cybersecurity Crossword Puzzles
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Legal terminology 2019-11-19
Across
- Electronic currency.
- Check the safety on the internet.
- People with good computer knowledge and skills.
- A variety of data that is rapidly increasing.
- Computer systems, programs and data are free from threats.
- reality This project is the technology between reality and the virtual world.
Down
- Use of electronic devices to destroy, change, or steal information.
- Bullying and Malignant, Insulting.
- User avatar in a virtual world or game.
- Scam through the internet
10 Clues: Electronic currency. • Scam through the internet • Check the safety on the internet. • Bullying and Malignant, Insulting. • User avatar in a virtual world or game. • A variety of data that is rapidly increasing. • People with good computer knowledge and skills. • Computer systems, programs and data are free from threats. • ...
Montreat College 2023-05-24
Across
- What is it's school colors?
- What sport am I going to this college for?
- What is our Mascot?
- What is the mascots name?
- What is the name of Montreats honors college?
Down
- Which famous preacher was married in the chapel on campus?
- This major has been gaining a lot of popularity at Montreat.
- Where is Montreat Located?
- What popular American sport is not offered here?
- What is the name of Montreats popular lake?
10 Clues: What is our Mascot? • What is the mascots name? • Where is Montreat Located? • What is it's school colors? • What sport am I going to this college for? • What is the name of Montreats popular lake? • What is the name of Montreats honors college? • What popular American sport is not offered here? • Which famous preacher was married in the chapel on campus? • ...
General Knowledge 2025-04-16
Across
- Doctors for animals
- A word that can be read the same in both directions
- Which type of company is CrowdStrike?
- Missile man of India
Down
- Char Minar is located in which city?
- By which process does the excess water in plants get released?
- Current Home Minister of India
- Which country was the primary target of Trump's tariff war?
- Ornithology is the scientific study of?
- What is the term lunar related to?
10 Clues: Doctors for animals • Missile man of India • Current Home Minister of India • What is the term lunar related to? • Char Minar is located in which city? • Which type of company is CrowdStrike? • Ornithology is the scientific study of? • A word that can be read the same in both directions • Which country was the primary target of Trump's tariff war? • ...
C4i4's Connect Crossword 2025-07-02
Across
- Future-focused maintenance strategy to reduce downtime
- Country widely credited for pioneering Industry 4.0.
- Actionable digital layer applied on physical systems.
- Data-driven insight method used in business intelligence.
- Smart factory enabler that reduces human intervention
Down
- Backbone technology for protecting digital infrastructure
- Converting analog processes to digital formats.
- Real-time sensor-based technology for tracking machinery performance.
- Seamless transfer of information across systems.
- Centralized location where digital info is kept safely.
10 Clues: Converting analog processes to digital formats. • Seamless transfer of information across systems. • Country widely credited for pioneering Industry 4.0. • Actionable digital layer applied on physical systems. • Smart factory enabler that reduces human intervention • Future-focused maintenance strategy to reduce downtime • ...
DigitalGuard: Protecting Your Online Footprint 2023-09-18
Across
- You need this to unlock your online world securely
- Doing the right thing in the digital world
- Defending against online threats
- Platforms like Facebook and Twitter for online networking
- Online harassment that hurts.
Down
- Protecting your personal space in the digital realm
- The process of converting data into a secret code
- Fraudulent attempts to obtain sensitive information
- Your online trail of likes, posts, and searches
- -An extra layer of security for online accounts
10 Clues: Online harassment that hurts. • Defending against online threats • Doing the right thing in the digital world • Your online trail of likes, posts, and searches • -An extra layer of security for online accounts • The process of converting data into a secret code • You need this to unlock your online world securely • Protecting your personal space in the digital realm • ...
Did you read it? 2020-10-16
Across
- Licensed amateur radio operator
- Entries due NLT 11/2
- Test Monthly
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 10/23
- By David C. Graham
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Chad's Favorite sports team?
- Do your Part.#BeCyberSmart
- Home of the 14th Flying Training Wing of Air Education and Training Command
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
CyberFun 2024-03-18
Across
- Keeping personal information safe from unauthorized access
- A protective barrier for your computer or network
- Unwanted and unsolicited emails
- An attempt to damage or disrupt computer systems
- A system of interconnected computers
- Measures taken to protect computer systems from theft or damage
Down
- A harmful software that can damage your computer
- A secret code to access your accounts online
- I want to _____ my GF/BF account
- Illegal activities conducted using the internet
10 Clues: Unwanted and unsolicited emails • I want to _____ my GF/BF account • A system of interconnected computers • A secret code to access your accounts online • Illegal activities conducted using the internet • A harmful software that can damage your computer • An attempt to damage or disrupt computer systems • A protective barrier for your computer or network • ...
Career Cluster Quiz 2025-05-30
Across
- includes jobs like professors and teachers
- includes jobs where people help design and create buildings
- includes jobs like factory workers and machine operators
- includes jobs like CEOS and managers
- includes jobs like hotel managers and tour guides
Down
- includes jobs like farmers and food scientists
- includes jobs like doctors and nurses
- includes jobs in advertising and social media
- includes jobs in cybersecurity and software engineering
- includes jobs in science, technology, engineering, and mathematics
10 Clues: includes jobs like CEOS and managers • includes jobs like doctors and nurses • includes jobs like professors and teachers • includes jobs in advertising and social media • includes jobs like farmers and food scientists • includes jobs like hotel managers and tour guides • includes jobs in cybersecurity and software engineering • ...
BYTETRAIL 16 2025-02-25
Across
- Protocol for transferring files over the internet
- Protecting systems from unauthorized access
- Secures data by converting it into a coded form
- Small data stored on a user’s computer by a website
- Logical division of a drive
Down
- A type of scam email designed to steal user data
- Wireless technology for local area networking
- Temporary storage for faster access
- A device or point in a network
- Software that manages hardware and software resources
10 Clues: Logical division of a drive • A device or point in a network • Temporary storage for faster access • Protecting systems from unauthorized access • Wireless technology for local area networking • Secures data by converting it into a coded form • A type of scam email designed to steal user data • Protocol for transferring files over the internet • ...
BYTETRAIL 16 2025-02-25
Across
- Protocol for transferring files over the internet
- Protecting systems from unauthorized access
- Secures data by converting it into a coded form
- Small data stored on a user’s computer by a website
- Logical division of a drive
Down
- A type of scam email designed to steal user data
- Wireless technology for local area networking
- Temporary storage for faster access
- A device or point in a network
- Software that manages hardware and software resources
10 Clues: Logical division of a drive • A device or point in a network • Temporary storage for faster access • Protecting systems from unauthorized access • Wireless technology for local area networking • Secures data by converting it into a coded form • A type of scam email designed to steal user data • Protocol for transferring files over the internet • ...
Application of Boosting And Ensemble Learning 2025-10-31
Across
- Detects anomalies or intrusions in networks
- Used in suggesting products or movies on platforms
- General purpose of using ensemble models
- Applied in detecting diseases in the medical field
- Helps in predicting stock prices or sales trends
- Used for improving decision-making processes
Down
- Applied in dividing images into meaningful regions
- Used in image and speech recognition tasks
- Used in identifying spam or fraudulent activities
- Common application in sorting data into categories
10 Clues: General purpose of using ensemble models • Used in image and speech recognition tasks • Detects anomalies or intrusions in networks • Used for improving decision-making processes • Helps in predicting stock prices or sales trends • Used in identifying spam or fraudulent activities • Applied in dividing images into meaningful regions • ...
Career Focus 2 2025-12-10
Across
- Sector that includes software, data and cybersecurity roles
- A common Registered Training Organisation in Australia
- Major regional NSW university, abbr.
- The general direction of your working life
- A person undertaking structured, paid training, often in non-trade areas
Down
- _____ OUTLOOK An industry's future demand for workers
- Core skill that helps you calculate trade measurements
- A typical trade apprenticeship.
