knowledge 2024-12-25
Across
- Largest threat to Bank.
- Bank’s #1 Strength.
- Financial guide for the Bank.
- Beliefs about what will happen in the future.
- An unexpected event that could have a negative impact on the Bank.
- Fun for all associates.
- Coin or what people fear the most.
Down
- The ability of an asset to be quickly and easily converted to cash.
- The feeling or belief that one can rely on someone or something thing.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- A formal agreement to repay a debt.
- Number #1 challenge of FNB.
- Bank’s core system.
- Bank’s define market area.
- Official inspection or Necessity for all Banks.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
Senior Management Knowledge 2024-12-25
Across
- Number #1 challenge of FNB.
- The feeling or belief that one can rely on someone or something thing.
- Largest threat to Bank.
- An unexpected event that could have a negative impact on the Bank.
- Financial guide for the Bank.
- A formal agreement to repay a debt.
- Official inspection or Necessity for all Banks.
Down
- Bank’s #1 Strength.
- Coin or what people fear the most.
- Bank’s define market area.
- The ability of an asset to be quickly and easily converted to cash.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- Beliefs about what will happen in the future.
- Bank’s core system.
- Fun for all associates.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
Parole Cybercrociate 2021-04-23
Across
- Un particolare tipo di dato personale
- Nuovo social network fondato nel 2020
- Città che è una eccellenza mondiale nella Cybersecurity
- La casata rappresentata da un lupo nella serie "Trono di Spade"
- Il pizzo digitale
- Truffa che sfrutta la tecnologia VoiP
- Una delle tre dimensioni di sicurezza del dato
Down
- Probabilità per impatto
- E' una criptovaluta
- Il nome del processore ARM per Mac di Apple
- Rete di computer composta da dispositivi infettati da un malware “zombie”
- Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali
12 Clues: Il pizzo digitale • E' una criptovaluta • Probabilità per impatto • Un particolare tipo di dato personale • Nuovo social network fondato nel 2020 • Truffa che sfrutta la tecnologia VoiP • Il nome del processore ARM per Mac di Apple • Una delle tre dimensioni di sicurezza del dato • Città che è una eccellenza mondiale nella Cybersecurity • ...
Professor Sloan's Fun Facts 2025-04-23
Across
- What is the acronym for the New CS Building?
- What month was he born?
- What school did he earn his PhD from?
- What school did he go to for undergrad?
- What is one of his hobbies?
- What book did he write w/Richard Warner in 2021?
Down
- What is his job title?
- What event is he the Official Pronouncer for?
- How many years has he been at UIC?
- What is his favorite apparel to wear?
- What is his newest book about?
- Where was he born?
12 Clues: Where was he born? • What is his job title? • What month was he born? • What is one of his hobbies? • What is his newest book about? • How many years has he been at UIC? • What is his favorite apparel to wear? • What school did he earn his PhD from? • What school did he go to for undergrad? • What is the acronym for the New CS Building? • ...
Did you read it? 2020-10-16
Across
- Entries due NLT 11/2
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Do your Part.#BeCyberSmart
- Quality Management Principles
- Test Monthly
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Hacktivism Vocabulary Crossword 2 2023-05-09
Across
- protecting an organization and its employees against cyber threats
- a person or thing likely to cause damage or danger
- a hacker with bad intentions
Down
- an attempt by hackers to damage or destroy a computer network or system
- a legal hacker hired by a company or government
- reveal
- take something that is not yours
- to search
8 Clues: reveal • to search • a hacker with bad intentions • take something that is not yours • a legal hacker hired by a company or government • a person or thing likely to cause damage or danger • protecting an organization and its employees against cyber threats • an attempt by hackers to damage or destroy a computer network or system
Computer Science 2025-09-11
Across
- a graph that plots data using bars
- your credibility to use the internet
- bullying using the internet
- someone you should inform during a bullying situation
- online credentials to an account on the internet
- the Brains of the computer
- Your own information on the internet
- a person who witnesses bullying
Down
- a component that connects your major components of the computer
- usng someone else's work without giving credit to the author
- the physical components of a computer
- your history on the internet
- harmful to your computer/ the internet
- one of the most common software applications
- a place where people can connect with others
- The process of protecting yourself on the internet
16 Clues: the Brains of the computer • bullying using the internet • your history on the internet • a person who witnesses bullying • a graph that plots data using bars • your credibility to use the internet • Your own information on the internet • the physical components of a computer • harmful to your computer/ the internet • one of the most common software applications • ...
