cybersecurity Crossword Puzzles
Educational Technologies Crossword 2026-01-30
Across
- To send a file from a device to the internet
- Digital or printed update shared with an audience
- Physical parts of a computer you can touch
- Protection of devices and online information
- Laptop commonly used in schools
- The process of planning and creating visual content
- Online tool used for graphic design and presentations
Down
- Program used to access online content
- Global network that connects computers
- Secret code used to access accounts
- Input device used to type letters and numbers
- Programs and apps that run on a device
- Device used to point, click, and scroll
- Digital way to send messages
- To save a file from the internet to a device
15 Clues: Digital way to send messages • Laptop commonly used in schools • Secret code used to access accounts • Program used to access online content • Global network that connects computers • Programs and apps that run on a device • Device used to point, click, and scroll • Physical parts of a computer you can touch • To send a file from a device to the internet • ...
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Blue Print 2024-09-11
Across
- Person who flies airplanes for a job
- Person who promotes products or brands online
- Animal expert who might work at a wildlife park
- Person who creates new computer and console games
- Cook who prepares food for big events
- Therapist who teaches exercises to heal injuries
- Creator of dance routines for shows or videos
- Writer who reports on the latest clothing trends
Down
- Computer expert who protects against online threats
- Someone who runs for office to make laws
- Designer of bridges, roads, and buildings
- Problem-solver who works to protect nature
- Person in charge of making movies
- Sound expert who helps make songs in a studio
14 Clues: Person in charge of making movies • Person who flies airplanes for a job • Cook who prepares food for big events • Someone who runs for office to make laws • Designer of bridges, roads, and buildings • Problem-solver who works to protect nature • Sound expert who helps make songs in a studio • Person who promotes products or brands online • ...
Oklahoma Computer Science 2025-05-13
Across
- A tool to organize, calculate, and analyze data
- A unique number for each device on a network
- Programs and apps that run on a computer
- A list of steps to solve a problem
- A group of connected computers that share information
- Information that can be collected and used
- Finding and fixing errors in code
Down
- Protecting devices and data from digital threats
- A device that sends data between computers and networks
- Code that repeats instructions
- A value in a program that can change
- Technology doing tasks without human help
- Showing only specific data based on rules
- The physical parts of a computer
14 Clues: Code that repeats instructions • The physical parts of a computer • Finding and fixing errors in code • A list of steps to solve a problem • A value in a program that can change • Programs and apps that run on a computer • Technology doing tasks without human help • Showing only specific data based on rules • Information that can be collected and used • ...
Engineering 2026-01-17
Across
- Protection of computer systems from digital attacks
- Industry concerned with aviation and space flight
- A plan giving lists of intended events and times
- Consistently good in quality or performance
- To keep something in good condition
- Basic physical structures like roads, bridges, and power supplies
- To follow a rule or regulation
- To create a plan or drawing before building something
Down
- To put a decision or plan into effect
- A person who designs, builds, or maintains machines
- Possible to do easily or conveniently; achievable
- A liquid fossil fuel; crude oil
- Weakness in materials caused by repeated stress
- To roughly calculate the cost, value, or quantity
- A barrier constructed to hold back water
15 Clues: To follow a rule or regulation • A liquid fossil fuel; crude oil • To keep something in good condition • To put a decision or plan into effect • A barrier constructed to hold back water • Consistently good in quality or performance • Weakness in materials caused by repeated stress • A plan giving lists of intended events and times • ...
FOP 2023-04-01
Across
- SOCA’s ________ department is the first point of contact with outside organizations.
- DISM’s SIG.
- Gryphons plan & organize ______-___-___ competitions.
- SPAI attended and presented at the ____ Conference.
- SEED hosts the ___-___-Series.
- SOCA is In charge of ________ relations.
- ______ organized the SOC Open House.
Down
- Gryphons aims to promote ________ to students that are passionate about it.
- SPAI created its own Project _____.
- SPAI is part of the AI Singapore Student ____ Group.
- SEED stands for Sharing, _______, Enriching, Development.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
- SOCC is in charge of maintaining and building ________ relations.
- League Programming competition only for freshmen.
- SOCC organized Freshman Orientation ______.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • SOCC organized Freshman Orientation ______. • League Programming competition only for freshmen. • SPAI attended and presented at the ____ Conference. • SPAI is part of the AI Singapore Student ____ Group. • ...
btyetrails4 2025-02-25
Across
- Protecting data from unauthorized access
- A system software managing computer hardware
- The process of transferring data from one device to another
- Permanently removing files from a storage device
Down
- A type of scam email designed to steal user data
- Storing data over the internet instead of local systems
- A web address used to access websites
- A software that helps navigate web pages
- Company that provides internet access
9 Clues: A web address used to access websites • Company that provides internet access • Protecting data from unauthorized access • A software that helps navigate web pages • A system software managing computer hardware • A type of scam email designed to steal user data • Permanently removing files from a storage device • Storing data over the internet instead of local systems • ...
AI Cyberspace 2024-10-15
Across
- Political factors influencing behavior in cybersecurity
- Measures to protect against cyber threats.
- AI enabling systems to learn from data.
- Total points vulnerable to cyber attacks.
Down
- Actions in cyberspace for security or attack.
- Actions to exploit vulnerabilities in systems.
- Intelligence Machines simulating human intelligence processes.
7 Clues: AI enabling systems to learn from data. • Total points vulnerable to cyber attacks. • Measures to protect against cyber threats. • Actions in cyberspace for security or attack. • Actions to exploit vulnerabilities in systems. • Political factors influencing behavior in cybersecurity • Intelligence Machines simulating human intelligence processes.
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Buzzwords and Trends of Disruptive Technology 2025-07-23
6 Clues: A shared virtual world • A Cyber Security Approach • A cybersecurity strengthener • A Public Cloud Computing Service • A process used to analyse business data • The ability of computer systems to replicate human intelligence
Cyber Midterm P1 2025-12-09
6 Clues: Data at rest • Data in transit • Keeping data intact and safe • Reliable access to information • Keeps data only accessible to authorized persons • Acronym for the triad that embodies Cybersecurity as a whole
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Tecnologia de la Informacion 2023-05-06
Across
- Implica en los trabajos en tecnología de la información
- La TI admite muchas funciones comerciales y ayuda a?
- Una de las carreras que abarca la TI
- Es un tipo de tecnología de información
- Sigla de la tecnología de información
- Las empresas globales utilizan la tecnología de información para?
Down
- ¿Qué es la tecnología de la información?
- ¿La tecnología de información es responsable de?
- ¿Porqué es necesaria la tecnología de la información?
