cybersecurity Crossword Puzzles

Crossword#10 2023-07-11

Crossword#10 crossword puzzle
Across
  1. - Storing and accessing data and applications remotely over the internet.
  2. - technology to manage business processes and operations.
  3. - Conducting business transactions online.
  4. - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
  5. - Working remotely using technology to communicate and collaborate.
  6. - Using technology to automate routine tasks and processes.
Down
  1. - Protecting computer systems and networks from unauthorized access or attacks.
  2. - technology to manage interactions with customers.
  3. - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
  4. - Using data and statistical analysis to inform decision-making.

10 Clues: - Conducting business transactions online.- technology to manage interactions with customers.- technology to manage business processes and operations.- Using technology to automate routine tasks and processes.- Using data and statistical analysis to inform decision-making.- Working remotely using technology to communicate and collaborate....

Information and Network Security 2023-09-08

Information and Network Security crossword puzzle
Across
  1. coded message
  2. Cause loss of message confidentiality
  3. A security principle that ensures data is accessible only to those authorized to view or modify it.
  4. A secret combination of characters used to authenticate a user's identity
  5. A type of malware that spreads by duplicating itself and infecting other programs
  6. This Ciphers these hide the message by rearranging the letter order
  7. The practice of protecting computer systems and networks from digital attacks.
Down
  1. Causes loss of message integrity
  2. Plain text message may be hidden in image or sound It is not encryption
  3. Is most difficult attack to find out

10 Clues: coded messageCauses loss of message integrityIs most difficult attack to find outCause loss of message confidentialityThis Ciphers these hide the message by rearranging the letter orderPlain text message may be hidden in image or sound It is not encryptionA secret combination of characters used to authenticate a user's identity...

Techy Word Search Challenge 2024-04-16

Techy Word Search Challenge crossword puzzle
Across
  1. Information stored and processed by computers, like numbers, text, or images.
  2. Writing instructions for a computer using a programming language.
  3. Machines that can move, sense, and interact with their environment.
  4. The physical parts of a computer that you can touch and see.
  5. A global network that connects computers worldwide.
Down
  1. Protecting computers, networks, and data from cyberattacks.
  2. Instructions for a computer's next move in a game.
  3. Intelligence: Computers that can learn, reason, and make decisions like humans.
  4. Programs that make computers work, like games, word processors, or music players.
  5. Turning information into a secret code to keep it safe from hackers.

10 Clues: Instructions for a computer's next move in a game.A global network that connects computers worldwide.Protecting computers, networks, and data from cyberattacks.The physical parts of a computer that you can touch and see.Writing instructions for a computer using a programming language....

October Crossword - Cyber Security 2022-02-07

October Crossword - Cyber Security crossword puzzle
Across
  1. software designed to prevent, detect, and remove malware
  2. cyberattack that tries already compromised usernames and passwords in other sites
  3. username and ... should be complex
  4. any crime committed electronically
  5. pretending to be someone and accessing their information
Down
  1. fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
  2. ensures that you are the only one who has access to your account
  3. campaign launched in 2010 by the Department of Homeland Security
  4. any software intended to damage, disable, or give someone unauthorized access
  5. agency that informs and educates about cybersecurity

10 Clues: username and ... should be complexany crime committed electronicallyagency that informs and educates about cybersecuritysoftware designed to prevent, detect, and remove malwarepretending to be someone and accessing their informationensures that you are the only one who has access to your account...

technology crossword 2023-06-07

technology crossword crossword puzzle
Across
  1. it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure,
  2. it is a method of representing data in a visual,
  3. it represents text, computer processor instructions
  4. it is an American multinational technology company
  5. it is the most important processor in a given computer.
Down
  1. it is a mobile operating system
  2. it is a mapping from some domain
  3. it allows developers to directly manipulate its underlying data structures:...
  4. is a method of transmitting and receiving messages using electronic devices.
  5. it is a collection of discrete values that convey information,

10 Clues: it is a mobile operating systemit is a mapping from some domainit is a method of representing data in a visual,it is an American multinational technology companyit represents text, computer processor instructionsit is the most important processor in a given computer.it is a collection of discrete values that convey information,...

Tugas-Jaringan Komputer dan Internet 2024-01-11

Tugas-Jaringan Komputer dan Internet crossword puzzle
Across
  1. sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
  2. pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
  3. Perangkat yang digunakan manusia untuk memudahkan kehidupannya
  4. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
  1. menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
  2. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  3. Bus Topologi yang menyerupai rel kereta api dinamakan
  4. Aspek teknik ada berapa
  5. Personal Area Network singkatan dari
  6. bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header

10 Clues: Aspek teknik ada berapaPersonal Area Network singkatan dariBus Topologi yang menyerupai rel kereta api dinamakanPerangkat yang digunakan manusia untuk memudahkan kehidupannyaperangkat yang menghubungkan jaringan lokal dengan jaringan eksternalpengaturan yang dilakukan komputer agar dapat terhubung satu sama lain...

Claims Board Fun Friday 9/13 2024-09-12

Claims Board Fun Friday 9/13 crossword puzzle
Across
  1. Company which will bring 2 astronauts who are stuck in International Space Station
  2. Text messages to trick individuals to reveal personal information
  3. Cybersecurity form with major outage impacting Microsoft apps
  4. Attaches itself to clean files and spreads to other files
  5. Deceives via phone calls
  6. Use phone calls to trick individuals to reveal personal details
  7. Movie name referred by Google CEO during his meetings
Down
  1. Publishes latest tech news and Tech CEOs start their day going through this site
  2. Caused by Solar Storms
  3. Every action has an outcome and none other than you are responsible for it f

10 Clues: Caused by Solar StormsDeceives via phone callsMovie name referred by Google CEO during his meetingsAttaches itself to clean files and spreads to other filesCybersecurity form with major outage impacting Microsoft appsUse phone calls to trick individuals to reveal personal detailsText messages to trick individuals to reveal personal information...

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. the I in FIM stands for?
  2. Before an application goes live, it has to go through a security ___.
Down
  1. We are all
  2. Identity & Access Management.

4 Clues: We are allthe I in FIM stands for?Identity & Access Management.Before an application goes live, it has to go through a security ___.

Cybersecurity Terminology Puzzle (participation 3) 2023-01-27

Cybersecurity Terminology Puzzle (participation 3) crossword puzzle
Across
  1. software that is harmful
  2. software that checks for malware
  3. internet access at starbucks
  4. scrambling data in unreadable
  5. attacks seeking out personal info
  6. software that tracks you
  7. shield for data
  8. tech savy criminals stealing private information
  9. improving security tools for cloud infrastructure
  10. multiple attackers preventing legitimate users
Down
  1. tricking users to click an image
  2. altered image creating false reality
  3. malware that makes you pay
  4. malware pretending to be useful
  5. designs, builds, and tests security systems
  6. malware that displays adverts
  7. network pro learning hacking techniques
  8. online harassment that intimidates victims

18 Clues: shield for datasoftware that is harmfulsoftware that tracks youmalware that makes you payinternet access at starbucksscrambling data in unreadablemalware that displays advertsmalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal infoaltered image creating false reality...

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Istilah untuk volume data besar yang diproses untuk informasi.
  2. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Istilah untuk volume data besar yang diproses untuk informasi.Program perangkat lunak yang dirancang untuk melakukan tugas tertentu....

Cybersecurity Crossword 2023-06-08

Cybersecurity Crossword crossword puzzle
Across
  1. a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
  2. a type of malicious software designed to disrupt a victim’s computer, server, or network.
  3. A chain of Internet-connected devices centrally controlled by a hacker
Down
  1. the process of disguising data so it’s impossible to decipher without authorization
  2. a type of email that you’ve technically solicited but may serve little to no purpose to you.
  3. tools that ask people to verify they are human and not robots

6 Clues: tools that ask people to verify they are human and not robotsA chain of Internet-connected devices centrally controlled by a hackerthe process of disguising data so it’s impossible to decipher without authorizationa type of malicious software designed to disrupt a victim’s computer, server, or network....

Eldorado Anniversary 2023-09-23

Eldorado Anniversary crossword puzzle
Across
  1. What is Eldorado's zip code?
  2. What percentage score is required to pass the Workplace Readiness Exam?
  3. How many wrestling state championships has Eldorado won?
  4. What is the magnet coordinator's telephone extension?
  5. How many free CTE college credits can a student earn for completing the Cybersecurity program of study?
  6. What was the last year Eldorado had a second campus?
  7. What year did Mrs. Brockett graduate from Eldorado?
  8. What year was Eldorado Magnet launched?
  9. What year did Eldorado open a second campus?
Down
  1. What year did the first class graduate?
  2. What year did Eldorado open
  3. What are the last four digits of the schools telephone number?
  4. How many principals have served Eldorado
  5. How many classes of seniors have graduated from EHS?
  6. What is the street address of EHS?
  7. At its largest capacity, EHS housed over how many students?
  8. How many students was Eldorado designed to accommodate
  9. What year did Eldorado receive the MSA School of Distinction Award?
  10. How old is Eldorado

19 Clues: How old is EldoradoWhat year did Eldorado openWhat is Eldorado's zip code?What is the street address of EHS?What year did the first class graduate?What year was Eldorado Magnet launched?How many principals have served EldoradoWhat year did Eldorado open a second campus?What year did Mrs. Brockett graduate from Eldorado?...

TEKNOLOGI 2024-11-19

TEKNOLOGI crossword puzzle
Across
  1. Teknologi elektronik yang dapat dipakai seperti jam pintar
  2. Teknologi dan praktik untuk melindungi sistem dan data dari ancaman
  3. OPTIC Teknologi transmisi data menggunakan kabel serat kaca
  4. Teknologi yang menghubungkan perangkat fisik ke internet
  5. Teknologi identifikasi berdasarkan ciri fisik manusia
  6. Mata uang digital yang menggunakan teknologi kriptografi untuk keamanan
  7. Teknologi untuk mengelola dan menganalisis data berukuran sangat besar
  8. Teknologi komputasi yang menggunakan prinsip mekanika kuantum
  9. Teknologi yang menciptakan versi virtual dari perangkat keras atau sistem operasi
  10. Serangkaian langkah yang digunakan untuk menyelesaikan masalah dalam teknologi
Down
  1. Teknologi basis data terdesentralisasi yang digunakan untuk menyimpan transaksi
  2. Teknologi yang menggabungkan dunia nyata dengan elemen virtual
  3. Kendaraan udara tanpa awak yang dikendalikan dari jarak jauh
  4. Layanan penyimpanan dan pemrosesan data melalui internet
  5. Ilmu yang mempelajari desain dan aplikasi robot
  6. Teknologi yang bekerja pada skala atom dan molekul
  7. Teknologi jaringan seluler generasi kelima yang sangat cepat
  8. Proses pengamanan data dengan mengubahnya menjadi kode
  9. HOME Sistem rumah pintar yang terhubung dengan teknologi otomatisasi

19 Clues: Ilmu yang mempelajari desain dan aplikasi robotTeknologi yang bekerja pada skala atom dan molekulTeknologi identifikasi berdasarkan ciri fisik manusiaProses pengamanan data dengan mengubahnya menjadi kodeLayanan penyimpanan dan pemrosesan data melalui internetTeknologi yang menghubungkan perangkat fisik ke internet...

