cybersecurity Crossword Puzzles

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

cruciverba cybersecurity 2025-11-17

cruciverba cybersecurity crossword puzzle
Across
  1. : Copia di sicurezza dei dati
  2. : Trasformare i dati in codice per proteggerli
  3. : Chiave segreta per accedere a un account
Down
  1. : Software dannoso che infetta il computer
  2. : Tentativo di rubare dati fingendosi qualcuno di fidato via email
  3. : Protezione che filtra il traffico di rete
  4. : Rete privata virtuale che protegge la connessione

7 Clues: : Copia di sicurezza dei dati: Software dannoso che infetta il computer: Chiave segreta per accedere a un account: Protezione che filtra il traffico di rete: Trasformare i dati in codice per proteggerli: Rete privata virtuale che protegge la connessione: Tentativo di rubare dati fingendosi qualcuno di fidato via email

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a setting you turn on to camouflage yourself from internet scammers
  2. this is where you install games and streaming services
  3. a streaming service that is very well known
  4. people that lure people into giving them there bank details
  5. a way of protecting you from hackers
Down
  1. a website in which you order from and it’s delivered to your door
  2. an answer to all your questions
  3. watch videos from your favourite content creator
  4. tweet tweet
  5. a social media app with a blue logo
  6. a corporation run by bill gates
  7. some the would be powered by electricity

12 Clues: tweet tweetan answer to all your questionsa corporation run by bill gatesa social media app with a blue logoa way of protecting you from hackerssome the would be powered by electricitya streaming service that is very well knownwatch videos from your favourite content creatorthis is where you install games and streaming services...

Business Ethics/Cyber Security 2023-09-19

Business Ethics/Cyber Security crossword puzzle
Across
  1. practice of protecting critical systems
  2. work place manners
  3. the number of steps in the decision making process
  4. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
  1. exchange of information between a sender and receiver
  2. these hackers send an email or text with a link to click
  3. guidelines for how a business should conduct themselves
  4. positive internet behavior
  5. a policy users must agree to follow in order to gain internet access
  6. a set of moral principles
  7. the most common form of communication in a business
  8. these hackers ask for money

12 Clues: work place mannersa set of moral principlespositive internet behaviorthese hackers ask for moneypractice of protecting critical systemsthe number of steps in the decision making processthe most common form of communication in a businessexchange of information between a sender and receiverguidelines for how a business should conduct themselves...

TDD 2023-09-19

TDD crossword puzzle
Across
  1. Think before you _____.​
  2. One of the common internet search engine used nowadays.
  3. Do not share your account ______ to anyone.​
  4. We should avoid sharing any _______ news without validating the sources.​
  5. #1 popular social media. CEO – Mark Zuckerberg​
Down
  1. ______ has been recognized as Cybersecurity awareness month.
  2. One of Amcor values.
  3. _______ make human sick as well as computer.​
  4. Operating System
  5. Short form of wireless network.​
  6. ____ your laptop when you are stepping away. You need a key to unlock it.​
  7. They are referred as small insects in mother nature. IT referred them as errors in computer program/system.​

12 Clues: Operating SystemOne of Amcor values.Think before you _____.​Short form of wireless network.​Do not share your account ______ to anyone.​_______ make human sick as well as computer.​#1 popular social media. CEO – Mark Zuckerberg​One of the common internet search engine used nowadays.______ has been recognized as Cybersecurity awareness month....

internet safety 2023-04-19

internet safety crossword puzzle
Across
  1. a part of a computer system or network which is designed to block unwanted access
  2. like a cold for your computer
  3. the state of being protected against the criminal use of electronic data
  4. bulling done over the internet
  5. a person or thing that hacks
  6. a world wide computer network
  7. websites and apps that let users create and share content EX.Snapchat
Down
  1. a piece of information needed to log in to the internet
  2. the state of being free from public attention
  3. be careful what you make public
  4. information made available by a website
  5. facts given to learn about someone or something

12 Clues: a person or thing that hackslike a cold for your computera world wide computer networkbulling done over the internetbe careful what you make publicinformation made available by a websitethe state of being free from public attentionfacts given to learn about someone or somethinga piece of information needed to log in to the internet...

Quality Month Quiz 2022-11-04

Quality Month Quiz crossword puzzle
Across
  1. a type of cybersecurity attack that attempts to steal your information
  2. Plays A VITAL ROLE IN YOUR APPRAISAL
  3. Skill / Knowledge to do a process
  4. Property of accuracy and completeness
  5. are implemented to mitigate the identified risks
  6. Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
  1. Tailgating is also termed as
  2. Portrays the hierarchy in organisation / function
  3. plan to achieve a long-term or overall objective
  4. Non-fulfilment of a requirement
  5. A weakness of an asset or control that could potentially be exploited by one or more threats
  6. How many Quality Management Principle in QMS

12 Clues: Tailgating is also termed asNon-fulfilment of a requirementSkill / Knowledge to do a processPlays A VITAL ROLE IN YOUR APPRAISALProperty of accuracy and completenessHow many Quality Management Principle in QMSplan to achieve a long-term or overall objectiveare implemented to mitigate the identified risks...

Tech Talks: Crossword Edition 2025-08-28

Tech Talks: Crossword Edition crossword puzzle
Across
  1. Structured support to help startups develop and scale
  2. Field involving the design and creation of automated machines
  3. Protecting systems and networks from digital threats
  4. Using fingerprints, facial recognition, or voice for authentication
  5. Technology that uses living organisms or cells to develop products
Down
  1. Testing environment for disruptive technologies
  2. Raising capital from the public to fund innovation projects
  3. High-risk funding enabling tech companies to grow rapidly
  4. Collaborative network of startups, funders, and enablers driving innovation
  5. MOSTI platform certifying local R&D products for procurement
  6. Tech innovation transforming financial services
  7. Unmanned aerial vehicle used in delivery, agriculture, and surveillance

12 Clues: Testing environment for disruptive technologiesTech innovation transforming financial servicesProtecting systems and networks from digital threatsStructured support to help startups develop and scaleHigh-risk funding enabling tech companies to grow rapidlyRaising capital from the public to fund innovation projects...

Zero-Trust 2025-07-23

Zero-Trust crossword puzzle
Across
  1. Zero Trust eliminates ___ ports to reduce attack surface.
  2. – Zero Trust enforces least ___ access to minimize risk.
  3. Every session in a Zero Trust model must be fully ___.
  4. OT compliance standard Secomea adheres to (abbr.).
  5. A secure remote access company built for OT.
  6. Traffic allowed in Zero Trust: ___-only.
Down
  1. Access should only be granted when it is scheduled and ___.
  2. – What Zero Trust replaces: ___ perimeter security.
  3. All users and devices must be continuously ___.
  4. European directive Secomea helps manufacturers comply with (abbr.).
  5. This cybersecurity model assumes no inherent trust: Zero ___.

11 Clues: Traffic allowed in Zero Trust: ___-only.A secure remote access company built for OT.All users and devices must be continuously ___.OT compliance standard Secomea adheres to (abbr.).– What Zero Trust replaces: ___ perimeter security.Every session in a Zero Trust model must be fully ___.– Zero Trust enforces least ___ access to minimize risk....

AI Lesson 2023-03-06

AI Lesson crossword puzzle
Across
  1. A type of machine learning that is modeled after the structure and function of the human brain
  2. data __________
  3. e.g. Siri, Alexa
  4. using machines to perform tasks that are normally done by humans
  5. e.g. fingerprints, facial recognition software
  6. the design, construction, operation and use of robots
  7. AI that learns about knowledge that humans know naturally
Down
  1. using firewalls and antivirus software to prevent computers from being attacked
  2. using large datasets to find patterns and insights
  3. AI that learns and improves from experience by itself
  4. a household that uses internet-connected devices to control appliances
  5. feeling/emotion
  6. a set of instructions that complete a task

13 Clues: data __________feeling/emotione.g. Siri, Alexaa set of instructions that complete a taske.g. fingerprints, facial recognition softwareusing large datasets to find patterns and insightsAI that learns and improves from experience by itselfthe design, construction, operation and use of robotsAI that learns about knowledge that humans know naturally...

Digital Technology 2025-04-26

Digital Technology crossword puzzle
Across
  1. After the pandemic, ____became normal in many industries.
  2. _____ is common in car manufacturing factories today.
  3. _____ forces companies to rethink their strategies.
  4. _____ helps doctors detect diseases earlier.
  5. Some companies practice _____ to hire cheaper labor abroad.
  6. A ____must find new clients to stay successful.
  7. A _____ usually needs to innovate to survive against big companies.
Down
  1. _____ experts are essential to protect sensitive company information.
  2. Many small businesses survive thanks to ____ platforms.
  3. With _____ , you can visit a museum without leaving your house.
  4. ____ reduces the need for repetitive human tasks.
  5. _____ helps banks process transactions faster and more securely.
  6. Laws about the _____ aim to prevent employee burnout.

13 Clues: _____ helps doctors detect diseases earlier.A ____must find new clients to stay successful.____ reduces the need for repetitive human tasks._____ forces companies to rethink their strategies._____ is common in car manufacturing factories today.Laws about the _____ aim to prevent employee burnout....