9 Clues: Una de las carreras que abarca la TI • Sigla de la tecnología de información • Es un tipo de tecnología de información • ¿Qué es la tecnología de la información? • ¿La tecnología de información es responsable de? • La TI admite muchas funciones comerciales y ayuda a? • ¿Porqué es necesaria la tecnología de la información? • ...
business 2025-05-22
Across
- Business model: selling directly to consumers (Business).
- Leaving a company, often measured in percentages (HR).
- A revolutionary idea that changes the market (Business).
- Strategy that compares performance with top competitors (Business).
Down
- Security that protects systems and data (Tech).
- Design that improves how people interact with a product (Tech).
- Bringing new workers into a company smoothly (HR).
- Total money earned (Finance).
- Group of people you market your product to (Marketing).
9 Clues: Total money earned (Finance). • Security that protects systems and data (Tech). • Bringing new workers into a company smoothly (HR). • Leaving a company, often measured in percentages (HR). • Group of people you market your product to (Marketing). • A revolutionary idea that changes the market (Business). • Business model: selling directly to consumers (Business). • ...
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Cyber Security Puzzle 2024-10-21
Across
- term used for various pop-up advertisements that show up on your computer or mobile device.
- a malware designed to deny a user or organization access to files on their computer
- what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
- specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
- the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
- refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
- A worm in cybersecurity is a type of malicious software that spreads across computer networks
- A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user
9 Clues: a malware designed to deny a user or organization access to files on their computer • term used for various pop-up advertisements that show up on your computer or mobile device. • A worm in cybersecurity is a type of malicious software that spreads across computer networks • ...
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
Cybersecurity Month 2023-09-27
Across
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
- Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
- A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
- A form of malware used by hackers to spy on you and your computer activities
- Any technology, be it software or hardware, used to keep intruders out
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications
7 Clues: Any technology, be it software or hardware, used to keep intruders out • A form of malware used by hackers to spy on you and your computer activities • Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
The Voice: October 7th, 2024 2024-10-07
Across
- Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
- What _____ look like in Canada today.
- Limited spots left for this event!
- October is what awareness month?
Down
- One of the highlighted members this week.
- Since 2012, the Chamber has advocated for improved what?
- EcoBrooks _____ Award.
7 Clues: EcoBrooks _____ Award. • October is what awareness month? • Limited spots left for this event! • What _____ look like in Canada today. • One of the highlighted members this week. • Since 2012, the Chamber has advocated for improved what? • Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
Queenbee Cybersecurity 2025-03-17
Across
- An hacker sends a ___________ email requesting the victim for sensitive information
- A _________ access by a third party is called a cyber attack
- Trojan is an example of __________ attack
Down
- Users need to use unique __________ passwords to strengthen defence against attacks
- ________ are dummy computers systems to deceive attackers
- A virtual wall between the computer and the internet is called as _______
- A person who performs a cybersecurity attack is called a _______
7 Clues: Trojan is an example of __________ attack • ________ are dummy computers systems to deceive attackers • A _________ access by a third party is called a cyber attack • A person who performs a cybersecurity attack is called a _______ • A virtual wall between the computer and the internet is called as _______ • ...
IT 2024-11-28
Across
- Field focused on protecting data from cyberattacks.
- What does IoT stand for?
- Common programming language used for AI.
- Process of identifying and fixing software issues.
Down
- A key method for securing data online.
- Smart system connecting everyday devices.
- Main component of a computer system's physical setup.
7 Clues: What does IoT stand for? • A key method for securing data online. • Common programming language used for AI. • Smart system connecting everyday devices. • Process of identifying and fixing software issues. • Field focused on protecting data from cyberattacks. • Main component of a computer system's physical setup.
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • a sense that a scammer creates when rushing you • The process of verifying a claimed identity of a user or device
CYBERSECURITY PUZZLE 2023-09-13
7 Clues: Do not visit • Shady..do not click! • Dishonest offer online • Don't ever share this to strangers! • Always change this throughout accounts! • Be careful when doing this on social media! • Publishing someone's private information on the internet
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity crossword 2023-03-17
Across
- Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- Find a synonym of preempt
Down
- What is the naming convention for ecrime category ?
- What is 84 minutes the average time for ?
- What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- Which type of accounts are mainly targeted by adversaries ?
7 Clues: Find a synonym of preempt • What is 84 minutes the average time for ? • What is the naming convention for ecrime category ? • Which type of accounts are mainly targeted by adversaries ? • Which tool can reveal hidden relationships and identify attack paths within an AD environment ? • ...
Cybersecurity Crossword 2022-05-19
Across
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- establishes a secure connection between you and the internet
- the practice of protecting critical systems and sensitive information from digital attacks.
Down
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a standalone malware computer program that replicates itself in order to spread to other computers
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
7 Clues: establishes a secure connection between you and the internet • the practice of protecting critical systems and sensitive information from digital attacks. • a set of instructions, data or programs used to operate computers and execute specific tasks • a standalone malware computer program that replicates itself in order to spread to other computers • ...
Cybersecurity Crossword 2023-11-10
Across
- What type of hacker exploits systems for personal gain and bad intention
- What is used to hide messages so only authorized people can understand?
- What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- Using deceptive measures to manipulate someone in disclosing personal information
- Data, information , device anything that is of value
- Acquiring unauthorized access to system or data
- An incident where attackers steal information without authorization?
7 Clues: Acquiring unauthorized access to system or data • Data, information , device anything that is of value • An incident where attackers steal information without authorization? • What is used to hide messages so only authorized people can understand? • What type of hacker exploits systems for personal gain and bad intention • ...
AI in education 2024-06-05
Across
- Protection of personal information.
- Lack of neutrality, prejudice.
- Guidelines or principles governing proper conduct.
- Actions taken to use something wrongly or inappropriately.
- The quality of being honest and having strong moral principles.
- The state of being clear and open.
Down
- The protection of data from unauthorized access or corruption.
- The state of being answerable or responsible.
- Practices designed to ensure secure data and systems.
- The practice of keeping information secret to prevent unauthorized access.
10 Clues: Lack of neutrality, prejudice. • The state of being clear and open. • Protection of personal information. • The state of being answerable or responsible. • Guidelines or principles governing proper conduct. • Practices designed to ensure secure data and systems. • Actions taken to use something wrongly or inappropriately. • ...