IELTS Science & Tech Vocabulary 2025-09-03
Across
- A sudden and important discovery or development
- The investigation of outer space through tech
- A new method, idea, or product
- Highly advanced and innovative
- Based on or guided by data
- The most advanced or sophisticated version available
- The imitation of intelligent human behavior
- The period characterized by the internet
- The gap between those with and without technology
Down
- Technology dealing with robots
- Involving advanced technological development
- High levels of technological development
- The use of machines to perform tasks without human involvement
- A digital space used for interaction or services
- The practice of protecting systems and networks from attacks
- Easy to understand or use
16 Clues: Easy to understand or use • Based on or guided by data • Technology dealing with robots • A new method, idea, or product • Highly advanced and innovative • High levels of technological development • The period characterized by the internet • The imitation of intelligent human behavior • Involving advanced technological development • ...
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- digital menciptakan pekerjaan baru berbasis → TEKNOLOGI
- besar yang digunakan untuk analisis bisnis disebut → BIGDATA
- baru berbasis teknologi disebut → STARTUP
- keuangan secara online disebut → EBANKING
- depan ekonomi digital bergantung pada literasi → DIGITAL
- dan GrabFood merupakan layanan → DIGITALDELIVERY
- merupakan singkatan dari → FINANCIALTECHNOLOGY
- pemerintah untuk mendukung ekonomi digital UMKM disebut → DIGITALISASIUMKM
- utama dalam ekonomi digital adalah keamanan data dan → PRIVASI
- melalui marketplace online termasuk kegiatan → EKOMERCE
- transaksi online dikenal dengan istilah → CYBERSECURITY
- ekonomi digital adalah kebocoran → DATA
Down
- buatan dikenal juga dengan istilah → ARTIFICIALINTELLIGENCE
- aplikasi fintech di Indonesia adalah → OVO
- ekonomi yang memanfaatkan teknologi digital dan internet → EKONOMIDIGITAL
- melalui media sosial disebut → DIGITALMARKETING
- Shopee, dan Lazada adalah contoh platform → MARKETPLACE
- utama ekonomi digital adalah mempercepat → TRANSAKSI
- tanpa uang tunai menggunakan kartu atau aplikasi disebut → EMONEY
- usaha kecil dapat menjangkau pasar luas melalui → INTERNET
20 Clues: ekonomi digital adalah kebocoran → DATA • baru berbasis teknologi disebut → STARTUP • keuangan secara online disebut → EBANKING • aplikasi fintech di Indonesia adalah → OVO • merupakan singkatan dari → FINANCIALTECHNOLOGY • melalui media sosial disebut → DIGITALMARKETING • dan GrabFood merupakan layanan → DIGITALDELIVERY • ...
TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A 2025-10-22
Across
- , Kegiatan ekonomi melalui media internet.
- ,Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- kredit , Alat pembayaran berbentuk kartu dari bank.
- , Aplikasi belanja online yang berwarna oranye.
- banking , Layanan bank yang sepenuhnya berbasis internet.
- Salah satu dompet digital terkenal di Indonesia.
- Sistem pembayaran tanpa uang tunai.
- , Sistem keamanan siber untuk perlindungan data.
- , Proses jual beli yang terjadi secara online.
- , Salah satu e-wallet milik Gojek.
Down
- Bentuk pasar digital tempat jual beli online.
- , Teknologi virtual yang berkembang bersama ekonomi digital.
- , Perusahaan teknologi keuangan disebut ...
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- , Mata uang kripto pertama di dunia.
- , Mata uang digital resmi dari bank sentral disebut.
- , Metode pembayaran dengan memindai kode.
- , Transaksi keuangan melalui jaringan komputer disebut ...
- Teknologi dasar dari mata uang kripto.
- Mata uang digital yang populer dan terdesentralisasi.
20 Clues: , Salah satu e-wallet milik Gojek. • Sistem pembayaran tanpa uang tunai. • , Mata uang kripto pertama di dunia. • Teknologi dasar dari mata uang kripto. • , Metode pembayaran dengan memindai kode. • , Kegiatan ekonomi melalui media internet. • , Perusahaan teknologi keuangan disebut ... • Bentuk pasar digital tempat jual beli online. • ...
Technology and Society 2024-09-02
Across
- A virtual representation of a person
- A digital platform for sharing and connecting
- A type of software that protects against malware
- A device used for communication and information
- The practice of protecting systems, networks
- The global network connecting millions of computers
Down
- The use of technology to perform tasks without human intervention
- A digital currency
- The buying and selling of goods and services over the internet.
- Online theft of personal information
10 Clues: A digital currency • A virtual representation of a person • Online theft of personal information • The practice of protecting systems, networks • A digital platform for sharing and connecting • A device used for communication and information • A type of software that protects against malware • The global network connecting millions of computers • ...
Technology 2025-06-16
Across
- an important discovery or development
- the use of machines to perform tasks without human intervention
- easy to use or understand
- a small electronic device with a specific function
- the trail of data left by users on the internet
- introducing new ideas or methods
Down
- knowledgeable about modern technology
- extremely modern and advanced
- measures taken to protect systems from cyber threats
- the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • knowledgeable about modern technology • an important discovery or development • the trail of data left by users on the internet • the simulation of human intelligence in machines • a small electronic device with a specific function • ...