INFORMATION GOVERNANCE SUMMER FUN 2017-08-08

INFORMATION GOVERNANCE SUMMER FUN crossword puzzle
Across
  1. Coming soon,in May 2018!
  2. New term under GDPR
  3. Increasing threat for us all
  4. Have you filled the new role required under GDPR?
  5. Process which becomes a legal requirement under GDPR
Down
  1. Part of important review by NDG 2016
  2. Mustn't forget this important law for patients
  3. What could happen to to you in 2018 if you steal personal data
  4. Part of revised definition for sensitive personal data under GDPR

9 Clues: New term under GDPRComing soon,in May 2018!Increasing threat for us allPart of important review by NDG 2016Mustn't forget this important law for patientsHave you filled the new role required under GDPR?Process which becomes a legal requirement under GDPRWhat could happen to to you in 2018 if you steal personal data...

Zine Crossword 2022-04-16

Zine Crossword crossword puzzle
Across
  1. Considered to be the first hacker
  2. The website on which anonymous would plan their attacks
  3. The film that produced the famous hacking mask
Down
  1. The protection of information on the internet
  2. One of the colors of the three types of hackers
  3. The headwear associated with hacking
  4. A form of harm done on the internet
  5. Famous hacking group

8 Clues: Famous hacking groupConsidered to be the first hackerA form of harm done on the internetThe headwear associated with hackingThe protection of information on the internetThe film that produced the famous hacking maskOne of the colors of the three types of hackersThe website on which anonymous would plan their attacks

soujanya hazra 2025-06-19

soujanya hazra crossword puzzle
Across
  1. Designed to protect network
  2. Illegal entry into a computer system or network.
  3. the process of 'befriending' children on social media.
  4. Hoaxing or misleading.
  5. It is an act of harming or harassing using information technology in a deliberate manner
Down
  1. Vital Information Resources Under Seize
  2. Any criminal activity intended to harm anyone using the computer.
  3. They do Cybercrime.

8 Clues: They do Cybercrime.Hoaxing or misleading.Designed to protect networkVital Information Resources Under SeizeIllegal entry into a computer system or network.the process of 'befriending' children on social media.Any criminal activity intended to harm anyone using the computer....

Science and Technology 2025-02-11

Science and Technology crossword puzzle
Across
  1. A computer-generated simulation of a three-dimensional environment
  2. The application of scientific knowledge for practical purposes
  3. The branch of technology dealing with robots
  4. Related to genes and heredity
  5. Avoiding depletion of natural resources for long-term balance
Down
  1. Information processed or stored by a computer (
  2. The use of technology to complete tasks with minimal human input
  3. Protection against cyber threats and attacks
  4. A new idea or method

9 Clues: A new idea or methodRelated to genes and heredityProtection against cyber threats and attacksThe branch of technology dealing with robotsInformation processed or stored by a computer (Avoiding depletion of natural resources for long-term balanceThe application of scientific knowledge for practical purposes...

HACKING TERMS 2023-11-13

HACKING TERMS crossword puzzle
Across
  1. Software designed to harm or exploit computer systems
  2. A deliberate attempt to exploit computer systems or networks.
  3. A reward offered for discovering and reporting software bugs
  4. A secret word or phrase used for authentication.
  5. A series of instructions for a computer to execute.
  6. Protective measures against digital threats
Down
  1. Ethical hackers working to improve security
  2. The right to keep personal information and activities confidential.
  3. A weakness or flaw in a system that can be exploited.
  4. The process of converting information into a code for security.

10 Clues: Ethical hackers working to improve securityProtective measures against digital threatsA secret word or phrase used for authentication.A series of instructions for a computer to execute.Software designed to harm or exploit computer systemsA weakness or flaw in a system that can be exploited....

Tech Terms 2023-12-01

Tech Terms crossword puzzle
Across
  1. - Software for accessing and navigating the internet. (7)
  2. - Step-by-step procedure for solving a problem. (8)
  3. Reality - Computer-generated environment that simulates reality. (13)
  4. - Secret code to access a protected system. (8)
  5. - Transfer files from the internet to a computer. (8)
Down
  1. - Measures to protect computer systems from theft or damage. (12)
  2. - Security system that prevents unauthorized access. (8)
  3. - Process of converting data into a code to secure it. (10)
  4. - Portable device with touchscreen features. (10)
  5. - Writing instructions for a computer program. (6)

10 Clues: - Secret code to access a protected system. (8)- Portable device with touchscreen features. (10)- Writing instructions for a computer program. (6)- Step-by-step procedure for solving a problem. (8)- Transfer files from the internet to a computer. (8)- Security system that prevents unauthorized access. (8)...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET crossword puzzle
Across
  1. Lapisan OSI ke 3
  2. topologi jaringan berbentuk bintang
  3. Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
  4. Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
  5. salah satu prinsip keamanan jaringan
Down
  1. mekanisme pertukaran data
  2. kegiatan tata kelola data
  3. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
  4. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  5. Salah satu macam jenis jaringan komputer

10 Clues: Lapisan OSI ke 3mekanisme pertukaran datakegiatan tata kelola datatopologi jaringan berbentuk bintangsalah satu prinsip keamanan jaringanSalah satu macam jenis jaringan komputerperangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)...

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI crossword puzzle
Across
  1. Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
  2. Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
  3. Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
  4. Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
  1. Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
  2. MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
  3. IoT ATAMASINING MA'NOSI
  4. To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
  5. Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
  6. DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI

10 Clues: IoT ATAMASINING MA'NOSISun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYATo‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita....

CODING VOCABULARY 2023-02-03

CODING VOCABULARY crossword puzzle
Across
  1. NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
  2. ANY CHARACTER OR OBJECT USED IN BLOCK CODING
  3. A FREE PROGRAMMING LANGUAGE
  4. MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
  5. ASKING IF A CONDITION IS MET
  6. SET OF LOGICAL STEPS CARRIED OUT IN ORDER
  7. OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
  8. FINDING WEAKNESSES IN DIGITAL DEVICES
  9. IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
  1. PROTECTING SENSITIVE DIGITAL INFORMATION
  2. TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
  3. MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
  4. DATA ENTERED BY A USER
  5. INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
  6. NAMES USED TO HOLD ONE OR MORE VALUES
  7. THE WAY SOMETHING IS WRITTEN

16 Clues: DATA ENTERED BY A USERA FREE PROGRAMMING LANGUAGEASKING IF A CONDITION IS METTHE WAY SOMETHING IS WRITTENNAMES USED TO HOLD ONE OR MORE VALUESFINDING WEAKNESSES IN DIGITAL DEVICESPROTECTING SENSITIVE DIGITAL INFORMATIONSET OF LOGICAL STEPS CARRIED OUT IN ORDERANY CHARACTER OR OBJECT USED IN BLOCK CODINGINSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO...

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Month Crossword 2023-09-18

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A security process that requires users to provide two different authentication factors before gaining access.
  2. Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
  3. Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
  4. An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
  5. Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  6. A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
  7. A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
  8. An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
  1. An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
  2. The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
  3. The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
  4. The process of examining network traffic to identify anomalies and potential security threats.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
  6. A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
  7. A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.

15 Clues: The process of examining network traffic to identify anomalies and potential security threats.Software designed to detect, prevent, and remove malicious software from a computer or network.The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality....

Education 2025-08-08

Education crossword puzzle
Across
  1. – Not just a name —where finance meets fun.
  2. – GBS emphasises this as one of the USP
  3. — Once a GBS student, always one—albeit slightly sarcastic.
  4. - Easy Lunch between ____
  5. – Period during which a student can cancel without tuition penalty
  6. – rewards that help students
  7. – Framework applied across GBS’s regulatory documents
  8. – Core value in GBS’s mission to create an inclusive environment
  9. – Central theme in GBS’s policies on personal data handling
Down
  1. — Where students start, and strong futures build.
  2. – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
  3. — The _____ that whispers, ‘Look at me, I promise futures!
  4. – Keeping hackers’ fingers off your grades.
  5. – Referring to NSS scores.
  6. – Online events offering insight into GBS programs
  7. – Where silence studies hard
  8. – Studying trips without leaving the campus

17 Clues: - Easy Lunch between ____– Referring to NSS scores.– rewards that help students– Where silence studies hard– GBS emphasises this as one of the USP– Keeping hackers’ fingers off your grades.– Not just a name —where finance meets fun.– Studying trips without leaving the campus— Where students start, and strong futures build....

Knowledge Exchange Christmas Quiz 2023-12-05

Knowledge Exchange Christmas Quiz crossword puzzle
Across
  1. Intranet location to learn more about IT initiatives.
  2. Santa's helpers.
  3. Last IT Tuesday topic
Down
  1. At Savannah, we have a culture of continuous ....
  2. The Centre of is where you can find further information on continuous improvement
  3. Guides Santas Sleigh
  4. The Snowman with a corncob pipe and button nose.

7 Clues: Santa's helpers.Guides Santas SleighLast IT Tuesday topicThe Snowman with a corncob pipe and button nose.At Savannah, we have a culture of continuous ....Intranet location to learn more about IT initiatives.The Centre of is where you can find further information on continuous improvement

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Technological Impacts on Business & Commerce 2023-05-03

Technological Impacts on Business & Commerce crossword puzzle
Across
  1. Radio Frequency Identification
  2. Global Positioning System
  3. A type of social media used by many businesses
  4. An immersive, interactive, computer-generated experience
  5. A type of mobile technology
  6. A common type of online payment system.
  7. Bullying someone online
  8. Technologies that require little to no human involvement to operate
  9. Computers that mimic human cognitive abilities
Down
  1. Customizing goods or services to consumers needs and preferences
  2. Safeguarding computer systems and networks
  3. The network of real-world things that exchange data form one another
  4. The network of businesses involved in product distribution
  5. Natural Language Processing
  6. The exchange of goods and services electronically
  7. Providing for the needs of this generation without compromising the needs for future generations
  8. A type of skill that is essential for ICT.