Comms & Media Crossword - October Edition 2022-10-04
Across
- This company was recently in news for launching 5G Lab-as-a-service
- Leading telecom equipment provider, & our client
- Virtual representation of a real-world physical system
- One of the most important digital challenges today
- Continuous Expenditure that companies incur
Down
- Satoshi Nakamoto was the pioneer behind this technology
- Software based technology used in Telecom
- This company launched India’s 1st multiplex in Metaverse
- Telecom players fight for this
- boAt had a K-pop concert on this platform
10 Clues: Telecom players fight for this • Software based technology used in Telecom • boAt had a K-pop concert on this platform • Continuous Expenditure that companies incur • Leading telecom equipment provider, & our client • One of the most important digital challenges today • Virtual representation of a real-world physical system • ...
MEKATRONIK T3 2024-05-24
Across
- merupakan satu teras utama revolusi industri 4.0
- satu sistem susunan dan sambungan fizikal komponen dalam satu litar
- merupakan contoh bagi sistem kawalan
- LITAR merupakan salah satu aspek penning dalam product mekatronik
- merupakan salah satu ujian kefungsian
- ..........manufacturing Hialeah pembuatan bah mental
Down
- berfungsi membekalkan arus bagi membolehkan peranti berfungsi
- ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
- ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
- jurutera jepun yang memperkenalkan konsep mekatronik
10 Clues: merupakan contoh bagi sistem kawalan • merupakan salah satu ujian kefungsian • merupakan satu teras utama revolusi industri 4.0 • ..........manufacturing Hialeah pembuatan bah mental • jurutera jepun yang memperkenalkan konsep mekatronik • berfungsi membekalkan arus bagi membolehkan peranti berfungsi • ...
Globalization and Technology 2025-02-06
Across
- Transaction on the internet like Amazon Pay, Paypal etc
- A global network the world uses for communications and other features
- A period of hundred years
- A system that gives music and transmits audio
- The act of buying and selling goods
- An Act of introducing new ideas or products
Down
- Process of exchanging Information through any medium
- A simulated experience using computer technology used by headset
- Moving things from one place to another
- Measures taken to protect a computer
10 Clues: A period of hundred years • The act of buying and selling goods • Measures taken to protect a computer • Moving things from one place to another • An Act of introducing new ideas or products • A system that gives music and transmits audio • Process of exchanging Information through any medium • Transaction on the internet like Amazon Pay, Paypal etc • ...
03 Almer Billie prabawa 2025-10-17
Across
- Memuat ulang halaman web agar tampil terbaru.
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Lembar atau jendela kecil dalam browser untuk membuka situs lain.
- menampilkan gambar atau halaman web di layar.
- Perlindungan sistem komputer dari serangan digital.
Down
- Tempat menulis alamat situs web (URL) di browser.
- Tab baru untuk membuka halaman web lain.
- Memperbarui tampilan halaman yang sedang dibuka.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
10 Clues: Tab baru untuk membuka halaman web lain. • Memuat ulang halaman web agar tampil terbaru. • menampilkan gambar atau halaman web di layar. • Memperbarui tampilan halaman yang sedang dibuka. • Tempat menulis alamat situs web (URL) di browser. • Perlindungan sistem komputer dari serangan digital. • Program untuk mengatur dan mempercepat unduhan file. • ...
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Should be tested monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Should be tested monthly • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Digital Health 2025-02-26
Across
- Large datasets analyzed to reveal patterns and trends.
- On-demand computing services over the internet.
- A secure, decentralized technology used for data integrity.
- Technology simulating human intelligence processes.
- Remote diagnosis and treatment of patients using technology.
- Ability of different systems to exchange and use information.
Down
- Protection of digital systems from attacks and threats.
- Use of digital technologies to improve healthcare delivery.
- Digital version of a patient's paper chart.
- AI technique that allows systems to learn from data.
10 Clues: Digital version of a patient's paper chart. • On-demand computing services over the internet. • Technology simulating human intelligence processes. • AI technique that allows systems to learn from data. • Large datasets analyzed to reveal patterns and trends. • Protection of digital systems from attacks and threats. • ...
pasar uang dan ekonomi digital 2024-02-28
Across
- sektor pendukung ekonomi digital
- contoh E-Commerce yang ada di Indonesia
- sumber pendanaan dalam pasar uang yang berupa utang dagang
- karakteristik pasar uang
- peluang bisnis ekonomi digital
Down
- pekerjaan masyarakat Indonesia dengan adanya media online
- masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
- ekonomi digital sangat efisien
- salah satu memanfaatkan ekonomi digital adalah membuat
- karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
- kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
- berperan sebagai perantara di antara pelaku dalam Pasar Uang
- salah satu fungsi pasar uang
- instrumen pasar uang yang diteritkan Bank Umum
- pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga
15 Clues: karakteristik pasar uang • salah satu fungsi pasar uang • ekonomi digital sangat efisien • peluang bisnis ekonomi digital • sektor pendukung ekonomi digital • contoh E-Commerce yang ada di Indonesia • instrumen pasar uang yang diteritkan Bank Umum • salah satu memanfaatkan ekonomi digital adalah membuat • pekerjaan masyarakat Indonesia dengan adanya media online • ...
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02
Across
- The protection of information and systems from cyberattacks
- A threat originating from within an organization
- The overall protection of computer systems and data
- A weakness in a computer system that can be exploited
- The transfer of information between devices
Down
- The act of stealing or manipulating data
- Unintentional harm caused to data or systems
- A threat originating from the internet
- The practice of illegally gaining access to a computer system
9 Clues: A threat originating from the internet • The act of stealing or manipulating data • The transfer of information between devices • Unintentional harm caused to data or systems • A threat originating from within an organization • The overall protection of computer systems and data • A weakness in a computer system that can be exploited • ...
TEMA 2 2025-10-23
Across
- Mata uang kripto pertama di dunia.
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- Sistem keamanan siber untuk perlindungan data.
- Teknologi dasar dari mata uang kripto.
- Kegiatan ekonomi melalui media internet.
- Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- Aplikasi belanja online yang berwarna oranye.
- Transaksi keuangan melalui jaringan komputer disebut ...
- Sistem pembayaran tanpa uang tunai.
- Bentuk pasar digital tempat jual beli online.
Down
- Mata uang digital yang populer dan terdesentralisasi.
- Perusahaan teknologi keuangan disebut ...
- Mata uang digital resmi dari bank sentral disebut ...
- kredit Alat pembayaran berbentuk kartu dari bank.
- shopping Proses jual beli yang terjadi secara online.
- Teknologi virtual yang berkembang bersama ekonomi digital.
- Metode pembayaran dengan memindai kode.
- Salah satu dompet digital terkenal di Indonesia.
- Salah satu e-wallet milik Gojek.
- banking Layanan bank yang sepenuhnya berbasis internet.