- The national system of qualifications (Australian Qualifications Framework)
- _____ ETHIC The personal quality behind motivation and drive
10 Clues: A typical trade apprenticeship. • Major regional NSW university, abbr. • The general direction of your working life • _____ OUTLOOK An industry's future demand for workers • Core skill that helps you calculate trade measurements • A common Registered Training Organisation in Australia • Sector that includes software, data and cybersecurity roles • ...
Digimath 9 2025-03-05
Across
- – The smallest unit of data in a computer
- – A wireless technology standard used to exchange data between devices over short distances
- – The practice of protecting computers and networks from digital attacks
- – A harmful program that can damage a computer
- – Used to type and input data
- – A screen that displays information
- – Physical parts of a computer
Down
- – A global network connecting millions of computers
- – A wireless connection to the internet
- – The "brain" of the computer
- – Storing data on the internet instead of a local device
- – Programs that run on a computer
- – A pointing device used to control the cursor
13 Clues: – The "brain" of the computer • – Used to type and input data • – Physical parts of a computer • – Programs that run on a computer • – A screen that displays information • – A wireless connection to the internet • – The smallest unit of data in a computer • – A harmful program that can damage a computer • – A pointing device used to control the cursor • ...
Intro Cybersecurity Puzzle 2 2021-09-15
Across
- Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
- Another form of single sign on, initially supported by Twitter and Google
- Biometrics is an example of something you _____
- single sign-on authentication, think three headed dog
- A key fob is an example of something you _____
- A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
- Robot Network
- Acronym for Industrial Control Systems Supervisory Software
- Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
- The infected computer in a network of computers with infected malware
- Your location to sign in is an example of somewhere you _____
- the process of converting a given key into another value. If they are the same this is known as collision.
- An emerging technology used in cryptocurrency
- Acronym for "Smart Devices" over the internet
- Your password is an example of something you _____
- Acronym for Anything as a service
- The acronym for the masterbot centralization
17 Clues: Robot Network • Acronym for Anything as a service • The acronym for the masterbot centralization • An emerging technology used in cryptocurrency • Acronym for "Smart Devices" over the internet • A key fob is an example of something you _____ • Biometrics is an example of something you _____ • Your password is an example of something you _____ • ...
Cybersecurity Fundamentals Chapter 5 2022-10-27
Across
- an efficient way to store, retrieve, and analyze data.
- table relationship must remain consistent.
- a set of rules defined by the user which does not belong to one of the other categories.
- use to make hashing more secure.
- strengthens hashing algorithm by using additional secret key as input to the hash function.
- a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
- checks that data falls within the parameters defined by the database designer.
- all data stored in a column must follow the same format.
- hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
- refers to the accuracy, consistency, and reliability of data stored in a
- developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
- the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
- provide the same functionality as handwritten signature for electronics documents.
- all rows must have a unique identifier called primary key.
- equivalent to an electronic passport.
- standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.
16 Clues: use to make hashing more secure. • equivalent to an electronic passport. • table relationship must remain consistent. • an efficient way to store, retrieve, and analyze data. • all data stored in a column must follow the same format. • all rows must have a unique identifier called primary key. • ...
Computer Science 2023-05-05
Across
- another word for virus
- A software that can do problem solving and learn on it's own
- Bill Gate's corporation
- Way to stop seeing ads
- Software to access the internet
- Owner of Tesla
- Lots of computers joined together through signals sending data
- The code that the nazis communicated through
- A software that infects your computer secretly
- A collection of code
- Code made out of 0s and 1s
Down
- The person who created the Universal Turing Machine
- A visual display which shows the code on a computer
- Small device that is pushed across a small area to do different actions
- A software addon
- Stops viruses from infecting your pc
- What you're using
- What you use to type
- What a computer uses to operate
- Another software that is very HOT
- Owner of apple
21 Clues: Owner of Tesla • Owner of apple • A software addon • What you're using • What you use to type • A collection of code • another word for virus • Way to stop seeing ads • Bill Gate's corporation • Code made out of 0s and 1s • Software to access the internet • What a computer uses to operate • Another software that is very HOT • Stops viruses from infecting your pc • ...
TTS informatika 2025-04-10
Across
- .Hak atas kekayaan intelektual
- .Sistem komputer untuk menelusuri informasi di internet
- .Profesiyang merancang tampilan dan interaksi aplikasi
- .Profesi yang menulis kode program
- .Mesin pencari paling populer saat ini
- .Profesi yang mengelola data dan sistem basis data
- .Singkatan dari Creative Commons (izin berbagi konten)
- .Hak yang diberikan kepada pencipta karya seni atau tulisan
- .Akhiran domain untuk situs komersial
- .Proses mengamankan data dari akses tidak sah
Down
- .Tempat untuk menyimpan dan berbagi video
- .Jenis hak kekayaan intelektual untuk merek dagang
- .Proses penyebaran informasi secara luas
- .Media sosial berbasis gambar milik Meta
- .Kegiatan mengambil data dari internet secara otomatis
- .Jenis konten digital berbentuk suara
- .Produk digital berbentuk tulisan panjang seperti e-book
- .Format file gambar umum (3 huruf)
- .Konten digital berbasis gambar bergerak
- .Profesi yang fokus pada keamanan jaringan komputer
20 Clues: .Hak atas kekayaan intelektual • .Profesi yang menulis kode program • .Format file gambar umum (3 huruf) • .Jenis konten digital berbentuk suara • .Akhiran domain untuk situs komersial • .Mesin pencari paling populer saat ini • .Proses penyebaran informasi secara luas • .Media sosial berbasis gambar milik Meta • .Konten digital berbasis gambar bergerak • ...
Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I 2025-04-11
Across
- Melindungi karya seni atau tulisan.
- Menampilkan halaman dengan URL serupa.
- Proses mengatur konten.
- Perlindungan atas penemuan teknologi.
- Mengecek kebenaran informasi.
- Engineer Ahli jaringan komputer.
- Penyebaran konten ke audiens luas.
- Analyst Menganalisis data besar.
- Digunakan untuk menghilangkan kata tertentu dalam pencarian.
- Syntax untuk pencarian kata spesifik.
Down
- Verifikasi keaslian konten.
- Menjaga keamanan data digital.
- Proses memanfaatkan teknologi untuk budaya.
- Identifikasi konten berbahaya.
- Budaya Konten berbasis nilai tradisional.
- Industri Hak untuk desain produk tertentu.
- Merancang perangkat lunak.
- Hak atas logo atau merek dagang.
- Lokal Media untuk menyebarluaskan budaya lokal.
- Konten palsu yang menyesatkan.
- Lokal Nilai tradisional dalam konten digital.
- Operator untuk pencarian di situs tertentu.
- Designer Merancang antarmuka pengguna.
- Mencari file dengan format spesifik.
- Hak atas ide atau karya pemikiran.
25 Clues: Proses mengatur konten. • Merancang perangkat lunak. • Verifikasi keaslian konten. • Mengecek kebenaran informasi. • Menjaga keamanan data digital. • Identifikasi konten berbahaya. • Konten palsu yang menyesatkan. • Hak atas logo atau merek dagang. • Engineer Ahli jaringan komputer. • Penyebaran konten ke audiens luas. • Analyst Menganalisis data besar. • ...
IT 2025-12-02
Across
- Tool used to secure data by converting it to code
- Extracting useful patterns from large datasets
- Software that manages computer hardware
- The visual part of software users interact with
- Rules for data communication over networks
- Checking a system for malicious software
- Online space to save and access files
- A software-based emulation of a computer
- Machines simulating human intelligence
Down
- Keeping servers running smoothly and securely
- Organizing and handling structured data
- Find and fix errors in software
- A set of rules for writing computer code
- Algorithms that learn from data automatically
- Protecting computers and networks from attacks
- New version of a program to improve it
- Measures to protect systems from digital threats
- Blocks unauthorized access to a network
- Copy of data saved for recovery purposes
- Write instructions for a computer program
20 Clues: Find and fix errors in software • Online space to save and access files • New version of a program to improve it • Machines simulating human intelligence • Organizing and handling structured data • Software that manages computer hardware • Blocks unauthorized access to a network • A set of rules for writing computer code • Checking a system for malicious software • ...