17 Clues: Bullying someone onlineGlobal Positioning SystemNatural Language ProcessingA type of mobile technologyRadio Frequency IdentificationA common type of online payment system.Safeguarding computer systems and networksA type of skill that is essential for ICT.A type of social media used by many businessesComputers that mimic human cognitive abilities...

test 2022-07-15

test crossword puzzle
Across
  1. Music festival they attended -
  2. Michael proposed in ___ beach -
  3. European country michael lived in -
  4. How they met
  5. On the way to Big Sur they stopped at an ___ farm -
  6. Day of the week they attend life group -
  7. City of the music festival they attended -
  8. Basketball team michael supports -
  9. Sammi’s side hustle -
  10. How we are honoring sammis dad at the wedding -
  11. Month they met -
  12. City they took their engagement photos -
  13. Sauce michael hates -
Down
  1. State michael was raised in -
  2. Industry sammi works in -
  3. Sammis favorite flowers -
  4. Sammis bridal shower was a ___ party -
  5. Brand of sammi’s car -
  6. Type of dance sammi did growing up -
  7. Destination of first plane ride together -
  8. Type of engineer Michael is -
  9. Year they met -
  10. Color of michaels bathroom before they painted it -
  11. Location of their first post together on IG -
  12. Engagement ring shape -

25 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

Cisco 2022-11-30

Cisco crossword puzzle
Across
  1. intentional tampering
  2. machine within a machine
  3. machine for printing text onto paper
  4. information non-consensually given to the public
  5. something on many screens
  6. output device that displays images
  7. place of sale
  8. official procedure
  9. common handheld device
  10. faster protocol
  11. thick rope of wire
  12. putting something into another forcefully
  13. an autonomous device
  14. device that often works with mice
  15. IO device that displays images
  16. IO device for computer
Down
  1. negative or not good
  2. our fearless leader
  3. slower protocol
  4. protection of systems
  5. to engineer
  6. company
  7. can be divided into vlans
  8. attack strategy
  9. connects networks
  10. our country
  11. a form of social engineering
  12. something often worn by humans
  13. IO device for computers
  14. a type of robot
  15. encoded message
  16. device
  17. aspect of human lift
  18. a type of person

34 Clues: devicecompanyto engineerour countryplace of saleslower protocolattack strategyfaster protocola type of robotencoded messagea type of personconnects networksofficial procedurethick rope of wireour fearless leadernegative or not goodan autonomous deviceaspect of human liftintentional tamperingprotection of systemscommon handheld device...

Crossword Puzzle 2023-12-12

Crossword Puzzle crossword puzzle
Across
  1. Coordinated anti-terrorism effort
  2. Diplomatic negotiation process
  3. Mutual defense pact
  4. Emotional response to stress or danger
  5. Country with aggressive territorial claims in the West Philippine Sea
  6. Protection against cyber threats
  7. Manipulation of information to influence opinions
  8. Policies aimed at reducing gender-based disparities
  9. Targeting of adversary's decision-making processes
  10. Island in the West Philippine Sea claimed by multiple countries
  11. Localized peace talks with insurgent groups
Down
  1. Common mental health condition characterized by persistent sadness
  2. Act of risking one's life to save others
  3. Joint military exercises
  4. Replacement of old weaponry with newer, more advanced systems
  5. Primary fighter aircraft used by the Air Force
  6. Country's plan for protecting itself from external threats
  7. Large warship equipped for open-sea combat
  8. Strategy to address the root causes of insurgency
  9. International court ruling on the West Philippine Sea dispute
  10. Declaration of the government to end insurgency

21 Clues: Mutual defense pactJoint military exercisesDiplomatic negotiation processProtection against cyber threatsCoordinated anti-terrorism effortEmotional response to stress or dangerAct of risking one's life to save othersLarge warship equipped for open-sea combatLocalized peace talks with insurgent groupsPrimary fighter aircraft used by the Air Force...

NEWSLETTER 2023-11-13

NEWSLETTER crossword puzzle
Across
  1. The activity, you do to get to places.
  2. Another word for young people....
  3. Ghana’s Winter.
  4. I want for Christmas is......
  5. The invisible line that divides the earth into two equal parts.
  6. Picture on social media.
  7. Your identity summarized onto one thing.
  8. Plans for the New Year.
  9. Program used to harm computers.
  10. Color associated with the New Year.
  11. MIDG end-of-year package for employees.
  12. Popular hangout zone in Accra.
  13. ....is responsible for the safety and manner on the internet and other connection.
Down
  1. Merry Christmas
  2. Baby Crocodile
  3. .....is the most showed movie during Christmas movie in Ghana.
  4. Margins ID Group is made up of four....
  5. .... flies when you’re having fun.
  6. Sits atop the Christmas tree.
  7. Pronto’s location.
  8. A machine that can be used to write, connect to the writer, the internet and play games.
  9. Identity theft is an example of...
  10. A letter sent on the internet.
  11. What makes you, you.

24 Clues: Baby CrocodileMerry ChristmasGhana’s Winter.Pronto’s location.What makes you, you.Plans for the New Year.Picture on social media.I want for Christmas is......Sits atop the Christmas tree.A letter sent on the internet.Popular hangout zone in Accra.Program used to harm computers.Another word for young people........ flies when you’re having fun....

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

Tugas Daring Yesika Intan Aurelia 2025-04-24

Tugas Daring Yesika Intan Aurelia crossword puzzle
Across
  1. UI designer merancang tampilan?
  2. menyebarluaskan konten digital disebut?
  3. Hoaks termasuk dalam konten?
  4. Salah satu platform berbagi konten tulisan adalah?
  5. Orang yang merancang sistem jaringan komputer disebut?
  6. Search engine menggunakan apa untuk mengindeks data?
  7. HAKI melindungi karya cipta agar tidak?
  8. Profesi yang menjaga keamanan data disebut?
  9. Data analyst bertugas menganalisis?
  10. Salah satu situs validasi fakta di Indonesia adalah?
  11. YouTube digunakan untuk menyebarkan konten berupa?
  12. Fungsi utama search engine adalah untuk?
Down
  1. Validasi konten bisa dilakukan dengan cara?
  2. Algoritma pada search engine membantu menentukan?
  3. Konten digital bisa berupa teks, gambar, video, dan ?
  4. Contoh selain Google adalah?
  5. Programmer bertugas membuat?
  6. Hak cipta diberikan kepada?
  7. Konten negatif dapat berdampak pada?
  8. Mesin pencari paling populer saat ini adalah?
  9. HAKI meliputi hak cipta dan?
  10. Contoh karya yang dilindungi HAKI adalah?
  11. Ciri konten valid adalah mencantumkan?
  12. Pelanggaran HAKI dapat dikenai?
  13. Software pengolah gambar adalah?

25 Clues: Hak cipta diberikan kepada?Contoh selain Google adalah?Hoaks termasuk dalam konten?Programmer bertugas membuat?HAKI meliputi hak cipta dan?UI designer merancang tampilan?Pelanggaran HAKI dapat dikenai?Software pengolah gambar adalah?Data analyst bertugas menganalisis?Konten negatif dapat berdampak pada?Ciri konten valid adalah mencantumkan?...

New Pork Rinds Crossword Puzzle 2025-08-20

New Pork Rinds Crossword Puzzle crossword puzzle
Across
  1. Called
  2. Quinoa, for example
  3. The coolest person ever
  4. Strange
  5. Escape from prison
  6. Disney dragon sidekick
  7. Best when solving a crossword puzzle
  8. A certain town clerk always says, "You're so ___."
  9. One may fall asleep at work if they have it
  10. Sinatra or hot dog
  11. Sport considered America's Greatest Pasttime
  12. Slang for guitar
  13. Children's bathtub toy
  14. Inspirational words
  15. Athletes who like to club
Down
  1. been hacked, Message concerning cybersecurity
  2. Outdated childish insult
  3. Roundabout
  4. frequent party guest
  5. "Your room is a ____"
  6. Tip over
  7. Amount that you can order in
  8. "___ goes his name-o"
  9. Before "Engine" and after "Top"
  10. cartoon bear who favors honey
  11. Super
  12. powerful wizard
  13. Gymnastics movement or secure storage
  14. Fried chicken state, in short
  15. "Broaden your ____"
  16. Assumes
  17. Pull aggressively
  18. Sun movement
  19. Pokemon trainer

34 Clues: SuperCalledStrangeAssumesTip overRoundaboutSun movementpowerful wizardPokemon trainerSlang for guitarPull aggressivelyEscape from prisonSinatra or hot dogQuinoa, for example"Broaden your ____"Inspirational wordsfrequent party guest"Your room is a ____""___ goes his name-o"Disney dragon sidekickChildren's bathtub toyThe coolest person ever...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  2. → Contoh aplikasi fintech di Indonesia adalah
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  6. → Perusahaan baru yang berbasis teknologi disebut
  7. → Masa depan ekonomi digital bergantung pada literasi
  8. → Pemasaran melalui media sosial disebut
  9. → Berjualan melalui marketplace online termasuk kegiatan
  10. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Fintech merupakan singkatan dari
  2. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Transaksi keuangan secara online disebut
  5. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  6. → Keamanan transaksi online dikenal dengan istilah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Risiko ekonomi digital adalah kebocoran
  9. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  10. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

