cybersecurity Crossword Puzzles
Getting to Know Darnnell 2024-08-31
Across
- French city Darnnell visited for official duty
- Proud native of DC
- Short for Darnnell's DC high school, McKinley
- Darnnell's bachelor’s degree from Strayer University
- Where Darnnell worked in cybersecurity
- Cruise destination Darnnell visited on Royal Caribbean
- Darnnell wrote books, including *Victorious!*
- She served during Operation Desert Storm
- Darnnell's graduation honor with a 4.0 GPA
- City Darnnell toured for Underground Railroad history
Down
- Key role Darnnell played in guiding teams and projects
- Military operation where she served
- Hawaiian island Darnnell visited in 2023
- Focused on preventing global threats; her role at DOJ
- Historical figure’s birthplace Darnnell visited
- The cornerstone of Darnnell's strength
- Central to Darnnell's heart and soul
- Language Darnnell’s learning on Duo lingo
- International police organization she worked with
- Operating system Darnnell once specialized in
20 Clues: Proud native of DC • Military operation where she served • Central to Darnnell's heart and soul • The cornerstone of Darnnell's strength • Where Darnnell worked in cybersecurity • Hawaiian island Darnnell visited in 2023 • She served during Operation Desert Storm • Language Darnnell’s learning on Duo lingo • Darnnell's graduation honor with a 4.0 GPA • ...
Wedding 2024-06-08
Across
- Brand of Michael’s car
- Michael’s job industry
- The number of years the couple is together
- Michael’s middle name
- Where did Michael and Stacey meet
- What the groom has for breakfast everyday
- How long has Stacey been in Australia for
- Stacey’s favourite food (hint: ask father of bride)
- City where Michael was born
- Honeymoon destination
- Mr & Mrs _____
- The age gap between the bride and the groom
- Number of their siblings all together
Down
- Flavour of the wedding cake
- Where did Michael propose
- Michael’s birthday month
- Who’s the better cook
- Their favourite season
- Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- Favourite AFL team (hint: ask Best Man)
- Michael’s favourite drink
- Stacey’s best friend
- Stacey’s birthday month
24 Clues: Mr & Mrs _____ • Stacey’s best friend • Who’s the better cook • Michael’s middle name • Honeymoon destination • Their favourite season • Brand of Michael’s car • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Where did Michael propose • Michael’s favourite drink • Flavour of the wedding cake • City where Michael was born • Where did Michael and Stacey meet • ...
Technology Words 2024-10-09
Across
- Computer Camera
- Used to type
- You call people on it
- Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Communicate with others vocally
- Coded software
- Analyze and solve problems
- Prevents viruses
- Provides entertainment
- Something that you can transfer digital info to
- Stores information
- Another word for apps
Down
- Gain unauthorized access
- Random Access Memory
- Decode a code
- Also an animal
- Requires a router
- Protects from cyber attacks
- The use of computer technology
- Remote connection
- Communication technology tool
- Central Processing Unit
- Look through the web
- Creates apps/websites
- Find locations
- Amount of data your internet connection can handle
- Accessed from a browser
- Protects your computer from virus
- Convert data into a code
- Social feed
30 Clues: Social feed • Used to type • Decode a code • Also an animal • Coded software • Find locations • Computer Camera • Prevents viruses • Requires a router • Remote connection • Stores information • Random Access Memory • Look through the web • You call people on it • Creates apps/websites • Another word for apps • Provides entertainment • Central Processing Unit • Accessed from a browser • ...
Sip & Solve 2025-06-06
Across
- Aydens zodiac sign
- Groom’s middle name
- How many months apart in age is the couple
- Camille’s College Acronym
- Best Man
- Aydens position in football
- What was Camille’s childhood nickname
- Who said I love you first
- Color of Ayden’s eyes
- Aydens current general profession
- Grooms favorite fast food restaurant
- Maid of Honor
- Name of Camille’s oldest friend
- Camille’s favorite color
- Couples first date
Down
- What month Ayden proposed
- Town Ayden & Camille grew up in
- Bride’s new last name
- First concert the couple attended together
- Bride’s maiden name
- Aydens birthday month
- Ayden & Camille’s high school mascot
- Camille’s favorite TV show
- Camille’s college degree
- Couples favorite soda
- Ayden’s College Acronym
- Where the couple got engaged
- Camille’s birthday month
- How many years have the couple been together
29 Clues: Best Man • Maid of Honor • Aydens zodiac sign • Couples first date • Groom’s middle name • Bride’s maiden name • Bride’s new last name • Aydens birthday month • Couples favorite soda • Color of Ayden’s eyes • Ayden’s College Acronym • Camille’s college degree • Camille’s birthday month • Camille’s favorite color • What month Ayden proposed • Camille’s College Acronym • Who said I love you first • ...
Grace & Branden 2025-09-04
Across
- The best man’s name
- Branden’s middle name
- Branden and Grace each have blank siblings
- Grace’s brother recently enlisted in the blank
- Season they met
- Who the better cook is
- Grace’s birth month
- Mother of the Bride’s name
- Grace’s eye color
- Branden’s favorite hobby
- Grace’s unknown talent
- Branden’s birth month
- Month they got engaged
- Grace’s new last name
- Their favorite sweet treat
Down
- Where they met
- Mother of the Groom’s name
- Grace brews some awesome
- Branden’s college major
- Branden’s eye color
- The maid of honor’s name
- Honeymoon destination
- What similar job did they hold while in high school
- The first meal they made together
- The officiant’s name
- Years they have known each other
- The state Branden was born in
27 Clues: Where they met • Season they met • Grace’s eye color • The best man’s name • Branden’s eye color • Grace’s birth month • The officiant’s name • Branden’s middle name • Honeymoon destination • Branden’s birth month • Grace’s new last name • Who the better cook is • Grace’s unknown talent • Month they got engaged • Branden’s college major • Grace brews some awesome • The maid of honor’s name • ...
Intro Cybersecurity Puzzle 2 2021-09-15
Across
- Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
- Another form of single sign on, initially supported by Twitter and Google
- Biometrics is an example of something you _____
- single sign-on authentication, think three headed dog
- A key fob is an example of something you _____
- A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
- Robot Network
- Acronym for Industrial Control Systems Supervisory Software
- Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
- The infected computer in a network of computers with infected malware
- Your location to sign in is an example of somewhere you _____
- the process of converting a given key into another value. If they are the same this is known as collision.
- An emerging technology used in cryptocurrency
- Acronym for "Smart Devices" over the internet
- Your password is an example of something you _____
- Acronym for Anything as a service
- The acronym for the masterbot centralization
17 Clues: Robot Network • Acronym for Anything as a service • The acronym for the masterbot centralization • An emerging technology used in cryptocurrency • Acronym for "Smart Devices" over the internet • A key fob is an example of something you _____ • Biometrics is an example of something you _____ • Your password is an example of something you _____ • ...
Cybersecurity Fundamentals Chapter 5 2022-10-27
Across
- an efficient way to store, retrieve, and analyze data.
- table relationship must remain consistent.
- a set of rules defined by the user which does not belong to one of the other categories.
- use to make hashing more secure.
- strengthens hashing algorithm by using additional secret key as input to the hash function.
- a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
- checks that data falls within the parameters defined by the database designer.
- all data stored in a column must follow the same format.
- hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
- refers to the accuracy, consistency, and reliability of data stored in a
- developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
- the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
- provide the same functionality as handwritten signature for electronics documents.
- all rows must have a unique identifier called primary key.
- equivalent to an electronic passport.
- standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.
16 Clues: use to make hashing more secure. • equivalent to an electronic passport. • table relationship must remain consistent. • an efficient way to store, retrieve, and analyze data. • all data stored in a column must follow the same format. • all rows must have a unique identifier called primary key. • ...