Cybersecurity Awareness Month 2025 2025-10-07
Across
- Malware that attaches to files and spreads when executed
- Network of infected devices, often remotely controlled
- Method of converting data into a fixed-size string
- Piece of code that takes advantage of a vulnerability
- Hidden method of bypassing normal authentication
- Software that secretly gathers data without consent
- Potential cause of an unwanted incident
- Self-replicating malware that spreads without user interaction
- Fraudulent attempt to obtain sensitive information via email or messaging
Down
- Incident where data is accessed without authorization
- Type of malware disguised as a legitimate file
- Process of verifying a user's identity
- Impersonating another user or device to gain access
- General term for malicious software
- Part of malware that performs the malicious action
- Stealthy type of malware designed to hide its presence
16 Clues: General term for malicious software • Process of verifying a user's identity • Potential cause of an unwanted incident • Type of malware disguised as a legitimate file • Hidden method of bypassing normal authentication • Method of converting data into a fixed-size string • Part of malware that performs the malicious action • ...
Getting to Know Darnnell 2024-08-31
Across
- French city Darnnell visited for official duty
- Proud native of DC
- Short for Darnnell's DC high school, McKinley
- Darnnell's bachelor’s degree from Strayer University
- Where Darnnell worked in cybersecurity
- Cruise destination Darnnell visited on Royal Caribbean
- Darnnell wrote books, including *Victorious!*
- She served during Operation Desert Storm
- Darnnell's graduation honor with a 4.0 GPA
- City Darnnell toured for Underground Railroad history
Down
- Key role Darnnell played in guiding teams and projects
- Military operation where she served
- Hawaiian island Darnnell visited in 2023
- Focused on preventing global threats; her role at DOJ
- Historical figure’s birthplace Darnnell visited
- The cornerstone of Darnnell's strength
- Central to Darnnell's heart and soul
- Language Darnnell’s learning on Duo lingo
- International police organization she worked with
- Operating system Darnnell once specialized in
20 Clues: Proud native of DC • Military operation where she served • Central to Darnnell's heart and soul • The cornerstone of Darnnell's strength • Where Darnnell worked in cybersecurity • Hawaiian island Darnnell visited in 2023 • She served during Operation Desert Storm • Language Darnnell’s learning on Duo lingo • Darnnell's graduation honor with a 4.0 GPA • ...
Wedding 2024-06-08
Across
- Brand of Michael’s car
- Michael’s job industry
- The number of years the couple is together
- Michael’s middle name
- Where did Michael and Stacey meet
- What the groom has for breakfast everyday
- How long has Stacey been in Australia for
- Stacey’s favourite food (hint: ask father of bride)
- City where Michael was born
- Honeymoon destination
- Mr & Mrs _____
- The age gap between the bride and the groom
- Number of their siblings all together
Down
- Flavour of the wedding cake
- Where did Michael propose
- Michael’s birthday month
- Who’s the better cook
- Their favourite season
- Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- Favourite AFL team (hint: ask Best Man)
- Michael’s favourite drink
- Stacey’s best friend
- Stacey’s birthday month
24 Clues: Mr & Mrs _____ • Stacey’s best friend • Who’s the better cook • Michael’s middle name • Honeymoon destination • Their favourite season • Brand of Michael’s car • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Where did Michael propose • Michael’s favourite drink • Flavour of the wedding cake • City where Michael was born • Where did Michael and Stacey meet • ...
Technology Words 2024-10-09
Across
- Computer Camera
- Used to type
- You call people on it
- Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Communicate with others vocally
- Coded software
- Analyze and solve problems
- Prevents viruses
- Provides entertainment
- Something that you can transfer digital info to
- Stores information
- Another word for apps
Down
- Gain unauthorized access
- Random Access Memory
- Decode a code
- Also an animal
- Requires a router
- Protects from cyber attacks
- The use of computer technology
- Remote connection
- Communication technology tool
- Central Processing Unit
- Look through the web
- Creates apps/websites
- Find locations
- Amount of data your internet connection can handle
- Accessed from a browser
- Protects your computer from virus
- Convert data into a code
- Social feed
30 Clues: Social feed • Used to type • Decode a code • Also an animal • Coded software • Find locations • Computer Camera • Prevents viruses • Requires a router • Remote connection • Stores information • Random Access Memory • Look through the web • You call people on it • Creates apps/websites • Another word for apps • Provides entertainment • Central Processing Unit • Accessed from a browser • ...
Sip & Solve 2025-06-06
Across
- Aydens zodiac sign
- Groom’s middle name
- How many months apart in age is the couple
- Camille’s College Acronym
- Best Man
- Aydens position in football
- What was Camille’s childhood nickname
- Who said I love you first
- Color of Ayden’s eyes
- Aydens current general profession
- Grooms favorite fast food restaurant
- Maid of Honor
- Name of Camille’s oldest friend
- Camille’s favorite color
- Couples first date
Down
- What month Ayden proposed
- Town Ayden & Camille grew up in
- Bride’s new last name
- First concert the couple attended together
- Bride’s maiden name
- Aydens birthday month
- Ayden & Camille’s high school mascot
- Camille’s favorite TV show
- Camille’s college degree
- Couples favorite soda
- Ayden’s College Acronym
- Where the couple got engaged
- Camille’s birthday month
- How many years have the couple been together
29 Clues: Best Man • Maid of Honor • Aydens zodiac sign • Couples first date • Groom’s middle name • Bride’s maiden name • Bride’s new last name • Aydens birthday month • Couples favorite soda • Color of Ayden’s eyes • Ayden’s College Acronym • Camille’s college degree • Camille’s birthday month • Camille’s favorite color • What month Ayden proposed • Camille’s College Acronym • Who said I love you first • ...
Grace & Branden 2025-09-04
Across
- The best man’s name
- Branden’s middle name
- Branden and Grace each have blank siblings
- Grace’s brother recently enlisted in the blank
- Season they met
- Who the better cook is
- Grace’s birth month
- Mother of the Bride’s name
- Grace’s eye color
- Branden’s favorite hobby
- Grace’s unknown talent
- Branden’s birth month
- Month they got engaged
- Grace’s new last name
- Their favorite sweet treat
Down
- Where they met
- Mother of the Groom’s name
- Grace brews some awesome
- Branden’s college major
- Branden’s eye color
- The maid of honor’s name
- Honeymoon destination
- What similar job did they hold while in high school
- The first meal they made together
- The officiant’s name
- Years they have known each other
- The state Branden was born in
27 Clues: Where they met • Season they met • Grace’s eye color • The best man’s name • Branden’s eye color • Grace’s birth month • The officiant’s name • Branden’s middle name • Honeymoon destination • Branden’s birth month • Grace’s new last name • Who the better cook is • Grace’s unknown talent • Month they got engaged • Branden’s college major • Grace brews some awesome • The maid of honor’s name • ...
Jargon Crossword 2025-12-11
Across
- EU directive for cybersecurity
- fieldbus communication standard
- Key metric for manufacturing productivity
- network device used to connect multiple devices
- system used to monitor and control processes
- IT and OT systems integration
- device connecting different networks or protocols
- Manages and monitors factory floor operations
- serial communication protocol
- industrial network protocol
- Lightweight messaging protocol for IoT devices
Down
- Upgrading existing industrial site
- device detecting changes in physical conditions
- Period when equipment is not operational
- computer used to automate processes
- specialized database for large volumes of data
- New facility built from scratch
- processes data at or near the source
- Automated machine performing repetitive tasks
- Evaluation process for systems or risks
- Driverless vehicle for material transport
- Industrial version of the Internet of Things
- Deviation from expected process behavior
23 Clues: industrial network protocol • IT and OT systems integration • serial communication protocol • EU directive for cybersecurity • fieldbus communication standard • New facility built from scratch • Upgrading existing industrial site • computer used to automate processes • processes data at or near the source • Evaluation process for systems or risks • ...