TEMA 02 : EKONOMI DIGITAL 2025-10-23

TEMA 02 : EKONOMI DIGITAL crossword puzzle
Across
  1. Proses promosi produk melalui media sosial.
  2. Media sosial yang sering digunakan untuk promosi produk.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Pihak yang menjual barang atau jasa di internet.
  5. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  6. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  7. Teknologi penyimpanan data berbasis internet.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Sistem ekonomi yang berbasis pada teknologi dan internet.
  2. Singkatan dari Financial Technology.
  3. Tokopedia dan Shopee termasuk jenis platform ini.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  8. Tempat di mana penjual dan pembeli bertemu secara online.
  9. Salah satu contoh dompet digital di Indonesia.
  10. Proses jual beli melalui internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

WORDS IN EAGLE 101 2025-10-07

WORDS IN EAGLE 101 crossword puzzle
Across
  1. An e-cigarette.
  2. Someone who is outgoing and willing to work in a group.
  3. Coloring or listening to music for a reset.
  4. We watch them every Friday to keep things on the happy side of life.
  5. A timer race Mr. Rieck uses.
  6. Can happen to the lungs of people who smoke.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. A motivational speaker.
Down
  1. Drug Abuse Resistance Education
  2. Drugs such as vapes that have flavor.
  3. Stress or worriness. A type of emotion.
  4. How to be a good citizen on the internet.
  5. Security on electronic devices.
  6. A movie we watched in Eagle 101.
  7. An opioid and drug that messes with your body.
  8. The act of having a bond with another person.
  9. To stand up to something you believe in.
  10. A type of drug.
  11. A fear of something (Mr. Rieck's is 67)
  12. Mr. Rieck's favorite sports team.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Drug Abuse Resistance EducationSecurity on electronic devices.A movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Techniques 2024-11-06

Cybersecurity Techniques crossword puzzle
Across
  1. A protocol designed to provide privacy and security over the internet by encapsulating traffic
  2. The latest security protocol for Wi-Fi, enhancing protections against attacks.
  3. An advanced Linux technology used for monitoring and packet observability in real-time.
  4. A term related to busting common misconceptions in the open and secure cyberspace.
Down
  1. Data collected from devices or systems for monitoring and analysis, used in intelligent security
  2. Malicious software designed to infiltrate or damage computer systems.
  3. The practice of collecting, analyzing, and preserving digital evidence.

7 Clues: Malicious software designed to infiltrate or damage computer systems.The practice of collecting, analyzing, and preserving digital evidence.The latest security protocol for Wi-Fi, enhancing protections against attacks.A term related to busting common misconceptions in the open and secure cyberspace....

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. What is the name of our mascot
  2. Parrot Ball location
  3. KeyW's colors
  4. What month was KeyW founded
  5. What color is our KeyW van
  6. KeyW's best location
  7. How many buildings does the Severn location have
  8. Protection of networks, computers, programs, and data from attack
  9. Applying statistical analysis to data which has a geographical or spatial aspect
  10. Time sheet
  11. What type of bird is our mascot
  12. Which food truck offers the best cheese steaks
Down
  1. What is the surname of KeyW's founder
  2. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  3. What is the name of our newsletter
  4. Radio Detection and Ranging
  5. How many miles connect Key West to Florida main land
  6. KeyW non-profit organization abbreviated
  7. KeyW CEO
  8. When at work, what must you always carry

20 Clues: KeyW CEOTime sheetKeyW's colorsParrot Ball locationKeyW's best locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderKeyW non-profit organization abbreviated...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. What Stacey used to refer Michael to when they first started dating
  2. Where did Michael and Stacey meet
  3. Michael’s birthday month
  4. Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
  5. The number of years the couple is together
  6. Honeymoon destination
  7. Their favourite season
  8. How many years did Michael live overseas for (hint: bribe Father of Groom)
  9. What the groom has for breakfast everyday
  10. Michael’s job industry
  11. Number of their siblings all together
  12. Stacey’s favourite food (hint: ask father of bride)
  13. Michael’s middle name
  14. Who’s the better cook
Down
  1. Mr & Mrs _____
  2. City where Michael was born
  3. Michael’s favourite drink
  4. Where did Michael propose
  5. Brand of Michael’s car
  6. Flavour of the wedding cake
  7. Stacey’s birthday month
  8. Favourite AFL team (hint: ask Best Man)
  9. Stacey’s best friend
  10. How long has Stacey been in Australia for
  11. The age gap between the bride and the groom

25 Clues: Mr & Mrs _____Stacey’s best friendHoneymoon destinationMichael’s middle nameWho’s the better cookBrand of Michael’s carTheir favourite seasonMichael’s job industryStacey’s birthday monthMichael’s birthday monthMichael’s favourite drinkWhere did Michael proposeCity where Michael was bornFlavour of the wedding cakeWhere did Michael and Stacey meet...

Crosswords 2024-07-16

Crosswords crossword puzzle
Across
  1. plan for successful digital transformation
  2. immediate data analysis
  3. large sets of data analyzed for insights
  4. combining data from different sources
  5. management of the flow of goods and services
  6. successful digital use by employees
  7. system that integrates various business processes
  8. virtual model of a physical object or system
  9. protection in digital business environments
  10. network of interconnected devices
  11. system for managing customer relationships
  12. accuracy and reliability of data
Down
  1. digital change impacting business processes
  2. redesigning business processes for improvement
  3. use of technology to perform tasks
  4. analysis of data for business insights
  5. based ERP solutions
  6. process of adopting ERP systems
  7. technology enhancing supply chain transparency
  8. integration of artificial intelligence in business
  9. isolated data storage within an organization
  10. improved by ERP systems
  11. analytics for customer engagement
  12. considerations in using AI and big data
  13. user experience in digital product design

25 Clues: based ERP solutionsimmediate data analysisimproved by ERP systemsprocess of adopting ERP systemsaccuracy and reliability of dataanalytics for customer engagementnetwork of interconnected devicesuse of technology to perform taskssuccessful digital use by employeescombining data from different sourcesanalysis of data for business insights...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

Maura & Spencer 2023-05-19

Maura & Spencer crossword puzzle
Across
  1. Spencer's favorite basketball player
  2. Where they moved after college
  3. The name of their cat
  4. Favorite "Fast Food"
  5. Brides Favorite Alcoholic Drink
  6. Spencer's Favorite Hobby
  7. Where did Maura & Spencer travel to this year
  8. Who gave out their phone number first?
  9. Where do they live
  10. Maura and Spencers First Born
  11. Maura's favorite Disney Movie
  12. How many years will they be together in September?
  13. Maura's middle name
  14. Maura's Job
Down
  1. Maura's Favorite Color
  2. What social media platform did Spencer use to slide in Maura's DM's
  3. Where did Maura go after DC
  4. Maura's Favorite Hobby
  5. Where Maura and Spencer met
  6. Where did Spencer propose?
  7. Spencer's Favorite Color
  8. What month did they get engaged
  9. The last addition to Maura & Spencers family
  10. Grooms Favorite Alcoholic Drink
  11. Spencers Job
  12. What was Maura's sport growing up
  13. Spencer's middle name

27 Clues: Maura's JobSpencers JobWhere do they liveMaura's middle nameFavorite "Fast Food"The name of their catSpencer's middle nameMaura's Favorite ColorMaura's Favorite HobbySpencer's Favorite ColorSpencer's Favorite HobbyWhere did Spencer propose?Where did Maura go after DCWhere Maura and Spencer metMaura and Spencers First Born...

Lushi and John 2025-02-22

Lushi and John crossword puzzle
Across
  1. Lushi's favorite alcoholic beverage
  2. First date restaurant
  3. John’s middle name
  4. Lushi’s favorite dessert
  5. John’s go-to drink
  6. Lushi’s favorite color
  7. Lushi’s favorite holiday
  8. John’s work industry
  9. City where they met
  10. Total number of their dogs
  11. Lushi’s favorite snack to make
  12. Month of their engagement
  13. Total countries visited together
  14. John’s favorite music band
  15. Favorite shared activity
Down
  1. Lushi’s favorite cuisine
  2. John’s hometown
  3. John’s favorite food
  4. University John attended
  5. Their dream honeymoon destination
  6. First international trip destination
  7. Who is older between them
  8. Place where John proposed
  9. Lushi’s favorite board game
  10. how John likes his coffee
  11. Lushi’s favorite time of year
  12. City they live in
  13. Lushi’s mom’s employer
  14. Name of their corgi
  15. Month of dating anniversary
  16. John’s favorite video game
  17. Color of John’s eyes

32 Clues: John’s hometownCity they live inJohn’s middle nameJohn’s go-to drinkCity where they metName of their corgiJohn’s favorite foodJohn’s work industryColor of John’s eyesFirst date restaurantLushi’s favorite colorLushi’s mom’s employerLushi’s favorite cuisineUniversity John attendedLushi’s favorite dessertLushi’s favorite holiday...