20 Clues: Salah satu e-wallet milik Gojek. • Mata uang kripto pertama di dunia. • Sistem pembayaran tanpa uang tunai. • Teknologi dasar dari mata uang kripto. • Metode pembayaran dengan memindai kode. • Kegiatan ekonomi melalui media internet. • Perusahaan teknologi keuangan disebut ... • Aplikasi belanja online yang berwarna oranye. • Bentuk pasar digital tempat jual beli online. • ...
Live Dictionary Crossword Day 20 2025-12-11
Across
- When milk is left out for too long it does this
- A large fabric that covers a window or something similar
- Protection from electronic maliciousness
- A father
Down
- Describes something that can be altered easily to its owner’s whim
- An earthy spice eaten whole or ground
- Stop fucking saying them
- A collective of people who share or follow extreme beliefs
8 Clues: A father • Stop fucking saying them • An earthy spice eaten whole or ground • Protection from electronic maliciousness • When milk is left out for too long it does this • A large fabric that covers a window or something similar • A collective of people who share or follow extreme beliefs • Describes something that can be altered easily to its owner’s whim
Cybersecurity Crossword 2021-11-14
Across
- Proving your identity
- Encrypting files and holding them hostage for money
Down
- A horse with a surprise
- software designed to corrupt or steal information
- Pretending to be someone you are not to extract information out of someone
- A denial of service attack targets this
- a brute force attack takes a long time to work on this
7 Clues: Proving your identity • A horse with a surprise • A denial of service attack targets this • software designed to corrupt or steal information • Encrypting files and holding them hostage for money • a brute force attack takes a long time to work on this • Pretending to be someone you are not to extract information out of someone
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crossword 2023-07-25
Across
- Unauthorized individuals gaining physical access through closely following authorized personnel
- A form of business risk resulting from cyberattacks or data breache
Down
- Suspicious emails
- Another word for tailgating
- Unexpected behavior exhibited by software applications, such as crashes could be caused by
- Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
- could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.
7 Clues: Suspicious emails • Another word for tailgating • A form of business risk resulting from cyberattacks or data breache • Unexpected behavior exhibited by software applications, such as crashes could be caused by • Unauthorized individuals gaining physical access through closely following authorized personnel • ...
CyberSecurity Awareness 2025-07-23
7 Clues: Multi-____ Authentication • being hidden from public view • conversion of information to code • "Enter your username and ______." • Security Assurance for the Federal Reserve • security protocols; organized into 'families' • fake correspondence sent by a 'Nigerian Prince'
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
cruciverba cybersecurity 2025-11-17
Across
- : Copia di sicurezza dei dati
- : Trasformare i dati in codice per proteggerli
- : Chiave segreta per accedere a un account
Down
- : Software dannoso che infetta il computer
- : Tentativo di rubare dati fingendosi qualcuno di fidato via email
- : Protezione che filtra il traffico di rete
- : Rete privata virtuale che protegge la connessione
7 Clues: : Copia di sicurezza dei dati • : Software dannoso che infetta il computer • : Chiave segreta per accedere a un account • : Protezione che filtra il traffico di rete • : Trasformare i dati in codice per proteggerli • : Rete privata virtuale che protegge la connessione • : Tentativo di rubare dati fingendosi qualcuno di fidato via email
KeyW Crossword 2017-01-19
Across
- Radio Detection and Ranging
- KeyW non-profit organization abbreviated
- KeyW's colors
- What is the name of our newsletter
- How many bridges connect Key West to Florida main land
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our mascot
- Parrot Ball location
- What color is our KeyW van
- What type of bird is our mascot
Down
- When at work, what must you always carry
- Protection of networks, computers, programs, and data from attack
- KeyW's best location
- Time sheet
- KeyW CEO
- What is the surname of KeyW's founder
- Which food truck offers the best cheese steaks
- Applying statistical analysis to data which has a geographical or spatial aspect
- What month was KeyW founded
- How many buildings does the Severn location have
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • Radio Detection and Ranging • What month was KeyW founded • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07
Across
- Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
- O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
- Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
- Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
- Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
- Dunyodagi eng yirik e-tijorat platformalaridan biri?
- Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
- Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
- Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
- Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
- Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
- Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
- Elektron hukumat tizimi bo‘yicha yetakchi davlat?
- Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
- Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
- Sun’iy intellekt sohasida yetakchi davlatlardan biri?
- Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
- Dunyodagi eng yirik texnologik kompaniyalardan biri?
- O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
- Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?
20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat? • Dunyodagi eng yirik e-tijorat platformalaridan biri? • Dunyodagi eng yirik texnologik kompaniyalardan biri? • Elektron tijorat bo‘yicha yetakchi davlatlardan biri? • Sun’iy intellekt sohasida yetakchi davlatlardan biri? • Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma? • ...
cpsc4240 2024-10-31
Across
- legal license that allows you to use and edit a product
- protecting systems and networks from digital attacks
- type of attack that can be caused by a nuke
- linuxdef
- number that determines process priority
- each one has a unique PID
- leaked the docs
- command to add user
- command to open this user is su
- command to control log settings
- partition that allows for temp storage
- link that points to another file
Down
- only letting users access what they need
- feature that logs metadata
- read write execute
- having many security layers
- system that has both ipv4 and ipv6
- file that discards all data written to it
- type of link that creates a direct copy
- file that stores password hashes
- sets file permission upon create
- process that creates child
- command to run a privileged command
- attaching a filesystem to another
24 Clues: linuxdef • leaked the docs • read write execute • command to add user • each one has a unique PID • feature that logs metadata • having many security layers • process that creates child • command to open this user is su • command to control log settings • file that stores password hashes • sets file permission upon create • link that points to another file • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Risiko ekonomi digital adalah kebocoran
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Fintech merupakan singkatan dari
- → Perusahaan baru yang berbasis teknologi disebut
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Keamanan transaksi online dikenal dengan istilah
- → Masa depan ekonomi digital bergantung pada literasi
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Contoh aplikasi fintech di Indonesia adalah
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
rahef isna 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
Digital media literacy 2023-09-14
Across
- a setting you turn on to camouflage yourself from internet scammers
- this is where you install games and streaming services
- a streaming service that is very well known
- people that lure people into giving them there bank details
- a way of protecting you from hackers
Down
- a website in which you order from and it’s delivered to your door
- an answer to all your questions
- watch videos from your favourite content creator
- tweet tweet
- a social media app with a blue logo
- a corporation run by bill gates
- some the would be powered by electricity
12 Clues: tweet tweet • an answer to all your questions • a corporation run by bill gates • a social media app with a blue logo • a way of protecting you from hackers • some the would be powered by electricity • a streaming service that is very well known • watch videos from your favourite content creator • this is where you install games and streaming services • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
TDD 2023-09-19
Across
- Think before you _____.