Information Security 2025-01-06
7 Clues: Malicious Software • Acceptable Use Policy • Malware that attaches to programs • Protection of ownership and reputation • Designed to lessen the risk of cyber attack • Protect with strong passwords and password storage • Protect with up to date software, encrypted information, limited employee access
Online Child Safety 2013-05-14
Across
- a person who access internet files either legally or illegally
- software that allows parents to control what their children do online
- an unsolicited email or junk mail
- Malicious hardware and code
- any software or technique used to prevent online crime
Down
- an interactive forum where you can talk in real time
- unsolicited adds on your computer
- a hostile strongly worded message that may contain obscene language
- scam that involves a fraudulent e-mail
- An adult internet user who exploits children or teens
- online site where people can post information about themselves
- rules/manners of inline usage
- a sexual message sent to someone
- virtual sexual encounters
- The Communications Decency Act
15 Clues: virtual sexual encounters • Malicious hardware and code • rules/manners of inline usage • The Communications Decency Act • a sexual message sent to someone • unsolicited adds on your computer • an unsolicited email or junk mail • scam that involves a fraudulent e-mail • an interactive forum where you can talk in real time • ...
Technology 2023-09-15
Across
- - Prefix for environments simulated by computers.
- - A global network connecting computers and devices.
- - Unmanned aerial vehicles used for various purposes.
- - A mobile device with advanced features.
- - Prefix for intelligence created by machines.
- - Wireless technology for short-range data exchange.
- - The study of designing and building robots.
- - Programs and applications used on computers.
Down
- - Authentication based on unique physical characteristics.
- - Measures to protect computer systems and data.
- - A small, specialized electronic device.
- - The process of converting data into a code to secure it.
- - Storage and computing resources accessed over the internet.
- - A set of rules for solving a problem or performing a task.
- - Using technology to perform tasks without human intervention.
15 Clues: - A small, specialized electronic device. • - A mobile device with advanced features. • - The study of designing and building robots. • - Prefix for intelligence created by machines. • - Programs and applications used on computers. • - Measures to protect computer systems and data. • - Prefix for environments simulated by computers. • ...
Computer Science 2025-08-12
Across
- – Finding and fixing errors in code.
- – Online storage and services accessed via the internet.
- – Two or more computers connected to share data.
- – Protecting computers and networks from attacks.
- – The physical parts of a computer.
- – Data or commands entered into a computer.
Down
- – A device used to type into a computer.
- – A global network that connects computers.
- – Scrambling data to keep it secure.
- – Information a computer gives back after processing.
- – Step-by-step instructions to solve a problem.
- – A way computers store data using 0s and 1s.
- – Instructions written for a computer to follow.
- – Programs that run on a computer.
- – Facts or information stored on a computer.
15 Clues: – Programs that run on a computer. • – The physical parts of a computer. • – Scrambling data to keep it secure. • – Finding and fixing errors in code. • – A device used to type into a computer. • – A global network that connects computers. • – Data or commands entered into a computer. • – Facts or information stored on a computer. • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- also known as a "white list"
- any software that relies upon by other applications and software
- predefined responses for security incidents
- this type of restart is needed for applying updates
- when a system is unavailable
- involves assessing all existing security controls, policies and procedures
- step-by-step instructions for security measures
- ideal security position based on industry standards
- define requirements for security controls and configurations
Down
- prioritization of improving security and moving to the desired state
- also known as "block lists"
- limiting certain actions or behaviors
- comparing the current and desired states
- Comparing the current state of an organization's security position to a desired state
- never trust, always verify
- these types of apps are outdated and older
16 Clues: never trust, always verify • also known as "block lists" • also known as a "white list" • when a system is unavailable • limiting certain actions or behaviors • comparing the current and desired states • these types of apps are outdated and older • predefined responses for security incidents • step-by-step instructions for security measures • ...
ISC 3 2025-03-24
Cybersecurity Fundamental Chapter 2 2022-11-24
Across
- a type of storage device retains the data when no user or process is using it.
- cyber criminals can capture, save and steal data in-transit.
- uses removable media to physically move data from one computer to another.
- procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- devices, and product available to protect information systems and fend off cyber criminals.
- verifies the identify of a user to prevent unauthorized access.
- uses cable to transmit data.
Down
- verifies determine which resources users can access, along with the operations that users can perform.
- is the principle used to describe the need to maintain availability of information systems and services at all times.
- involves sending information from one device to another.
- cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- cyber criminals can intercept and alter data in-transit.
- aware and knowledgeable about their world and the dangers that threaten their world.
- keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- prevents the disclosure of information to unauthorize people, resource and processes.
- uses the airways to transmit data.
16 Clues: uses cable to transmit data. • uses the airways to transmit data. • involves sending information from one device to another. • cyber criminals can intercept and alter data in-transit. • cyber criminals can capture, save and steal data in-transit. • verifies the identify of a user to prevent unauthorized access. • ...
SCIENCE AND TECHNOLOGY 2024-03-29
Across
- Protection of computer systems from theft or damage.
- The study of living organisms.
- Intelligence Teaching computers to think and learn.
- introducing new ideas or methods.
- A series of steps to accomplish a task.
Down
- Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
- Connecting computers or devices to communicate.
- Study of heredity and variation in living organisms.
- Distinctive features or traits.
- A community of living organisms and their environment.
- Using machines to perform tasks.
- Genetic material containing instructions for living organisms' development and traits.
12 Clues: The study of living organisms. • Distinctive features or traits. • Using machines to perform tasks. • introducing new ideas or methods. • A series of steps to accomplish a task. • Connecting computers or devices to communicate. • Study of heredity and variation in living organisms. • Protection of computer systems from theft or damage. • ...
cyber threat actors, attacks & motivations 2023-12-18
Across
- Where to report a a cybersecurity incident at RDA
- It's something RDA is known for, but in the social form
- Homophone of a much loved pass time
- Supported by a government
- Australian Government agency that houses the ACSC
- Cybercrime that involves encryption and blackmail
- The name of the cipher you may or may not have succeeded in solving
- Furtum identitatis
Down
- A brute force technique used by cybercriminals
- An important aspect of security as a capability that isn't cyber
- Morris distributed this via the internet in 1988
- Something you must protect in the digital age
- A characteristic of cybercriminal groups
- Cybercriminal motivated by ideology
- A leading motivator for cybercriminals
- Malicious software used to establish remote access
- It's everyone's responsibility
17 Clues: Furtum identitatis • Supported by a government • It's everyone's responsibility • Homophone of a much loved pass time • Cybercriminal motivated by ideology • A leading motivator for cybercriminals • A characteristic of cybercriminal groups • Something you must protect in the digital age • A brute force technique used by cybercriminals • ...
Source Vs Machine Code 2025-11-12
Across
- – Low-level software stored in ROM
- – Easy for humans to understand (like source code)
- – A single command in a program
- – Person who writes source code
- – Example of a high-level programming language
- – Uses programming to analyze and interpret data
- – Job that designs or builds software applications
- – Field that protects systems from digital attacks
Down
- – Coder who designs and codes video games
- – Field that creates and maintains websites
- – System using only 0 and 1
- – Part of the computer that executes machine code
- – Another term for bits (0s and 1s)
- – Hard or impossible to modify (like machine code)
- – Read-Only Memory that stores permanent instructions
- – Programs and applications created using source code
- – The physical components of a computer
17 Clues: – System using only 0 and 1 • – A single command in a program • – Person who writes source code • – Low-level software stored in ROM • – Another term for bits (0s and 1s) • – The physical components of a computer • – Coder who designs and codes video games • – Field that creates and maintains websites • – Example of a high-level programming language • ...
User responsibility 2025-10-14
Across
- practicing ethical respectful and safe behavior online
- the trace of all your online activities
- respecting differences and opinions in digital spaces
Down
- protecting systems and data from digital attacks
- accepting consequences for online actions
- checking accuracy before believing or sharing
- settings tools that control who can see your information
- false information shared without verifying facts
8 Clues: the trace of all your online activities • accepting consequences for online actions • checking accuracy before believing or sharing • protecting systems and data from digital attacks • false information shared without verifying facts • respecting differences and opinions in digital spaces • practicing ethical respectful and safe behavior online • ...