Cybersecurity 2024-10-07

Cybersecurity crossword puzzle
Across
  1. A 4 step method used for checking suspicious emails before taking any action.
  2. Occurs when someone accidentally causes harm, such as by clicking on a malicious link.
Down
  1. Software intentionally designed to cause disruption to a computer, server, client, or network.
  2. Highly personalized and targets a specific individual, often using details like their name, position, or projects they're involved in to appear more legitimate.

4 Clues: A 4 step method used for checking suspicious emails before taking any action.Occurs when someone accidentally causes harm, such as by clicking on a malicious link.Software intentionally designed to cause disruption to a computer, server, client, or network....

Online security 2019-12-03

Online security crossword puzzle
Across
  1. This mode is more secure than public
  2. When you save your information within an external drive is called a:
  3. When you research online you should visit only _____ to avoid risks
Down
  1. Being aware of your online protection
  2. Have one and keep it updated to avoid malware and other online risks
  3. Needed to access devices

6 Clues: Needed to access devicesThis mode is more secure than publicBeing aware of your online protectionWhen you research online you should visit only _____ to avoid risksHave one and keep it updated to avoid malware and other online risksWhen you save your information within an external drive is called a:

vocab 2024-10-13

vocab crossword puzzle
Across
  1. Because of all the ___ I still haven't got my visa
  2. although
  3. My clothes always ___ a bit after being in the washing machine
  4. working in a way that does not waste a resource, productive
  5. I got into a car ___ accident on the way, which is why I was late
  6. a field in IT where the main goal is protection from digital attacks
  7. After giving that 3 hour lecture, my ___ really hurt
  8. before
Down
  1. many of the company's employees were ___ after AI replaced them
  2. It's not nice to make ___ about someone based on their looks
  3. a state/feeling of uncontrolled excitement/behaviour.
  4. I've been waiting for that ___ for months, I really need the extra money
  5. something happening at the same time
  6. sometimes a synonym for "also"
  7. successful in achieving the results that you want

15 Clues: beforealthoughsometimes a synonym for "also"something happening at the same timesuccessful in achieving the results that you wantBecause of all the ___ I still haven't got my visaAfter giving that 3 hour lecture, my ___ really hurta state/feeling of uncontrolled excitement/behaviour.working in a way that does not waste a resource, productive...

Technology words 2023-05-10

Technology words crossword puzzle
Across
  1. where your teachers assign you work to do for classes
  2. where a global system hooks up to networks
  3. a long communication without wires
  4. where you can watch videos for classes or for fun
  5. where you can send mail digitally to workers, teachers or student
  6. where it can be instructed by hardware
  7. when something is transmitting information by various types
Down
  1. it is designed to protect your computers and other devices from bugs ands hackers
  2. where you can look up answers or look for evidence
  3. where you can create a web browser
  4. where you can make a presentation
  5. where you create a bar graph, line graph, or a pie chart
  6. where scientists design and build machines
  7. where it widely describes wide range of technology's
  8. where you can hook up to internet and use your technology better

15 Clues: where you can make a presentationwhere you can create a web browsera long communication without wireswhere it can be instructed by hardwarewhere a global system hooks up to networkswhere scientists design and build machineswhere you can watch videos for classes or for funwhere you can look up answers or look for evidence...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
  2. The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  3. The diplomas offered in the School of Design & Environment focuses on ________.
  4. The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
  5. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  6. Ngee Ann Polytechnic is an award-winning smart and ______campus.
  7. Located at the Atrium, there is a 24/7 unmanned ______.
  8. If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
  9. Common _____ Programme is a new programme offered in the School of Film & Media Studies.
  10. Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
  11. Students are able to pursue a minor via the ______Learning Pathway Programme.
  12. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
  1. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
  2. Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
  3. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  4. Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
  5. Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
  8. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.

20 Clues: Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic is an award-winning smart and ______campus.Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.Students are able to pursue a minor via the ______Learning Pathway Programme.The diplomas offered in the School of Design & Environment focuses on ________....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Istilah untuk volume data besar yang diproses untuk informasi.
  2. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Istilah untuk volume data besar yang diproses untuk informasi.Program perangkat lunak yang dirancang untuk melakukan tugas tertentu....

LOGIC LATTICE 2024-02-16

LOGIC LATTICE crossword puzzle
Across
  1. Measures taken to protect computer systems and networks from unauthorized access or attacks.
  2. Software used to access and view websites on the internet.
  3. The manipulation of matter on an atomic or molecular scale.
Down
  1. Digital or virtual currency that uses cryptography for security.
  2. A structured set of data stored electronically.
  3. Software that is embedded into hardware devices.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. Programs and applications that run on computers and other devices.
  6. The process of converting data into a code to prevent unauthorized access.
  7. A step-by-step procedure for solving a problem.

10 Clues: A structured set of data stored electronically.A step-by-step procedure for solving a problem.Software that is embedded into hardware devices.Software used to access and view websites on the internet.The manipulation of matter on an atomic or molecular scale.Digital or virtual currency that uses cryptography for security....

Technology 2024-02-18

Technology crossword puzzle
Across
  1. I'm a thinking machine, processing data tirelessly. What device am I?
  2. Intangible, yet I control what you see. What type of program am I?
  3. I move without being alive. What field of technology am I?
  4. Following steps, I solve problems. What logical process am I?
  5. Constant change, perpetual improvement. What technological concept am I?
Down
  1. I complement reality. What technology am I?
  2. I write instructions for machines. What technological skill am I?
  3. I guard against digital threats. What specialized area am I?
  4. I connect the world. What network am I?
  5. I store information. What logical structure am I?

10 Clues: I connect the world. What network am I?I complement reality. What technology am I?I store information. What logical structure am I?I move without being alive. What field of technology am I?I guard against digital threats. What specialized area am I?Following steps, I solve problems. What logical process am I?...

Cybersecurity Vocab 2022-03-10

Cybersecurity Vocab crossword puzzle
Across
  1. Credit and Copyright
  2. Cipher
  3. Your Own Device (BYOD)
  4. Stalking
Down
  1. Certificate
  2. Triad
  3. Hygiene

7 Clues: TriadCipherHygieneStalkingCertificateCredit and CopyrightYour Own Device (BYOD)

Cybersecurity Concepts 2023-10-11

Cybersecurity Concepts crossword puzzle
Across
  1. assets of the computer system should be accessible only by authorized parties
  2. A set of circumstances that has the potential to cause loss or harm
  3. A weakness in the system
Down
  1. assets can be modified only by authorized parties or in authorized ways
  2. authorized parties should not be prevented from accessing objects to which they have legitimate access
  3. An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats

6 Clues: A weakness in the systemA set of circumstances that has the potential to cause loss or harmassets can be modified only by authorized parties or in authorized waysassets of the computer system should be accessible only by authorized partiesauthorized parties should not be prevented from accessing objects to which they have legitimate access...

Cybersecurity crosswords 2024-10-18

Cybersecurity crosswords crossword puzzle
Across
  1. A person who uses technical skills to gain unauthorized access to systems.
  2. Protecting information from unauthorized access or harm.
  3. Facts and statistics collected for analysis or reference.
Down
  1. A group of connected computers that can share data and resources.
  2. To make something more current or improve it, often related to software.
  3. The ability to enter or use a system, network, or resource.

6 Clues: Protecting information from unauthorized access or harm.Facts and statistics collected for analysis or reference.The ability to enter or use a system, network, or resource.A group of connected computers that can share data and resources.To make something more current or improve it, often related to software....

Phishing A technique used to trick someone to reveal sensitive information 2024-05-10

Phishing A technique used to trick someone to reveal sensitive information crossword puzzle
Across
  1. A type of attack that floods a network or server with excess traffic
  2. The process of converting data into unreadable format to prevent unauthorized access
  3. The practice of preventing systems from digital attacks
  4. A technique used to trick someone to reveal sensitive information
Down
  1. A unique string of characters used for authentication
  2. Software designed to block unauthorized access
  3. A technique used to gain unauthorized access to a system by guessing passwords
  4. A secret code that must be entered to enter a system or account
  5. A malicious program that self replicates and spreads to other systems
  6. Unauthorized access to data or systems
  7. A deceptive email scam targeting personal information

11 Clues: Unauthorized access to data or systemsSoftware designed to block unauthorized accessA unique string of characters used for authenticationA deceptive email scam targeting personal informationThe practice of preventing systems from digital attacksA secret code that must be entered to enter a system or account...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
  2. The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  3. The diplomas offered in the School of Design & Environment focuses on ________.
  4. The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
  5. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  6. Ngee Ann Polytechnic is an award-winning smart and ______campus.
  7. Located at the Atrium, there is a 24/7 unmanned ______.
  8. If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
  9. Common _____ Programme is a new programme offered in the School of Film & Media Studies.
  10. Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
  11. Students are able to pursue a minor via the ______Learning Pathway Programme.
  12. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
  1. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
  2. Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
  3. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  4. Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
  5. Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
  8. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.

20 Clues: Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic is an award-winning smart and ______campus.Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.Students are able to pursue a minor via the ______Learning Pathway Programme.The diplomas offered in the School of Design & Environment focuses on ________....

Cybersecurity 2023-03-25

Cybersecurity crossword puzzle
Across
  1. A security measure designed to verify an individual`s authorization to access a computer or security information
Down
  1. Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access
  2. A collection of computers subject to centralized remote control by an outside party, usually without the knowledge of the owners, using surreptitiously installed software robots. The robots are spread by trojan horses and viruses. The botnets can be used to launch denial-of-service attacks and transmit spam
  3. Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred

4 Clues: A security measure designed to verify an individual`s authorization to access a computer or security informationDiscovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. a person trying to get your private information
  2. a way people get money from you by sending you a scam email
  3. a kind of virus that is also a animal
Down
  1. a code used to keep information safe

4 Clues: a code used to keep information safea kind of virus that is also a animala person trying to get your private informationa way people get money from you by sending you a scam email

Compliance and Ethics 2021-11-29

Compliance and Ethics crossword puzzle
Across
  1. attempt by individual or private interest group to lawfully influence government decision
  2. An official inspection of an individual's or organization's accounts
  3. guideline of ethical practices that a company expects its employees to follow
Down
  1. Unwelcome act of physical contact or advances
  2. conforming to a rule i.e policy, standard or law
  3. Computer Security
  4. Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
  5. anything of value given as attempt to influence a decision to acquire improper advantage

8 Clues: Computer SecurityUnwelcome act of physical contact or advancesconforming to a rule i.e policy, standard or lawAn official inspection of an individual's or organization's accountsguideline of ethical practices that a company expects its employees to followUse of force, threat, or coercion to abuse, intimidate, or aggressively dominate others...