Digimath 9 2025-03-05
Across
- – The smallest unit of data in a computer
- – A wireless technology standard used to exchange data between devices over short distances
- – The practice of protecting computers and networks from digital attacks
- – A harmful program that can damage a computer
- – Used to type and input data
- – A screen that displays information
- – Physical parts of a computer
Down
- – A global network connecting millions of computers
- – A wireless connection to the internet
- – The "brain" of the computer
- – Storing data on the internet instead of a local device
- – Programs that run on a computer
- – A pointing device used to control the cursor
13 Clues: – The "brain" of the computer • – Used to type and input data • – Physical parts of a computer • – Programs that run on a computer • – A screen that displays information • – A wireless connection to the internet • – The smallest unit of data in a computer • – A harmful program that can damage a computer • – A pointing device used to control the cursor • ...
Computer Science 2023-05-05
Across
- another word for virus
- A software that can do problem solving and learn on it's own
- Bill Gate's corporation
- Way to stop seeing ads
- Software to access the internet
- Owner of Tesla
- Lots of computers joined together through signals sending data
- The code that the nazis communicated through
- A software that infects your computer secretly
- A collection of code
- Code made out of 0s and 1s
Down
- The person who created the Universal Turing Machine
- A visual display which shows the code on a computer
- Small device that is pushed across a small area to do different actions
- A software addon
- Stops viruses from infecting your pc
- What you're using
- What you use to type
- What a computer uses to operate
- Another software that is very HOT
- Owner of apple
21 Clues: Owner of Tesla • Owner of apple • A software addon • What you're using • What you use to type • A collection of code • another word for virus • Way to stop seeing ads • Bill Gate's corporation • Code made out of 0s and 1s • Software to access the internet • What a computer uses to operate • Another software that is very HOT • Stops viruses from infecting your pc • ...
TTS informatika 2025-04-10
Across
- .Hak atas kekayaan intelektual
- .Sistem komputer untuk menelusuri informasi di internet
- .Profesiyang merancang tampilan dan interaksi aplikasi
- .Profesi yang menulis kode program
- .Mesin pencari paling populer saat ini
- .Profesi yang mengelola data dan sistem basis data
- .Singkatan dari Creative Commons (izin berbagi konten)
- .Hak yang diberikan kepada pencipta karya seni atau tulisan
- .Akhiran domain untuk situs komersial
- .Proses mengamankan data dari akses tidak sah
Down
- .Tempat untuk menyimpan dan berbagi video
- .Jenis hak kekayaan intelektual untuk merek dagang
- .Proses penyebaran informasi secara luas
- .Media sosial berbasis gambar milik Meta
- .Kegiatan mengambil data dari internet secara otomatis
- .Jenis konten digital berbentuk suara
- .Produk digital berbentuk tulisan panjang seperti e-book
- .Format file gambar umum (3 huruf)
- .Konten digital berbasis gambar bergerak
- .Profesi yang fokus pada keamanan jaringan komputer
20 Clues: .Hak atas kekayaan intelektual • .Profesi yang menulis kode program • .Format file gambar umum (3 huruf) • .Jenis konten digital berbentuk suara • .Akhiran domain untuk situs komersial • .Mesin pencari paling populer saat ini • .Proses penyebaran informasi secara luas • .Media sosial berbasis gambar milik Meta • .Konten digital berbasis gambar bergerak • ...
Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I 2025-04-11
Across
- Melindungi karya seni atau tulisan.
- Menampilkan halaman dengan URL serupa.
- Proses mengatur konten.
- Perlindungan atas penemuan teknologi.
- Mengecek kebenaran informasi.
- Engineer Ahli jaringan komputer.
- Penyebaran konten ke audiens luas.
- Analyst Menganalisis data besar.
- Digunakan untuk menghilangkan kata tertentu dalam pencarian.
- Syntax untuk pencarian kata spesifik.
Down
- Verifikasi keaslian konten.
- Menjaga keamanan data digital.
- Proses memanfaatkan teknologi untuk budaya.
- Identifikasi konten berbahaya.
- Budaya Konten berbasis nilai tradisional.
- Industri Hak untuk desain produk tertentu.
- Merancang perangkat lunak.
- Hak atas logo atau merek dagang.
- Lokal Media untuk menyebarluaskan budaya lokal.
- Konten palsu yang menyesatkan.
- Lokal Nilai tradisional dalam konten digital.
- Operator untuk pencarian di situs tertentu.
- Designer Merancang antarmuka pengguna.
- Mencari file dengan format spesifik.
- Hak atas ide atau karya pemikiran.
25 Clues: Proses mengatur konten. • Merancang perangkat lunak. • Verifikasi keaslian konten. • Mengecek kebenaran informasi. • Menjaga keamanan data digital. • Identifikasi konten berbahaya. • Konten palsu yang menyesatkan. • Hak atas logo atau merek dagang. • Engineer Ahli jaringan komputer. • Penyebaran konten ke audiens luas. • Analyst Menganalisis data besar. • ...
IT 2025-12-02
Across
- Tool used to secure data by converting it to code
- Extracting useful patterns from large datasets
- Software that manages computer hardware
- The visual part of software users interact with
- Rules for data communication over networks
- Checking a system for malicious software
- Online space to save and access files
- A software-based emulation of a computer
- Machines simulating human intelligence
Down
- Keeping servers running smoothly and securely
- Organizing and handling structured data
- Find and fix errors in software
- A set of rules for writing computer code
- Algorithms that learn from data automatically
- Protecting computers and networks from attacks
- New version of a program to improve it
- Measures to protect systems from digital threats
- Blocks unauthorized access to a network
- Copy of data saved for recovery purposes
- Write instructions for a computer program
20 Clues: Find and fix errors in software • Online space to save and access files • New version of a program to improve it • Machines simulating human intelligence • Organizing and handling structured data • Software that manages computer hardware • Blocks unauthorized access to a network • A set of rules for writing computer code • Checking a system for malicious software • ...
Cybersecurity Awareness Month 2025 2025-10-07
Across
- Malware that attaches to files and spreads when executed
- Network of infected devices, often remotely controlled
- Method of converting data into a fixed-size string
- Piece of code that takes advantage of a vulnerability
- Hidden method of bypassing normal authentication
- Software that secretly gathers data without consent
- Potential cause of an unwanted incident
- Self-replicating malware that spreads without user interaction
- Fraudulent attempt to obtain sensitive information via email or messaging
Down
- Incident where data is accessed without authorization
- Type of malware disguised as a legitimate file
- Process of verifying a user's identity
- Impersonating another user or device to gain access
- General term for malicious software
- Part of malware that performs the malicious action
- Stealthy type of malware designed to hide its presence
16 Clues: General term for malicious software • Process of verifying a user's identity • Potential cause of an unwanted incident • Type of malware disguised as a legitimate file • Hidden method of bypassing normal authentication • Method of converting data into a fixed-size string • Part of malware that performs the malicious action • ...
Online Child Safety 2013-05-14
Across
- a person who access internet files either legally or illegally
- software that allows parents to control what their children do online
- an unsolicited email or junk mail
- Malicious hardware and code
- any software or technique used to prevent online crime
Down
- an interactive forum where you can talk in real time
- unsolicited adds on your computer
- a hostile strongly worded message that may contain obscene language
- scam that involves a fraudulent e-mail
- An adult internet user who exploits children or teens
- online site where people can post information about themselves
- rules/manners of inline usage
- a sexual message sent to someone
- virtual sexual encounters
- The Communications Decency Act
15 Clues: virtual sexual encounters • Malicious hardware and code • rules/manners of inline usage • The Communications Decency Act • a sexual message sent to someone • unsolicited adds on your computer • an unsolicited email or junk mail • scam that involves a fraudulent e-mail • an interactive forum where you can talk in real time • ...