Cybersecurity Awareness Month 2023-09-20
Across
- Personally Identifiable Information
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- Type of malware that threatens to expose information unless a payment is made
- Health Insurance Portability and Accountability Act
- An email that tricks you into giving up your passphrase
Down
- A weakness in a program or system that can be exploited
- Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
- CWRU classifies information as: public, internal-use, and _______
- Install operating system security ________ regularly
- The process of changing plain text to cipher text using an algorithm
- A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems
11 Clues: Personally Identifiable Information • Health Insurance Portability and Accountability Act • Install operating system security ________ regularly • A weakness in a program or system that can be exploited • An email that tricks you into giving up your passphrase • CWRU classifies information as: public, internal-use, and _______ • ...
TECHNOLOGY 2025-01-29
Across
- easy to use or understand
- the use of machines to perform tasks without human intervention
- knowledgeable about modern technology
- the trail of data left by users on the internet
- a small electronic device with a specific function
Down
- measures taken to protect systems from cyber threats
- an important discovery or development
- introducing new ideas or methods
- extremely modern and advanced
- Intelligence (AI) the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • an important discovery or development • knowledgeable about modern technology • the trail of data left by users on the internet • a small electronic device with a specific function • measures taken to protect systems from cyber threats • ...
17 Miftahul Huda 8i 2025-10-16
Across
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Memuat ulang halaman web agar tampil terbaru.
- Program berbahaya yang bisa merusak sistem komputer.
- Salinan data untuk mencegah kehilangan.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
Down
- Penanda halaman web agar mudah dikunjungi lagi.
- Perlindungan sistem komputer dari serangan digital.
- Proses menampilkan gambar atau halaman web di layar.
- Jalan pintas untuk membuka program atau file cepat.
10 Clues: Salinan data untuk mencegah kehilangan. • Memuat ulang halaman web agar tampil terbaru. • Penanda halaman web agar mudah dikunjungi lagi. • Perlindungan sistem komputer dari serangan digital. • Jalan pintas untuk membuka program atau file cepat. • Program untuk mengatur dan mempercepat unduhan file. • Proses menampilkan gambar atau halaman web di layar. • ...
Career Focus 2 2025-11-05
Across
- Core skill that helps you calculate trade measurements
- A common Registered Training Organisation in Australia
- Major regional NSW university, abbr.
- OUTLOOK An industry's future demand for workers
- A person undertaking structured, paid training, often in non-trade areas
- The national system of qualifications (Australian Qualifications Framework)
- ETHIC The personal quality behind motivation and drive
Down
- The general direction of your working life
- Sector that includes software, data and cybersecurity roles
- A typical trade apprenticeship.
10 Clues: A typical trade apprenticeship. • Major regional NSW university, abbr. • The general direction of your working life • OUTLOOK An industry's future demand for workers • Core skill that helps you calculate trade measurements • A common Registered Training Organisation in Australia • ETHIC The personal quality behind motivation and drive • ...
Career Clusters Crossword 2024-12-20
Across
- Promotes whole health in individuals through an array of services
- Focuses on administration, strategic planning, and entrepreneurship
- Designing and executing the built environment
- Encompasses roles in local, state, and federal governments
- Movement of goods over air, ground, and water
Down
- Fostering learning from early-childhood to adulthood
- Supports plant and animal based industries
- Promoting products and brands
- Developing digital systems such as AI, data analytics, and cybersecurity
- Renewable fuel production, power generation, utilities
- Includes services related to food, travel, and lodging
- Aims to produce high quality goods
- Banking, lending, corporate, debt management
- Includes film, fashion, journalism, interior design, and more
14 Clues: Promoting products and brands • Aims to produce high quality goods • Supports plant and animal based industries • Banking, lending, corporate, debt management • Designing and executing the built environment • Movement of goods over air, ground, and water • Fostering learning from early-childhood to adulthood • Renewable fuel production, power generation, utilities • ...
E-Commerce Crossword 2024-04-19
Across
- digital shopping cart used to hold items before purchase
- online advertisements targeted to specific users
- short for "electronic commerce"
- process of securely storing and transmitting customer data
- mobile app used to browse and purchase products online
- process of fulfilling an online order by delivering it
- process of returning a purchased item online
Down
- detailed description of a product listed online
- positive online review left by a satisfied customer
- online marketplace where sellers and buyers connect
- discounts offered online to attract customers
- secure online payment method using a credit card
- person who influences buying decisions through online reviews
- images used online to showcase products
14 Clues: short for "electronic commerce" • images used online to showcase products • process of returning a purchased item online • discounts offered online to attract customers • detailed description of a product listed online • online advertisements targeted to specific users • secure online payment method using a credit card • ...
Internet Safety Crossword 2023-04-20
Across
- a part of a computer system or network which is made to block unwanted access
- the state of being free from public attention
- a piece of information needed to log in to websites
- information made available by a website
- never share personal information online
- unwanted messages
- bulling done over the internet
- facts given about something or someone
Down
- someone that hacks
- websites and apps that enable users to create and share content EX.SnapChat
- a world wide computer network
- the state of being protected against the criminal use of electronic data
- like a cold for your computer
- be careful what you make public
14 Clues: unwanted messages • someone that hacks • a world wide computer network • like a cold for your computer • bulling done over the internet • be careful what you make public • facts given about something or someone • information made available by a website • never share personal information online • the state of being free from public attention • ...
Information Management 2025-09-23
Across
- Identifying risks and taking precautions to avoid them.
- Anything valuable that isn’t natural.
- A system that supports functions of Information Management.
- Anything created with someone’s mind.
Down
- The protection of networks, and data.
- A business that involves people, processes that collects data.
- An unbiased inspection to review safety, integrity, and accuracy of information.
- The accuracy of data.
- A practice not knowing outside the company.
9 Clues: The accuracy of data. • The protection of networks, and data. • Anything valuable that isn’t natural. • Anything created with someone’s mind. • A practice not knowing outside the company. • Identifying risks and taking precautions to avoid them. • A system that supports functions of Information Management. • ...
UNODC TOT Crossword 2025-11-11
Across
- The hackers we aim to defend against
- The regional center name abbreviation under UNODC
- The brilliant course instructor guiding us
- The mandatory course we completed before the TOT
Down
- The country hosting our training and collaboration
- The field our expertise revolves around
- The second participating institution in the training
- The center in Doha where the TOT course is conducted
- The first participating institution in the training
9 Clues: The hackers we aim to defend against • The field our expertise revolves around • The brilliant course instructor guiding us • The mandatory course we completed before the TOT • The regional center name abbreviation under UNODC • The country hosting our training and collaboration • The first participating institution in the training • ...
Cyber Security 2023-11-07
Across
- Logs and Event Management provided in JICA Project
- Set of rules, policies and operations that a company uses to achieve its business goals
- Compliance is act of following rules, laws and regulations
- Network Monitoring system short form
- Term that Deals with Organization secret data
- Operates continuously and Data visible 24*7
- Next Generation Firewall brand provided in JICA Project
Down
- Term used to define Weakness
- Keeping Information and Communication Private
- Terms used for Logging all the user activity
- Keeping Organizational information accurate and free of errors
- Authorizing a Person to perform certain activity
- cybersecurity standards for OT technology
- Role Based Access Control
14 Clues: Role Based Access Control • Term used to define Weakness • Network Monitoring system short form • cybersecurity standards for OT technology • Operates continuously and Data visible 24*7 • Terms used for Logging all the user activity • Keeping Information and Communication Private • Term that Deals with Organization secret data • ...
TIAA - SMT Crossword 2024-09-19
7 Clues: TIAA strategic partner • CS&T Drive24 initiative • First name of a T3CON presenter • Female associates and allies BRG • TIAA office location that is closing • agile, cybersecurity, data, AI and emerging tech • One of 5 Latin American countries that celebrates their independence on sept 15
Meet UAlbany 2023-07-26
Across
- Nonprofit who manages the UAlbany ID Card Office
- The last C in CEHC stands for
- Online platform for mandatory compliance trainings
- UAlbany's free safety app for your smartphone
- The number of libraries on the UAlbany Uptown Campus
- The Great Dane
- Renowned American architect and designer of main campus
- Symbol of commitment to Latina/o student success
Down
- Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
- College of Arts &
- Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
- Colonial, Dutch, State, and Indigenous
- TAS stands for? Hint: $$
13 Clues: The Great Dane • College of Arts & • TAS stands for? Hint: $$ • The last C in CEHC stands for • Colonial, Dutch, State, and Indigenous • UAlbany's free safety app for your smartphone • Nonprofit who manages the UAlbany ID Card Office • Symbol of commitment to Latina/o student success • Online platform for mandatory compliance trainings • ...