Cyber Safe Seniors Crossword Puzzle 2024-03-09

Cyber Safe Seniors Crossword Puzzle crossword puzzle
Across
  1. Short for “malicious software”
  2. The measures taken to protect electronic data
  3. A string of characters that allows access to a computer system or service
  4. The practice of making fraudulent phone calls or leaving voice messages
Down
  1. Software designed to detect and destroy computer viruses
  2. A person who engages in criminal activity by means of computers or the internet
  3. The fraudulent practice of sending emails purporting to be from reputable companies
  4. Malware which changes, corrupts, or destroys information (think disease)

8 Clues: Short for “malicious software”The measures taken to protect electronic dataSoftware designed to detect and destroy computer virusesThe practice of making fraudulent phone calls or leaving voice messagesMalware which changes, corrupts, or destroys information (think disease)A string of characters that allows access to a computer system or service...

OSHEC Crossword 2023-08-16

OSHEC Crossword crossword puzzle
Across
  1. Download PDF – First word of ‘Abstract’ - Article Name: Influence of Educational Robots on Learning Performance of Learners Majoring in Computer Science.
  2. Last word of ‘Background’ - Article Name: The accuracy of artificial intelligence used for non-melanoma skin cancer diagnoses: a meta-analysis.
  3. Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
  4. Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
  5. Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
Down
  1. Second word of ‘Introduction’ - Article Name: Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review.
  2. Last word, before ‘footnotes’ - Article Name: Global Mental Health Services and the Impact of Artificial Intelligence-Powered Large Language Models.
  3. Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Training in Sociology and Public Health an Essential in Medical Education.
  4. Fill in the blank -Literature, Film and ________ (Look at the Sub-headings) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
  5. Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.

10 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture....

SECURITY AWARENESS EASTER EGG HUNT 2024-04-09

SECURITY AWARENESS EASTER EGG HUNT crossword puzzle
Across
  1. A secret word or phrase allows access to a computer system, email or services
  2. The process for educating employees about cybersecurity best practices
  3. A divison of Distributors that supplies a wide range of brands, generics, OTC, medical supplies, etc
  4. Your companies name
  5. One of the affiliated companies that provide banking services
Down
  1. One of the affiliated companies that deals with the production of our powdered and liquid goods
  2. One of the affiliated companies that supply customers with goods
  3. Malicious software that infects and damages computer
  4. Electronic messages sent and received over a computer network

9 Clues: Your companies nameMalicious software that infects and damages computerElectronic messages sent and received over a computer networkOne of the affiliated companies that provide banking servicesOne of the affiliated companies that supply customers with goodsThe process for educating employees about cybersecurity best practices...

Get Secure 2019-08-26

Get Secure crossword puzzle
Across
  1. protection of information systems from damage or crime
  2. bad connection during online calls
  3. create a password
  4. a device that consists of a part that fits over a person's ears and a part into which the person can speak, used for communicating without using the hands
  5. connection to a network from a place that is far away
Down
  1. get into a network
  2. a package of software products sold together, usually having a similar look and common installation
  3. rules that help to protect a system
  4. the applications that a company uses for work

9 Clues: create a passwordget into a networkbad connection during online callsrules that help to protect a systemthe applications that a company uses for workconnection to a network from a place that is far awayprotection of information systems from damage or crime...

Success 101 2024-10-04

Success 101 crossword puzzle
Across
  1. You should go to this school if you want to be a YouTuber
  2. This career is supported at academies at both Hampton and Kecoughtan
  3. Academy of ___and Public Safety supports future fire fighters
  4. A short speech that you should give when networking
  5. The school with the academy for future teachers
  6. If you want to be an actor, join this academy
  7. Perfect shirt for a job interview
  8. Attend this academy if you want to be a chef
  9. My Future, My ______
Down
  1. Perfect pants for a job interview
  2. This academy is like a private school within a school
  3. This high school has an academy that supports nursing
  4. This academy is for future lawyers
  5. The academy that all 9th graders are in
  6. Academy of Cybersecurity, Engineering, and _____
  7. A future welder in the shipyard should attend this school
  8. A group project focused on changing the community
  9. It is possible to graduate high school with this type of college degree

18 Clues: My Future, My ______Perfect pants for a job interviewPerfect shirt for a job interviewThis academy is for future lawyersThe academy that all 9th graders are inAttend this academy if you want to be a chefIf you want to be an actor, join this academyThe school with the academy for future teachersAcademy of Cybersecurity, Engineering, and _____...

Jenis Profesi 2024-08-08

Jenis Profesi crossword puzzle
Across
  1. menguasai bahasa pemrograman dan terampil menggunakannya
  2. seseorang pembuat konten kreatif
  3. orang yang mengajar dan menyediakan pendidikan untuk orang lain
  4. seseorang yang meneliti informasi menggunakan alat analisis data
  5. berkaitan erat dengan penemuan-penemuan baru
  6. orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
  7. mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
  8. pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
  1. menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
  2. bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
  3. melindungi sistem, jaringan, serta data dari serangan cyber
  4. profesional di bidang kuliner
  5. membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
  6. ndividu yang mempunyai pengaruh besar di media sosial
  7. bertugas mengendalikan pesawat
  8. maha guru
  9. seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
  10. berkaitan erat dengan keamanan dan ketertiban negaranya

18 Clues: maha guruprofesional di bidang kulinerbertugas mengendalikan pesawatseseorang pembuat konten kreatifberkaitan erat dengan penemuan-penemuan barundividu yang mempunyai pengaruh besar di media sosialmenguasai bahasa pemrograman dan terampil menggunakannyaberkaitan erat dengan keamanan dan ketertiban negaranya...

Technology in Supply Chain Management 2023-05-01

Technology in Supply Chain Management crossword puzzle
Across
  1. Highly skilled IT professionals, process engineers,and the appropriate technologies.
  2. technologies combine data management, communications, decision support, and processing capabilities.
  3. technologies create greater connectivity and speed flow.
  4. support systems provide computing power to make higher-quality decisions faster.
  5. Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
  1. technologies provide 24/7 resource availability.
  2. Protection against online threats.

7 Clues: Protection against online threats.technologies provide 24/7 resource availability.technologies create greater connectivity and speed flow.support systems provide computing power to make higher-quality decisions faster.Highly skilled IT professionals, process engineers,and the appropriate technologies....

Vocabulary revision 1 2024-10-30

Vocabulary revision 1 crossword puzzle
Across
  1. a small device or tool that has a specific use
  2. money given to a student to help pay for their education
  3. the act of leaving to start a journey
  4. having strong feelings or enthusiasm for something you love
  5. information that is stored in computers
  6. the protection of computers and networks from being attacked
Down
  1. the money you pay for education at a college or university
  2. to revise one day before an exam
  3. the flight that takes place within your country
  4. free time used for relaxation
  5. the place you are travelling to
  6. to complete studies at a school, college, or university
  7. a person who does something for fun; not a professional
  8. a talk given by a professor to a group of students about a subject
  9. a place where people go for vacations and fun, for example, for skiing
  10. to love something or someone very much
  11. a person who uses computers to find or change information, without permission
  12. strong and lasting a long time without breaking

18 Clues: free time used for relaxationthe place you are travelling toto revise one day before an examthe act of leaving to start a journeyto love something or someone very muchinformation that is stored in computersa small device or tool that has a specific usethe flight that takes place within your countrystrong and lasting a long time without breaking...

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  2. use one key to encrypt data and a different key to decrypt data.
  3. to encrypt and decrypt messages.
  4. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
  5. science of making and breaking secret codes.
  6. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
  1. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  2. has a fixed block size of 128, 192 or 256 bits.
  3. implementing cryptography into a web browser.
  4. a protocol that provides a secure remote access connection to network devices.
  5. way to store and transmit data so only the intended recipient can read or process it.
  6. fundamental component of ipsec virtual private networks (vpn).

12 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).use one key to encrypt data and a different key to decrypt data....

Puzzle OSHEC 2023-08-31

Puzzle OSHEC crossword puzzle
Across
  1. Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
  2. Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
  3. Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)
Down
  1. Last word of the first point of ‘Key Takeaways’ - Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
  2. Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
  3. Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.

6 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)...

Cybersecurity decoded 1x1 2 2020-07-30

Cybersecurity decoded 1x1 2 crossword puzzle
Across
  1. code's evil twin
  2. childhood game
  3. used to fix jeans... or software
  4. the iron giant
  5. Not canned food
  6. Dr's are messy with this
  7. Distant labor
  8. sugar comes in these
Down
  1. Fake mustache, trench coat, sunglasses
  2. type of cleanliness
  3. Troy's downfall
  4. they come out after the rain

12 Clues: Distant laborchildhood gamethe iron giantTroy's downfallNot canned foodcode's evil twintype of cleanlinesssugar comes in theseDr's are messy with thisthey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglasses

Science and technology C1 2024-03-01

Science and technology C1 crossword puzzle
Across
  1. the development and use of a new idea or method
  2. becoming very popular very quickly on the internet
  3. protecttive measures taken against the criminal access of electronic data
  4. very modern
  5. to obtain a more powerful or feature-rich computer or electronic device
  6. a person who is enthusiastic about new technology
  7. involving or causing a complete or dramatic change and improvement
Down
  1. a person who fears or dislikes new technology, especially computers, and does not want to use it
  2. a small mechanical or electronic device or too
  3. not in use any more, having been replaced by something better
  4. a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology
  5. to suddenly stop working

12 Clues: very modernto suddenly stop workinga small mechanical or electronic device or toothe development and use of a new idea or methoda person who is enthusiastic about new technologybecoming very popular very quickly on the internetnot in use any more, having been replaced by something better...

The Wedding Crossword 2021-03-28

The Wedding Crossword crossword puzzle
Across
  1. What is Liam's favourite game?
  2. Where did Liam and Ais go on their first date?
  3. What did Ais want to be when she grew up?
  4. Liam and Ais went to the Six Nations in Dublin to see Ireland play what team?
  5. What is Ais's Godmother's surname?
  6. Where did Liam and Ais meet for the very first time?
  7. What TV computer nerd inspired Ais to consider studying cybersecurity and forensics?
  8. An Irish fairy known for being talkative and mischievous
  9. Liam and Ais share their favourite cake - what is it?
  10. Where did Liam and Ais live in Cork?
Down
  1. One of the destinations on the honeymoon
  2. Liam and Ais's favourite place to visit in Koln.
  3. Where did Liam go to the Gaelteacht?
  4. What is Ais's favourite game?
  5. Ais and Liam got back into Formula One last year - what's their favourite team?
  6. What is Liam's Godmother's surname?
  7. Ais's childhood cat is famous at the local vet for what?
  8. What is the name of Liam's personal pandemic hairdresser?

18 Clues: What is Ais's favourite game?What is Liam's favourite game?What is Ais's Godmother's surname?What is Liam's Godmother's surname?Where did Liam go to the Gaelteacht?Where did Liam and Ais live in Cork?One of the destinations on the honeymoonWhat did Ais want to be when she grew up?Where did Liam and Ais go on their first date?...