- One of the common internet search engine used nowadays.
- Do not share your account ______ to anyone.
- We should avoid sharing any _______ news without validating the sources.
- #1 popular social media. CEO – Mark Zuckerberg
Down
- ______ has been recognized as Cybersecurity awareness month.
- One of Amcor values.
- _______ make human sick as well as computer.
- Operating System
- Short form of wireless network.
- ____ your laptop when you are stepping away. You need a key to unlock it.
- They are referred as small insects in mother nature. IT referred them as errors in computer program/system.
12 Clues: Operating System • One of Amcor values. • Think before you _____. • Short form of wireless network. • Do not share your account ______ to anyone. • _______ make human sick as well as computer. • #1 popular social media. CEO – Mark Zuckerberg • One of the common internet search engine used nowadays. • ______ has been recognized as Cybersecurity awareness month. • ...
internet safety 2023-04-19
Across
- a part of a computer system or network which is designed to block unwanted access
- like a cold for your computer
- the state of being protected against the criminal use of electronic data
- bulling done over the internet
- a person or thing that hacks
- a world wide computer network
- websites and apps that let users create and share content EX.Snapchat
Down
- a piece of information needed to log in to the internet
- the state of being free from public attention
- be careful what you make public
- information made available by a website
- facts given to learn about someone or something
12 Clues: a person or thing that hacks • like a cold for your computer • a world wide computer network • bulling done over the internet • be careful what you make public • information made available by a website • the state of being free from public attention • facts given to learn about someone or something • a piece of information needed to log in to the internet • ...
Quality Month Quiz 2022-11-04
Across
- a type of cybersecurity attack that attempts to steal your information
- Plays A VITAL ROLE IN YOUR APPRAISAL
- Skill / Knowledge to do a process
- Property of accuracy and completeness
- are implemented to mitigate the identified risks
- Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
- Tailgating is also termed as
- Portrays the hierarchy in organisation / function
- plan to achieve a long-term or overall objective
- Non-fulfilment of a requirement
- A weakness of an asset or control that could potentially be exploited by one or more threats
- How many Quality Management Principle in QMS
12 Clues: Tailgating is also termed as • Non-fulfilment of a requirement • Skill / Knowledge to do a process • Plays A VITAL ROLE IN YOUR APPRAISAL • Property of accuracy and completeness • How many Quality Management Principle in QMS • plan to achieve a long-term or overall objective • are implemented to mitigate the identified risks • ...
Tech Talks: Crossword Edition 2025-08-28
Across
- Structured support to help startups develop and scale
- Field involving the design and creation of automated machines
- Protecting systems and networks from digital threats
- Using fingerprints, facial recognition, or voice for authentication
- Technology that uses living organisms or cells to develop products
Down
- Testing environment for disruptive technologies
- Raising capital from the public to fund innovation projects
- High-risk funding enabling tech companies to grow rapidly
- Collaborative network of startups, funders, and enablers driving innovation
- MOSTI platform certifying local R&D products for procurement
- Tech innovation transforming financial services
- Unmanned aerial vehicle used in delivery, agriculture, and surveillance
12 Clues: Testing environment for disruptive technologies • Tech innovation transforming financial services • Protecting systems and networks from digital threats • Structured support to help startups develop and scale • High-risk funding enabling tech companies to grow rapidly • Raising capital from the public to fund innovation projects • ...
Zero-Trust 2025-07-23
Across
- Zero Trust eliminates ___ ports to reduce attack surface.
- – Zero Trust enforces least ___ access to minimize risk.
- Every session in a Zero Trust model must be fully ___.
- OT compliance standard Secomea adheres to (abbr.).
- A secure remote access company built for OT.
- Traffic allowed in Zero Trust: ___-only.
Down
- Access should only be granted when it is scheduled and ___.
- – What Zero Trust replaces: ___ perimeter security.
- All users and devices must be continuously ___.
- European directive Secomea helps manufacturers comply with (abbr.).
- This cybersecurity model assumes no inherent trust: Zero ___.
11 Clues: Traffic allowed in Zero Trust: ___-only. • A secure remote access company built for OT. • All users and devices must be continuously ___. • OT compliance standard Secomea adheres to (abbr.). • – What Zero Trust replaces: ___ perimeter security. • Every session in a Zero Trust model must be fully ___. • – Zero Trust enforces least ___ access to minimize risk. • ...
AI Lesson 2023-03-06
Across
- A type of machine learning that is modeled after the structure and function of the human brain
- data __________
- e.g. Siri, Alexa
- using machines to perform tasks that are normally done by humans
- e.g. fingerprints, facial recognition software
- the design, construction, operation and use of robots
- AI that learns about knowledge that humans know naturally
Down
- using firewalls and antivirus software to prevent computers from being attacked
- using large datasets to find patterns and insights
- AI that learns and improves from experience by itself
- a household that uses internet-connected devices to control appliances
- feeling/emotion
- a set of instructions that complete a task
13 Clues: data __________ • feeling/emotion • e.g. Siri, Alexa • a set of instructions that complete a task • e.g. fingerprints, facial recognition software • using large datasets to find patterns and insights • AI that learns and improves from experience by itself • the design, construction, operation and use of robots • AI that learns about knowledge that humans know naturally • ...
Digital Technology 2025-04-26
Across
- After the pandemic, ____became normal in many industries.
- _____ is common in car manufacturing factories today.
- _____ forces companies to rethink their strategies.
- _____ helps doctors detect diseases earlier.
- Some companies practice _____ to hire cheaper labor abroad.
- A ____must find new clients to stay successful.
- A _____ usually needs to innovate to survive against big companies.
Down
- _____ experts are essential to protect sensitive company information.
- Many small businesses survive thanks to ____ platforms.
- With _____ , you can visit a museum without leaving your house.
- ____ reduces the need for repetitive human tasks.
- _____ helps banks process transactions faster and more securely.
- Laws about the _____ aim to prevent employee burnout.
13 Clues: _____ helps doctors detect diseases earlier. • A ____must find new clients to stay successful. • ____ reduces the need for repetitive human tasks. • _____ forces companies to rethink their strategies. • _____ is common in car manufacturing factories today. • Laws about the _____ aim to prevent employee burnout. • ...