Teka Teki Silang 2025-06-26
Across
- Profesi yang bertugas mendesain dan mengembangkan perangkat lunak
- Membuat dan menulis program komputer
- Orang yang mengelola jaringan komputer dalam suatu organisasi
- Orang yang mengoprasikan komputer dalam kehidupan sehari-hari
- Profesi yang membantu pengguna saat mengalami masalah teknis
Down
- Profesi yang bertugas merancang dan membangun halaman web
- Orang yang bertugas menjaga keamanan sistem dari serangan siber
- Profesi yang menganalisis kebutuhan sistem sebelum dibuat
- Komponen sistem komputer selain hardware dan software
- Orang yang menggunakan komputer
10 Clues: Orang yang menggunakan komputer • Membuat dan menulis program komputer • Komponen sistem komputer selain hardware dan software • Profesi yang bertugas merancang dan membangun halaman web • Profesi yang menganalisis kebutuhan sistem sebelum dibuat • Profesi yang membantu pengguna saat mengalami masalah teknis • ...
Cybersecurity Fundamentals - Chapter 3 2022-10-18
Across
- to make malicious website appear higher in search engine result.
- software that enables a criminal to obtain information about user's computer activities.
- an attack that targes high profile targets within an organization.
- impersonation of a legitimate website
- the program or code introduced by a criminal who has compromised a system
- malicious program that uses a trigger to awaken the malicious code
- malicious code that replicates by independently exploiting vulnerabilities.
- malware that carries out malicious operation under the guise of a desired operation.
- a malicious executable code attached to another executable file.
- known as junk mail
Down
- highly targeted phishing attack, that send customized emails to a specific person or individual.
- holds a computer system, or the data it contains, captive until the target makes a payment.
- alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
- a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
- persuades the user to take specific action based on fear
- displays annoying pop-ups to generate revenue for its authors.
- using voice communication technology and records message that appears legitimate.
17 Clues: known as junk mail • impersonation of a legitimate website • persuades the user to take specific action based on fear • displays annoying pop-ups to generate revenue for its authors. • to make malicious website appear higher in search engine result. • a malicious executable code attached to another executable file. • ...
Privacy Summit 2025 2025-01-06
Across
- Federal law governing information security management
- Hide one's IP address
- Unique code or number assigned to an individual
- Government watching
- Personal info stored online
- Cybersecurity sequence
- Measures to prevent hacking
- Threat of hacking or online attack or Reason to use strong passwords
- Code for secure messaging
- Alert to potential threat
- Not for public view
- Secure online account
Down
- Requirement of FOIA
- Secret information
- Method of identification using fingerprints or High-tech way to unlock your phone
- Protected from hacking
- Nameless online user
- Conceal online activity
- Personal info to be guarded
- Unauthorized access
- Right to keep info secret
- Shield from identity theft
- Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
- Document or file containing personal data
24 Clues: Secret information • Requirement of FOIA • Government watching • Unauthorized access • Not for public view • Nameless online user • Hide one's IP address • Secure online account • Protected from hacking • Cybersecurity sequence • Conceal online activity • Right to keep info secret • Code for secure messaging • Alert to potential threat • Shield from identity theft • ...
attempt 3 2025-07-10
Across
- The flavor of their wedding cake
- The instrument the groom played in high school
- Their first dance song
- The city they met in
- The name of their dog
- How many years the couple has been together
- The first movie they watched as a couple
- The bride's maiden name
- First concert they saw together
- number of pets the couple has
- The stone in the engagement ring
Down
- The country they visited last summer
- The street Sarah and Liam call home
- What did the groom study in college
- Name of Sarah's Maid of Honor
- The month they first met
- Sarah's middle name
- The month the couple got engaged
- Where did the proposal happen
- The color of the bridesmaid dresses
- Name of the Best Man
- Sarah's star sign
22 Clues: Sarah's star sign • Sarah's middle name • The city they met in • Name of the Best Man • The name of their dog • Their first dance song • The bride's maiden name • The month they first met • Name of Sarah's Maid of Honor • Where did the proposal happen • number of pets the couple has • First concert they saw together • The flavor of their wedding cake • The month the couple got engaged • ...