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Penipuan online melalui email atau situs palsu.
  4. Penyusupan sistem oleh pihak tidak berwenang.
  5. Pencurian data kartu kredit atau kartu debit
  6. Teknik mengakses sistem tanpa otorisasi.
  7. Alamat identifikasi unik setiap perangkat di jaringan.
  8. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  9. Kata sandi dalam sistem keamanan.
  10. Jenis virus komputer
Down
  1. Program pengintai aktivitas pengguna tanpa izin.
  2. Sistem keamanan biometrik yang menggunakan sidik jari.
  3. Proses identifikasi atau verifikasi pengguna
  4. Aksi mencari celah dalam sistem komputer.
  5. Istilah lain untuk keamanan jaringan
  6. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  7. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  8. Penyerang digital yang memiliki tujuan jahat.
  9. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Istilah lain untuk keamanan jaringan
  2. Penipuan online melalui email atau situs palsu.
  3. Penyerang digital yang memiliki tujuan jahat.
  4. Alamat identifikasi unik setiap perangkat di jaringan.
  5. Aksi mencari celah dalam sistem komputer.
  6. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  7. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  8. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  9. Sistem keamanan biometrik yang menggunakan sidik jari.
Down
  1. Proses identifikasi atau verifikasi pengguna
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  4. Teknik mengakses sistem tanpa otorisasi.
  5. Program pengintai aktivitas pengguna tanpa izin.
  6. Penyusupan sistem oleh pihak tidak berwenang.
  7. Pencurian data kartu kredit atau kartu debit
  8. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  9. Jenis virus komputer
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  11. Kata sandi dalam sistem keamanan.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS_EvandaDandy_14xh 2025-04-15

TTS_EvandaDandy_14xh crossword puzzle
Across
  1. Orang yang membuat desain antarmuka.
  2. HAKI singkatan dari...?
  3. Lembaga yang mengurus HAKI di Indonesia.
  4. Menyebarkan konten ke publik secara digital disebut?
  5. Hak yang melindungi karya cipta.
  6. Simbol yang digunakan untuk pencarian kata bebas.
  7. Profesi yang membuat aplikasi disebut?
  8. Platform berbagi video populer.
  9. Informasi palsu di internet disebut?
  10. PENGELOLA sistem jaringan.
Down
  1. Proses membuat konten disebut?
  2. Proses memeriksa kebenaran konten disebut?
  3. Kata kunci yang digunakan untuk mengabaikan kata tertentu.
  4. Salah satu bentuk HAKI untuk brand dagang.
  5. Elemen tradisional dalam konten digital disebut unsur...?
  6. Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
  7. yang menganalisis data.
  8. Simbol untuk laporan konten di media sosial.
  9. Ahli keamanan siber disebut...?
  10. Contoh media digital untuk menyebarkan budaya.
  11. Sistem otomatis untuk menyaring konten.
  12. Mesin pencari paling populer.
  13. Konten berbahaya disebut konten...?
  14. Simbol untuk mencari sinonim kata (gunakan ~).
  15. Hak eksklusif atas penemuan teknologi.

25 Clues: yang menganalisis data.HAKI singkatan dari...?Mesin pencari paling populer.Platform berbagi video populer.Proses membuat konten disebut?Hak yang melindungi karya cipta.PENGELOLA sistem jaringan.Simbol untuk mencari sinonim kata (gunakan ~).Simbol yang digunakan untuk pencarian kata bebas....

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

IT Terminology 2025-05-15

IT Terminology crossword puzzle
Across
  1. Distributed ledger technology with cryptographic linking.
  2. Using scripts or software to perform tasks without manual input.
  3. Project management method using small, iterative steps.
  4. Open-source operating system with many distributions.
  5. Network of malware-infected devices controlled remotely.
  6. Practice of protecting digital assets from threats.
  7. Converting data into unreadable code for protection.
  8. Flooding a network with traffic to disrupt service.
  9. A sequence of instructions used in software tasks.
  10. Low-level code interacting directly with hardware.
  11. On-demand delivery of IT resources over the internet.
  12. Malware that demands payment to unlock encrypted data.
Down
  1. Computers mimicking human cognitive functions.
  2. Professional who interprets data to help decision-making.
  3. Wireless technology for short-distance device communication.
  4. Numeric label identifying devices on a network.
  5. Loss of signal strength in networking cables.
  6. Attempt to infiltrate digital systems maliciously.
  7. Developer who creates the visual interface of websites.
  8. Temporary storage for fast data retrieval.

20 Clues: Temporary storage for fast data retrieval.Loss of signal strength in networking cables.Computers mimicking human cognitive functions.Numeric label identifying devices on a network.Attempt to infiltrate digital systems maliciously.A sequence of instructions used in software tasks.Low-level code interacting directly with hardware....

tema 2 perkembangan ekonomi digital 2025-10-27

tema 2 perkembangan ekonomi digital crossword puzzle
Across
  1. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  5. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  8. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  9. → Pemasaran melalui media sosial disebut
  10. → Contoh aplikasi fintech di Indonesia adalah
Down
  1. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → Transaksi keuangan secara online disebut
  5. → Fintech merupakan singkatan dari
  6. → Berjualan melalui marketplace online termasuk kegiatan
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masa depan ekonomi digital bergantung pada literasi
  9. → Risiko ekonomi digital adalah kebocoran
  10. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 2025-10-27

TEMA 2 crossword puzzle
Across
  1. Tokopedia dan Shopee termasuk jenis platform ini.
  2. Teknologi penyimpanan data berbasis internet.
  3. Proses jual beli melalui internet.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Proses promosi produk melalui media sosial.
  6. Salah satu contoh dompet digital di Indonesia.
  7. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Singkatan dari Financial Technology.
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Media sosial yang sering digunakan untuk promosi produk.
  2. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Tempat di mana penjual dan pembeli bertemu secara online.
  7. Sistem ekonomi yang berbasis pada teknologi dan internet.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  10. Pihak yang menjual barang atau jasa di internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

TEMA 2: EKONOMI DIGITAL 2025-10-23

TEMA 2: EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

KeyW Crossword 2017-01-18

KeyW Crossword crossword puzzle
Across
  1. When at work, what must you always carry
  2. Applying statistical analysis to data which has a geographical or spatial aspect
  3. KeyW non-profit organization abbreviated
  4. KeyW's best location
  5. What is the name of our newsletter
  6. KeyW CEO
  7. Time sheet
  8. What is the surname of KeyW's founder
  9. What type of bird is our mascot
Down
  1. KeyW's colors
  2. What month was KeyW founded
  3. What is the name of our mascot
  4. Radio Detection and Ranging
  5. How many buildings does the Severn location have
  6. Protection of networks, computers, programs, and data from attack
  7. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  8. Parrot Ball location
  9. How many miles connect Key West to Florida main land
  10. Which food truck offers the best cheese steaks
  11. What color is our KeyW van

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

science-and-technology 2 2023-11-25

science-and-technology 2 crossword puzzle
Across
  1. Device that speeds up charged particles.
  2. The path of an object around a celestial body.
  3. Managing temperature and weather conditions.
  4. Computer-generated simulation of a three-dimensional environment.
  5. Design and construction of new biological parts.
  6. Device that converts hydrogen into electricity.
  7. Study of ionized gases (plasma).
Down
  1. Protection of computer systems from theft or damage.
  2. Altering genes in an organism's DNA.
  3. Relating to electric and magnetic fields.
  4. Elementary particle and a fundamental constituent of matter.
  5. Study of extremely low temperatures.
  6. Manipulation of matter on a molecular or atomic scale.
  7. Electromagnetic radiation with longer wavelengths than visible light.
  8. Long-term alteration in Earth's climate.
  9. Small rocky object orbiting the sun.
  10. Application of biological principles to medicine.
  11. Programs and applications for computers.
  12. Thread-like structure of DNA in the nucleus.
  13. Ability of machines to learn from data.

20 Clues: Study of ionized gases (plasma).Altering genes in an organism's DNA.Study of extremely low temperatures.Small rocky object orbiting the sun.Ability of machines to learn from data.Device that speeds up charged particles.Long-term alteration in Earth's climate.Programs and applications for computers.Relating to electric and magnetic fields....

Technology Crossword 2024-05-29

Technology Crossword crossword puzzle
Across
  1. AI
  2. a computer that works like a human brain
  3. a form of a monitarilly valuable item
  4. Something that is a threat to us non physically
  5. this is a watch or VR headset
  6. Something that can be invaded
  7. an orbit of artifical stars in a pattern
  8. a form of tourism that is very expensive and not many have a chance to go.
  9. Exploring the largest part of earth
  10. Advanced Computing
Down
  1. Finger print or face id
  2. a form of engineering
  3. A form of travel out of this world
  4. Threat of Unemployment
  5. Analysis of data
  6. Something seen as a toy for some but fly
  7. having people colonize a close planet
  8. Something almost everyone uses
  9. many people have these devices
  10. a way of making sure that you get what you need to get well

20 Clues: AIAnalysis of dataAdvanced Computinga form of engineeringThreat of UnemploymentFinger print or face idthis is a watch or VR headsetSomething that can be invadedSomething almost everyone usesmany people have these devicesA form of travel out of this worldExploring the largest part of eartha form of a monitarilly valuable item...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS 2025-04-15

TTS crossword puzzle
Across
  1. Perlindungan hukum untuk identitas produk
  2. Scientist Analis data untuk pengambilan keputusan
  3. Perundungan melalui media digital
  4. Simbol penanda pencarian fleksibel pada mesin pencari
  5. Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
  6. Platform berbagi video terbesar di dunia
  7. Cipta Perlindungan hukum untuk karya kreatif
  8. Kebencian Ungkapan yang menghina dan merendahkan
  9. Simbol pengurang kata kunci dalam pencarian
  10. Penulis kode program komputer
  11. Platform berbagi foto dan video populer
  12. Lembaga pemerintah pengelola HAKI
Down
  1. Buatan" Penulisan untuk pencarian frasa spesifik
  2. Ideologi yang menganjurkan kekerasan
  3. Digital Pedoman moral dalam pembuatan konten digital
  4. Developer Pengembang dan pengelola situs web
  5. Analyst Pakar keamanan sistem komputer
  6. Budaya Tujuan penyebaran konten budaya
  7. Konten seksual yang eksplisit
  8. Informasi palsu yang tersebar luas
  9. Jaipong Contoh konten budaya Sunda di media digital
  10. Perlindungan hukum untuk inovasi
  11. Designer Perancang antarmuka pengguna
  12. Singkatan dari Hak Kekayaan Intelektual
  13. Operator logika untuk pencarian gabungan kata kunci

25 Clues: Konten seksual yang eksplisitPenulis kode program komputerPerlindungan hukum untuk inovasiPerundungan melalui media digitalLembaga pemerintah pengelola HAKIInformasi palsu yang tersebar luasIdeologi yang menganjurkan kekerasanDesigner Perancang antarmuka penggunaAnalyst Pakar keamanan sistem komputerBudaya Tujuan penyebaran konten budaya...