Technology 2023-09-15
Across
- - Prefix for environments simulated by computers.
- - A global network connecting computers and devices.
- - Unmanned aerial vehicles used for various purposes.
- - A mobile device with advanced features.
- - Prefix for intelligence created by machines.
- - Wireless technology for short-range data exchange.
- - The study of designing and building robots.
- - Programs and applications used on computers.
Down
- - Authentication based on unique physical characteristics.
- - Measures to protect computer systems and data.
- - A small, specialized electronic device.
- - The process of converting data into a code to secure it.
- - Storage and computing resources accessed over the internet.
- - A set of rules for solving a problem or performing a task.
- - Using technology to perform tasks without human intervention.
15 Clues: - A small, specialized electronic device. • - A mobile device with advanced features. • - The study of designing and building robots. • - Prefix for intelligence created by machines. • - Programs and applications used on computers. • - Measures to protect computer systems and data. • - Prefix for environments simulated by computers. • ...
Computer Science 2025-08-12
Across
- – Finding and fixing errors in code.
- – Online storage and services accessed via the internet.
- – Two or more computers connected to share data.
- – Protecting computers and networks from attacks.
- – The physical parts of a computer.
- – Data or commands entered into a computer.
Down
- – A device used to type into a computer.
- – A global network that connects computers.
- – Scrambling data to keep it secure.
- – Information a computer gives back after processing.
- – Step-by-step instructions to solve a problem.
- – A way computers store data using 0s and 1s.
- – Instructions written for a computer to follow.
- – Programs that run on a computer.
- – Facts or information stored on a computer.
15 Clues: – Programs that run on a computer. • – The physical parts of a computer. • – Scrambling data to keep it secure. • – Finding and fixing errors in code. • – A device used to type into a computer. • – A global network that connects computers. • – Data or commands entered into a computer. • – Facts or information stored on a computer. • ...
Information Security 2025-01-06
7 Clues: Malicious Software • Acceptable Use Policy • Malware that attaches to programs • Protection of ownership and reputation • Designed to lessen the risk of cyber attack • Protect with strong passwords and password storage • Protect with up to date software, encrypted information, limited employee access
ISC 3 2025-03-24
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- also known as a "white list"
- any software that relies upon by other applications and software
- predefined responses for security incidents
- this type of restart is needed for applying updates
- when a system is unavailable
- involves assessing all existing security controls, policies and procedures
- step-by-step instructions for security measures
- ideal security position based on industry standards
- define requirements for security controls and configurations
Down
- prioritization of improving security and moving to the desired state
- also known as "block lists"
- limiting certain actions or behaviors
- comparing the current and desired states
- Comparing the current state of an organization's security position to a desired state
- never trust, always verify
- these types of apps are outdated and older
16 Clues: never trust, always verify • also known as "block lists" • also known as a "white list" • when a system is unavailable • limiting certain actions or behaviors • comparing the current and desired states • these types of apps are outdated and older • predefined responses for security incidents • step-by-step instructions for security measures • ...
Cybersecurity Fundamental Chapter 2 2022-11-24
Across
- a type of storage device retains the data when no user or process is using it.
- cyber criminals can capture, save and steal data in-transit.
- uses removable media to physically move data from one computer to another.
- procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- devices, and product available to protect information systems and fend off cyber criminals.
- verifies the identify of a user to prevent unauthorized access.
- uses cable to transmit data.
Down
- verifies determine which resources users can access, along with the operations that users can perform.
- is the principle used to describe the need to maintain availability of information systems and services at all times.
- involves sending information from one device to another.
- cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- cyber criminals can intercept and alter data in-transit.
- aware and knowledgeable about their world and the dangers that threaten their world.
- keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- prevents the disclosure of information to unauthorize people, resource and processes.
- uses the airways to transmit data.
16 Clues: uses cable to transmit data. • uses the airways to transmit data. • involves sending information from one device to another. • cyber criminals can intercept and alter data in-transit. • cyber criminals can capture, save and steal data in-transit. • verifies the identify of a user to prevent unauthorized access. • ...
SCIENCE AND TECHNOLOGY 2024-03-29
Across
- Protection of computer systems from theft or damage.
- The study of living organisms.
- Intelligence Teaching computers to think and learn.
- introducing new ideas or methods.
- A series of steps to accomplish a task.
Down
- Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
- Connecting computers or devices to communicate.
- Study of heredity and variation in living organisms.
- Distinctive features or traits.
- A community of living organisms and their environment.
- Using machines to perform tasks.
- Genetic material containing instructions for living organisms' development and traits.
12 Clues: The study of living organisms. • Distinctive features or traits. • Using machines to perform tasks. • introducing new ideas or methods. • A series of steps to accomplish a task. • Connecting computers or devices to communicate. • Study of heredity and variation in living organisms. • Protection of computer systems from theft or damage. • ...
User responsibility 2025-10-14
Across
- practicing ethical respectful and safe behavior online
- the trace of all your online activities
- respecting differences and opinions in digital spaces
Down
- protecting systems and data from digital attacks
- accepting consequences for online actions
- checking accuracy before believing or sharing
- settings tools that control who can see your information
- false information shared without verifying facts
8 Clues: the trace of all your online activities • accepting consequences for online actions • checking accuracy before believing or sharing • protecting systems and data from digital attacks • false information shared without verifying facts • respecting differences and opinions in digital spaces • practicing ethical respectful and safe behavior online • ...
cyber threat actors, attacks & motivations 2023-12-18
Across
- Where to report a a cybersecurity incident at RDA
- It's something RDA is known for, but in the social form
- Homophone of a much loved pass time
- Supported by a government
- Australian Government agency that houses the ACSC
- Cybercrime that involves encryption and blackmail
- The name of the cipher you may or may not have succeeded in solving
- Furtum identitatis
Down
- A brute force technique used by cybercriminals
- An important aspect of security as a capability that isn't cyber
- Morris distributed this via the internet in 1988
- Something you must protect in the digital age
- A characteristic of cybercriminal groups
- Cybercriminal motivated by ideology
- A leading motivator for cybercriminals
- Malicious software used to establish remote access
- It's everyone's responsibility
17 Clues: Furtum identitatis • Supported by a government • It's everyone's responsibility • Homophone of a much loved pass time • Cybercriminal motivated by ideology • A leading motivator for cybercriminals • A characteristic of cybercriminal groups • Something you must protect in the digital age • A brute force technique used by cybercriminals • ...
Source Vs Machine Code 2025-11-12
Across
- – Low-level software stored in ROM
- – Easy for humans to understand (like source code)
- – A single command in a program
- – Person who writes source code
- – Example of a high-level programming language
- – Uses programming to analyze and interpret data
- – Job that designs or builds software applications
- – Field that protects systems from digital attacks
Down
- – Coder who designs and codes video games
- – Field that creates and maintains websites
- – System using only 0 and 1
- – Part of the computer that executes machine code
- – Another term for bits (0s and 1s)
- – Hard or impossible to modify (like machine code)
- – Read-Only Memory that stores permanent instructions
- – Programs and applications created using source code
- – The physical components of a computer
17 Clues: – System using only 0 and 1 • – A single command in a program • – Person who writes source code • – Low-level software stored in ROM • – Another term for bits (0s and 1s) • – The physical components of a computer • – Coder who designs and codes video games • – Field that creates and maintains websites • – Example of a high-level programming language • ...