Cittadinanza digitale 2021-11-15
7 Clues: bullismo in rete • colui che infetta i file • la sicurezza informatica • il pirata del sistema informatico • parola segreta legata a un account • rete di computer che possono comunicare tra loro • insieme di regole per il buon comportamento su internet
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
CTE Pathway Lake Highlands HS 2022-11-16
7 Clues: Robotics Pathway (Level 4) • Legal Studies Magnet Pathway (Level 1) • Cybersecurity Magnet Pathway (Level 4) • Culinary Arts Magnet Pathway (Level 3) • Computer Science Magnet Pathway (Level 3) • Manufacturing Technology Magnet Pathway (Level 1) • Digital Communications -AV Production Pathway (Level 2)
High School Pathways 2024-04-26
7 Clues: Earn a welding certificate • Course towards medical fields • Take courses to become a teacher • Take courses in computer technology • Finish 2 years of your Bachelor's Degree • Take courses on building, carpentry work • Take courses about wildlife, plants and animals
Cybersecurity Crossword Puzzle 2023-04-17
Across
- Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- It is a software or hardware which is used to filter network traffic based on rules.
- It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- Is a software that operates on different OS which is used to prevent malicious software.
- security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- Is an action or event that might compromise the security.
- It is a malicious software that installs on your computer without your consent for a bad purpose.
- security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Is an assault on the system security that is delivered by a person or a machine to a system.
11 Clues: Is an action or event that might compromise the security. • It is a software or hardware which is used to filter network traffic based on rules. • Is a software that operates on different OS which is used to prevent malicious software. • Is an assault on the system security that is delivered by a person or a machine to a system. • ...
Unit 4 Cybersecurity 2022-03-02
Across
- a check for a secure BIOS operation
- when an information system receives protection from a pre-existing security controls
- software built into a piece of hardware
- securing devices by reducing the exposure
Down
- a more thorough hotfix
- quick fix for a software problem
- firewall command to block or allow certain user
- a device that acts as a file server
- proprietary journaling file system
- a guide for efficiency of a network
- network of high speed storage used by servers
11 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a check for a secure BIOS operation • a device that acts as a file server • a guide for efficiency of a network • software built into a piece of hardware • securing devices by reducing the exposure • network of high speed storage used by servers • ...
CYBERSECURITY AWARENESS - C40 2024-10-22
Across
- The process of analyzing systems for vulnerabilities (8 LETTERS)
- A program that replicates itself to spread malware (4 LETTERS)
- A security method where each user has specific privileges (6 LETTERS)
- Cybercriminals often use this method to monitor network activity (8 LETTERS)
- Using multiple types of information to verify identity (14 LETTERS)
- Security strategy that requires users to change this regularly (8 LETTERS)
Down
- Common method used to protect sensitive data (10 LETTERS)
- Fake emails claiming to be from trusted sources (8 LETTERS)
- A phrase longer than a password for added security (9 LETTERS)
- Network of infected computers controlled remotely (6 LETTERS)
- Program designed to prevent unauthorized access (8 LETTERS)
11 Clues: Common method used to protect sensitive data (10 LETTERS) • Fake emails claiming to be from trusted sources (8 LETTERS) • Program designed to prevent unauthorized access (8 LETTERS) • Network of infected computers controlled remotely (6 LETTERS) • A phrase longer than a password for added security (9 LETTERS) • ...
Luka's Cybersecurity Quizz 2024-03-20
Across
- Something that protect a network
- Symetrical encryption
- Keep a message unmodified
- Someone who doing hacking for there ethic
- Garanty that a message come from one person
- Something that encrypt or deencrypt a message
Down
- The possibility to access data
- Something that will damage your pc or things on it
- Privacy of a message
- A type of attack on a network
- Asymetrical encryption
11 Clues: Privacy of a message • Symetrical encryption • Asymetrical encryption • Keep a message unmodified • A type of attack on a network • The possibility to access data • Something that protect a network • Someone who doing hacking for there ethic • Garanty that a message come from one person • Something that encrypt or deencrypt a message • ...
National Cybersecurity Month 2022-09-16
Across
- SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
- A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
- AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
- A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
- A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
- COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
- THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
- MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
- A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
- USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
- EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING
11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING • A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM • COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER • MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK • ...
Cybersecurity for Seniors 2025-10-10
Across
- Be____when sharing credit card information
- Do not _____ passwords with anyone
- Signifies the protection of important information
- Do not ___ the same password
- ____ applications you don't use anymore
- Means keeping information unchanged and trustworthy
Down
- Turn off ____ on all applications
- ____ software when available
- _____ calls/texts/links from strangers
- Availability means making sure computers, websites and ___ are ready to be used
- When making an account set good ____
11 Clues: ____ software when available • Do not ___ the same password • Turn off ____ on all applications • Do not _____ passwords with anyone • When making an account set good ____ • _____ calls/texts/links from strangers • ____ applications you don't use anymore • Be____when sharing credit card information • Signifies the protection of important information • ...
Vocabulary 2024-10-17
Across
- For higher cybersecurity, you need a better ... (Passwort).
- Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
- schützen/beschützen
- Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
- Sometimes there is no ... (Beweis) of the cyberattack.