Technology vocabulary 2025-09-03

Technology vocabulary crossword puzzle
Across
  1. Virtual reality, a 3D digital world.
  2. An electronic machine that processes information.
  3. Technology you can put on your body.
  4. A person who loves technology.
  5. To bring software to the newest version.
  6. Computers that can act and “think” like humans.
  7. A program used on a phone or computer.
  8. A small electronic device.
  9. A screen you can control by touching.
  10. To take a file from the internet.
  11. Wireless internet connection.
Down
  1. A picture of what’s on your screen.
  2. To look through websites or files.
  3. Someone who writes computer code.
  4. Protecting computers and data from attacks.
  5. To write words on a keyboard.
  6. To turn off and then back on again.
  7. To add a file to an email.
  8. A place or device that gives Wi-Fi access.
  9. To send a file to the internet.
  10. A portable computer.

21 Clues: A portable computer.To add a file to an email.A small electronic device.To write words on a keyboard.Wireless internet connection.A person who loves technology.To send a file to the internet.Someone who writes computer code.To take a file from the internet.To look through websites or files.A picture of what’s on your screen....

Words In Eagle 101 I Learned 2025-10-07

Words In Eagle 101 I Learned crossword puzzle
Across
  1. Drug Abuse Resistance Education
  2. To stand up to something you believe in.
  3. Can happen to the lungs of people who smoke.
  4. Stress or worriness. A type of emotion.
  5. How to be a good citizen on the internet.
  6. An e-cigarette.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. Mr. Rieck's favorite sports team.
  9. The act of having a bond with another person.
  10. A movie we watched in Eagle 101.
Down
  1. Security on electronic devices.
  2. We watch them every Friday to keep things on the happy side of life.
  3. An opioid and drug that messes with your body.
  4. Coloring or listening to music for a reset.
  5. A motivational speaker.
  6. A timer race Mr. Rieck uses.
  7. A fear of something (Mr. Rieck's is 67)
  8. Drugs such as vapes that have flavor.
  9. A type of drug.
  10. Someone who is outgoing and willing to work in a group.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Security on electronic devices.Drug Abuse Resistance EducationA movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

ch1-2-3 2021-09-25

ch1-2-3 crossword puzzle
Across
  1. quality of dealing with ideas rather than events
  2. malicious software
  3. track online activity and capture data
  4. study of what is right or wrong in human conduct
  5. a way to discover and fix a problem in a system
  6. process to protect individual and organization
Down
  1. the beliefs of the individuals or groups as to what is wrong and right
  2. replicates itself independently in a network
  3. automatically delivers advertisements
  4. holds a computer system captive until payment is made
  5. the degree to which something is able or fit to be used
  6. usually spreads by USB drives, emails or network shares

12 Clues: malicious softwareautomatically delivers advertisementstrack online activity and capture datareplicates itself independently in a networkprocess to protect individual and organizationa way to discover and fix a problem in a systemquality of dealing with ideas rather than eventsstudy of what is right or wrong in human conduct...

Love Data Week Crossword 2025-01-24

Love Data Week Crossword crossword puzzle
Across
  1. Acronym for the Office of the Chief Information Officer
  2. The process of making uniform or homogeneous
  3. Examination of data
  4. GNB’s Chief Information Officer
  5. The protection of computers and networks against unauthorised access and sabotage
Down
  1. Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
  2. VPN’s offering
  3. Info that gives info about other info?
  4. Secrecy and fidelity one cannot break
  5. Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
  6. Unauthorized access to personal information
  7. Perform very well in data analysis?

12 Clues: VPN’s offeringExamination of dataGNB’s Chief Information OfficerPerform very well in data analysis?Secrecy and fidelity one cannot breakInfo that gives info about other info?Unauthorized access to personal informationThe process of making uniform or homogeneousAcronym for the Office of the Chief Information Officer...

Anson Khoo Kai Loon 8G 2023-01-19

Anson Khoo Kai Loon  8G crossword puzzle
Across
  1. People use this to study online during the pandemic.
  2. To protect others from looking in your phone.
  3. protects you from networks & programs digital attacks.
  4. We can use ________ to communicate with others all around the world.
  5. You can send a ______ to your friends to play with.
Down
  1. A website that people use to buy something online.
  2. A website that people use to search.
  3. You need to press _______ to shut your computer/laptop.
  4. Made by Mark Zuckerberg.
  5. Its use in almost all electronic devices.
  6. An old website that people use to search something.

11 Clues: Made by Mark Zuckerberg.A website that people use to search.Its use in almost all electronic devices.To protect others from looking in your phone.A website that people use to buy something online.An old website that people use to search something.You can send a ______ to your friends to play with.People use this to study online during the pandemic....

Internet Crossword 2024-12-04

Internet Crossword crossword puzzle
Across
  1. the global computer system that interconnects technology
  2. a unique form of personal data which website ask for
  3. a platform where resources are managed on a a computer
  4. the language of the computer which are performed on a computer
  5. the delivery of IT resources throughout the Internet
  6. the programs that build a computer
Down
  1. the physical connection of computers together
  2. a barricade that monitors information going in or out
  3. the protection of computers, data, and the Internet
  4. the amount of data your computer can handle
  5. a coding error on a computer

11 Clues: a coding error on a computerthe programs that build a computerthe amount of data your computer can handlethe physical connection of computers togetherthe protection of computers, data, and the Interneta unique form of personal data which website ask forthe delivery of IT resources throughout the Internet...

Logiscool v3 2025-11-11

Logiscool v3 crossword puzzle
Across
  1. What you type to tell AI what to do
  2. Describes vehicles that can drive themselves
  3. Protecting computers and data from harm
  4. Doing the right thing in technology and AI
Down
  1. A programming language for coders
  2. A virtual world where people can meet and play
  3. A computer program that chats like a person
  4. Co-founder of DeepMind and leader in AI innovation
  5. Flying robots used for photos, deliveries, or rescue
  6. Teen inventor who created tech to fight cyberbullying (Gitanjali ___)
  7. Smart systems that can think and learn like humans

11 Clues: A programming language for codersWhat you type to tell AI what to doProtecting computers and data from harmDoing the right thing in technology and AIA computer program that chats like a personDescribes vehicles that can drive themselvesA virtual world where people can meet and playCo-founder of DeepMind and leader in AI innovation...

Mr Robot 2022-11-15

Mr Robot crossword puzzle
Across
  1. prevent attacks by blocking malicious traffic
  2. unwanted files or programs that can cause harm to a computer
  3. private information being kept secret
  4. people who seek to exploit weaknesses in software
  5. a set of characters that allows access to a system
  6. software designed to detect and destroy viruses
Down
  1. flaws in software
  2. the art of protecting networks, devices, and data from attacks
  3. type of email use to steal information about you

9 Clues: flaws in softwareprivate information being kept secretprevent attacks by blocking malicious trafficsoftware designed to detect and destroy virusestype of email use to steal information about youpeople who seek to exploit weaknesses in softwarea set of characters that allows access to a system...

CWSI Cyber CrossWord 2025-03-25

CWSI Cyber CrossWord crossword puzzle
Across
  1. Foundation of both cybersecurity and team collaboration
  2. Common attack vector for phishing and scams
  3. What you should never do with suspicious links or attachments
  4. A vulnerability in software waiting to be exploited
  5. Guidelines that govern secure workplace behavior
Down
  1. A physical or digital object used for multi-factor authentication
  2. What hackers see unaware employees as
  3. A potential danger that exploits system vulnerabilities
  4. The chance that a threat will exploit a vulnerability

9 Clues: What hackers see unaware employees asCommon attack vector for phishing and scamsGuidelines that govern secure workplace behaviorA vulnerability in software waiting to be exploitedThe chance that a threat will exploit a vulnerabilityFoundation of both cybersecurity and team collaborationA potential danger that exploits system vulnerabilities...