CIA 2025-05-08
Across
- You can make up to _________ a year
- The CIA helps students develop mission _____ while finishing their degrees
- You must take a _________ security clearance process.
- To serve you need to be a U.S. ________ and have a bachelors degree
- It was created to coordinate the nations _______ activities
Down
- Headquarters is located in Langley ______
- Some careers are analysis, auditing, ________, and engineering
- It doesn´t operate with traditional __________
- The CIA was founded in _______
- How was the CIA founded_______
- CIA recruits through their online portal __________
- CIA serves the ______________
- The CIA gathers and ________ intelligence about foreign countries
13 Clues: CIA serves the ______________ • The CIA was founded in _______ • How was the CIA founded_______ • You can make up to _________ a year • Headquarters is located in Langley ______ • It doesn´t operate with traditional __________ • CIA recruits through their online portal __________ • You must take a _________ security clearance process. • ...
AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06
Across
- Use of technologies to improve accuracy.
- Another word for difficulties experienced.
- Increasing use of online and cloud based tools increases this item.
Down
- One of the benefits of ESG reporting.
- Whats new in the industry?
- New technology used by companies for financial reporting.
- Profession being explored.
7 Clues: Whats new in the industry? • Profession being explored. • One of the benefits of ESG reporting. • Use of technologies to improve accuracy. • Another word for difficulties experienced. • New technology used by companies for financial reporting. • Increasing use of online and cloud based tools increases this item.
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Sip & Solve 2025-06-06
Across
- Camille’s birthday month
- Aydens birthday month
- Ayden’s College Acronym
- Couples favorite soda
- How many years have the couple been together
- What was Camille’s childhood nickname
- Bride’s maiden name
- Where the couple got engaged
- Couples first date
- Best Man
- How many months apart in age is the couple
- Name of Camille’s oldest friend
- Aydens current general profession
- Camille’s college degree
- First concert the couple attended together
- Aydens zodiac sign
Down
- Camille’s favorite TV show
- Camille’s favorite color
- Aydens position in football
- What month Ayden proposed
- Groom’s middle name
- Maid of Honor
- Ayden & Camille’s high school mascot
- Bride’s new last name
- Town Ayden & Camille grew up in
- Who said I love you first
- Color of Ayden’s eyes
- Grooms favorite fast food restaurant
- Camille’s College Acronym
29 Clues: Best Man • Maid of Honor • Couples first date • Aydens zodiac sign • Groom’s middle name • Bride’s maiden name • Aydens birthday month • Couples favorite soda • Bride’s new last name • Color of Ayden’s eyes • Ayden’s College Acronym • Camille’s birthday month • Camille’s favorite color • Camille’s college degree • What month Ayden proposed • Who said I love you first • Camille’s College Acronym • ...
Sarah and Liam's wedding 2025-07-10
Across
- The month they first met
- The country they visited last summer
- The month the couple got engaged
- The first movie they watched as a couple
- The city they met in
- What did the groom study in college
- Where did the proposal happen
- Sarah's middle name
- The flavor of their wedding cake
- number of pets the couple has
- The stone in the engagement ring
Down
- The color of the bridesmaid dresses
- The street Sarah and Liam call home
- The bride's maiden name
- How many years the couple has been together
- Their first dance song
- First concert they saw together
- name of Sarah's Maid of Honor
- Sarah's star sign
- The instrument the groom played in high school
- The name of their dog
- Name of the Best Man
22 Clues: Sarah's star sign • Sarah's middle name • The city they met in • Name of the Best Man • The name of their dog • Their first dance song • The bride's maiden name • The month they first met • name of Sarah's Maid of Honor • Where did the proposal happen • number of pets the couple has • First concert they saw together • The month the couple got engaged • The flavor of their wedding cake • ...
WHAT LIES AHEAD 2025-11-20
Across
- New alloys or concrete that repairs itself.
- Very large, rapidly growing cities (50M+).
- Urban areas using technology for efficiency.
- Clean, very inexpensive nuclear energy.
- New, wealthy areas separate from declining cities.
- The engineering that makes all structures work together.
- Robotic clothing that helps workers.
- Machines' ability to make decisions and automate design.
- The issue of public money for infrastructure.
- Very fast train in vacuum tubes.
Down
- The large amounts of information from sensors.
- A structure's ability to resist disasters.
- Environmental change affecting cities
- Means of transport that can be automated (driverless).
- Small unmanned aircraft for delivery or building.
- Protection against hacking of connected systems.
- Network of sensors that exchange data in the infrastructure.
- Building and public works.
- Small devices to monitor infrastructure health.
- Non-fossil resources like solar or fusion
20 Clues: Building and public works. • Very fast train in vacuum tubes. • Robotic clothing that helps workers. • Environmental change affecting cities • Clean, very inexpensive nuclear energy. • Non-fossil resources like solar or fusion • A structure's ability to resist disasters. • Very large, rapidly growing cities (50M+). • New alloys or concrete that repairs itself. • ...
PROFESI TKJ 2025-05-03
Across
- Orang yang bertugas memasang dan memelihara jaringan komputer
- Orang yang menulis dan mengembangkan kode perangkat lunak
- Orang yang memperbaiki dan merakit komputer
- Pembuat dan pengelola situs web
- Pengelola dan pengawas sistem server dalam sebuah jaringan
Down
- Ahli yang merancang dan mengelola sistem jaringan skala besar
- Profesional yang menjaga keamanan jaringan dan data digital
- Orang yang memasang perangkat dan kabel jaringan
- Petugas yang memberikan bantuan teknis kepada pengguna komputer
- Penasihat teknis dalam bidang teknologi informasi untuk perusahaan
10 Clues: Pembuat dan pengelola situs web • Orang yang memperbaiki dan merakit komputer • Orang yang memasang perangkat dan kabel jaringan • Orang yang menulis dan mengembangkan kode perangkat lunak • Pengelola dan pengawas sistem server dalam sebuah jaringan • Profesional yang menjaga keamanan jaringan dan data digital • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
work 2024-03-22
Across
- Novel ideas and creativity.
- Administration and control of technological resources.
- Organization and oversight of tasks to achieve objectives.
- Advanced academic qualification.
- Examination and interpretation of information.
- Protection of digital systems and data.
- Long-term planning for achieving goals.
Down
- Investigation into government or organizational policies.
- Acronym for a specific department or field.
- Digital Academy Educational institution focusing on technology.
- Rules and guidelines governing behavior or activities.
- Possibly an acronym for a certain system or process.
- Techniques and processes for conducting studies.
- Sustainable use of ocean resources for economic growth.
- Government framework for science, technology, and innovation.
- Conference or meeting on a national scale.
- Legal rights over creations of the mind.
- Mandates Responsibilities of a certain organization.
- 2024 Event showcasing science, technology, and innovation in a specific year.
19 Clues: Novel ideas and creativity. • Advanced academic qualification. • Protection of digital systems and data. • Long-term planning for achieving goals. • Legal rights over creations of the mind. • Conference or meeting on a national scale. • Acronym for a specific department or field. • Examination and interpretation of information. • ...
Challenges Related to Community Safety in the Philippines 2024-02-29
Across
- Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
- Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
- and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
- is responsible for fire prevention, suppression, and investigation.
- is the primary law enforcement agency in the country.
- Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
- the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
- is responsible for disaster preparedness, response, and recovery.
- With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
- implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).
10 Clues: is the primary law enforcement agency in the country. • is responsible for disaster preparedness, response, and recovery. • is responsible for fire prevention, suppression, and investigation. • the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or • ...