- beliebig
- The company got ... (gehackt).
- Hackers use the internet as their ... (Waffe).
- They use information to ... (erpressen) people.
Down
- The ... (Opfer) often doesn't recognize hackers as criminals.
- Hackers' ... (Verbrechen) are often invisible.
- The ... (Verdächtige/r) was probably from the UK.
- This ... (illegale) activity is costing the global economy a lot of money.
- Schadsoftware
- Sicherheit
- It sometimes can be really difficult to catch a ... (Kriminelle/r).
16 Clues: beliebig • Sicherheit • Schadsoftware • schützen/beschützen • The company got ... (gehackt). • Hackers' ... (Verbrechen) are often invisible. • Hackers use the internet as their ... (Waffe). • They use information to ... (erpressen) people. • The ... (Verdächtige/r) was probably from the UK. • Sometimes there is no ... (Beweis) of the cyberattack. • ...
Compliance Newsletter, Vol 1. April 2021 2021-03-26
Across
- Covid conference room
- Ticker symbol for Apex Clearing Holdings
- Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
- Sum of money paid by a company to its shareholders
- Written ________ Procedures
- Protects against the criminal or unauthorized use of electronic data
- A Series 4 Exam covers this specific area
- Securities ________ Protection Corporation
- The acknowledgement of understanding and abidance to policies, procedures or training
- ________ Oxley Act of 2002
Down
- Being in accordance with established guidelines or regulations
- Special Purpose ________ Company
- People who have material nonpublic information about a company
- The Firm's new Deputy CCO
- State where Apex Clearing is based
- Know Your ________
- Vendor for Firm Element Training
- Driving for Uber is an example of an Outside ________ Activity
- Handles the licensing and regulation of broker-dealers
19 Clues: Know Your ________ • Covid conference room • The Firm's new Deputy CCO • ________ Oxley Act of 2002 • Written ________ Procedures • Special Purpose ________ Company • Vendor for Firm Element Training • State where Apex Clearing is based • Ticker symbol for Apex Clearing Holdings • A Series 4 Exam covers this specific area • Securities ________ Protection Corporation • ...
CSIT - Cybersecurity Vocab 2024-12-02
Across
- A person or entity responsible for an event that has been identified as a security incident or as a risk
- Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
- Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
- Data that can be used to identify or contact an individual
- A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
- A number used in conjunction with authentication devices
- Scans that allow access to a physical space or program by verifying unique body features
- unauthorized use is detected or attempted
- Security control that can enforce a virtual boundary based on real-world geography
- A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role
11 Clues: unauthorized use is detected or attempted • A number used in conjunction with authentication devices • Data that can be used to identify or contact an individual • Security control that can enforce a virtual boundary based on real-world geography • Scans that allow access to a physical space or program by verifying unique body features • ...
Akash Test crossword 2025-03-21
Across
- Protects your data and accounts from unauthorized access
- Avoiding practices that harm the environment in tech usage
- Giving credit to original creators when using their work
- Verifying facts before sharing online information
- Avoiding the use of pirated software
- Ensuring websites are trustworthy before sharing personal data
- A harmful program that can damage your computer
Down
- Abiding by rules and regulations online
- Keeping your information secret online
- To act thoughtfully when posting or commenting online
- Using strong passwords and two-factor authentication
11 Clues: Avoiding the use of pirated software • Keeping your information secret online • Abiding by rules and regulations online • A harmful program that can damage your computer • Verifying facts before sharing online information • Using strong passwords and two-factor authentication • To act thoughtfully when posting or commenting online • ...
Let's Play OPS 2025-12-01
Across
- Unauthorized access gained by cracking credentials
- Attack where shipment or order details are altered secretly
- Encrypted communication protocol used between supply chain systems
- Event where warehouse operations halt due to corrupted systems
- Malicious entry inserted through software updates
- Weakest digital point that can collapse a multi-partner network
- Fraud where attackers pose as legitimate suppliers
Down
- Practice of verifying every transaction or shared data
- Undetected extraction of sensitive commercial data
- Technique that overwhelms logistics systems with fake traffic
- Process of assessing supplier cybersecurity capability
11 Clues: Malicious entry inserted through software updates • Unauthorized access gained by cracking credentials • Undetected extraction of sensitive commercial data • Fraud where attackers pose as legitimate suppliers • Practice of verifying every transaction or shared data • Process of assessing supplier cybersecurity capability • ...
Northwood and NUIAS 2024-10-02
Across
- Built Tough
- Who runs the Auto Show?
- What is the name of the Automotive Roundtable at 9 am on October 5th?
- The protection of computers and computer systems
- What number is this year's Auto Show?