Cyber Security 2023-11-07
Across
- Logs and Event Management provided in JICA Project
- Set of rules, policies and operations that a company uses to achieve its business goals
- Compliance is act of following rules, laws and regulations
- Network Monitoring system short form
- Term that Deals with Organization secret data
- Operates continuously and Data visible 24*7
- Next Generation Firewall brand provided in JICA Project
Down
- Term used to define Weakness
- Keeping Information and Communication Private
- Terms used for Logging all the user activity
- Keeping Organizational information accurate and free of errors
- Authorizing a Person to perform certain activity
- cybersecurity standards for OT technology
- Role Based Access Control
14 Clues: Role Based Access Control • Term used to define Weakness • Network Monitoring system short form • cybersecurity standards for OT technology • Operates continuously and Data visible 24*7 • Terms used for Logging all the user activity • Keeping Information and Communication Private • Term that Deals with Organization secret data • ...
E-Commerce Crossword 2024-04-19
Across
- digital shopping cart used to hold items before purchase
- online advertisements targeted to specific users
- short for "electronic commerce"
- process of securely storing and transmitting customer data
- mobile app used to browse and purchase products online
- process of fulfilling an online order by delivering it
- process of returning a purchased item online
Down
- detailed description of a product listed online
- positive online review left by a satisfied customer
- online marketplace where sellers and buyers connect
- discounts offered online to attract customers
- secure online payment method using a credit card
- person who influences buying decisions through online reviews
- images used online to showcase products
14 Clues: short for "electronic commerce" • images used online to showcase products • process of returning a purchased item online • discounts offered online to attract customers • detailed description of a product listed online • online advertisements targeted to specific users • secure online payment method using a credit card • ...
Internet Safety Crossword 2023-04-20
Across
- a part of a computer system or network which is made to block unwanted access
- the state of being free from public attention
- a piece of information needed to log in to websites
- information made available by a website
- never share personal information online
- unwanted messages
- bulling done over the internet
- facts given about something or someone
Down
- someone that hacks
- websites and apps that enable users to create and share content EX.SnapChat
- a world wide computer network
- the state of being protected against the criminal use of electronic data
- like a cold for your computer
- be careful what you make public
14 Clues: unwanted messages • someone that hacks • a world wide computer network • like a cold for your computer • bulling done over the internet • be careful what you make public • facts given about something or someone • information made available by a website • never share personal information online • the state of being free from public attention • ...
Career Clusters Crossword 2024-12-20
Across
- Promotes whole health in individuals through an array of services
- Focuses on administration, strategic planning, and entrepreneurship
- Designing and executing the built environment
- Encompasses roles in local, state, and federal governments
- Movement of goods over air, ground, and water
Down
- Fostering learning from early-childhood to adulthood
- Supports plant and animal based industries
- Promoting products and brands
- Developing digital systems such as AI, data analytics, and cybersecurity
- Renewable fuel production, power generation, utilities
- Includes services related to food, travel, and lodging
- Aims to produce high quality goods
- Banking, lending, corporate, debt management
- Includes film, fashion, journalism, interior design, and more
14 Clues: Promoting products and brands • Aims to produce high quality goods • Supports plant and animal based industries • Banking, lending, corporate, debt management • Designing and executing the built environment • Movement of goods over air, ground, and water • Fostering learning from early-childhood to adulthood • Renewable fuel production, power generation, utilities • ...
Information Management 2025-09-23
Across
- Identifying risks and taking precautions to avoid them.
- Anything valuable that isn’t natural.
- A system that supports functions of Information Management.
- Anything created with someone’s mind.
Down
- The protection of networks, and data.
- A business that involves people, processes that collects data.
- An unbiased inspection to review safety, integrity, and accuracy of information.
- The accuracy of data.
- A practice not knowing outside the company.
9 Clues: The accuracy of data. • The protection of networks, and data. • Anything valuable that isn’t natural. • Anything created with someone’s mind. • A practice not knowing outside the company. • Identifying risks and taking precautions to avoid them. • A system that supports functions of Information Management. • ...
UNODC TOT Crossword 2025-11-11
Across
- The hackers we aim to defend against
- The regional center name abbreviation under UNODC
- The brilliant course instructor guiding us
- The mandatory course we completed before the TOT
Down
- The country hosting our training and collaboration
- The field our expertise revolves around
- The second participating institution in the training
- The center in Doha where the TOT course is conducted
- The first participating institution in the training
9 Clues: The hackers we aim to defend against • The field our expertise revolves around • The brilliant course instructor guiding us • The mandatory course we completed before the TOT • The regional center name abbreviation under UNODC • The country hosting our training and collaboration • The first participating institution in the training • ...
TECHNOLOGY 2025-01-29
Across
- easy to use or understand
- the use of machines to perform tasks without human intervention
- knowledgeable about modern technology
- the trail of data left by users on the internet
- a small electronic device with a specific function
Down
- measures taken to protect systems from cyber threats
- an important discovery or development
- introducing new ideas or methods
- extremely modern and advanced
- Intelligence (AI) the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • an important discovery or development • knowledgeable about modern technology • the trail of data left by users on the internet • a small electronic device with a specific function • measures taken to protect systems from cyber threats • ...
17 Miftahul Huda 8i 2025-10-16
Across
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Memuat ulang halaman web agar tampil terbaru.
- Program berbahaya yang bisa merusak sistem komputer.
- Salinan data untuk mencegah kehilangan.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
Down
- Penanda halaman web agar mudah dikunjungi lagi.
- Perlindungan sistem komputer dari serangan digital.
- Proses menampilkan gambar atau halaman web di layar.
- Jalan pintas untuk membuka program atau file cepat.
10 Clues: Salinan data untuk mencegah kehilangan. • Memuat ulang halaman web agar tampil terbaru. • Penanda halaman web agar mudah dikunjungi lagi. • Perlindungan sistem komputer dari serangan digital. • Jalan pintas untuk membuka program atau file cepat. • Program untuk mengatur dan mempercepat unduhan file. • Proses menampilkan gambar atau halaman web di layar. • ...
Career Focus 2 2025-11-05
Across
- Core skill that helps you calculate trade measurements
- A common Registered Training Organisation in Australia
- Major regional NSW university, abbr.
- OUTLOOK An industry's future demand for workers
- A person undertaking structured, paid training, often in non-trade areas
- The national system of qualifications (Australian Qualifications Framework)
- ETHIC The personal quality behind motivation and drive
Down
- The general direction of your working life
- Sector that includes software, data and cybersecurity roles
- A typical trade apprenticeship.
10 Clues: A typical trade apprenticeship. • Major regional NSW university, abbr. • The general direction of your working life • OUTLOOK An industry's future demand for workers • Core skill that helps you calculate trade measurements • A common Registered Training Organisation in Australia • ETHIC The personal quality behind motivation and drive • ...
TIAA - SMT Crossword 2024-09-19
7 Clues: TIAA strategic partner • CS&T Drive24 initiative • First name of a T3CON presenter • Female associates and allies BRG • TIAA office location that is closing • agile, cybersecurity, data, AI and emerging tech • One of 5 Latin American countries that celebrates their independence on sept 15
AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06
Across
- Use of technologies to improve accuracy.
- Another word for difficulties experienced.
- Increasing use of online and cloud based tools increases this item.
Down
- One of the benefits of ESG reporting.
- Whats new in the industry?
- New technology used by companies for financial reporting.
- Profession being explored.
7 Clues: Whats new in the industry? • Profession being explored. • One of the benefits of ESG reporting. • Use of technologies to improve accuracy. • Another word for difficulties experienced. • New technology used by companies for financial reporting. • Increasing use of online and cloud based tools increases this item.