Technology CW 2023-06-07

Technology CW crossword puzzle
Across
  1. a proprietary audio/video interface for transmitting uncompressed video data
  2. the protection of computer systems and networks
  3. a method of transmitting and receiving messages using electronic devices.
  4. a file format developed by Adobe in 1992 to present documents
  5. a hardware or software component that stores data
  6. data using a two-symbol system.
  7. a file format developed by Adobe in 1992 to present documents
  8. a coding format for digital audio
  9. a mapping from some domain (for example, a range of integers)
  10. a humanoid robot or synthetic organism designed to imitate a human
Down
  1. blocks of data created by a web server
  2. a file format developed by Adobe in 1992 to present documents
  3. a bitmap image format that was developed by a team at the online services provider
  4. a collection of discrete values that convey information
  5. the most important processor in a given computer.
  6. a commonly used method of lossy compression for digital images
  7. an American multinational technology company
  8. a digital multimedia container format most commonly used to store video and audio
  9. a method of representing data
  10. any software intentionally designed to cause disruption to a computer

20 Clues: a method of representing datadata using a two-symbol system.a coding format for digital audioblocks of data created by a web serveran American multinational technology companythe protection of computer systems and networksthe most important processor in a given computer.a hardware or software component that stores data...

CSAM 2023 2023-07-10

CSAM 2023 crossword puzzle
Across
  1. name of seta mascot
Down
  1. what month is CSAM
  2. trust security framework requiring authentication
  3. cybersecurity attack via text message

4 Clues: what month is CSAMname of seta mascotcybersecurity attack via text messagetrust security framework requiring authentication

complete_rmt_22 2022-02-09

complete_rmt_22 crossword puzzle
Across
  1. The role responsible for maintaining product roadmap
  2. The abbreviation for Innovation management.
  3. The meaning of RTE
  4. Creator of the Software Design plan
  5. The process of setting up an information pool, market segmentation, market sizing, customer analysis, competitor analysis, trend & technology analysis, internal analysis.
  6. The experience distilled from a project that should be actively taken into account in future projects in the context of KM.
  7. Role responsible for qualification of software
  8. Abbreviation for product management process
  9. Abbreviation for Scaled Agile Framenwork
  10. The time needed from creation of the problem to the resolution of the problem, i.e. rejection or the implementation and acceptance of a change.(2 words)
  11. Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
  12. Software Requirements Analysis process in ASPICE
  13. The meaning of swc
  14. Short name for workshops where a team reflects the way it works and identifies potentials for improvement.(plural)
  15. Abbreviation of Software Detailed Designs
  16. Abbreviation used for Cybersecurity Engineering process.
  17. Standard for road vehicles functional safety
  18. The prerequisite identified as necessary for a user, or a user group, to achieve a goal, within a specific context of use.
  19. Object oriented programming language lunched in 1995
  20. The abbreviation of Automotive Software Performance Improvement and Capability dEtermination
  21. The abbreviation of the business development process.
  22. The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
  23. The document that defines the safety strategy in the project
  24. The IEEE-STD-610 defines it as “An activity that ensures that an end product stakeholder’s true needs and expectations are met.”
  25. The abbreviation for the work result "Software Quality Assurance Plan", defined by IEEE 730.
  26. Record of the an exact result of a performed integration step.
  27. Abbreviation for a requirement management plan
  28. Role responsible for identification and analysis of market-specific trends & technologies.
  29. The inspection of selected processes in selected instances (projects, products, locations, …) and that identifies weaknesses in terms of compliance and risk
  30. The highest-level backlog in SAFe
  31. The process of identifying (current and future) business critical knowledge areas as well as capturing, developing, sharing, and effectively using organizational knowledge.
  32. The coordinator that helps the program achieve the program goals.
  33. Attribute of a change request derived from risk, impact, affected customers, upcoming release schedules, etc.
  34. The workresult work result defining the pricing in line with the market, in responsibility of the business development manager.
  35. Any potential failure identified in internal reviews, testing, etc.
  36. The infrastructure used by the project defined in the configuration management plan.
  37. Problem resolution management process in ASPICE
  38. Type of testing performed to expose defects in the interfaces and in the interactions between integrated components or systems.
  39. The task that tracks the program progress against the program goals and to identify potential deviations in time.
  40. Role responsible to create the cybersecurity concept.
Down
  1. Work result with the purpose to provide basic information about the expected outcome of the incubator project.
  2. Important event in the history or development of something or someone
  3. Abbreviation of Software integration and integration test process.
  4. An individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations. (ISO12207)
  5. The abbreviation for the features and high-level requirements
  6. Software integration and integration test process in ASPICE.
  7. The set of five criteria that a product name must fulfill in order to become a product brand.
  8. Abbreviation of User Experience Engineering process.
  9. Work result that is treated as a single entity in the configuration management process.
  10. The abbreviation of system test process
  11. Role responsible for evaluating the received new product ideas and giving feedback to the Employee (accept for further development, or reject).
  12. Task in portfolio management with the purpose to mitigate risks of double work in research and development and to use the scarce resources optimally.
  13. A software component, that contains one or more software components (units and/or other compositions)that makes hierarchical structures in the architectural design possible.
  14. A series of actions taken in order to achieve a certain result
  15. The abbreviation of software test process
  16. The role responsible to drive new business ideas, identify its business potential, and create new business models
  17. Standard used as reference for defining the User Experience Engineering process
  18. The abbreviation used for Problem Resolution Management process
  19. Work results that triggers the change management activities according to the change request management plan
  20. The name of the qualified set of frozen configuration items is
  21. The process established to maintain the integrity of all work results of a process or project and make them available to parties concerned.
  22. Role with skills that is independent of the project and performs process audits and assessments.
  23. Role responsible for deciding whether a change is to be applied.
  24. Smallest piece of software
  25. The strategy that provides the work result is to provide guidance for innovation activities in the next 5 years.
  26. The IEEE-STD-610 defines it as “A test of a system to prove that it meets all its specified requirements at a particular stage of its development.”
  27. Abbreviation of program management process
  28. A cross-functional group of 5-11 individuals who define, build, test, and deliver an increment of value in a short time box.
  29. Role responsible to plan, measure, act on and report the project.
  30. The abbreviation of Portfolio management process
  31. Implemented by planned activities, or divided into sub-goals
  32. The ordered list of features or enablers on a high level (e.g. epics), part of a program.
  33. A collection of projects which are connected by joint goals to obtain benefits not available from managing the projects individually.
  34. Abbreviation of Software Architectural Design
  35. Prioritization of software units to provide the information what is to be done in which order
  36. The fictitious yet realistic representations of users of a system, including details like their mental models, limitations in cognition or physical mobility.
  37. The list of the available product lines, products and product items with the corresponding license types and prices.
  38. The abbreviation for the work result "software project management plan", which is also defined by IEEE 1058
  39. Abbreviation for Subject Matter Expert.
  40. Abbreviation used for change request management process

80 Clues: The meaning of RTEThe meaning of swcSmallest piece of softwareThe highest-level backlog in SAFeCreator of the Software Design planThe abbreviation of system test processAbbreviation for Subject Matter Expert.Abbreviation for Scaled Agile FramenworkThe abbreviation of software test processAbbreviation of Software Detailed Designs...

azure-data-oro-idc-day-of-learning-november 2022-11-24

azure-data-oro-idc-day-of-learning-november crossword puzzle
Across
  1. Meaning of ORO?
  2. India's most attractive employer brand by Randstad
  3. Microsoft had announced a Metaverse partnership with which organization
  4. In which year, ORO team is formed - Two Thousand….?
  5. A lightweight markup language used to create Azure's public documentation
  6. Who wrote ORO team song?
  7. Internal portal used for joining various distribution and security groups
  8. Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
  1. Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
  2. Number of years since IDC was established
  3. - FIFA world cup 2022 is played in which country?
  4. Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
  5. Tool used in Microsoft to manage livesite incidents

13 Clues: Meaning of ORO?Who wrote ORO team song?Number of years since IDC was established- FIFA world cup 2022 is played in which country?India's most attractive employer brand by RandstadIn which year, ORO team is formed - Two Thousand….?Tool used in Microsoft to manage livesite incidents...

Cyber Security Threads 2024-10-01

Cyber Security Threads crossword puzzle
Across
  1. An attack that floods a network with excessive traffic, disrupting services
  2. Ensures that data is accurate and has not been tampered with
  3. Falsifying data to deceive systems or users
  4. The ability of a system to recover quickly from disruptions or attacks
  5. Ensures that systems are accessible and functional when needed
Down
  1. Ensures that information is accessible only to those authorized to access it
  2. The process of converting information into a secret code
  3. A model that describes the stages of a cyberattack ( 2 words )
  4. A weakness in a system that can be exploited by attackers
  5. A type of malware disguised as legitimate software
  6. A potential danger or harmful event in cybersecurity
  7. A security system that monitors and controls network traffic
  8. An attempt to exploit a system or network

13 Clues: An attempt to exploit a system or networkFalsifying data to deceive systems or usersA type of malware disguised as legitimate softwareA potential danger or harmful event in cybersecurityThe process of converting information into a secret codeA weakness in a system that can be exploited by attackers...

CyberSecurity Awareness Month 2024 2024-05-03

CyberSecurity Awareness Month 2024 crossword puzzle
Across
  1. Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
  2. A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
  3. A secret combination of characters used to access an account or device.
  4. An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
  5. A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
  1. A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
  2. Technology that simulates human intelligence processes through automated algorithms.
  3. Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
  4. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
  7. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.

12 Clues: A secret combination of characters used to access an account or device.Technology that simulates human intelligence processes through automated algorithms.Software designed to disrupt, damage, or gain unauthorized access to a computer system.A type of barcode that can be scanned to access information quickly, often used with smartphones....

FOC - Cybersecurity - Unit 6 2024-11-15

FOC - Cybersecurity - Unit 6 crossword puzzle
Across
  1. Involves one key for both encryption and decryption
  2. A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
  3. Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  4. Information about an individual that identifies, links, relates, or describes them
  5. A process of encoding messages to keep them secret, so only "authorized" parties can read it
Down
  1. A wireless access point that gives unauthorized access to secure networks
  2. Protects a computing system against infection
  3. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  4. A process that reverses encryption, taking a secret message and reproducing the original plain text
  5. Software intended to damage a computing system or to take partial control over its operation
  6. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  7. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

12 Clues: Protects a computing system against infectionInvolves one key for both encryption and decryptionA wireless access point that gives unauthorized access to secure networksInformation about an individual that identifies, links, relates, or describes themSoftware intended to damage a computing system or to take partial control over its operation...