- Ford's newest active driving assistance system
- The collection of multi-million dollar hypercars
Down
- America's _____ University
- What is both a degree at Northwood and a section of the Auto Show
- Liberty and ____ for all
- What does the "I" in NUIAS stand for
- What does the "M" in CAMS stand for?
12 Clues: Built Tough • Who runs the Auto Show? • Liberty and ____ for all • America's _____ University • What does the "I" in NUIAS stand for • What does the "M" in CAMS stand for? • What number is this year's Auto Show? • Ford's newest active driving assistance system • The protection of computers and computer systems • The collection of multi-million dollar hypercars • ...
IT Networking & Cybersecurity 2025-03-27
Across
- Connects multiple local networks
- Personal small device network
- Defines data transmission rules
- Central hub connects devices
- Single central network cable
Down
- Mix of multiple topologies
- Devices form a closed loop
- Nodes interconnect with redundancy
- Splits, checks, and reassembles data
- Large, wide-area network
- Small local network area
11 Clues: Large, wide-area network • Small local network area • Mix of multiple topologies • Devices form a closed loop • Central hub connects devices • Single central network cable • Personal small device network • Defines data transmission rules • Connects multiple local networks • Nodes interconnect with redundancy • Splits, checks, and reassembles data
Test Yourself! 2025-06-24
Across
- Unauthorized access to systems or data
- Malicious software designed to harm or exploit systems
- A fake website or link used to trick people
- messages distributed by electronic means
- Secret sequence of characters used for safety purposes
- Program that appears useful but is harmful
- File extension often used for dangerous attachments
Down
- A flaw or gap in software security
- Practice of protecting systems, networks, and programs
- Type of scam that tricks users via fake emails
- Type of attack where users are locked out unless they pay
- Common malware that replicates through a network
12 Clues: A flaw or gap in software security • Unauthorized access to systems or data • messages distributed by electronic means • Program that appears useful but is harmful • A fake website or link used to trick people • Type of scam that tricks users via fake emails • Common malware that replicates through a network • File extension often used for dangerous attachments • ...
Build with AI Bamenda 2025 2025-05-03
Across
- Platform for data science competitions and hosting datasets
- Unit of a neural network
- Hardware accelerator for speeding up AI computations
- Text-to-image model developed by Google DeepMind
- Model error due to excessive complexity
- Protection of digital systems and data
- Platform for collaborative coding and machine learning
- Google's AI research organization
- AI chatbot developed by Google DeepMind
Down
- Collection of data for training AI models
- Decentralized and secure data storage
- Open-source ML framework used on Google Cloud
- Notebook Interactive coding environment
- Proportion of correct predictions made by a model
- Method for solving a problem
- Google infrastructure for scalable AI computing
- AI Platform for building and deploying ML models on Google Cloud
17 Clues: Unit of a neural network • Method for solving a problem • Google's AI research organization • Decentralized and secure data storage • Protection of digital systems and data • Notebook Interactive coding environment • Model error due to excessive complexity • AI chatbot developed by Google DeepMind • Collection of data for training AI models • ...
Did you read it? 2020-10-16
Across
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
- Entries due NLT 10/23
- Do your Part.#BeCyberSmart
- Quality Management Principles
Down
- Entries due NLT 11/2
- Test Monthly
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Cybersecurity Crossword Puzzle 2025-04-29
Across
- part of the CIA triad that ensures no unauthorized access to sensitive data
- a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
- A type of malware that propagates across a network without the help of a user
- denial of _________
- a wireless hijacking attack involving a rogue access point
- part of the CIA triad that ensures access to data is readily available
Down
- a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
- a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
- man in the ________
- part of the CIA triad that ensures accuracy and trustworthiness of data
- malware that disguises itself as a harmless program
11 Clues: man in the ________ • denial of _________ • malware that disguises itself as a harmless program • a wireless hijacking attack involving a rogue access point • part of the CIA triad that ensures access to data is readily available • part of the CIA triad that ensures accuracy and trustworthiness of data • ...
DigitalGuard: Protecting Your Online Footprint 2023-09-18
Across
- You need this to unlock your online world securely
- Doing the right thing in the digital world
- Defending against online threats
- Platforms like Facebook and Twitter for online networking
- Online harassment that hurts.
Down
- Protecting your personal space in the digital realm
- The process of converting data into a secret code
- Fraudulent attempts to obtain sensitive information
- Your online trail of likes, posts, and searches
- -An extra layer of security for online accounts
10 Clues: Online harassment that hurts. • Defending against online threats • Doing the right thing in the digital world • Your online trail of likes, posts, and searches • -An extra layer of security for online accounts • The process of converting data into a secret code • You need this to unlock your online world securely • Protecting your personal space in the digital realm • ...
Did you read it? 2020-10-16
Across
- Licensed amateur radio operator
- Entries due NLT 11/2
- Test Monthly
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 10/23
- By David C. Graham
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Chad's Favorite sports team?