Zine Crossword 2022-04-16
Across
- Considered to be the first hacker
- The website on which anonymous would plan their attacks
- The film that produced the famous hacking mask
Down
- The protection of information on the internet
- One of the colors of the three types of hackers
- The headwear associated with hacking
- A form of harm done on the internet
- Famous hacking group
8 Clues: Famous hacking group • Considered to be the first hacker • A form of harm done on the internet • The headwear associated with hacking • The protection of information on the internet • The film that produced the famous hacking mask • One of the colors of the three types of hackers • The website on which anonymous would plan their attacks
soujanya hazra 2025-06-19
Across
- Designed to protect network
- Illegal entry into a computer system or network.
- the process of 'befriending' children on social media.
- Hoaxing or misleading.
- It is an act of harming or harassing using information technology in a deliberate manner
Down
- Vital Information Resources Under Seize
- Any criminal activity intended to harm anyone using the computer.
- They do Cybercrime.
8 Clues: They do Cybercrime. • Hoaxing or misleading. • Designed to protect network • Vital Information Resources Under Seize • Illegal entry into a computer system or network. • the process of 'befriending' children on social media. • Any criminal activity intended to harm anyone using the computer. • ...
Science and Technology 2025-02-11
Across
- A computer-generated simulation of a three-dimensional environment
- The application of scientific knowledge for practical purposes
- The branch of technology dealing with robots
- Related to genes and heredity
- Avoiding depletion of natural resources for long-term balance
Down
- Information processed or stored by a computer (
- The use of technology to complete tasks with minimal human input
- Protection against cyber threats and attacks
- A new idea or method
9 Clues: A new idea or method • Related to genes and heredity • Protection against cyber threats and attacks • The branch of technology dealing with robots • Information processed or stored by a computer ( • Avoiding depletion of natural resources for long-term balance • The application of scientific knowledge for practical purposes • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Techniques 2024-11-06
Across
- A protocol designed to provide privacy and security over the internet by encapsulating traffic
- The latest security protocol for Wi-Fi, enhancing protections against attacks.
- An advanced Linux technology used for monitoring and packet observability in real-time.
- A term related to busting common misconceptions in the open and secure cyberspace.
Down
- Data collected from devices or systems for monitoring and analysis, used in intelligent security
- Malicious software designed to infiltrate or damage computer systems.
- The practice of collecting, analyzing, and preserving digital evidence.
7 Clues: Malicious software designed to infiltrate or damage computer systems. • The practice of collecting, analyzing, and preserving digital evidence. • The latest security protocol for Wi-Fi, enhancing protections against attacks. • A term related to busting common misconceptions in the open and secure cyberspace. • ...
HACKING TERMS 2023-11-13
Across
- Software designed to harm or exploit computer systems
- A deliberate attempt to exploit computer systems or networks.
- A reward offered for discovering and reporting software bugs
- A secret word or phrase used for authentication.
- A series of instructions for a computer to execute.
- Protective measures against digital threats
Down
- Ethical hackers working to improve security
- The right to keep personal information and activities confidential.
- A weakness or flaw in a system that can be exploited.
- The process of converting information into a code for security.
10 Clues: Ethical hackers working to improve security • Protective measures against digital threats • A secret word or phrase used for authentication. • A series of instructions for a computer to execute. • Software designed to harm or exploit computer systems • A weakness or flaw in a system that can be exploited. • ...
Tech Terms 2023-12-01
Across
- - Software for accessing and navigating the internet. (7)
- - Step-by-step procedure for solving a problem. (8)
- Reality - Computer-generated environment that simulates reality. (13)
- - Secret code to access a protected system. (8)
- - Transfer files from the internet to a computer. (8)
Down
- - Measures to protect computer systems from theft or damage. (12)
- - Security system that prevents unauthorized access. (8)
- - Process of converting data into a code to secure it. (10)
- - Portable device with touchscreen features. (10)
- - Writing instructions for a computer program. (6)
10 Clues: - Secret code to access a protected system. (8) • - Portable device with touchscreen features. (10) • - Writing instructions for a computer program. (6) • - Step-by-step procedure for solving a problem. (8) • - Transfer files from the internet to a computer. (8) • - Security system that prevents unauthorized access. (8) • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Lapisan OSI ke 3
- topologi jaringan berbentuk bintang
- Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
- Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
- salah satu prinsip keamanan jaringan
Down
- mekanisme pertukaran data
- kegiatan tata kelola data
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Salah satu macam jenis jaringan komputer
10 Clues: Lapisan OSI ke 3 • mekanisme pertukaran data • kegiatan tata kelola data • topologi jaringan berbentuk bintang • salah satu prinsip keamanan jaringan • Salah satu macam jenis jaringan komputer • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet) • ...
RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26
Across
- Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
- Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
- Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
- Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
- Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
- MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
- IoT ATAMASINING MA'NOSI
- To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
- Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
- DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI
10 Clues: IoT ATAMASINING MA'NOSI • Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni. • MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA • To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi. • Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon. • Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita. • ...
INFORMATION GOVERNANCE SUMMER FUN 2017-08-08
Across
- Coming soon,in May 2018!
- New term under GDPR
- Increasing threat for us all
- Have you filled the new role required under GDPR?
- Process which becomes a legal requirement under GDPR
Down
- Part of important review by NDG 2016
- Mustn't forget this important law for patients
- What could happen to to you in 2018 if you steal personal data
- Part of revised definition for sensitive personal data under GDPR
9 Clues: New term under GDPR • Coming soon,in May 2018! • Increasing threat for us all • Part of important review by NDG 2016 • Mustn't forget this important law for patients • Have you filled the new role required under GDPR? • Process which becomes a legal requirement under GDPR • What could happen to to you in 2018 if you steal personal data • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Month Crossword 2023-09-18
Across
- A security process that requires users to provide two different authentication factors before gaining access.
- Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- The process of examining network traffic to identify anomalies and potential security threats.
- Software designed to detect, prevent, and remove malicious software from a computer or network.
- A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.
15 Clues: The process of examining network traffic to identify anomalies and potential security threats. • Software designed to detect, prevent, and remove malicious software from a computer or network. • The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality. • ...
CODING VOCABULARY 2023-02-03
Across
- NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
- ANY CHARACTER OR OBJECT USED IN BLOCK CODING
- A FREE PROGRAMMING LANGUAGE
- MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
- ASKING IF A CONDITION IS MET
- SET OF LOGICAL STEPS CARRIED OUT IN ORDER
- OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
- FINDING WEAKNESSES IN DIGITAL DEVICES
- IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
- PROTECTING SENSITIVE DIGITAL INFORMATION
- TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
- MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
- DATA ENTERED BY A USER
- INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
- NAMES USED TO HOLD ONE OR MORE VALUES
- THE WAY SOMETHING IS WRITTEN
16 Clues: DATA ENTERED BY A USER • A FREE PROGRAMMING LANGUAGE • ASKING IF A CONDITION IS MET • THE WAY SOMETHING IS WRITTEN • NAMES USED TO HOLD ONE OR MORE VALUES • FINDING WEAKNESSES IN DIGITAL DEVICES • PROTECTING SENSITIVE DIGITAL INFORMATION • SET OF LOGICAL STEPS CARRIED OUT IN ORDER • ANY CHARACTER OR OBJECT USED IN BLOCK CODING • INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO • ...