Security Awareness Week - Shrewsbury 2013-08-29

Security Awareness Week - Shrewsbury crossword puzzle
Across
  1. A more secure form of password
  2. The term used to describe IT Security
Down
  1. Caterpillar's method of classifying confidential data
  2. A computer virus designed to spread itself to other computers
  3. The act of manipulating people into divulging confidential information

5 Clues: A more secure form of passwordThe term used to describe IT SecurityCaterpillar's method of classifying confidential dataA computer virus designed to spread itself to other computersThe act of manipulating people into divulging confidential information

Machine Learning Crossword #11 2020-05-24

Machine Learning Crossword #11 crossword puzzle
Across
  1. Bharti Airtel recently acquires 10% stake in this early-stage startup
  2. Accenture recently acquired this Ahmedabad based analytics company
  3. Intel capital invested $900M in this mobility startup
  4. INDIAN VOICE AI STARTUP RAISES $5.1 MN FROM EXFINITY VENTURES AND KALAARI CAPITAL
Down
  1. an agritech startup raises $5.9M in Series A round to further enhance its AI-based offerings
  2. This RPA startup RAISES $120 MILLION just last month
  3. Apple has purchased virtual reality startup
  4. Microsoft will pay $165 million for the acquisition of this Israeli cybersecurity company

8 Clues: Apple has purchased virtual reality startupThis RPA startup RAISES $120 MILLION just last monthIntel capital invested $900M in this mobility startupAccenture recently acquired this Ahmedabad based analytics companyBharti Airtel recently acquires 10% stake in this early-stage startup...

Technology 2021-10-28

Technology crossword puzzle
Across
  1. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  2. video adapter
  3. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
  4. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  5. measures to protect of computer
  6. not eliminate the servers
  7. a saved link to a particular web page
Down
  1. the heart of operating system
  2. conventional method of transmitting data
  3. part of application that performs a task not known to a user
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. collection of physical part of comp system

12 Clues: video adapternot eliminate the serversthe heart of operating systemmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

Cyber Security Crossword 2024-01-16

Cyber Security Crossword crossword puzzle
Across
  1. A malicious program that infects computers without user knowledge or permission.
  2. Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
  3. Malicious party attacking a company.
  4. A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
  5. attack that affects availability of a resource.
  6. A botnet is a network of private computers infected with malicious software.
Down
  1. Secret expression required to gain access to a computing system.
  2. Attack type.
  3. Excessive push notifications leading to unwanted response.
  4. authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
  5. Data Leakage due to well-crafted AI prompt.
  6. Firewall type that protects Web-based Applications.

12 Clues: Attack type.Malicious party attacking a company.Data Leakage due to well-crafted AI prompt.attack that affects availability of a resource.Firewall type that protects Web-based Applications.Excessive push notifications leading to unwanted response.Secret expression required to gain access to a computing system....

Talk To Me in Cybersecurity 2021-09-16

Talk To Me in Cybersecurity crossword puzzle
Across
  1. Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
  2. A formal and approved list of users who have defined access rights to an asset
  3. Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
  4. Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  5. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
  6. Surveillance software that can record every keystroke made on a computer’s keyboard
  7. The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
  8. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
  10. The psychological manipulation of people into performing actions or divulging confidential information
  11. Computer program used to prevent, detect, and remove malware
Down
  1. The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
  2. Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
  3. Refers to a company security policy that allows for employees’ personal devices to be used in business
  4. Devices or software designed to find and prevent malicious activity on corporate networks
  5. Actions a company takes to manage the aftermath of a security breach or cyberattack
  6. A type of authentication method where the proof of a user’s identity is gained by different independent sources

17 Clues: Computer program used to prevent, detect, and remove malwareA formal and approved list of users who have defined access rights to an assetSurveillance software that can record every keystroke made on a computer’s keyboardActions a company takes to manage the aftermath of a security breach or cyberattack...

Cybersecurity Unit 1 Lesson 1 2022-12-02

Cybersecurity Unit 1 Lesson 1 crossword puzzle
Across
  1. Changes your directory
  2. A set of steps to accomplish a task.
  3. A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
  4. Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
  5. Guidelines that team members develop in order to be followed when working together.
  6. A system that can distinguish between a human and an automated program.
  7. Shows the contents of your directory
  8. A process that converts human-readable text or data into a coded form.
Down
  1. A team of individuals working together to investigate cyber events and anomalies.
  2. A collection of rules detailing appropriate student behavior.
  3. Software that is intended to do harm or damage.
  4. The trail that you leave behind when you engage in online experiences.
  5. To guess or discover, especially a password.
  6. Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
  7. To confirm your identity using knowledge know only to you or information interpreted by you.
  8. An attempt to discover information, especially passwords, through trial and error.
  9. Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.

17 Clues: Changes your directoryA set of steps to accomplish a task.Shows the contents of your directoryTo guess or discover, especially a password.Software that is intended to do harm or damage.A collection of rules detailing appropriate student behavior.The trail that you leave behind when you engage in online experiences....

Unit 1: Intro to IT 2023-12-20

Unit 1:  Intro to IT crossword puzzle
Across
  1. Two-dimensional bar code that contains an encoded web or e-mail address.
  2. Working for a company from home using IT.
  3. Software that resides in the cloud that is accessed by users without downloading or installing.
  4. Gap between those with access to technology and those who do not.
  5. Storage that is cloud-based.
  6. Type of computer found inside of other devices.
  7. Involves storing and retrieving data from Internet-based spaces.
Down
  1. How efficiently and quickly a person completes tasks.
  2. Branch of IT that protects computer systems.
  3. Method of searching through huge amounts of data to find patterns.
  4. Amount of data that can travel on a communication system.
  5. Includes all the work done with computers.
  6. View of the live world that has been enhanced with graphics, sounds, or other outputs.
  7. Type of e-book that contains integrated multimedia features.

14 Clues: Storage that is cloud-based.Working for a company from home using IT.Includes all the work done with computers.Branch of IT that protects computer systems.Type of computer found inside of other devices.How efficiently and quickly a person completes tasks.Amount of data that can travel on a communication system....

IT_Tóth Dániel Károly 2023-12-24

IT_Tóth Dániel Károly crossword puzzle
Across
  1. The field concerned with protecting computer systems and data.
  2. Software application designed for use on mobile devices.
  3. The process of determining the structure and functionality of a program.
  4. The activity of writing or designing a computer program.
  5. (!Internet of Things!) The network of physical devices capable of communicating over the internet.
  6. services provided electronically, such as online banking or e-commerce.
  7. A structured storage system that allows efficient data management.
  8. Designing the user interface and user experience for software.
  9. A computer providing specialized services to other computers or devices.
Down
  1. Large volumes of data used for analytical purposes.
  2. Computing resources and services accessible over the internet.
  3. Language A set of rules and instructions interpreted by a computer.
  4. A sequence of steps to perform a computer task.
  5. An iterative and incremental development method in software design.
  6. A system of interconnected computers or devices.

15 Clues: A sequence of steps to perform a computer task.A system of interconnected computers or devices.Large volumes of data used for analytical purposes.Software application designed for use on mobile devices.The activity of writing or designing a computer program.The field concerned with protecting computer systems and data....

26. Technology 2023-09-09

26. Technology crossword puzzle
Across
  1. A handheld device that combines a phone with computing functions.
  2. A machine designed to carry out tasks autonomously or under human control.
  3. A machine that processes information and performs tasks.
  4. A simulated environment created by computer technology.
  5. Global Positioning System, used for location and navigation.
  6. The process of encoding information to secure it from unauthorized access.
  7. A global network that connects computers and devices worldwide.
  8. Information that can be stored, processed, and analyzed.
Down
  1. Machines and software that can think and learn like humans.
  2. The measurement and analysis of unique physical or behavioral characteristics for identification.
  3. The physical components of computers and electronic devices.
  4. Programs and applications that run on computers and devices.
  5. Measures taken to protect computer systems and data from cyber threats.
  6. The creation of three-dimensional objects from digital designs.

14 Clues: A simulated environment created by computer technology.A machine that processes information and performs tasks.Information that can be stored, processed, and analyzed.Machines and software that can think and learn like humans.The physical components of computers and electronic devices.Programs and applications that run on computers and devices....

Cybersecurity Fundamental Chapter 1 2023-10-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. who rally and protest against different political and social ideas.
  2. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. collection of technologies that enable the connection of various devices to the Internet.
  4. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. Their targets are foreign governments, terrorist groups, and corporations.
  4. hackers who are either self-employed or working for large cybercrime organizations.
  5. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. result of data sets that are large and complex, making traditional data processing applications inadequate.

12 Clues: who rally and protest against different political and social ideas.Their targets are foreign governments, terrorist groups, and corporations.hackers who are either self-employed or working for large cybercrime organizations.collection of technologies that enable the connection of various devices to the Internet....

Cybersecurity Lesson 1-3 2023-09-21

Cybersecurity Lesson 1-3 crossword puzzle
Across
  1. automatically tags any pictures you take with the location of where you took it
  2. the freedom to be left alone
  3. formal ways of giving credit to people for their work
  4. everything you do online
  5. a detailed report
  6. untrue, defamatory statements that are written.
  7. short for internet etiquette
  8. the exclusive right to make copies
Down
  1. includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
  2. stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
  3. someone who intentionally targets people for harm using online chat rooms or social media
  4. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody

12 Clues: a detailed reporteverything you do onlinethe freedom to be left aloneshort for internet etiquettethe exclusive right to make copiesuntrue, defamatory statements that are written.formal ways of giving credit to people for their workautomatically tags any pictures you take with the location of where you took it...

Brain-Box Challenge 2024-09-28

Brain-Box Challenge crossword puzzle
Across
  1. The ability to connect systems and devices for seamless communication.
  2. A flexible project management approach focusing on iterative progress.
  3. A plan of action designed to achieve long-term goals.
  4. A decentralized, digital ledger for recording transactions securely.
  5. The person whose experience is central to digital transformation.
  6. A significant change caused by new technologies or innovations.
  7. Raw information collected for analysis and decision-making.
  8. A system that uses algorithms to learn from data and improve.
  9. The use of technology to perform tasks without human intervention
  10. The process of creating new ideas or products that drive change.
Down
  1. The systematic analysis of data for insights and trends.
  2. Measures taken to protect systems from digital attacks.
  3. The ability to grow and handle increased demand efficiently.
  4. A platform for storing and accessing data over the internet.
  5. The process of using digital technologies to change business models.

15 Clues: A plan of action designed to achieve long-term goals.Measures taken to protect systems from digital attacks.The systematic analysis of data for insights and trends.Raw information collected for analysis and decision-making.The ability to grow and handle increased demand efficiently.A platform for storing and accessing data over the internet....

Strategic Planning 2023-06-19

Strategic Planning crossword puzzle
Across
  1. An obstacle excutives face the team does not agree with proposed strategy
  2. Businesses may need to address market volatility, cybersecurity, legal and regulatory compliance, and supply chain disruptions
  3. When the blame game starts and people become defensive
  4. Businesses struggle with uncertanties such as market volatility, technological advancements, and regulatory shifts.
Down
  1. Businesses may face due financial, human, and technological limits
  2. Lost in translation
  3. New strategies often face ______ from employees
  4. When businesses get lost in the sematics of defining their vision, missions, and values

8 Clues: Lost in translationNew strategies often face ______ from employeesWhen the blame game starts and people become defensiveBusinesses may face due financial, human, and technological limitsAn obstacle excutives face the team does not agree with proposed strategyWhen businesses get lost in the sematics of defining their vision, missions, and values...

computing 2022-02-09

computing crossword puzzle
Across
  1. software that would be most appropriate to use to send an attached document to lots of people at the same time
  2. wired networks send data along ------
  3. the law protects the control you have over the things that you create
Down
  1. it is an electronic communication to bully others
  2. it is the worldwide network of computers
  3. protection of information systems from unauthorized access or modification to information
  4. a device that connects multiple devices together
  5. networks send and receive messages in small units of data known as ------

8 Clues: wired networks send data along ------it is the worldwide network of computersa device that connects multiple devices togetherit is an electronic communication to bully othersthe law protects the control you have over the things that you createnetworks send and receive messages in small units of data known as ------...