Cybersecurity Awareness Month 2023-09-20
Across
- Personally Identifiable Information
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- Type of malware that threatens to expose information unless a payment is made
- Health Insurance Portability and Accountability Act
- An email that tricks you into giving up your passphrase
Down
- A weakness in a program or system that can be exploited
- Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
- CWRU classifies information as: public, internal-use, and _______
- Install operating system security ________ regularly
- The process of changing plain text to cipher text using an algorithm
- A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems
11 Clues: Personally Identifiable Information • Health Insurance Portability and Accountability Act • Install operating system security ________ regularly • A weakness in a program or system that can be exploited • An email that tricks you into giving up your passphrase • CWRU classifies information as: public, internal-use, and _______ • ...
Meet UAlbany 2023-07-26
Across
- Nonprofit who manages the UAlbany ID Card Office
- The last C in CEHC stands for
- Online platform for mandatory compliance trainings
- UAlbany's free safety app for your smartphone
- The number of libraries on the UAlbany Uptown Campus
- The Great Dane
- Renowned American architect and designer of main campus
- Symbol of commitment to Latina/o student success
Down
- Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
- College of Arts &
- Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
- Colonial, Dutch, State, and Indigenous
- TAS stands for? Hint: $$
13 Clues: The Great Dane • College of Arts & • TAS stands for? Hint: $$ • The last C in CEHC stands for • Colonial, Dutch, State, and Indigenous • UAlbany's free safety app for your smartphone • Nonprofit who manages the UAlbany ID Card Office • Symbol of commitment to Latina/o student success • Online platform for mandatory compliance trainings • ...
CIA 2025-05-08
Across
- You can make up to _________ a year
- The CIA helps students develop mission _____ while finishing their degrees
- You must take a _________ security clearance process.
- To serve you need to be a U.S. ________ and have a bachelors degree
- It was created to coordinate the nations _______ activities
Down
- Headquarters is located in Langley ______
- Some careers are analysis, auditing, ________, and engineering
- It doesn´t operate with traditional __________
- The CIA was founded in _______
- How was the CIA founded_______
- CIA recruits through their online portal __________
- CIA serves the ______________
- The CIA gathers and ________ intelligence about foreign countries
13 Clues: CIA serves the ______________ • The CIA was founded in _______ • How was the CIA founded_______ • You can make up to _________ a year • Headquarters is located in Langley ______ • It doesn´t operate with traditional __________ • CIA recruits through their online portal __________ • You must take a _________ security clearance process. • ...
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Sip & Solve 2025-06-06
Across
- Camille’s birthday month
- Aydens birthday month
- Ayden’s College Acronym
- Couples favorite soda
- How many years have the couple been together
- What was Camille’s childhood nickname
- Bride’s maiden name
- Where the couple got engaged
- Couples first date
- Best Man
- How many months apart in age is the couple
- Name of Camille’s oldest friend
- Aydens current general profession
- Camille’s college degree
- First concert the couple attended together
- Aydens zodiac sign
Down
- Camille’s favorite TV show
- Camille’s favorite color
- Aydens position in football
- What month Ayden proposed
- Groom’s middle name
- Maid of Honor
- Ayden & Camille’s high school mascot
- Bride’s new last name
- Town Ayden & Camille grew up in
- Who said I love you first
- Color of Ayden’s eyes
- Grooms favorite fast food restaurant
- Camille’s College Acronym
29 Clues: Best Man • Maid of Honor • Couples first date • Aydens zodiac sign • Groom’s middle name • Bride’s maiden name • Aydens birthday month • Couples favorite soda • Bride’s new last name • Color of Ayden’s eyes • Ayden’s College Acronym • Camille’s birthday month • Camille’s favorite color • Camille’s college degree • What month Ayden proposed • Who said I love you first • Camille’s College Acronym • ...
Sarah and Liam's wedding 2025-07-10
Across
- The month they first met
- The country they visited last summer
- The month the couple got engaged
- The first movie they watched as a couple
- The city they met in
- What did the groom study in college
- Where did the proposal happen
- Sarah's middle name
- The flavor of their wedding cake
- number of pets the couple has
- The stone in the engagement ring
Down
- The color of the bridesmaid dresses
- The street Sarah and Liam call home
- The bride's maiden name
- How many years the couple has been together
- Their first dance song
- First concert they saw together
- name of Sarah's Maid of Honor
- Sarah's star sign
- The instrument the groom played in high school
- The name of their dog
- Name of the Best Man
22 Clues: Sarah's star sign • Sarah's middle name • The city they met in • Name of the Best Man • The name of their dog • Their first dance song • The bride's maiden name • The month they first met • name of Sarah's Maid of Honor • Where did the proposal happen • number of pets the couple has • First concert they saw together • The month the couple got engaged • The flavor of their wedding cake • ...
WHAT LIES AHEAD 2025-11-20
Across
- New alloys or concrete that repairs itself.
- Very large, rapidly growing cities (50M+).
- Urban areas using technology for efficiency.
- Clean, very inexpensive nuclear energy.
- New, wealthy areas separate from declining cities.
- The engineering that makes all structures work together.
- Robotic clothing that helps workers.
- Machines' ability to make decisions and automate design.
- The issue of public money for infrastructure.
- Very fast train in vacuum tubes.
Down
- The large amounts of information from sensors.
- A structure's ability to resist disasters.
- Environmental change affecting cities
- Means of transport that can be automated (driverless).
- Small unmanned aircraft for delivery or building.
- Protection against hacking of connected systems.
- Network of sensors that exchange data in the infrastructure.
- Building and public works.
- Small devices to monitor infrastructure health.
- Non-fossil resources like solar or fusion
20 Clues: Building and public works. • Very fast train in vacuum tubes. • Robotic clothing that helps workers. • Environmental change affecting cities • Clean, very inexpensive nuclear energy. • Non-fossil resources like solar or fusion • A structure's ability to resist disasters. • Very large, rapidly growing cities (50M+). • New alloys or concrete that repairs itself. • ...
PROFESI TKJ 2025-05-03
Across
- Orang yang bertugas memasang dan memelihara jaringan komputer
- Orang yang menulis dan mengembangkan kode perangkat lunak
- Orang yang memperbaiki dan merakit komputer
- Pembuat dan pengelola situs web
- Pengelola dan pengawas sistem server dalam sebuah jaringan
Down
- Ahli yang merancang dan mengelola sistem jaringan skala besar
- Profesional yang menjaga keamanan jaringan dan data digital
- Orang yang memasang perangkat dan kabel jaringan
- Petugas yang memberikan bantuan teknis kepada pengguna komputer
- Penasihat teknis dalam bidang teknologi informasi untuk perusahaan
10 Clues: Pembuat dan pengelola situs web • Orang yang memperbaiki dan merakit komputer • Orang yang memasang perangkat dan kabel jaringan • Orang yang menulis dan mengembangkan kode perangkat lunak • Pengelola dan pengawas sistem server dalam sebuah jaringan • Profesional yang menjaga keamanan jaringan dan data digital • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
work 2024-03-22
Across
- Novel ideas and creativity.
- Administration and control of technological resources.
- Organization and oversight of tasks to achieve objectives.
- Advanced academic qualification.
- Examination and interpretation of information.
- Protection of digital systems and data.
- Long-term planning for achieving goals.
Down
- Investigation into government or organizational policies.
- Acronym for a specific department or field.
- Digital Academy Educational institution focusing on technology.
- Rules and guidelines governing behavior or activities.
- Possibly an acronym for a certain system or process.
- Techniques and processes for conducting studies.
- Sustainable use of ocean resources for economic growth.
- Government framework for science, technology, and innovation.
- Conference or meeting on a national scale.