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Knowledge Exchange Christmas Quiz 2023-12-05
7 Clues: Santa's helpers. • Guides Santas Sleigh • Last IT Tuesday topic • The Snowman with a corncob pipe and button nose. • At Savannah, we have a culture of continuous .... • Intranet location to learn more about IT initiatives. • The Centre of is where you can find further information on continuous improvement
Technological Impacts on Business & Commerce 2023-05-03
Across
- Radio Frequency Identification
- Global Positioning System
- A type of social media used by many businesses
- An immersive, interactive, computer-generated experience
- A type of mobile technology
- A common type of online payment system.
- Bullying someone online
- Technologies that require little to no human involvement to operate
- Computers that mimic human cognitive abilities
Down
- Customizing goods or services to consumers needs and preferences
- Safeguarding computer systems and networks
- The network of real-world things that exchange data form one another
- The network of businesses involved in product distribution
- Natural Language Processing
- The exchange of goods and services electronically
- Providing for the needs of this generation without compromising the needs for future generations
- A type of skill that is essential for ICT.
17 Clues: Bullying someone online • Global Positioning System • Natural Language Processing • A type of mobile technology • Radio Frequency Identification • A common type of online payment system. • Safeguarding computer systems and networks • A type of skill that is essential for ICT. • A type of social media used by many businesses • Computers that mimic human cognitive abilities • ...
Education 2025-08-08
Across
- – Not just a name —where finance meets fun.
- – GBS emphasises this as one of the USP
- — Once a GBS student, always one—albeit slightly sarcastic.
- - Easy Lunch between ____
- – Period during which a student can cancel without tuition penalty
- – rewards that help students
- – Framework applied across GBS’s regulatory documents
- – Core value in GBS’s mission to create an inclusive environment
- – Central theme in GBS’s policies on personal data handling
Down
- — Where students start, and strong futures build.
- – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
- — The _____ that whispers, ‘Look at me, I promise futures!
- – Keeping hackers’ fingers off your grades.
- – Referring to NSS scores.
- – Online events offering insight into GBS programs
- – Where silence studies hard
- – Studying trips without leaving the campus
17 Clues: - Easy Lunch between ____ • – Referring to NSS scores. • – rewards that help students • – Where silence studies hard • – GBS emphasises this as one of the USP • – Keeping hackers’ fingers off your grades. • – Not just a name —where finance meets fun. • – Studying trips without leaving the campus • — Where students start, and strong futures build. • ...
KeyW Crossword 2017-01-19
Across
- What is the name of our mascot
- Parrot Ball location
- KeyW's colors
- What month was KeyW founded
- What color is our KeyW van
- KeyW's best location
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- Applying statistical analysis to data which has a geographical or spatial aspect
- Time sheet
- What type of bird is our mascot
- Which food truck offers the best cheese steaks
Down
- What is the surname of KeyW's founder
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our newsletter
- Radio Detection and Ranging
- How many miles connect Key West to Florida main land
- KeyW non-profit organization abbreviated
- KeyW CEO
- When at work, what must you always carry
20 Clues: KeyW CEO • Time sheet • KeyW's colors • Parrot Ball location • KeyW's best location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • KeyW non-profit organization abbreviated • ...
Wedding 2024-06-08
Across
- What Stacey used to refer Michael to when they first started dating
- Where did Michael and Stacey meet
- Michael’s birthday month
- Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
- The number of years the couple is together
- Honeymoon destination
- Their favourite season
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- What the groom has for breakfast everyday
- Michael’s job industry
- Number of their siblings all together
- Stacey’s favourite food (hint: ask father of bride)
- Michael’s middle name
- Who’s the better cook
Down
- Mr & Mrs _____
- City where Michael was born
- Michael’s favourite drink
- Where did Michael propose
- Brand of Michael’s car
- Flavour of the wedding cake
- Stacey’s birthday month
- Favourite AFL team (hint: ask Best Man)
- Stacey’s best friend
- How long has Stacey been in Australia for
- The age gap between the bride and the groom
25 Clues: Mr & Mrs _____ • Stacey’s best friend • Honeymoon destination • Michael’s middle name • Who’s the better cook • Brand of Michael’s car • Their favourite season • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Michael’s favourite drink • Where did Michael propose • City where Michael was born • Flavour of the wedding cake • Where did Michael and Stacey meet • ...
Crosswords 2024-07-16
Across
- plan for successful digital transformation
- immediate data analysis
- large sets of data analyzed for insights
- combining data from different sources
- management of the flow of goods and services
- successful digital use by employees
- system that integrates various business processes
- virtual model of a physical object or system
- protection in digital business environments
- network of interconnected devices
- system for managing customer relationships
- accuracy and reliability of data
Down
- digital change impacting business processes
- redesigning business processes for improvement
- use of technology to perform tasks
- analysis of data for business insights
- based ERP solutions
- process of adopting ERP systems
- technology enhancing supply chain transparency
- integration of artificial intelligence in business
- isolated data storage within an organization
- improved by ERP systems
- analytics for customer engagement
- considerations in using AI and big data
- user experience in digital product design
25 Clues: based ERP solutions • immediate data analysis • improved by ERP systems • process of adopting ERP systems • accuracy and reliability of data • analytics for customer engagement • network of interconnected devices • use of technology to perform tasks • successful digital use by employees • combining data from different sources • analysis of data for business insights • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
Maura & Spencer 2023-05-19
Across
- Spencer's favorite basketball player
- Where they moved after college
- The name of their cat
- Favorite "Fast Food"
- Brides Favorite Alcoholic Drink
- Spencer's Favorite Hobby
- Where did Maura & Spencer travel to this year
- Who gave out their phone number first?
- Where do they live
- Maura and Spencers First Born
- Maura's favorite Disney Movie
- How many years will they be together in September?
- Maura's middle name
- Maura's Job
Down
- Maura's Favorite Color
- What social media platform did Spencer use to slide in Maura's DM's
- Where did Maura go after DC
- Maura's Favorite Hobby
- Where Maura and Spencer met
- Where did Spencer propose?