Classwork Crossword Puzzle 2021-09-20
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Blue Print 2024-09-11
Across
- Person who flies airplanes for a job
- Person who promotes products or brands online
- Animal expert who might work at a wildlife park
- Person who creates new computer and console games
- Cook who prepares food for big events
- Therapist who teaches exercises to heal injuries
- Creator of dance routines for shows or videos
- Writer who reports on the latest clothing trends
Down
- Computer expert who protects against online threats
- Someone who runs for office to make laws
- Designer of bridges, roads, and buildings
- Problem-solver who works to protect nature
- Person in charge of making movies
- Sound expert who helps make songs in a studio
14 Clues: Person in charge of making movies • Person who flies airplanes for a job • Cook who prepares food for big events • Someone who runs for office to make laws • Designer of bridges, roads, and buildings • Problem-solver who works to protect nature • Sound expert who helps make songs in a studio • Person who promotes products or brands online • ...
Oklahoma Computer Science 2025-05-13
Across
- A tool to organize, calculate, and analyze data
- A unique number for each device on a network
- Programs and apps that run on a computer
- A list of steps to solve a problem
- A group of connected computers that share information
- Information that can be collected and used
- Finding and fixing errors in code
Down
- Protecting devices and data from digital threats
- A device that sends data between computers and networks
- Code that repeats instructions
- A value in a program that can change
- Technology doing tasks without human help
- Showing only specific data based on rules
- The physical parts of a computer
14 Clues: Code that repeats instructions • The physical parts of a computer • Finding and fixing errors in code • A list of steps to solve a problem • A value in a program that can change • Programs and apps that run on a computer • Technology doing tasks without human help • Showing only specific data based on rules • Information that can be collected and used • ...
btyetrails4 2025-02-25
Across
- Protecting data from unauthorized access
- A system software managing computer hardware
- The process of transferring data from one device to another
- Permanently removing files from a storage device
Down
- A type of scam email designed to steal user data
- Storing data over the internet instead of local systems
- A web address used to access websites
- A software that helps navigate web pages
- Company that provides internet access
9 Clues: A web address used to access websites • Company that provides internet access • Protecting data from unauthorized access • A software that helps navigate web pages • A system software managing computer hardware • A type of scam email designed to steal user data • Permanently removing files from a storage device • Storing data over the internet instead of local systems • ...
tech 2025-12-12
Across
- (Anything an organization possesses that needs protection)
- (A security device that controls network traffic)
- (A key 'P' in the cybersecurity framework)
- (A computing system hosted online)
- (To watch network activity and traffic)
- (A software update to repair bugs or vulnerabilities)
- (A deception tool to detect an attack)
- (Network communication endpoints)
Down
- (Bad software installed on a computer)
- (A self-replicating malware program)
- (Relates to system processes and authentication)
- (Protecting data by converting it into secret code)
- (Unauthorized user with malicious intent)
- (A server that sits between a computer and the web to hide an IP address)
- (A notification that an attack or vulnerability has been detected)
15 Clues: (Network communication endpoints) • (A computing system hosted online) • (A self-replicating malware program) • (Bad software installed on a computer) • (A deception tool to detect an attack) • (To watch network activity and traffic) • (Unauthorized user with malicious intent) • (A key 'P' in the cybersecurity framework) • (Relates to system processes and authentication) • ...
AI Cyberspace 2024-10-15
Across
- Political factors influencing behavior in cybersecurity
- Measures to protect against cyber threats.
- AI enabling systems to learn from data.
- Total points vulnerable to cyber attacks.
Down
- Actions in cyberspace for security or attack.
- Actions to exploit vulnerabilities in systems.
- Intelligence Machines simulating human intelligence processes.
7 Clues: AI enabling systems to learn from data. • Total points vulnerable to cyber attacks. • Measures to protect against cyber threats. • Actions in cyberspace for security or attack. • Actions to exploit vulnerabilities in systems. • Political factors influencing behavior in cybersecurity • Intelligence Machines simulating human intelligence processes.
FOP 2023-04-01
Across
- SOCA’s ________ department is the first point of contact with outside organizations.
- DISM’s SIG.
- Gryphons plan & organize ______-___-___ competitions.
- SPAI attended and presented at the ____ Conference.
- SEED hosts the ___-___-Series.
- SOCA is In charge of ________ relations.
- ______ organized the SOC Open House.
Down
- Gryphons aims to promote ________ to students that are passionate about it.
- SPAI created its own Project _____.
- SPAI is part of the AI Singapore Student ____ Group.
- SEED stands for Sharing, _______, Enriching, Development.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
- SOCC is in charge of maintaining and building ________ relations.
- League Programming competition only for freshmen.
- SOCC organized Freshman Orientation ______.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • SOCC organized Freshman Orientation ______. • League Programming competition only for freshmen. • SPAI attended and presented at the ____ Conference. • SPAI is part of the AI Singapore Student ____ Group. • ...
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Cyber Midterm P1 2025-12-09
6 Clues: Data at rest • Data in transit • Keeping data intact and safe • Reliable access to information • Keeps data only accessible to authorized persons • Acronym for the triad that embodies Cybersecurity as a whole
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Tecnologia de la Informacion 2023-05-06
Across
- Implica en los trabajos en tecnología de la información
- La TI admite muchas funciones comerciales y ayuda a?
- Una de las carreras que abarca la TI
- Es un tipo de tecnología de información
- Sigla de la tecnología de información
- Las empresas globales utilizan la tecnología de información para?
Down
- ¿Qué es la tecnología de la información?
- ¿La tecnología de información es responsable de?
- ¿Porqué es necesaria la tecnología de la información?
9 Clues: Una de las carreras que abarca la TI • Sigla de la tecnología de información • Es un tipo de tecnología de información • ¿Qué es la tecnología de la información? • ¿La tecnología de información es responsable de? • La TI admite muchas funciones comerciales y ayuda a? • ¿Porqué es necesaria la tecnología de la información? • ...
business 2025-05-22
Across
- Business model: selling directly to consumers (Business).
- Leaving a company, often measured in percentages (HR).
- A revolutionary idea that changes the market (Business).
- Strategy that compares performance with top competitors (Business).
Down
- Security that protects systems and data (Tech).
- Design that improves how people interact with a product (Tech).
- Bringing new workers into a company smoothly (HR).
- Total money earned (Finance).
- Group of people you market your product to (Marketing).
9 Clues: Total money earned (Finance). • Security that protects systems and data (Tech). • Bringing new workers into a company smoothly (HR). • Leaving a company, often measured in percentages (HR). • Group of people you market your product to (Marketing). • A revolutionary idea that changes the market (Business). • Business model: selling directly to consumers (Business). • ...
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Cyber Security Puzzle 2024-10-21
Across
- term used for various pop-up advertisements that show up on your computer or mobile device.
- a malware designed to deny a user or organization access to files on their computer
- what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
- specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
- the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
- refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
- A worm in cybersecurity is a type of malicious software that spreads across computer networks
- A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user
9 Clues: a malware designed to deny a user or organization access to files on their computer • term used for various pop-up advertisements that show up on your computer or mobile device. • A worm in cybersecurity is a type of malicious software that spreads across computer networks • ...
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • a sense that a scammer creates when rushing you • The process of verifying a claimed identity of a user or device
The Voice: October 7th, 2024 2024-10-07
Across
- Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
- What _____ look like in Canada today.
- Limited spots left for this event!
- October is what awareness month?
Down
- One of the highlighted members this week.
- Since 2012, the Chamber has advocated for improved what?
- EcoBrooks _____ Award.
7 Clues: EcoBrooks _____ Award. • October is what awareness month? • Limited spots left for this event! • What _____ look like in Canada today. • One of the highlighted members this week. • Since 2012, the Chamber has advocated for improved what? • Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
CYBERSECURITY PUZZLE 2023-09-13
7 Clues: Do not visit • Shady..do not click! • Dishonest offer online • Don't ever share this to strangers! • Always change this throughout accounts! • Be careful when doing this on social media! • Publishing someone's private information on the internet
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity crossword 2023-03-17
Across
- Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- Find a synonym of preempt
Down
- What is the naming convention for ecrime category ?