End Users and Cybersecurity 2023-10-13

End Users and Cybersecurity crossword puzzle
Across
  1. 85% of people posting puppy photos are trying to _____ you
  2. _____ are connected to the internet
  3. ensure that the correct information is relayed to the right destination across the network
  4. _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
  5. network of connections between people, things, data, and processes
  6. shortened URLs
Down
  1. variant of malware
  2. person who uses IT products or services
  3. occurs when an end user receives an illegitimate message or email
  4. providing education to end users can mitigate cybersecurity _____
  5. almost every employee has access to this
  6. help protect your internet connection and privacy online

12 Clues: shortened URLsvariant of malware_____ are connected to the internetperson who uses IT products or servicesalmost every employee has access to thishelp protect your internet connection and privacy online85% of people posting puppy photos are trying to _____ youoccurs when an end user receives an illegitimate message or email...

1 2025-05-22

1 crossword puzzle
Across
  1. – A program or practical use of something in real life
  2. – Something given in recognition of excellence or achievement
  3. – Something given or added to help achieve a goal
  4. – A result gained by effort or skill
Down
  1. – Protection of computer systems and networks from attacks
  2. – The use or study of computers and technology
  3. – An area of study, activity, or interest
  4. – A fundamental element or basis of something
  5. – The strong effect or influence of something
  6. – A reward given to someone for winning or achieving something
  7. – An organized collection of information stored electronically
  8. – Something handed down from the past

12 Clues: – A result gained by effort or skill– Something handed down from the past– An area of study, activity, or interest– A fundamental element or basis of something– The strong effect or influence of something– The use or study of computers and technology– Something given or added to help achieve a goal...

Compliance Week - Day 1 Puzzle 2022-10-09

Compliance Week - Day 1 Puzzle crossword puzzle
Across
  1. Intimidation of an individual after reporting an allegation of misconduct.
  2. When PHI is exposed, a _______ of the patient's privacy has been committed.
  3. Never share your ________ with anyone.
  4. The ____ is an anonymous way to report a compliance concern. (707.825.1027)
  5. Health insurance portability & accountability act.
Down
  1. Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
  2. Computer security
  3. It is our job to _______ our clients health record.
  4. Verify this for every client every time (3 words)
  5. An official inspection of an individual's or organization's accounts.
  6. Protected health information.

11 Clues: Computer securityProtected health information.Never share your ________ with anyone.Verify this for every client every time (3 words)Health insurance portability & accountability act.It is our job to _______ our clients health record.An official inspection of an individual's or organization's accounts....

ACC 2022-09-27

ACC crossword puzzle
Across
  1. We waive any right of recovery we may have
  2. platform used to log calls
  3. ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
  4. our ABI know it all
  5. are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
  1. contains a collection of additional coverages and increased limits for certain coverages
  2. an inspection required in the state of NY
  3. optional coverage maximizes limits
  4. provides coverages at no cost
  5. Option for liability limit
  6. script used to answer a call

11 Clues: our ABI know it allplatform used to log callsOption for liability limitscript used to answer a callprovides coverages at no costoptional coverage maximizes limitsan inspection required in the state of NYWe waive any right of recovery we may havecontains a collection of additional coverages and increased limits for certain coverages...

ict 2024-07-02

ict crossword puzzle
Across
  1. Number system with two digits, 0 and 1, used by computers.
  2. Security system that monitors and controls network traffic.
  3. Process of converting information into a secure form.
  4. Organized collection of data.
  5. Intelligence: Simulation of human intelligence by machines.
Down
  1. Device connected to a computer (e.g., printer, mouse).
  2. Technique of creating virtual versions of computer resources.
  3. Protection of computer systems from digital attacks
  4. Finding and fixing errors or bugs in software code.
  5. Step-by-step procedure for solving a problem.
  6. System: Software that manages computer hardware and software resources.

11 Clues: Organized collection of data.Step-by-step procedure for solving a problem.Protection of computer systems from digital attacksFinding and fixing errors or bugs in software code.Process of converting information into a secure form.Device connected to a computer (e.g., printer, mouse).Number system with two digits, 0 and 1, used by computers....

Provalus Crossword 2025-09-30

Provalus Crossword crossword puzzle
Across
  1. The one medication on the list that is an anti-arrythmic
  2. Which is the insurance plan that covers low-income individuals?
  3. Which Aux code is used for lunch?
  4. The keyboard shortcut for "select all"
  5. The Medicare part that covers hospital visits
  6. The protection of digital data
  7. How many folders deep can you go in OneDrive?
Down
  1. Which is the insurance plan that covers individuals above 65?
  2. Disregarding concerns
  3. How many days long is the probation period?
  4. How many times you should say a customer's name in a phone call
  5. What Citrix is
  6. The components of active listening are attention and ____

13 Clues: What Citrix isDisregarding concernsThe protection of digital dataWhich Aux code is used for lunch?The keyboard shortcut for "select all"How many days long is the probation period?The Medicare part that covers hospital visitsHow many folders deep can you go in OneDrive?The one medication on the list that is an anti-arrythmic...

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  4. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  5. MALICIOUS SOFTWARE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
  3. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
  4. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  5. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID....

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. MALICIOUS SOFTWARE.
  4. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  5. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
  3. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  4. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  5. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES....

Cybersecurity Crossword Puzzle 2023-05-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Term for sexually explicit material available on the internet
  2. Software designs to damage or gain unauthorized access to a computer system
  3. Act of sending deceptive emails to trick individuals
  4. Every aspect of protecting an organization and its employees and assets against cyber threats
  5. Process of gaining unauthorized access to computer systems
Down
  1. One of the internet abuse effects for teenagers
  2. Act of deliberately using digital communication to harass or intimidate someone
  3. Software designed to protect against malicious software
  4. Practice of protecting information by converting it into a secret code
  5. A secret word or phrase that must be used to gain admission

10 Clues: One of the internet abuse effects for teenagersAct of sending deceptive emails to trick individualsSoftware designed to protect against malicious softwareProcess of gaining unauthorized access to computer systemsA secret word or phrase that must be used to gain admissionTerm for sexually explicit material available on the internet...

Cybersecurity Week 1 2021-10-05

Cybersecurity Week 1 crossword puzzle
Across
  1. Short for malicious software designed to obtain information from a computer without the user's consent
  2. Protection of information assets within internetworked information systems
  3. Ensures the timely and reliable access and use of information systems
  4. Full use of a vulnerability for the benefit of an attacker
Down
  1. Protection of information from authorized access and disclosure
  2. A protected string of characters that authenticate a computer user to a system
  3. the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
  4. The protection of information from unauthorized modification
  5. A system or combination of systems that enforces a boundary between two or more networks
  6. An individual who attempts to gain unauthorized access to a computer system

10 Clues: Full use of a vulnerability for the benefit of an attackerThe protection of information from unauthorized modificationProtection of information from authorized access and disclosureEnsures the timely and reliable access and use of information systemsProtection of information assets within internetworked information systems...

Cybersecurity Hex Crossword 2023-11-03

Cybersecurity Hex Crossword crossword puzzle
Across
  1. 43 4C 41 53 53
  2. 43 52 4F 53 53 57 4F 52 44
  3. 50 48 4F 4E 45
  4. 4C 49 46 45
Down
  1. 4C 41 50 54 4F 50 0A
  2. 4D 41 54 48
  3. 54 45 53 54
  4. 43 59 42 45 52
  5. 53 43 48 4F 4F 4C
  6. 46 55 4E

10 Clues: 46 55 4E4D 41 54 4854 45 53 544C 49 46 4543 4C 41 53 5343 59 42 45 5250 48 4F 4E 4553 43 48 4F 4F 4C4C 41 50 54 4F 50 0A43 52 4F 53 53 57 4F 52 44

TPWD Cybersecurity Awareness 2024-10-08

TPWD Cybersecurity Awareness crossword puzzle
Across
  1. A fake email designed to trick users into giving up personal information
  2. A way to verify a person's identity online
  3. A malicious software designed to harm a computer
  4. A software update that fixes vulnerabilities in a program
  5. Software that blocks harmful content from reaching your computer
Down
  1. A security breach that involves unauthorized access to data
  2. A security feature that requires more than one form of verification
  3. A network of infected computers controlled by a hacker
  4. The practice of protecting information from unauthorized access
  5. A set of guidelines for handling sensitive data

10 Clues: A way to verify a person's identity onlineA set of guidelines for handling sensitive dataA malicious software designed to harm a computerA network of infected computers controlled by a hackerA software update that fixes vulnerabilities in a programA security breach that involves unauthorized access to data...

Foundations of Cybersecurity 2024-11-20

Foundations of Cybersecurity crossword puzzle
Across
  1. This device inspects and filters network traffic
  2. the process of converting data into a code
  3. the process of verifying an identity before granting access
  4. the process of encoding information so that only the person that the message was intended for can read it
Down
  1. the practice of sending fake emails
  2. a network of compromised computers that are controlled by a single attacker
  3. a weakness within a computer system
  4. software that is designed to disrupt or damage access to a computer
  5. a type of malicious software that secretly gathers a user's personal data
  6. a type of malware that encrypts a victim's files or locks their device, and then demands payment

10 Clues: the practice of sending fake emailsa weakness within a computer systemthe process of converting data into a codeThis device inspects and filters network trafficthe process of verifying an identity before granting accesssoftware that is designed to disrupt or damage access to a computer...

TBP FL-D 10/23 2023-10-23

TBP FL-D 10/23 crossword puzzle
Across
  1. Type of current produced by solar panels.
  2. The c in E=mc^2.
  3. Amount of heat required to raise temperature by 1 degree Celsius.
Down
  1. Type of engineer responsible for harnessing electricity.
  2. This cat may or may not be alive.
  3. Building with the most popular bathroom on UCF campus.
  4. Plastic polymer that can be recycled and reformed into another shape
  5. The cybersecurity team that works to defend an organization.
  6. Support structure that uses triangles.