- Legal rights over creations of the mind.
- Mandates Responsibilities of a certain organization.
- 2024 Event showcasing science, technology, and innovation in a specific year.
19 Clues: Novel ideas and creativity. • Advanced academic qualification. • Protection of digital systems and data. • Long-term planning for achieving goals. • Legal rights over creations of the mind. • Conference or meeting on a national scale. • Acronym for a specific department or field. • Examination and interpretation of information. • ...
Classwork Crossword Puzzle 2021-09-20
Challenges Related to Community Safety in the Philippines 2024-02-29
Across
- Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
- Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
- and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
- is responsible for fire prevention, suppression, and investigation.
- is the primary law enforcement agency in the country.
- Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
- the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
- is responsible for disaster preparedness, response, and recovery.
- With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
- implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).
10 Clues: is the primary law enforcement agency in the country. • is responsible for disaster preparedness, response, and recovery. • is responsible for fire prevention, suppression, and investigation. • the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or • ...
FOP 2023-04-01
Across
- SOCA’s ________ department is the first point of contact with outside organizations.
- DISM’s SIG.
- Gryphons plan & organize ______-___-___ competitions.
- SPAI attended and presented at the ____ Conference.
- SEED hosts the ___-___-Series.
- SOCA is In charge of ________ relations.
- ______ organized the SOC Open House.
Down
- Gryphons aims to promote ________ to students that are passionate about it.
- SPAI created its own Project _____.
- SPAI is part of the AI Singapore Student ____ Group.
- SEED stands for Sharing, _______, Enriching, Development.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
- SOCC is in charge of maintaining and building ________ relations.
- League Programming competition only for freshmen.
- SOCC organized Freshman Orientation ______.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • SOCC organized Freshman Orientation ______. • League Programming competition only for freshmen. • SPAI attended and presented at the ____ Conference. • SPAI is part of the AI Singapore Student ____ Group. • ...
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Blue Print 2024-09-11
Across
- Person who flies airplanes for a job
- Person who promotes products or brands online
- Animal expert who might work at a wildlife park
- Person who creates new computer and console games
- Cook who prepares food for big events
- Therapist who teaches exercises to heal injuries
- Creator of dance routines for shows or videos
- Writer who reports on the latest clothing trends
Down
- Computer expert who protects against online threats
- Someone who runs for office to make laws
- Designer of bridges, roads, and buildings
- Problem-solver who works to protect nature
- Person in charge of making movies
- Sound expert who helps make songs in a studio
14 Clues: Person in charge of making movies • Person who flies airplanes for a job • Cook who prepares food for big events • Someone who runs for office to make laws • Designer of bridges, roads, and buildings • Problem-solver who works to protect nature • Sound expert who helps make songs in a studio • Person who promotes products or brands online • ...
Oklahoma Computer Science 2025-05-13
Across
- A tool to organize, calculate, and analyze data
- A unique number for each device on a network
- Programs and apps that run on a computer
- A list of steps to solve a problem
- A group of connected computers that share information
- Information that can be collected and used
- Finding and fixing errors in code
Down
- Protecting devices and data from digital threats
- A device that sends data between computers and networks
- Code that repeats instructions
- A value in a program that can change
- Technology doing tasks without human help
- Showing only specific data based on rules
- The physical parts of a computer
14 Clues: Code that repeats instructions • The physical parts of a computer • Finding and fixing errors in code • A list of steps to solve a problem • A value in a program that can change • Programs and apps that run on a computer • Technology doing tasks without human help • Showing only specific data based on rules • Information that can be collected and used • ...
btyetrails4 2025-02-25
Across
- Protecting data from unauthorized access
- A system software managing computer hardware
- The process of transferring data from one device to another
- Permanently removing files from a storage device
Down
- A type of scam email designed to steal user data
- Storing data over the internet instead of local systems
- A web address used to access websites
- A software that helps navigate web pages
- Company that provides internet access
9 Clues: A web address used to access websites • Company that provides internet access • Protecting data from unauthorized access • A software that helps navigate web pages • A system software managing computer hardware • A type of scam email designed to steal user data • Permanently removing files from a storage device • Storing data over the internet instead of local systems • ...
AI Cyberspace 2024-10-15
Across
- Political factors influencing behavior in cybersecurity
- Measures to protect against cyber threats.
- AI enabling systems to learn from data.
- Total points vulnerable to cyber attacks.
Down
- Actions in cyberspace for security or attack.
- Actions to exploit vulnerabilities in systems.
- Intelligence Machines simulating human intelligence processes.
7 Clues: AI enabling systems to learn from data. • Total points vulnerable to cyber attacks. • Measures to protect against cyber threats. • Actions in cyberspace for security or attack. • Actions to exploit vulnerabilities in systems. • Political factors influencing behavior in cybersecurity • Intelligence Machines simulating human intelligence processes.
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Tecnologia de la Informacion 2023-05-06
Across
- Implica en los trabajos en tecnología de la información
- La TI admite muchas funciones comerciales y ayuda a?
- Una de las carreras que abarca la TI
- Es un tipo de tecnología de información
- Sigla de la tecnología de información
- Las empresas globales utilizan la tecnología de información para?
Down
- ¿Qué es la tecnología de la información?
- ¿La tecnología de información es responsable de?
- ¿Porqué es necesaria la tecnología de la información?
9 Clues: Una de las carreras que abarca la TI • Sigla de la tecnología de información • Es un tipo de tecnología de información • ¿Qué es la tecnología de la información? • ¿La tecnología de información es responsable de? • La TI admite muchas funciones comerciales y ayuda a? • ¿Porqué es necesaria la tecnología de la información? • ...
business 2025-05-22
Across
- Business model: selling directly to consumers (Business).
- Leaving a company, often measured in percentages (HR).
- A revolutionary idea that changes the market (Business).
- Strategy that compares performance with top competitors (Business).
Down
- Security that protects systems and data (Tech).
- Design that improves how people interact with a product (Tech).
- Bringing new workers into a company smoothly (HR).
- Total money earned (Finance).
- Group of people you market your product to (Marketing).
9 Clues: Total money earned (Finance). • Security that protects systems and data (Tech). • Bringing new workers into a company smoothly (HR). • Leaving a company, often measured in percentages (HR). • Group of people you market your product to (Marketing). • A revolutionary idea that changes the market (Business). • Business model: selling directly to consumers (Business). • ...
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Cyber Security Puzzle 2024-10-21
Across
- term used for various pop-up advertisements that show up on your computer or mobile device.
- a malware designed to deny a user or organization access to files on their computer
- what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
- specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
- the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
- refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
- A worm in cybersecurity is a type of malicious software that spreads across computer networks
- A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user
9 Clues: a malware designed to deny a user or organization access to files on their computer • term used for various pop-up advertisements that show up on your computer or mobile device. • A worm in cybersecurity is a type of malicious software that spreads across computer networks • ...
CYBERSECURITY PUZZLE 2023-09-13
7 Clues: Do not visit • Shady..do not click! • Dishonest offer online • Don't ever share this to strangers! • Always change this throughout accounts! • Be careful when doing this on social media! • Publishing someone's private information on the internet
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity crossword 2023-03-17
Across
- Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- Find a synonym of preempt
Down
- What is the naming convention for ecrime category ?
- What is 84 minutes the average time for ?
- What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- Which type of accounts are mainly targeted by adversaries ?
7 Clues: Find a synonym of preempt • What is 84 minutes the average time for ? • What is the naming convention for ecrime category ? • Which type of accounts are mainly targeted by adversaries ? • Which tool can reveal hidden relationships and identify attack paths within an AD environment ? • ...