- What is 84 minutes the average time for ?
- What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- Which type of accounts are mainly targeted by adversaries ?
7 Clues: Find a synonym of preempt • What is 84 minutes the average time for ? • What is the naming convention for ecrime category ? • Which type of accounts are mainly targeted by adversaries ? • Which tool can reveal hidden relationships and identify attack paths within an AD environment ? • ...
Cybersecurity Crossword 2022-05-19
Across
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- establishes a secure connection between you and the internet
- the practice of protecting critical systems and sensitive information from digital attacks.
Down
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a standalone malware computer program that replicates itself in order to spread to other computers
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
7 Clues: establishes a secure connection between you and the internet • the practice of protecting critical systems and sensitive information from digital attacks. • a set of instructions, data or programs used to operate computers and execute specific tasks • a standalone malware computer program that replicates itself in order to spread to other computers • ...
Cybersecurity Crossword 2023-11-10
Across
- What type of hacker exploits systems for personal gain and bad intention
- What is used to hide messages so only authorized people can understand?
- What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- Using deceptive measures to manipulate someone in disclosing personal information
- Data, information , device anything that is of value
- Acquiring unauthorized access to system or data
- An incident where attackers steal information without authorization?
7 Clues: Acquiring unauthorized access to system or data • Data, information , device anything that is of value • An incident where attackers steal information without authorization? • What is used to hide messages so only authorized people can understand? • What type of hacker exploits systems for personal gain and bad intention • ...
IT 2024-11-28
Across
- Field focused on protecting data from cyberattacks.
- What does IoT stand for?
- Common programming language used for AI.
- Process of identifying and fixing software issues.
Down
- A key method for securing data online.
- Smart system connecting everyday devices.
- Main component of a computer system's physical setup.
7 Clues: What does IoT stand for? • A key method for securing data online. • Common programming language used for AI. • Smart system connecting everyday devices. • Process of identifying and fixing software issues. • Field focused on protecting data from cyberattacks. • Main component of a computer system's physical setup.
MEKATRONIK T3 2024-05-24
Across
- merupakan satu teras utama revolusi industri 4.0
- satu sistem susunan dan sambungan fizikal komponen dalam satu litar
- merupakan contoh bagi sistem kawalan
- LITAR merupakan salah satu aspek penning dalam product mekatronik
- merupakan salah satu ujian kefungsian
- ..........manufacturing Hialeah pembuatan bah mental
Down
- berfungsi membekalkan arus bagi membolehkan peranti berfungsi
- ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
- ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
- jurutera jepun yang memperkenalkan konsep mekatronik
10 Clues: merupakan contoh bagi sistem kawalan • merupakan salah satu ujian kefungsian • merupakan satu teras utama revolusi industri 4.0 • ..........manufacturing Hialeah pembuatan bah mental • jurutera jepun yang memperkenalkan konsep mekatronik • berfungsi membekalkan arus bagi membolehkan peranti berfungsi • ...
Globalization and Technology 2025-02-06
Across
- Transaction on the internet like Amazon Pay, Paypal etc
- A global network the world uses for communications and other features
- A period of hundred years
- A system that gives music and transmits audio
- The act of buying and selling goods
- An Act of introducing new ideas or products
Down
- Process of exchanging Information through any medium
- A simulated experience using computer technology used by headset
- Moving things from one place to another
- Measures taken to protect a computer
10 Clues: A period of hundred years • The act of buying and selling goods • Measures taken to protect a computer • Moving things from one place to another • An Act of introducing new ideas or products • A system that gives music and transmits audio • Process of exchanging Information through any medium • Transaction on the internet like Amazon Pay, Paypal etc • ...
03 Almer Billie prabawa 2025-10-17
Across
- Memuat ulang halaman web agar tampil terbaru.
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Lembar atau jendela kecil dalam browser untuk membuka situs lain.
- menampilkan gambar atau halaman web di layar.
- Perlindungan sistem komputer dari serangan digital.
Down
- Tempat menulis alamat situs web (URL) di browser.
- Tab baru untuk membuka halaman web lain.
- Memperbarui tampilan halaman yang sedang dibuka.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
10 Clues: Tab baru untuk membuka halaman web lain. • Memuat ulang halaman web agar tampil terbaru. • menampilkan gambar atau halaman web di layar. • Memperbarui tampilan halaman yang sedang dibuka. • Tempat menulis alamat situs web (URL) di browser. • Perlindungan sistem komputer dari serangan digital. • Program untuk mengatur dan mempercepat unduhan file. • ...
AI in education 2024-06-05
Across
- Protection of personal information.
- Lack of neutrality, prejudice.
- Guidelines or principles governing proper conduct.
- Actions taken to use something wrongly or inappropriately.
- The quality of being honest and having strong moral principles.
- The state of being clear and open.
Down
- The protection of data from unauthorized access or corruption.
- The state of being answerable or responsible.
- Practices designed to ensure secure data and systems.
- The practice of keeping information secret to prevent unauthorized access.
10 Clues: Lack of neutrality, prejudice. • The state of being clear and open. • Protection of personal information. • The state of being answerable or responsible. • Guidelines or principles governing proper conduct. • Practices designed to ensure secure data and systems. • Actions taken to use something wrongly or inappropriately. • ...
Comms & Media Crossword - October Edition 2022-10-04
Across
- This company was recently in news for launching 5G Lab-as-a-service
- Leading telecom equipment provider, & our client
- Virtual representation of a real-world physical system
- One of the most important digital challenges today
- Continuous Expenditure that companies incur
Down
- Satoshi Nakamoto was the pioneer behind this technology
- Software based technology used in Telecom
- This company launched India’s 1st multiplex in Metaverse
- Telecom players fight for this
- boAt had a K-pop concert on this platform
10 Clues: Telecom players fight for this • Software based technology used in Telecom • boAt had a K-pop concert on this platform • Continuous Expenditure that companies incur • Leading telecom equipment provider, & our client • One of the most important digital challenges today • Virtual representation of a real-world physical system • ...
4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02
Across
- The protection of information and systems from cyberattacks
- A threat originating from within an organization
- The overall protection of computer systems and data
- A weakness in a computer system that can be exploited
- The transfer of information between devices
Down
- The act of stealing or manipulating data
- Unintentional harm caused to data or systems
- A threat originating from the internet
- The practice of illegally gaining access to a computer system
9 Clues: A threat originating from the internet • The act of stealing or manipulating data • The transfer of information between devices • Unintentional harm caused to data or systems • A threat originating from within an organization • The overall protection of computer systems and data • A weakness in a computer system that can be exploited • ...
pasar uang dan ekonomi digital 2024-02-28
Across
- sektor pendukung ekonomi digital
- contoh E-Commerce yang ada di Indonesia
- sumber pendanaan dalam pasar uang yang berupa utang dagang
- karakteristik pasar uang
- peluang bisnis ekonomi digital
Down
- pekerjaan masyarakat Indonesia dengan adanya media online
- masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
- ekonomi digital sangat efisien
- salah satu memanfaatkan ekonomi digital adalah membuat
- karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
- kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
- berperan sebagai perantara di antara pelaku dalam Pasar Uang
- salah satu fungsi pasar uang
- instrumen pasar uang yang diteritkan Bank Umum
- pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga
15 Clues: karakteristik pasar uang • salah satu fungsi pasar uang • ekonomi digital sangat efisien • peluang bisnis ekonomi digital • sektor pendukung ekonomi digital • contoh E-Commerce yang ada di Indonesia • instrumen pasar uang yang diteritkan Bank Umum • salah satu memanfaatkan ekonomi digital adalah membuat • pekerjaan masyarakat Indonesia dengan adanya media online • ...
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
Cybersecurity Month 2023-09-27
Across
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
- Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
- A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
- A form of malware used by hackers to spy on you and your computer activities
- Any technology, be it software or hardware, used to keep intruders out
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications
7 Clues: Any technology, be it software or hardware, used to keep intruders out • A form of malware used by hackers to spy on you and your computer activities • Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