Innovative Digital Platform 2023-05-24

Innovative Digital Platform crossword puzzle
Across
  1. “Fast changing _____” is the biggest challenge for this pillar.
  2. This pillar is about “_____” the way we work.
  3. What are the two drivers of this pillar? (3 words)
  4. According to the inspiration blog about business, what should be a priority when leverage innovative digital platforms? (2 words)
Down
  1. Where does Sebastian like spending his free time?
  2. Ricky ____ would play Sebastian in the film of his life.
  3. What would Sebastian do if he could?
  4. What kind of technology excites Sebastian most about this pillar?
  5. What do we need to drive right business decisions?
  6. Data _____ is becoming more and more important in maximising business value.
  7. What should we spend five minutes a day doing, to enable the strategy?

11 Clues: What would Sebastian do if he could?This pillar is about “_____” the way we work.Where does Sebastian like spending his free time?What do we need to drive right business decisions?What are the two drivers of this pillar? (3 words)Ricky ____ would play Sebastian in the film of his life.“Fast changing _____” is the biggest challenge for this pillar....

Digital Technology Words 1 2024-05-08

Digital Technology Words 1 crossword puzzle
Across
  1. The method a digital system uses to store and manipulate data.
  2. Raw, unorganised facts and figures.
  3. performed
  4. Really being what it seems to be, genuine.
  5. The protection provided to the creators of original works that offers a legal framework for the control and reproduction or transmission of their creations.
  6. A method or system of computing or calculating.
Down
  1. Data with a high degree of organisation, such that it can easily be analysed and processed using algorithms.
  2. protection of internet-connected systems, including hardware, software and data, from cyberattacks.
  3. A step-by-step procedure required to solve a problem.
  4. An instruction in a computer program or algorithm that causes different actions to
  5. Free from errors

11 Clues: performedFree from errorsRaw, unorganised facts and figures.Really being what it seems to be, genuine.A method or system of computing or calculating.A step-by-step procedure required to solve a problem.The method a digital system uses to store and manipulate data.An instruction in a computer program or algorithm that causes different actions to...

Technology 2023-06-29

Technology crossword puzzle
Across
  1. Using technology to simulate a three-dimensional environment
  2. Protecting computers, networks, and data from unauthorized access
  3. A portable device with a touch screen for browsing and entertainment
  4. Watching or listening to media content over the internet in real-time
  5. Online platforms for connecting and sharing content with others
  6. A global network that connects computers and allows information sharing
Down
  1. A machine that can perform various tasks and run different programs
  2. Electronic mail used for sending messages and files online
  3. Designing, building, and programming robots for various purposes
  4. A collection of web pages accessible through the internet
  5. Electronic games played on a computer or gaming console
  6. Creating three-dimensional objects by layering materials
  7. Writing instructions for computers to create software and websites
  8. A portable computer that you can use for writing, doing homework, or watching movies
  9. A mobile device that can make calls, send messages, and run apps

15 Clues: Electronic games played on a computer or gaming consoleCreating three-dimensional objects by layering materialsA collection of web pages accessible through the internetElectronic mail used for sending messages and files onlineUsing technology to simulate a three-dimensional environmentOnline platforms for connecting and sharing content with others...

App Rationalisation Crossword 2024-02-14

App Rationalisation Crossword crossword puzzle
Across
  1. Phase 1 of EXO apps is called ______ Win.
  2. What is Work Order 1.0 for the process of apps' decommissioning?
  3. The site to raise tickets for decommissioning.
  4. Apps Optimisation could help to reduce _________ cost (Maintenance, subscriptio & hardware cost) at OPU.
  5. One of the EXO apps focus is to ________ on - premise applications to PETRONAS cloud.
  6. What is the name of the new apps optimization project initiated by GD?
Down
  1. Phase 2 of EXO apps is called __________ Enhancement.
  2. ____ decommissioning involves the removal of both infra and application components.
  3. Main data source for app rationalization.
  4. ______________ functions is when 2 or more apps share similar functionality.
  5. Apps that are not in the scope of the PDSB decommission team.
  6. Idle applications & servers increase the likelihood of __________________________ attack.
  7. Consists of the decommissioning of server, database, storage, and network components.
  8. How many work orders are in the process of decommissioning apps?
  9. Dashboard to view Downstream Application

15 Clues: Dashboard to view Downstream ApplicationPhase 1 of EXO apps is called ______ Win.Main data source for app rationalization.The site to raise tickets for decommissioning.Phase 2 of EXO apps is called __________ Enhancement.Apps that are not in the scope of the PDSB decommission team.What is Work Order 1.0 for the process of apps' decommissioning?...

Alexa Say Wha? 2023-10-09

Alexa Say Wha? crossword puzzle
Across
  1. You can find this snack at most shopping malls.
  2. You can find this aquatic friend on the Nemo ride at Epcot.
Down
  1. The work that we do.
  2. This will need to be remediated.
  3. 22, 53, and 80 are common examples.

5 Clues: The work that we do.This will need to be remediated.22, 53, and 80 are common examples.You can find this snack at most shopping malls.You can find this aquatic friend on the Nemo ride at Epcot.

TECHNO CROSSWORD 2024-11-12

TECHNO CROSSWORD crossword puzzle
Across
  1. People use this to connect, share photos, and send messages online.
  2. Devices that measure body temperature.
  3. The process of protecting devices from online attacks.
  4. Used to watch movies, shows, and news.
  5. A device that helps people take clear pictures or videos.
  6. Used for making calls and sending texts.
  7. A machine that can be programmed to do tasks by itself.
Down
  1. Portable devices used by students to access learning material.
  2. A flying device controlled by remote, often used to take pictures from above.
  3. Games played on consoles, computers, or mobile devices.
  4. An assistant on phones that talks back and helps with tasks.
  5. This device lets you see and hear people far away in real time.
  6. A place where you can find a lot of information on any topic.

13 Clues: Devices that measure body temperature.Used to watch movies, shows, and news.Used for making calls and sending texts.The process of protecting devices from online attacks.Games played on consoles, computers, or mobile devices.A machine that can be programmed to do tasks by itself.A device that helps people take clear pictures or videos....

Technology 2021-10-28

Technology crossword puzzle
Across
  1. a saved link to a particular web page
  2. the heart of operating system
  3. measures to protect of computer
  4. does not eliminate the servers
  5. collection of physical part of comp system
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  2. video adapter
  3. conventional method of transmitting data
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.

12 Clues: video adapterthe heart of operating systemdoes not eliminate the serversmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

IT Crossword 2021-10-28

IT Crossword crossword puzzle
Across
  1. a saved link to a particular web page.
  2. the heart of operating system.
  3. measures to protect of computer.
  4. does not eliminate the servers.
  5. collection of physical part of comp system.
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials.
  2. video adapter.
  3. conventional method of transmitting data.
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user.
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication.
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result

12 Clues: video adapter.the heart of operating system.does not eliminate the servers.measures to protect of computer.a saved link to a particular web page.conventional method of transmitting data.collection of physical part of comp system.part of application that performs a task not known to a user....

Cyberpuzzle 2023-08-08

Cyberpuzzle crossword puzzle
Across
  1. Substitute_ with numbers, punctuation marks or symbols when creating your password
  2. Phishing attempt directed at specific individuals or companies
  3. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  4. Kind of software used to prevent, scan, detect and delete viruses from a computer
  5. Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
  6. Cybersecurity Awareness Month
  7. Mandatory to wear inside the organisation and to remove outside
Down
  1. Action to do when I receive a suspicious email
  2. When available, use stronger_for an added layer of security
  3. Type of malware that disrupts computers, servers, and other devices
  4. Phishing attack deployed via SMS message
  5. Defensive technology designed to keep the bad guys out

12 Clues: Cybersecurity Awareness MonthPhishing attack deployed via SMS messageAction to do when I receive a suspicious emailDefensive technology designed to keep the bad guys outWhen available, use stronger_for an added layer of securityPhishing attempt directed at specific individuals or companies...

Cyber ethics terms 2021-08-25

Cyber ethics terms crossword puzzle
Across
  1. unauthorized use or reproduction of another's work
  2. legal right, given to an originator
  3. a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
  4. correct or acceptable way of communicating on the internet
  5. moral principles
  6. a document stipulating constraints and practices that a user must agree to for access
  7. a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
  1. the philosophic study of ethics pertaining to computers
  2. all rights associated with intangible assets owned by a person or company
  3. criminal activities carried out by means of computers or the internet
  4. bullying that is cyber
  5. tricking someone on the web
  6. allows the creator protection from theft of their idea
  7. abusive message posted on the internet

14 Clues: moral principlesbullying that is cybertricking someone on the weblegal right, given to an originatorabusive message posted on the internetunauthorized use or reproduction of another's workallows the creator protection from theft of their ideathe philosophic study of ethics pertaining to computers...

Racheal Tan Kai Luo - 8 Gamma 2023-01-19

Racheal Tan Kai Luo - 8 Gamma crossword puzzle
Across
  1. a personal data that social media will collect from you
  2. raw facts and figures
  3. Cyberattacks are usually aimed at _____ normal business processes
Down
  1. practice of protecting systems , network and program from digital attacks
  2. you have the right to ______ your data
  3. ____ must be used for specific and stated reason

6 Clues: raw facts and figuresyou have the right to ______ your data____ must be used for specific and stated reasona personal data that social media will collect from youCyberattacks are usually aimed at _____ normal business processespractice of protecting systems , network and program from digital attacks

Cybersecurity Vocabulary Crossword 2022-03-07

Cybersecurity Vocabulary Crossword crossword puzzle
Across
  1. transforming plaintext or cleartext into ciphertext
  2. planning and maintaining organization safe in cyberspace.
  3. used to prove one's identity, or authorize access to a resource.
  4. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
  1. practice of sending fraudulent messages that appear to come from a reputable source.
  2. attaches itself with host file and replicates.
  3. unwanted or unsolicited communications typically received via e-mail

7 Clues: attaches itself with host file and replicates.transforming plaintext or cleartext into ciphertextplanning and maintaining organization safe in cyberspace.used to prove one's identity, or authorize access to a resource.unwanted or unsolicited communications typically received via e-mail...