Cybersecurity Crossword 2022-05-19
Across
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- establishes a secure connection between you and the internet
- the practice of protecting critical systems and sensitive information from digital attacks.
Down
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a standalone malware computer program that replicates itself in order to spread to other computers
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
7 Clues: establishes a secure connection between you and the internet • the practice of protecting critical systems and sensitive information from digital attacks. • a set of instructions, data or programs used to operate computers and execute specific tasks • a standalone malware computer program that replicates itself in order to spread to other computers • ...
Cybersecurity Crossword 2023-11-10
Across
- What type of hacker exploits systems for personal gain and bad intention
- What is used to hide messages so only authorized people can understand?
- What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- Using deceptive measures to manipulate someone in disclosing personal information
- Data, information , device anything that is of value
- Acquiring unauthorized access to system or data
- An incident where attackers steal information without authorization?
7 Clues: Acquiring unauthorized access to system or data • Data, information , device anything that is of value • An incident where attackers steal information without authorization? • What is used to hide messages so only authorized people can understand? • What type of hacker exploits systems for personal gain and bad intention • ...
The Voice: October 7th, 2024 2024-10-07
Across
- Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
- What _____ look like in Canada today.
- Limited spots left for this event!
- October is what awareness month?
Down
- One of the highlighted members this week.
- Since 2012, the Chamber has advocated for improved what?
- EcoBrooks _____ Award.
7 Clues: EcoBrooks _____ Award. • October is what awareness month? • Limited spots left for this event! • What _____ look like in Canada today. • One of the highlighted members this week. • Since 2012, the Chamber has advocated for improved what? • Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • a sense that a scammer creates when rushing you • The process of verifying a claimed identity of a user or device
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Should be tested monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Should be tested monthly • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Digital Health 2025-02-26
Across
- Large datasets analyzed to reveal patterns and trends.
- On-demand computing services over the internet.
- A secure, decentralized technology used for data integrity.
- Technology simulating human intelligence processes.
- Remote diagnosis and treatment of patients using technology.
- Ability of different systems to exchange and use information.
Down
- Protection of digital systems from attacks and threats.
- Use of digital technologies to improve healthcare delivery.
- Digital version of a patient's paper chart.
- AI technique that allows systems to learn from data.
10 Clues: Digital version of a patient's paper chart. • On-demand computing services over the internet. • Technology simulating human intelligence processes. • AI technique that allows systems to learn from data. • Large datasets analyzed to reveal patterns and trends. • Protection of digital systems from attacks and threats. • ...
IT 2024-11-28
Across
- Field focused on protecting data from cyberattacks.
- What does IoT stand for?
- Common programming language used for AI.
- Process of identifying and fixing software issues.
Down
- A key method for securing data online.
- Smart system connecting everyday devices.
- Main component of a computer system's physical setup.
7 Clues: What does IoT stand for? • A key method for securing data online. • Common programming language used for AI. • Smart system connecting everyday devices. • Process of identifying and fixing software issues. • Field focused on protecting data from cyberattacks. • Main component of a computer system's physical setup.
AI in education 2024-06-05
Across
- Protection of personal information.
- Lack of neutrality, prejudice.
- Guidelines or principles governing proper conduct.
- Actions taken to use something wrongly or inappropriately.
- The quality of being honest and having strong moral principles.
- The state of being clear and open.
Down
- The protection of data from unauthorized access or corruption.
- The state of being answerable or responsible.
- Practices designed to ensure secure data and systems.
- The practice of keeping information secret to prevent unauthorized access.
10 Clues: Lack of neutrality, prejudice. • The state of being clear and open. • Protection of personal information. • The state of being answerable or responsible. • Guidelines or principles governing proper conduct. • Practices designed to ensure secure data and systems. • Actions taken to use something wrongly or inappropriately. • ...
Comms & Media Crossword - October Edition 2022-10-04
Across
- This company was recently in news for launching 5G Lab-as-a-service
- Leading telecom equipment provider, & our client
- Virtual representation of a real-world physical system
- One of the most important digital challenges today
- Continuous Expenditure that companies incur
Down
- Satoshi Nakamoto was the pioneer behind this technology
- Software based technology used in Telecom
- This company launched India’s 1st multiplex in Metaverse
- Telecom players fight for this
- boAt had a K-pop concert on this platform
10 Clues: Telecom players fight for this • Software based technology used in Telecom • boAt had a K-pop concert on this platform • Continuous Expenditure that companies incur • Leading telecom equipment provider, & our client • One of the most important digital challenges today • Virtual representation of a real-world physical system • ...
MEKATRONIK T3 2024-05-24
Across
- merupakan satu teras utama revolusi industri 4.0
- satu sistem susunan dan sambungan fizikal komponen dalam satu litar
- merupakan contoh bagi sistem kawalan
- LITAR merupakan salah satu aspek penning dalam product mekatronik
- merupakan salah satu ujian kefungsian
- ..........manufacturing Hialeah pembuatan bah mental
Down
- berfungsi membekalkan arus bagi membolehkan peranti berfungsi
- ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
- ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
- jurutera jepun yang memperkenalkan konsep mekatronik
10 Clues: merupakan contoh bagi sistem kawalan • merupakan salah satu ujian kefungsian • merupakan satu teras utama revolusi industri 4.0 • ..........manufacturing Hialeah pembuatan bah mental • jurutera jepun yang memperkenalkan konsep mekatronik • berfungsi membekalkan arus bagi membolehkan peranti berfungsi • ...
Globalization and Technology 2025-02-06
Across
- Transaction on the internet like Amazon Pay, Paypal etc
- A global network the world uses for communications and other features
- A period of hundred years
- A system that gives music and transmits audio
- The act of buying and selling goods
- An Act of introducing new ideas or products
Down
- Process of exchanging Information through any medium
- A simulated experience using computer technology used by headset
- Moving things from one place to another
- Measures taken to protect a computer
10 Clues: A period of hundred years • The act of buying and selling goods • Measures taken to protect a computer • Moving things from one place to another • An Act of introducing new ideas or products • A system that gives music and transmits audio • Process of exchanging Information through any medium • Transaction on the internet like Amazon Pay, Paypal etc • ...
03 Almer Billie prabawa 2025-10-17
Across
- Memuat ulang halaman web agar tampil terbaru.
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Lembar atau jendela kecil dalam browser untuk membuka situs lain.
- menampilkan gambar atau halaman web di layar.
- Perlindungan sistem komputer dari serangan digital.
Down
- Tempat menulis alamat situs web (URL) di browser.
- Tab baru untuk membuka halaman web lain.
- Memperbarui tampilan halaman yang sedang dibuka.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
10 Clues: Tab baru untuk membuka halaman web lain. • Memuat ulang halaman web agar tampil terbaru. • menampilkan gambar atau halaman web di layar. • Memperbarui tampilan halaman yang sedang dibuka. • Tempat menulis alamat situs web (URL) di browser. • Perlindungan sistem komputer dari serangan digital. • Program untuk mengatur dan mempercepat unduhan file. • ...
4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02
Across
- The protection of information and systems from cyberattacks
- A threat originating from within an organization
- The overall protection of computer systems and data
- A weakness in a computer system that can be exploited
- The transfer of information between devices
Down
- The act of stealing or manipulating data
- Unintentional harm caused to data or systems
- A threat originating from the internet
- The practice of illegally gaining access to a computer system
9 Clues: A threat originating from the internet • The act of stealing or manipulating data • The transfer of information between devices • Unintentional harm caused to data or systems • A threat originating from within an organization • The overall protection of computer systems and data • A weakness in a computer system that can be exploited • ...