- Do your Part.#BeCyberSmart
- Home of the 14th Flying Training Wing of Air Education and Training Command
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
CyberFun 2024-03-18
Across
- Keeping personal information safe from unauthorized access
- A protective barrier for your computer or network
- Unwanted and unsolicited emails
- An attempt to damage or disrupt computer systems
- A system of interconnected computers
- Measures taken to protect computer systems from theft or damage
Down
- A harmful software that can damage your computer
- A secret code to access your accounts online
- I want to _____ my GF/BF account
- Illegal activities conducted using the internet
10 Clues: Unwanted and unsolicited emails • I want to _____ my GF/BF account • A system of interconnected computers • A secret code to access your accounts online • Illegal activities conducted using the internet • A harmful software that can damage your computer • An attempt to damage or disrupt computer systems • A protective barrier for your computer or network • ...
Career Cluster Quiz 2025-05-30
Across
- includes jobs like professors and teachers
- includes jobs where people help design and create buildings
- includes jobs like factory workers and machine operators
- includes jobs like CEOS and managers
- includes jobs like hotel managers and tour guides
Down
- includes jobs like farmers and food scientists
- includes jobs like doctors and nurses
- includes jobs in advertising and social media
- includes jobs in cybersecurity and software engineering
- includes jobs in science, technology, engineering, and mathematics
10 Clues: includes jobs like CEOS and managers • includes jobs like doctors and nurses • includes jobs like professors and teachers • includes jobs in advertising and social media • includes jobs like farmers and food scientists • includes jobs like hotel managers and tour guides • includes jobs in cybersecurity and software engineering • ...
BYTETRAIL 16 2025-02-25
Across
- Protocol for transferring files over the internet
- Protecting systems from unauthorized access
- Secures data by converting it into a coded form
- Small data stored on a user’s computer by a website
- Logical division of a drive
Down
- A type of scam email designed to steal user data
- Wireless technology for local area networking
- Temporary storage for faster access
- A device or point in a network
- Software that manages hardware and software resources
10 Clues: Logical division of a drive • A device or point in a network • Temporary storage for faster access • Protecting systems from unauthorized access • Wireless technology for local area networking • Secures data by converting it into a coded form • A type of scam email designed to steal user data • Protocol for transferring files over the internet • ...
BYTETRAIL 16 2025-02-25
Across
- Protocol for transferring files over the internet
- Protecting systems from unauthorized access
- Secures data by converting it into a coded form
- Small data stored on a user’s computer by a website
- Logical division of a drive
Down
- A type of scam email designed to steal user data
- Wireless technology for local area networking
- Temporary storage for faster access
- A device or point in a network
- Software that manages hardware and software resources
10 Clues: Logical division of a drive • A device or point in a network • Temporary storage for faster access • Protecting systems from unauthorized access • Wireless technology for local area networking • Secures data by converting it into a coded form • A type of scam email designed to steal user data • Protocol for transferring files over the internet • ...
Application of Boosting And Ensemble Learning 2025-10-31
Across
- Detects anomalies or intrusions in networks
- Used in suggesting products or movies on platforms
- General purpose of using ensemble models
- Applied in detecting diseases in the medical field
- Helps in predicting stock prices or sales trends
- Used for improving decision-making processes
Down
- Applied in dividing images into meaningful regions
- Used in image and speech recognition tasks
- Used in identifying spam or fraudulent activities
- Common application in sorting data into categories
10 Clues: General purpose of using ensemble models • Used in image and speech recognition tasks • Detects anomalies or intrusions in networks • Used for improving decision-making processes • Helps in predicting stock prices or sales trends • Used in identifying spam or fraudulent activities • Applied in dividing images into meaningful regions • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Legal terminology 2019-11-19
Across
- Electronic currency.
- Check the safety on the internet.
- People with good computer knowledge and skills.
- A variety of data that is rapidly increasing.
- Computer systems, programs and data are free from threats.
- reality This project is the technology between reality and the virtual world.
Down
- Use of electronic devices to destroy, change, or steal information.
- Bullying and Malignant, Insulting.
- User avatar in a virtual world or game.
- Scam through the internet
10 Clues: Electronic currency. • Scam through the internet • Check the safety on the internet. • Bullying and Malignant, Insulting. • User avatar in a virtual world or game. • A variety of data that is rapidly increasing. • People with good computer knowledge and skills. • Computer systems, programs and data are free from threats. • ...
Montreat College 2023-05-24
Across
- What is it's school colors?
- What sport am I going to this college for?
- What is our Mascot?
- What is the mascots name?
- What is the name of Montreats honors college?
Down
- Which famous preacher was married in the chapel on campus?
- This major has been gaining a lot of popularity at Montreat.
- Where is Montreat Located?