9 Clues: The c in E=mc^2.This cat may or may not be alive.Support structure that uses triangles.Type of current produced by solar panels.Building with the most popular bathroom on UCF campus.Type of engineer responsible for harnessing electricity.The cybersecurity team that works to defend an organization....

SBU TBP Crossword 10/5 2022-10-04

SBU TBP Crossword 10/5 crossword puzzle
Across
  1. Species with the most genetic similarity to humans.
  2. Series of educational lectures hosted by Tau Beta Pi.
  3. Protection against unauthorized electronic data access.
  4. Process of converting data into a code for protection.
Down
  1. Mathematical function without "in-between" values.
  2. Longest bone in the human body.
  3. A structure consisting of beams connected in triangular shapes.
  4. ____'s constant gives the relationship between the energy and frequency of a photon.
  5. Third most common element in the universe.

9 Clues: Longest bone in the human body.Third most common element in the universe.Mathematical function without "in-between" values.Species with the most genetic similarity to humans.Series of educational lectures hosted by Tau Beta Pi.Process of converting data into a code for protection.Protection against unauthorized electronic data access....

30 2023-06-06

30 crossword puzzle
Across
  1. - Online storage and computing services
  2. - Uniform Resource Locator, the address of a web page
  3. - Measures to protect computer systems and data from digital threats
  4. - Buying and selling goods or services online
  5. - Component that stores electrical energy
  6. - Conductive material for transmitting electricity
  7. - Device that changes the voltage of an electrical current
Down
  1. - Device that stores and provides electrical energy
  2. - Electrical socket for connecting devices to the power supply
  3. - Safety device that breaks the circuit when current exceeds a certain level
  4. - Complete path for electrical current
  5. - Device used to control the flow of electrical current
  6. - Component that restricts the flow of electricity

13 Clues: - Complete path for electrical current- Online storage and computing services- Component that stores electrical energy- Buying and selling goods or services online- Component that restricts the flow of electricity- Conductive material for transmitting electricity- Device that stores and provides electrical energy...

Computer Concepts 2025-11-18

Computer Concepts crossword puzzle
Across
  1. software that detects and removes harmful programs
  2. images, visuals, and video are processed by a ___ processing unit
  3. protection of computers, networks, and data from attacks
  4. number system made of 0s and 1s
  5. the main circuit board that connects all components
  6. short-term working space used by a computer, also called RAM
  7. security tool that blocks unwanted network traffic
Down
  1. the screen that shows images and text
  2. scrambling data so only authorised users can read it
  3. number system based on 10
  4. the ___ processing unit is where calculations are performed
  5. scam where someone is tricked into giving personal information
  6. harmful software designed to damage or steal information

13 Clues: number system based on 10number system made of 0s and 1sthe screen that shows images and textsoftware that detects and removes harmful programssecurity tool that blocks unwanted network trafficthe main circuit board that connects all componentsscrambling data so only authorised users can read it...

technolgy 2024-12-20

technolgy crossword puzzle
Across
  1. Protecting digital information from threats.
  2. An online community for connecting with others.
  3. A person skilled in technology.
  4. A computer that provides data to other computers.
  5. Someone very interested in computers.
  6. A software used to access websites.
  7. To transfer a file from the internet to your device.
  8. To create an account on a website or app.
  9. Abbreviation for Artificial Intelligence.
Down
  1. Software that is free to use.
  2. Smart devices worn on the body, like fitness trackers.
  3. MEDIA Online platforms for sharing content and communication.
  4. HOTSPOT A location where wireless internet is available.
  5. PROVIDER A company that provides internet access.
  6. To transfer a file from your device to the internet.
  7. A computer-generated immersive experience.
  8. To log into an account.

17 Clues: To log into an account.Software that is free to use.A person skilled in technology.A software used to access websites.Someone very interested in computers.To create an account on a website or app.Abbreviation for Artificial Intelligence.A computer-generated immersive experience.Protecting digital information from threats....

Rush Health Cybersecurity 2020-02-24

Rush Health Cybersecurity crossword puzzle
Across
  1. Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
  2. Type of attack to steal username and password
  3. Type of unwanted emails
  4. a standalone malware computer program that replicates itself in order to spread to other computers
  5. Someone that does harm to a computer
  6. Scrambling information so that only those with the keys can read it
Down
  1. Type of malware that requires a ransom to remove the malware.
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. any software program in which advertising banners are displayed while the program is running.
  4. Something that can harm your computer

10 Clues: Type of unwanted emailsSomeone that does harm to a computerSomething that can harm your computerType of attack to steal username and passwordType of malware that requires a ransom to remove the malware.Scrambling information so that only those with the keys can read it...

All Things Cybersecurity 2021-03-31

All Things Cybersecurity crossword puzzle
Across
  1. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. Small files that Web sites put on your computer hard disk drive when you first visit.
  3. Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  4. Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. A local or restricted communications network, especially a private network created using World Wide Web software.

10 Clues: An attempt by hackers to damage or destroy a computer network or system.Someone who seeks and exploits weaknesses in a computer system or computer network.Small files that Web sites put on your computer hard disk drive when you first visit....

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. Software used to protect against viruses and malware.
  2. A program that replicates itself and spreads to other computers.
  3. An organization that identifies security flaws in software.
  4. An encrypted connection between a web browser and a server.
  5. A technique to deceive individuals into providing sensitive information.
  6. A type of attack that floods a network to disrupt its operation.
Down
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A secret code that only authorized parties should be able to read.
  3. The practice of keeping software up to date to protect against vulnerabilities.
  4. A sequence of characters used to authenticate identity or access.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Basic cybersecurity terms 2024-07-29

Basic cybersecurity terms crossword puzzle
Across
  1. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
  2. The process of converting information or data into a code, especially to prevent unauthorized access.
  3. A security process that verifies the identity of a user or device attempting to access a system.
  4. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Basics #1 2024-09-17

Cybersecurity Basics #1 crossword puzzle
Across
  1. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
  2. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
  3. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
  4. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
  1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
  2. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
  3. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
  4. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
  5. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
  6. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.

10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only....

Compliance And Cybersecurity 2024-12-23

Compliance And Cybersecurity crossword puzzle
Across
  1. The process of confirming the identity of a user or device
  2. A malicious software program that encrypts files for ransom
  3. A set of rules or guidelines adopted by an organization.
  4. Do not share a password with members
Down
  1. A defensive system protecting networks from cyberattacks
  2. The act of adhering to laws, regulations, and standards.
  3. What does the HIPAA Privacy Rule protect?
  4. The deliberate act of stealing personal information online
  5. Data that is unreadable without decryption
  6. Rules to guard patient data

10 Clues: Rules to guard patient dataDo not share a password with membersWhat does the HIPAA Privacy Rule protect?Data that is unreadable without decryptionA defensive system protecting networks from cyberattacksThe act of adhering to laws, regulations, and standards.A set of rules or guidelines adopted by an organization....

CYBERSECURITY CROSSWORD PUZZLE 2025-08-15

CYBERSECURITY CROSSWORD PUZZLE crossword puzzle
Across
  1. The process of converting data into a coded format to prevent unauthorized access.
  2. Malicious software designed to damage or disrupt systems.
  3. A network security device that monitors and filters incoming and outgoing traffic.
  4. A cyberattack method that tricks users into revealing sensitive information.
  5. A copy of data kept in case the original is lost or damaged.
Down
  1. Software that secretly monitors and collects user information.
  2. Secure connection method over the internet, often used for privacy.
  3. A self-replicating program that infects files or systems.
  4. An update to fix software vulnerabilities.
  5. A secret string used for authentication.

10 Clues: A secret string used for authentication.An update to fix software vulnerabilities.Malicious software designed to damage or disrupt systems.A self-replicating program that infects files or systems.A copy of data kept in case the original is lost or damaged.Software that secretly monitors and collects user information....

Cybersecurity Amelie BTS1 2025-12-02

Cybersecurity Amelie BTS1 crossword puzzle
Across
  1. A group of Internet-connected devices, each of which runs one or more bots.
  2. Completely Automated Public Turing test to tell Computers and Humans Apart.
  3. information that is officially secret.
Down
  1. An occasion when private information can be seen by people who should not be able to see it.
  2. deriving from or relating to a previously unknown vulnerability to attack in some software.
  3. (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
  4. (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
  5. (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
  6. Programs that surreptitiously monitor and report the actions of a computer user.
  7. theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.

10 Clues: information that is officially secret.A group of Internet-connected devices, each of which runs one or more bots.Completely Automated Public Turing test to tell Computers and Humans Apart.Programs that surreptitiously monitor and report the actions of a computer user....

FITAVocab.lo 2013-05-15

FITAVocab.lo crossword puzzle
Across
  1. code of positive conduct one uses such as plagiarism, copyright, etc.
  2. rules and behaviors designed to keep individuals safe online
  3. a search engine that goes through all the search engines.
  4. speed of machine
  5. short term memory for your computer
  6. a
Down
  1. a website that protects young people from cyber bullies
  2. protecting information on computer systems/networks
  3. a program that allows you to search information on the internet.
  4. a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.

10 Clues: aspeed of machineshort term memory for your computerprotecting information on computer systems/networksa website that protects young people from cyber bulliesa search engine that goes through all the search engines.rules and behaviors designed to keep individuals safe onlinea program that allows you to search information on the internet....