Resolving Conflict and Building Peace 2021-04-19

Resolving Conflict and Building Peace crossword puzzle
Across
  1. The building of strong and positive relationships between countries in order to maintain peace and prevent conflicts from occurring
  2. The practice of protecting computers, mobile devices, electronic systems, networks and data from attacks
  3. The power or authority to rule
  4. to keep a careful watch for possible danger or difficulties
  5. The protection of something from harm
  6. In a pleasant and friendly way
Down
  1. To be able to understand how someone feels
  2. Discussing an issue in order to find a solution that is acceptable to all
  3. The intentional use of force or violence by individuals or groups to cause fear and intimidate others
  4. A disagreement between two or more parties
  5. To find a solution to a problem or disagreement

11 Clues: The power or authority to ruleIn a pleasant and friendly wayThe protection of something from harmTo be able to understand how someone feelsA disagreement between two or more partiesTo find a solution to a problem or disagreementto keep a careful watch for possible danger or difficulties...

CIS 178 Participation 3 Security crossword 2023-04-21

CIS 178 Participation 3 Security crossword crossword puzzle
Across
  1. information for users online activity
Down
  1. Protects devices services and netwoks
  2. two components to verify users
  3. designed to stop remove viruses

4 Clues: two components to verify usersdesigned to stop remove virusesProtects devices services and netwoksinformation for users online activity

Digital system & Computer science 2022 2022-10-18

Digital system & Computer science 2022 crossword puzzle
Across
  1. software that collectes information on a computer without the user knowing about it
  2. protection of systems and datas on computer sciences
  3. web language used to build web pages and executed client side
  4. measure of the amount of data that can be transfered on a network
  5. the default or front page of a web site
  6. site like ecosia or google used to find information on the internet
Down
  1. said of the network used at home or in a small company
  2. a group or system of interconnected devices or people
  3. to put programs or inforamtion from a computer to the internet
  4. a connection without cables

10 Clues: a connection without cablesthe default or front page of a web siteprotection of systems and datas on computer sciencesa group or system of interconnected devices or peoplesaid of the network used at home or in a small companyweb language used to build web pages and executed client sideto put programs or inforamtion from a computer to the internet...

Social media scams! Identify! 2021-08-11

Social media scams! Identify! crossword puzzle
Across
  1. pretending to be someone else online.
  2. social media app, red, orange, yellow and purple background with a camera as its icon
  3. protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. examples are phishing, impersonation.
Down
  1. the name of this project!
  2. information or an opinion about an identified individual.
  3. online impersonators use these.
  4. a current medium of exchange in the form of coins and banknotes.
  5. goods to be bought and sold dont forget to get some on the way out!
  6. an app with the synonym of "Fraud" prevention. Please support our cause by downloading it thanks!

10 Clues: the name of this project!online impersonators use these.pretending to be someone else online.examples are phishing, impersonation.information or an opinion about an identified individual.a current medium of exchange in the form of coins and banknotes.goods to be bought and sold dont forget to get some on the way out!...

tentang ai runway gen 3 alpha 2024-10-30

tentang ai runway gen 3 alpha crossword puzzle
Across
  1. Secara garis besar apa yang dapat di lakukan oleh Runway Gen-3 Alpha AI?
  2. Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna?
  3. Apakah Runway Gen-3 Alpha ramah?
  4. Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut?
  5. Apa yang membedakan Runway Gen-3 Alpha dari software editing video tradisional?
  6. Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film?
Down
  1. batasan atau tantangan yang dihadapi pengguna saat menggunakan Runway Gen-3 Alpha?
  2. Apa yang Runway Gen-3 Alpha tawarkan agar bisa disesuaikan dengan kebutuhan spesifik mereka?
  3. Apa itu Runway Gen-3 Alpha?
  4. apa perbedaan utamanya dibandingkan dengan versi sebelumnya?

10 Clues: Apa itu Runway Gen-3 Alpha?Apakah Runway Gen-3 Alpha ramah?apa perbedaan utamanya dibandingkan dengan versi sebelumnya?Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna?Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut?Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film?...

test 2022-07-15

test crossword puzzle
Across
  1. Year they met -
  2. On the way to Big Sur they stopped at an ___ farm -
  3. European country michael lived in -
  4. City they will live in after the wedding -
  5. City of the music festival they attended -
  6. Sammi’s side hustle -
  7. City they took their engagement photos -
  8. Destination of first plane ride together -
  9. Amusement park they had annual passes to -
  10. How they met
  11. Sammis bridal shower was a ___ party -
  12. Location of their first post together on IG -
  13. Industry sammi works in -
Down
  1. Music festival they attended -
  2. Michael proposed in ___ beach -
  3. Color of michaels bathroom before they painted it -
  4. Type of engineer Michael is -
  5. City sammi did her internship in -
  6. How we are honoring sammis dad at the wedding -
  7. Type of dance sammi did growing up -
  8. State michael was raised in -
  9. Basketball team michael supports -
  10. Attends ___ ___ community church -
  11. Where they ate on their first date -
  12. Sauce michael hates -
  13. Brand of sammi’s car -
  14. Engagement ring shape -
  15. Day of the week they attend life group -
  16. Sammis favorite flowers -
  17. Month they met -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Sammis favorite flowers -Industry sammi works in -Type of engineer Michael is -State michael was raised in -Music festival they attended -Michael proposed in ___ beach -City sammi did her internship in -...

test 2022-07-15

test crossword puzzle
Across
  1. How we are honoring sammis dad at the wedding -
  2. Sammis bridal shower was a ___ party -
  3. Engagement ring shape -
  4. Music festival they attended -
  5. Sauce michael hates -
  6. City sammi did her internship in -
  7. Day of the week they attend life group -
  8. Sammi’s side hustle -
  9. Basketball team michael supports -
  10. Location of their first post together on IG -
  11. Type of engineer Michael is -
  12. Brand of sammi’s car -
  13. Where they ate on their first date -
  14. Year they met -
  15. Michael proposed in ___ beach -
  16. Month they met -
Down
  1. Amusement park they had annual passes to -
  2. European country michael lived in -
  3. Destination of first plane ride together -
  4. On the way to Big Sur they stopped at an ___ farm -
  5. Color of michaels bathroom before they painted it -
  6. State michael was raised in -
  7. Industry sammi works in -
  8. City they will live in after the wedding -
  9. City they took their engagement photos -
  10. Type of dance sammi did growing up -
  11. How they met
  12. Attends ___ ___ community church -
  13. Sammis favorite flowers -
  14. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sauce michael hates -Sammi’s side hustle -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -City sammi did her internship in -...

Ryan & Allison 2023-01-01

Ryan & Allison crossword puzzle
Across
  1. Ryan's age
  2. You could bribe Ryan with (state)
  3. High School Ryan graduated from
  4. Where they got engaged
  5. City Allison grew up in
  6. Where they met
  7. College Ryan & Allison attended
  8. Years they've been together
  9. Allison's favorite dessert
  10. Ryan's Middle Name
  11. Allison's profession
  12. Ryan's Zodiac Sign
  13. Number of nephews
  14. Allison's Mother's name
  15. Allison's first job
  16. First concert they went to together
  17. Number of Neices
  18. City Ryan grew up in
  19. Allison's eye color
  20. Allison's Dad's name
Down
  1. Ryan's profession
  2. Ryan's favorite color
  3. Month they got engaged
  4. Furthest state they have visited together
  5. Allison's biggest fear
  6. Job they worked together
  7. Highschool Allison graduated from
  8. Allison's Zodiac Sign
  9. You could bribe Allison with
  10. Ryan's favorite genre of movies or books
  11. They each have ____ sister(s)
  12. Ryan's Dad's name
  13. Ryan's Mother's Name
  14. Allison's age
  15. Brand of car Ryan has
  16. Ryan's favorite outdoor activity
  17. Ryan's eye color
  18. Ryan's favorite Indian dish
  19. Ryan & Allison Dog
  20. First out-of-state trip together
  21. Allison's Middle Name

41 Clues: Ryan's ageAllison's ageWhere they metRyan's eye colorNumber of NeicesRyan's professionRyan's Dad's nameNumber of nephewsRyan's Middle NameRyan's Zodiac SignRyan & Allison DogAllison's first jobAllison's eye colorAllison's professionRyan's Mother's NameCity Ryan grew up inAllison's Dad's nameRyan's favorite colorAllison's Zodiac Sign...

FIT E: A Lot O Words 2013-05-16

FIT E: A Lot O Words crossword puzzle
Across
  1. 1,000 petabytes
  2. 1,000 zetabytes
  3. catchy phrase for a business
  4. cpu
  5. 1,000 yottabytes
  6. lcd
  7. 1,000 megabytes
  8. the heart of the computer
  9. search engine that uses other search engines for their results
  10. place where the mother board is
  11. mouse or flashdrive
  12. your protection from hackers online
  13. isp
  14. printer or monitor
  15. smallest unit data
  16. portable storage for files and documents
  17. port where you connect the ethernet cable
  18. screen
  19. 1,000 bytes
Down
  1. angry birds or temple run
  2. behavior online
  3. 1,000 gigabytes
  4. 1,000 brontobytes
  5. ncsa
  6. to start up
  7. 1,000 exabytes
  8. 3g and 4g
  9. zoomable online presentation
  10. 1,000 kilobytes
  11. 8 bits
  12. led
  13. word
  14. 1,000 terabytes
  15. ram
  16. phone
  17. three types: optical, mechanical, and touch pad
  18. used to improve or add on to a game played on computers
  19. who what why
  20. the system that operates the computer
  21. dsl and cable
  22. port where you connect your flashdrive
  23. google or yahoo
  24. your privacy online
  25. wireless internet access
  26. nike swoosh

45 Clues: cpuledlcdramispncsawordphone8 bitsscreen3g and 4gto start upnike swoosh1,000 byteswho what whydsl and cable1,000 exabytesbehavior online1,000 gigabytes1,000 petabytes1,000 zetabytes1,000 kilobytes1,000 terabytes1,000 megabytesgoogle or yahoo1,000 yottabytes1,000 brontobytesprinter or monitorsmallest unit datamouse or flashdriveyour privacy online...

Computer Apps Review 2022-05-02

Computer Apps Review crossword puzzle
Across
  1. what google app would you use to make a survey
  2. What are the google doc margins
  3. The main part of an email is called the ___.
  4. When you steal someone else's work it is called _____
  5. What is mrs.brughorns favorite font?
  6. what google app would you use to make a website
  7. A google app that gives you directions to a location
  8. How do you sight your sources in a google doc?
  9. You use this to use google
Down
  1. We use cybersecurity to protect us from___
  2. what google app would you use to make a presentation
  3. _____ docs
  4. The school issues you this at the beginning of the year
  5. An app to make videos
  6. what google app would you use to write an essay
  7. Where does all the work you do on a google app go?
  8. When wringing an email you need to have ______ etiquette
  9. _______ is a type of essay format
  10. This google app can help with math.
  11. When sending an email the ___ line tells the receiver what the email is about

20 Clues: _____ docsAn app to make videosYou use this to use googleWhat are the google doc margins_______ is a type of essay formatThis google app can help with math.What is mrs.brughorns favorite font?We use cybersecurity to protect us from___The main part of an email is called the ___.what google app would you use to make a survey...