- What popular American sport is not offered here?
- What is the name of Montreats popular lake?
10 Clues: What is our Mascot? • What is the mascots name? • Where is Montreat Located? • What is it's school colors? • What sport am I going to this college for? • What is the name of Montreats popular lake? • What is the name of Montreats honors college? • What popular American sport is not offered here? • Which famous preacher was married in the chapel on campus? • ...
General Knowledge 2025-04-16
Across
- Doctors for animals
- A word that can be read the same in both directions
- Which type of company is CrowdStrike?
- Missile man of India
Down
- Char Minar is located in which city?
- By which process does the excess water in plants get released?
- Current Home Minister of India
- Which country was the primary target of Trump's tariff war?
- Ornithology is the scientific study of?
- What is the term lunar related to?
10 Clues: Doctors for animals • Missile man of India • Current Home Minister of India • What is the term lunar related to? • Char Minar is located in which city? • Which type of company is CrowdStrike? • Ornithology is the scientific study of? • A word that can be read the same in both directions • Which country was the primary target of Trump's tariff war? • ...
C4i4's Connect Crossword 2025-07-02
Across
- Future-focused maintenance strategy to reduce downtime
- Country widely credited for pioneering Industry 4.0.
- Actionable digital layer applied on physical systems.
- Data-driven insight method used in business intelligence.
- Smart factory enabler that reduces human intervention
Down
- Backbone technology for protecting digital infrastructure
- Converting analog processes to digital formats.
- Real-time sensor-based technology for tracking machinery performance.
- Seamless transfer of information across systems.
- Centralized location where digital info is kept safely.
10 Clues: Converting analog processes to digital formats. • Seamless transfer of information across systems. • Country widely credited for pioneering Industry 4.0. • Actionable digital layer applied on physical systems. • Smart factory enabler that reduces human intervention • Future-focused maintenance strategy to reduce downtime • ...
Did you read it? 2020-10-16
Across
- Licensed amateur radio operator
- Entries due NLT 11/2
- Test Monthly
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 10/23
- By David C. Graham
- Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Chad's Favorite sports team?
- Do your Part.#BeCyberSmart
- Home of the 14th Flying Training Wing of Air Education and Training Command
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
cyber security 2022-05-05
Across
- a type of malware that modifies information on a computer
- virtual private network
- distributed denial of service
- someone who enters a technological divice illegaly
- attacker uses malici=ous codes to take the victims information
- a type of software allowing an attacker to take over a computer
Down
- set of programs that allow a computer to perform the task
- a technique allowing the hacker to imporsonate
- protection of technological devices
- malicious softwares
10 Clues: malicious softwares • virtual private network • distributed denial of service • protection of technological devices • a technique allowing the hacker to imporsonate • someone who enters a technological divice illegaly • a type of malware that modifies information on a computer • set of programs that allow a computer to perform the task • ...
Technology 2023-07-06
Across
- Identification used by a person with access to a computer
- Another word for the top-notch support that we provide our users.
- A smaller computer that runs on ChromeOS
- A systematic approach to solving a problem
- What kids use to spell bad words
- A person that is learning
Down
- Sound
- Enables storing data and files on the internet
- The practice of protecting systems and networks from digital attacks
- Intelligence demonstrated by computers
10 Clues: Sound • A person that is learning • What kids use to spell bad words • Intelligence demonstrated by computers • A smaller computer that runs on ChromeOS • A systematic approach to solving a problem • Enables storing data and files on the internet • Identification used by a person with access to a computer • Another word for the top-notch support that we provide our users. • ...
byte trails 3 2025-03-05
Across
- Protocol for transferring files over the internet
- Protecting systems from unauthorized access
- Secures data by converting it into a coded form
- Small data stored on a user’s computer by a website
- Logical division of a drive
Down
- A type of scam email designed to steal user data
- Wireless technology for local area networking
- Temporary storage for faster access
- A device or point in a network
- Software that manages hardware and software resources
10 Clues: Logical division of a drive • A device or point in a network • Temporary storage for faster access • Protecting systems from unauthorized access • Wireless technology for local area networking • Secures data by converting it into a coded form • A type of scam email designed to steal user data • Protocol for transferring files over the internet • ...
Computer Science 2025-05-15
Across
- A place to store files and data
- The part of the computer you can touch
- A language used to write computer programs
- A list of instructions for a computer to follow
- A mistake in a program
Down
- Protecting information from unauthorized access
- Repeating a set of actions
- A symbol or name that stores data in a program
- An action or information given to a computer
- The result produced by a computer
10 Clues: A mistake in a program • Repeating a set of actions • A place to store files and data • The result produced by a computer • The part of the computer you can touch • A language used to write computer programs • An action or information given to a computer • A symbol or name that stores data in a program • Protecting information from unauthorized access • ...