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
Cybersecurity Month 2023-09-27
Across
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
- Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
- A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
- A form of malware used by hackers to spy on you and your computer activities
- Any technology, be it software or hardware, used to keep intruders out
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications
7 Clues: Any technology, be it software or hardware, used to keep intruders out • A form of malware used by hackers to spy on you and your computer activities • Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
pasar uang dan ekonomi digital 2024-02-28
Across
- sektor pendukung ekonomi digital
- contoh E-Commerce yang ada di Indonesia
- sumber pendanaan dalam pasar uang yang berupa utang dagang
- karakteristik pasar uang
- peluang bisnis ekonomi digital
Down
- pekerjaan masyarakat Indonesia dengan adanya media online
- masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
- ekonomi digital sangat efisien
- salah satu memanfaatkan ekonomi digital adalah membuat
- karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
- kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
- berperan sebagai perantara di antara pelaku dalam Pasar Uang
- salah satu fungsi pasar uang
- instrumen pasar uang yang diteritkan Bank Umum
- pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga
15 Clues: karakteristik pasar uang • salah satu fungsi pasar uang • ekonomi digital sangat efisien • peluang bisnis ekonomi digital • sektor pendukung ekonomi digital • contoh E-Commerce yang ada di Indonesia • instrumen pasar uang yang diteritkan Bank Umum • salah satu memanfaatkan ekonomi digital adalah membuat • pekerjaan masyarakat Indonesia dengan adanya media online • ...
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
TEMA 2 2025-10-23
Across
- Mata uang kripto pertama di dunia.
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- Sistem keamanan siber untuk perlindungan data.
- Teknologi dasar dari mata uang kripto.
- Kegiatan ekonomi melalui media internet.
- Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- Aplikasi belanja online yang berwarna oranye.
- Transaksi keuangan melalui jaringan komputer disebut ...
- Sistem pembayaran tanpa uang tunai.
- Bentuk pasar digital tempat jual beli online.
Down
- Mata uang digital yang populer dan terdesentralisasi.
- Perusahaan teknologi keuangan disebut ...
- Mata uang digital resmi dari bank sentral disebut ...
- kredit Alat pembayaran berbentuk kartu dari bank.
- shopping Proses jual beli yang terjadi secara online.
- Teknologi virtual yang berkembang bersama ekonomi digital.
- Metode pembayaran dengan memindai kode.
- Salah satu dompet digital terkenal di Indonesia.
- Salah satu e-wallet milik Gojek.
- banking Layanan bank yang sepenuhnya berbasis internet.
20 Clues: Salah satu e-wallet milik Gojek. • Mata uang kripto pertama di dunia. • Sistem pembayaran tanpa uang tunai. • Teknologi dasar dari mata uang kripto. • Metode pembayaran dengan memindai kode. • Kegiatan ekonomi melalui media internet. • Perusahaan teknologi keuangan disebut ... • Aplikasi belanja online yang berwarna oranye. • Bentuk pasar digital tempat jual beli online. • ...
KeyW Crossword 2017-01-19
Across
- Radio Detection and Ranging
- KeyW non-profit organization abbreviated
- KeyW's colors
- What is the name of our newsletter
- How many bridges connect Key West to Florida main land
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our mascot
- Parrot Ball location
- What color is our KeyW van
- What type of bird is our mascot
Down
- When at work, what must you always carry
- Protection of networks, computers, programs, and data from attack
- KeyW's best location
- Time sheet
- KeyW CEO
- What is the surname of KeyW's founder
- Which food truck offers the best cheese steaks
- Applying statistical analysis to data which has a geographical or spatial aspect
- What month was KeyW founded
- How many buildings does the Severn location have
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • Radio Detection and Ranging • What month was KeyW founded • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07
Across
- Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
- O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
- Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
- Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
- Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
- Dunyodagi eng yirik e-tijorat platformalaridan biri?
- Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
- Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
- Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
- Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
- Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
- Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
- Elektron hukumat tizimi bo‘yicha yetakchi davlat?
- Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
- Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
- Sun’iy intellekt sohasida yetakchi davlatlardan biri?
- Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
- Dunyodagi eng yirik texnologik kompaniyalardan biri?
- O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
- Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?
20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat? • Dunyodagi eng yirik e-tijorat platformalaridan biri? • Dunyodagi eng yirik texnologik kompaniyalardan biri? • Elektron tijorat bo‘yicha yetakchi davlatlardan biri? • Sun’iy intellekt sohasida yetakchi davlatlardan biri? • Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma? • ...
cpsc4240 2024-10-31
Across
- legal license that allows you to use and edit a product
- protecting systems and networks from digital attacks
- type of attack that can be caused by a nuke
- linuxdef
- number that determines process priority
- each one has a unique PID
- leaked the docs
- command to add user
- command to open this user is su
- command to control log settings
- partition that allows for temp storage
- link that points to another file
Down
- only letting users access what they need
- feature that logs metadata
- read write execute
- having many security layers
- system that has both ipv4 and ipv6
- file that discards all data written to it
- type of link that creates a direct copy
- file that stores password hashes
- sets file permission upon create
- process that creates child
- command to run a privileged command
- attaching a filesystem to another
24 Clues: linuxdef • leaked the docs • read write execute • command to add user • each one has a unique PID • feature that logs metadata • having many security layers • process that creates child • command to open this user is su • command to control log settings • file that stores password hashes • sets file permission upon create • link that points to another file • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Risiko ekonomi digital adalah kebocoran
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Fintech merupakan singkatan dari
- → Perusahaan baru yang berbasis teknologi disebut
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Keamanan transaksi online dikenal dengan istilah
- → Masa depan ekonomi digital bergantung pada literasi
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Contoh aplikasi fintech di Indonesia adalah
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
rahef isna 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
Queenbee Cybersecurity 2025-03-17
Across
- An hacker sends a ___________ email requesting the victim for sensitive information
- A _________ access by a third party is called a cyber attack
- Trojan is an example of __________ attack
Down
- Users need to use unique __________ passwords to strengthen defence against attacks
- ________ are dummy computers systems to deceive attackers
- A virtual wall between the computer and the internet is called as _______
- A person who performs a cybersecurity attack is called a _______
7 Clues: Trojan is an example of __________ attack • ________ are dummy computers systems to deceive attackers • A _________ access by a third party is called a cyber attack • A person who performs a cybersecurity attack is called a _______ • A virtual wall between the computer and the internet is called as _______ • ...
Cybersecurity Crossword 2021-11-14
Across
- Proving your identity
- Encrypting files and holding them hostage for money
Down
- A horse with a surprise
- software designed to corrupt or steal information
- Pretending to be someone you are not to extract information out of someone
- A denial of service attack targets this
- a brute force attack takes a long time to work on this
7 Clues: Proving your identity • A horse with a surprise • A denial of service attack targets this • software designed to corrupt or steal information • Encrypting files and holding them hostage for money • a brute force attack takes a long time to work on this • Pretending to be someone you are not to extract information out of someone
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crossword 2023-07-25
Across
- Unauthorized individuals gaining physical access through closely following authorized personnel
- A form of business risk resulting from cyberattacks or data breache
Down
- Suspicious emails
- Another word for tailgating
- Unexpected behavior exhibited by software applications, such as crashes could be caused by
- Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
- could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.
7 Clues: Suspicious emails • Another word for tailgating • A form of business risk resulting from cyberattacks or data breache • Unexpected behavior exhibited by software applications, such as crashes could be caused by • Unauthorized individuals gaining physical access through closely following authorized personnel • ...
CyberSecurity Awareness 2025-07-23
7 Clues: Multi-____ Authentication • being hidden from public view • conversion of information to code • "Enter your username and ______." • Security Assurance for the Federal Reserve • security protocols; organized into 'families' • fake correspondence sent by a 'Nigerian Prince'