Computer Virus 2024-07-01

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

it-words 2022-11-08

it-words crossword puzzle
Across
  1. communication over a distance by cable, telegraph or telephone
  2. a person who uses or operates something, especially a computer or other machine
  3. WWW
  4. copy (data) from one computer system to another, typically over the internet
  5. the state of being protected against the criminal or unauthorized use of electronic data or the measures taken to achieve this
  6. networked computing facilities providing remote data storage and processing services via the internet
  7. the activity of buying and selling, especially on a large scale
Down
  1. program instructions
  2. you have to press it to turn on the computer
  3. the programs and other operating information used by a computer
  4. Excel table with one word
  5. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  6. modern technology's synonym
  7. input device with which you can write text
  8. the "soul" of the computer

15 Clues: WWWprogram instructionsExcel table with one wordthe "soul" of the computermodern technology's synonyminput device with which you can write textyou have to press it to turn on the computercommunication over a distance by cable, telegraph or telephonethe programs and other operating information used by a computer...

Risk Culture Awareness 2022-01-18

Risk Culture Awareness crossword puzzle
Across
  1. your ability and willingness to stomach a decline in the value of your investments.
  2. risk of loss resulting from ineffective or failed internal processes, people, systems
  3. not part of operational risk
  4. chance of something happening
  5. level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
  6. there are three lines of them
Down
  1. reputational harm stemming from a cyberattack or breach within an organization's network
  2. you are part of this line
  3. represents the third line
  4. the elimination of hazards, activities and exposures that can negatively affect an organization and its assets

10 Clues: you are part of this linerepresents the third linenot part of operational riskchance of something happeningthere are three lines of themyour ability and willingness to stomach a decline in the value of your investments.risk of loss resulting from ineffective or failed internal processes, people, systems...

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms including AI for automation
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

Embracing the Digital Tapestry 2024-02-11

Embracing the Digital Tapestry crossword puzzle
Across
  1. The act of introducing new ideas, devices, or methods.
  2. Digital or virtual currency secured by cryptography.
  3. The ability to understand and share the feelings of another in the context of digital interactions.
  4. The state or condition of being free from public attention in the digital realm.
  5. A global system of interconnected computer networks.
Down
  1. Simulation of human intelligence in machines for performing complex tasks.
  2. Online platforms that enable users to create, share content, or participate in social networking.
  3. A decentralized ledger of all transactions across a network.
  4. The era marked by rapid technological advancements and global connectivity.
  5. Protective measures and technologies used to safeguard information and systems.

10 Clues: Digital or virtual currency secured by cryptography.A global system of interconnected computer networks.The act of introducing new ideas, devices, or methods.A decentralized ledger of all transactions across a network.Simulation of human intelligence in machines for performing complex tasks....

technical 2024-07-29

technical crossword puzzle
Across
  1. This language is known for its simplicity and is named after a type of snake.
  2. The practice of protecting systems and networks from digital attacks.
  3. A widely used operating system developed by Microsoft.
  4. Management This acronym refers to a type of database that organizes data into tables.
  5. The method used to connect multiple devices in a network.
  6. A diagram used to visually represent the flow of a program.
Down
  1. A common tool used to prevent unauthorized access to a network.
  2. The physical components of a computer system.
  3. This term refers to a device that stores data using magnetic disks.
  4. The process of writing and maintaining the source code of software.

10 Clues: The physical components of a computer system.A widely used operating system developed by Microsoft.The method used to connect multiple devices in a network.A diagram used to visually represent the flow of a program.A common tool used to prevent unauthorized access to a network.This term refers to a device that stores data using magnetic disks....

4424 2024-04-05

4424 crossword puzzle
Across
  1. New K-State guard from Michigan.
  2. K-State requires all students to complete _____ training by April 30.
  3. The College of Modern Language is encouraging _____ to its students.
  4. _____ Songs of Spring to listen to this season.
Down
  1. The Aggieville _____ brings in hundreds of cattle to Manhattan this weekend.
  2. A new _____ light master plan will make Manhattan roads safer.
  3. Had four RBI against Missouri State.
  4. Carla Bernat skyrocketed to tied-23rd to make the Saturday _____ at Augusta National Women’s Amateur.
  5. K-State baseball faces off against No. 25 ____, starting Friday.
  6. Campus Compass: _____ Counseling and Psychological Services offers therapists, therapy programs and more to support students.

10 Clues: New K-State guard from Michigan.Had four RBI against Missouri State._____ Songs of Spring to listen to this season.A new _____ light master plan will make Manhattan roads safer.K-State baseball faces off against No. 25 ____, starting Friday.The College of Modern Language is encouraging _____ to its students....

Crucigrama: Estándares de Auditoría 2024-08-17

Crucigrama: Estándares de Auditoría crossword puzzle
Across
  1. Estándar de seguridad de datos para proteger las transacciones con tarjetas de pago.
  2. Ley de EE. UU. que establece estándares para la contabilidad y la auditoría.
  3. Marco para la gestión del riesgo y el control interno.
  4. Norma para la gestión de la continuidad del negocio.
  5. Publica el Cybersecurity Framework, un marco para mejorar la ciberseguridad.
  6. Ley de EE. UU. para la protección de la información médica.
Down
  1. Reglamento europeo para la protección de datos personales.
  2. Un estándar internacional para la gestión de la seguridad de la información.
  3. Marco de referencia para la gobernanza y gestión de TI.
  4. Conjunto de prácticas para la gestión de servicios de TI.

10 Clues: Norma para la gestión de la continuidad del negocio.Marco para la gestión del riesgo y el control interno.Marco de referencia para la gobernanza y gestión de TI.Conjunto de prácticas para la gestión de servicios de TI.Reglamento europeo para la protección de datos personales.Ley de EE. UU. para la protección de la información médica....

Harley's Computer Apps. Crossword 2022-04-29

Harley's Computer Apps. Crossword crossword puzzle
Across
  1. a review game website that allows you to earn cash and buy upgrades
  2. Making sure your safe on the internet
  3. First thing we learned about
  4. Application that allows you to organize your information on a spreadsheet
  5. You can make your own website using this
  6. A citation Machine
  7. allows you to make a picture or text move or spin, etc.
  8. You can gather data from people who you share this with
  9. The brand of computers students use in PCM schools
  10. Company that owns sheets, docs, slides, etc.
Down
  1. the illegal act of using someone else's content without properly citing it
  2. Not letting people know about your personal life
  3. Application that allows you to make and share slides with people
  4. Application that allows you to create and edit videos for class
  5. what you always end your sentences in
  6. What gives slides their overall color and font
  7. Shortest unit of the school year
  8. what shape are the blocks from blooket
  9. How to do math using sheets
  10. The most commonly used game website for reviewing

20 Clues: A citation MachineHow to do math using sheetsFirst thing we learned aboutShortest unit of the school yearwhat you always end your sentences inMaking sure your safe on the internetwhat shape are the blocks from blooketYou can make your own website using thisCompany that owns sheets, docs, slides, etc.What gives slides their overall color and font...

test 2022-07-15

test crossword puzzle
Across
  1. Brand of sammi’s car -
  2. Basketball team michael supports -
  3. City they will live in after the wedding -
  4. How they met
  5. Location of their first post together on IG -
  6. Industry sammi works in -
  7. Color of michaels bathroom before they painted it -
  8. Sammi’s side hustle -
  9. State michael was raised in -
  10. Sauce michael hates -
  11. Music festival they attended -
  12. Month they met -
  13. Destination of first plane ride together -
  14. Engagement ring shape -
  15. Type of dance sammi did growing up -
  16. Sammis bridal shower was a ___ party -
  17. Michael proposed in ___ beach -
Down
  1. Sammis favorite flowers -
  2. Year they met -
  3. Attends ___ ___ community church -
  4. Type of engineer Michael is -
  5. European country michael lived in -
  6. Amusement park they had annual passes to -
  7. On the way to Big Sur they stopped at an ___ farm -
  8. City sammi did her internship in -
  9. City they took their engagement photos -
  10. Where they ate on their first date -
  11. Day of the week they attend life group -
  12. How we are honoring sammis dad at the wedding -
  13. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Sammis favorite flowers -Industry sammi works in -Type of engineer Michael is -State michael was raised in -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

test 2022-07-15

test crossword puzzle
Across
  1. City sammi did her internship in -
  2. Engagement ring shape -
  3. Sammi’s side hustle -
  4. How we are honoring sammis dad at the wedding -
  5. Where they ate on their first date -
  6. Sauce michael hates -
  7. Type of dance sammi did growing up -
  8. Industry sammi works in -
  9. Day of the week they attend life group -
  10. Sammis favorite flowers -
  11. Attends ___ ___ community church -
  12. Location of their first post together on IG -
  13. Year they met -
  14. Month they met -
  15. City they will live in after the wedding -
Down
  1. Amusement park they had annual passes to -
  2. City they took their engagement photos -
  3. Music festival they attended -
  4. Destination of first plane ride together -
  5. Color of michaels bathroom before they painted it -
  6. Basketball team michael supports -
  7. Brand of sammi’s car -
  8. State michael was raised in -
  9. European country michael lived in -
  10. Type of engineer Michael is -
  11. Sammis bridal shower was a ___ party -
  12. Michael proposed in ___ beach -
  13. On the way to Big Sur they stopped at an ___ farm -
  14. How they met
  15. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -City sammi did her internship in -...

Computer Virus 2024-09-09

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

Unit III Crossword II 2024-10-15

Unit III Crossword II crossword puzzle
Across
  1. Act of creating fraudulent digital signatures under the IT Act.
  2. Technique for securing data as per IT Act guidelines.
  3. Area where the IT Act has the power to enforce laws.
  4. Illegal content covered under Section 67.
  5. Term for records, documents, or data as defined in the IT Act.
  6. Legal action taken for offenses under the IT Act.
  7. Crime involving computers or networks under the IT Act.
  8. Authority to decide penalties for cyber offenses.
  9. Access without permission, covered under multiple sections.
Down
  1. Protection of information infrastructure under Section 70.
  2. Authority responsible for issuing digital signatures.
  3. Cybercrime involving fraudulent emails for personal data theft.
  4. Entity facilitating online services regulated under the Act.
  5. Changes or updates made to the IT Act, such as in 2008.
  6. Manipulation of computer source code, Section 65.
  7. Violation or illegal activity defined under the IT Act.
  8. Duty to protect sensitive data, highlighted in Section 72.
  9. Unauthorized access to computer systems as per Section 66.
  10. Type of signature recognized by the IT Act for authentication.
  11. Legal consequences for violating the IT Act.

20 Clues: Illegal content covered under Section 67.Legal consequences for violating the IT Act.Manipulation of computer source code, Section 65.Legal action taken for offenses under the IT Act.Authority to decide penalties for cyber offenses.Area where the IT Act has the power to enforce laws.Authority responsible for issuing digital signatures....