- Spencer's Favorite Color
- What month did they get engaged
- The last addition to Maura & Spencers family
- Grooms Favorite Alcoholic Drink
- Spencers Job
- What was Maura's sport growing up
- Spencer's middle name
27 Clues: Maura's Job • Spencers Job • Where do they live • Maura's middle name • Favorite "Fast Food" • The name of their cat • Spencer's middle name • Maura's Favorite Color • Maura's Favorite Hobby • Spencer's Favorite Color • Spencer's Favorite Hobby • Where did Spencer propose? • Where did Maura go after DC • Where Maura and Spencer met • Maura and Spencers First Born • ...
Lushi and John 2025-02-22
Across
- Lushi's favorite alcoholic beverage
- First date restaurant
- John’s middle name
- Lushi’s favorite dessert
- John’s go-to drink
- Lushi’s favorite color
- Lushi’s favorite holiday
- John’s work industry
- City where they met
- Total number of their dogs
- Lushi’s favorite snack to make
- Month of their engagement
- Total countries visited together
- John’s favorite music band
- Favorite shared activity
Down
- Lushi’s favorite cuisine
- John’s hometown
- John’s favorite food
- University John attended
- Their dream honeymoon destination
- First international trip destination
- Who is older between them
- Place where John proposed
- Lushi’s favorite board game
- how John likes his coffee
- Lushi’s favorite time of year
- City they live in
- Lushi’s mom’s employer
- Name of their corgi
- Month of dating anniversary
- John’s favorite video game
- Color of John’s eyes
32 Clues: John’s hometown • City they live in • John’s middle name • John’s go-to drink • City where they met • Name of their corgi • John’s favorite food • John’s work industry • Color of John’s eyes • First date restaurant • Lushi’s favorite color • Lushi’s mom’s employer • Lushi’s favorite cuisine • University John attended • Lushi’s favorite dessert • Lushi’s favorite holiday • ...
TTS INFORMATIKA 2025-04-14
Across
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Penipuan online melalui email atau situs palsu.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Teknik mengakses sistem tanpa otorisasi.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Kata sandi dalam sistem keamanan.
- Jenis virus komputer
Down
- Program pengintai aktivitas pengguna tanpa izin.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Aksi mencari celah dalam sistem komputer.
- Istilah lain untuk keamanan jaringan
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Penyerang digital yang memiliki tujuan jahat.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Istilah lain untuk keamanan jaringan
- Penipuan online melalui email atau situs palsu.
- Penyerang digital yang memiliki tujuan jahat.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Aksi mencari celah dalam sistem komputer.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Sistem keamanan biometrik yang menggunakan sidik jari.
Down
- Proses identifikasi atau verifikasi pengguna
- Sandi digital yang dipakai untuk keamanan transaksi.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Teknik mengakses sistem tanpa otorisasi.
- Program pengintai aktivitas pengguna tanpa izin.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Jenis virus komputer
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Kata sandi dalam sistem keamanan.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS_EvandaDandy_14xh 2025-04-15
Across
- Orang yang membuat desain antarmuka.
- HAKI singkatan dari...?
- Lembaga yang mengurus HAKI di Indonesia.
- Menyebarkan konten ke publik secara digital disebut?
- Hak yang melindungi karya cipta.
- Simbol yang digunakan untuk pencarian kata bebas.
- Profesi yang membuat aplikasi disebut?
- Platform berbagi video populer.
- Informasi palsu di internet disebut?
- PENGELOLA sistem jaringan.
Down
- Proses membuat konten disebut?
- Proses memeriksa kebenaran konten disebut?
- Kata kunci yang digunakan untuk mengabaikan kata tertentu.
- Salah satu bentuk HAKI untuk brand dagang.
- Elemen tradisional dalam konten digital disebut unsur...?
- Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
- yang menganalisis data.
- Simbol untuk laporan konten di media sosial.
- Ahli keamanan siber disebut...?
- Contoh media digital untuk menyebarkan budaya.
- Sistem otomatis untuk menyaring konten.
- Mesin pencari paling populer.
- Konten berbahaya disebut konten...?
- Simbol untuk mencari sinonim kata (gunakan ~).
- Hak eksklusif atas penemuan teknologi.
25 Clues: yang menganalisis data. • HAKI singkatan dari...? • Mesin pencari paling populer. • Platform berbagi video populer. • Proses membuat konten disebut? • Hak yang melindungi karya cipta. • PENGELOLA sistem jaringan. • Simbol untuk mencari sinonim kata (gunakan ~). • Simbol yang digunakan untuk pencarian kata bebas. • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
IT Terminology 2025-05-15
Across
- Distributed ledger technology with cryptographic linking.
- Using scripts or software to perform tasks without manual input.
- Project management method using small, iterative steps.
- Open-source operating system with many distributions.
- Network of malware-infected devices controlled remotely.
- Practice of protecting digital assets from threats.
- Converting data into unreadable code for protection.
- Flooding a network with traffic to disrupt service.
- A sequence of instructions used in software tasks.
- Low-level code interacting directly with hardware.
- On-demand delivery of IT resources over the internet.
- Malware that demands payment to unlock encrypted data.
Down
- Computers mimicking human cognitive functions.
- Professional who interprets data to help decision-making.
- Wireless technology for short-distance device communication.
- Numeric label identifying devices on a network.
- Loss of signal strength in networking cables.
- Attempt to infiltrate digital systems maliciously.
- Developer who creates the visual interface of websites.
- Temporary storage for fast data retrieval.
20 Clues: Temporary storage for fast data retrieval. • Loss of signal strength in networking cables. • Computers mimicking human cognitive functions. • Numeric label identifying devices on a network. • Attempt to infiltrate digital systems maliciously. • A sequence of instructions used in software tasks. • Low-level code interacting directly with hardware. • ...
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Perusahaan baru yang berbasis teknologi disebut
- → Kecerdasan buatan dikenal juga dengan istilah
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pemasaran melalui media sosial disebut
- → Contoh aplikasi fintech di Indonesia adalah
Down
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Berjualan melalui marketplace online termasuk kegiatan
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masa depan ekonomi digital bergantung pada literasi
- → Risiko ekonomi digital adalah kebocoran
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 2025-10-27
Across
- Tokopedia dan Shopee termasuk jenis platform ini.
- Teknologi penyimpanan data berbasis internet.
- Proses jual beli melalui internet.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Proses promosi produk melalui media sosial.
- Salah satu contoh dompet digital di Indonesia.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Singkatan dari Financial Technology.
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Media sosial yang sering digunakan untuk promosi produk.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Pihak yang menjual barang atau jasa di internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
