cybersecurity Crossword Puzzles

Kaien 8Gamma 2023-01-19

Kaien 8Gamma crossword puzzle
Across
  1. it is created when that data has been processed and becomes meaningful.
  2. a secret word that must be used to gain admission to a place.
  3. number a number that you dial on the telephone to reach a particular person, business, and more.
  4. media a collective term of website that focus on communication and more.
  5. a panel of keys that operate a computer or typewriter.
Down
  1. it is the practice of protecting system, networks, and programs from digital attacks.
  2. a device where people use to communicate when ever they want.
  3. a social media that was created by Mark Zuckerberg.
  4. a app that you could search anything.
  5. it is the raw facts and figures.

10 Clues: it is the raw facts and figures.a app that you could search anything.a social media that was created by Mark Zuckerberg.a panel of keys that operate a computer or typewriter.a device where people use to communicate when ever they want.a secret word that must be used to gain admission to a place....

IT and Tech 2023-10-03

IT and Tech crossword puzzle
Across
  1. Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
  2. The evaluation or appraisal of someone or something.
  3. The practice of recruiting highly skilled individuals for specialized positions.
  4. Measures taken to protect computer systems, networks, and data from cyber threats.
Down
  1. Solutions Services or strategies for finding and hiring suitable employees.
  2. The process of integrating a new employee into a company.
  3. The practice of analyzing and interpreting complex data sets to inform decision-making.

7 Clues: The evaluation or appraisal of someone or something.The process of integrating a new employee into a company.Solutions Services or strategies for finding and hiring suitable employees.The practice of recruiting highly skilled individuals for specialized positions.Measures taken to protect computer systems, networks, and data from cyber threats....

Women's Engineering Day 2024-06-24

Women's Engineering Day crossword puzzle
Across
  1. Making sure everyone gets a seat at the table.
  2. What is AWS's managed service for creating machine learning models?
  3. A network of smart gadgets chatting and sharing secrets.
  4. Application store for IOS
  5. A jolt of creativity that sparks new ideas.
  6. The magical code that breathes life into machines.
  7. A shared and immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
  8. What is the practice of deploying software updates without downtime called?
  9. What is AWS's container orchestration service?
Down
  1. What is the practice of breaking down applications into smaller, manageable services?
  2. Combining the wonders of nature with cutting-edge tech.
  3. The dream that fuels your journey to success.
  4. What is the term for a lightweight, standalone, and executable package that includes everything needed to run a piece of software?
  5. Apple's intelligent personal assistant
  6. A quest to create thinking machines that rival human wits.
  7. A kaleidoscope of different voices and perspectives.
  8. The guardians of the digital realm, defending against cyber villains.
  9. Crafting metal companions that move and think on their own.

18 Clues: Application store for IOSApple's intelligent personal assistantA jolt of creativity that sparks new ideas.The dream that fuels your journey to success.Making sure everyone gets a seat at the table.What is AWS's container orchestration service?The magical code that breathes life into machines.A kaleidoscope of different voices and perspectives....

Industrial Internet Puzzle 2016-07-27

Industrial Internet Puzzle crossword puzzle
Across
  1. The number of forces shaping the industrial internet
  2. World’s first industrial operating system
  3. The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)
  4. Headquarters for GE Digital (2 words)
Down
  1. The division of GE Digital dedicated to address potential vulnerabilities by protecting industrial assets (2 words)
  2. Current CEO for GE Digital (2 words)
  3. A virtual model of each physical production asset (2 words)
  4. Another force of the industrial internet that deals with increasing system intelligence through embedded software (2 words)
  5. One force shaping the industrial internet that has to do with transforming massive volumes into information into intelligence (2 words)

9 Clues: Current CEO for GE Digital (2 words)Headquarters for GE Digital (2 words)World’s first industrial operating systemThe number of forces shaping the industrial internetA virtual model of each physical production asset (2 words)The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)...

Risk Culture Awareness 2022-01-19

Risk Culture Awareness crossword puzzle
Across
  1. Process and risk owners are in which line of defense?
  2. the chance that an outcome or investment's actual gains will differ from an expected outcome or return
  3. level of risk that an organization is prepared to accept
  4. A mitigation strategy to eliminate the risk exposure to come into existence
  5. Risk department that reviews and provides an independent opinion to the business on lending proposals
Down
  1. this function represents the third line of defense
  2. The practice of protecting systems and information from digital attacks
  3. risk of loss resulting from ineffective or failed internal processes, people, systems
  4. A measure of the level of risk an organization is willing to accept

9 Clues: this function represents the third line of defenseProcess and risk owners are in which line of defense?level of risk that an organization is prepared to acceptA measure of the level of risk an organization is willing to acceptThe practice of protecting systems and information from digital attacks...

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Never write these down on a sticky note or a whiteboard.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. Lock your _____ and your mobile phone anytime they are not in use.
  5. Files with sensitive information should always be kept in a _____ file room or drawer.
  6. Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
  1. _____ is when an unauthorized person follows you into a secure location.
  2. Report all possible cyber _____ to the IT Service Desk.
  3. An email scam that that targets unsuspecting users to give up information.
  4. Measures taken to protect your or your organization's information from cyber attack
  5. An unauthorized person that tries to gain access to your computer.
  6. Stay _____ and be on the lookout for security threats or incidents.
  7. Always keep a _____ workspace that is free of confidential information.

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

Cyber security 2021-03-20

Cyber security crossword puzzle
Across
  1. , technology
Down
  1. , data
  2. intrusion

3 Clues: , dataintrusion, technology

Media texnologiyalar kundalik hayotda 2024-10-22

Media texnologiyalar kundalik hayotda crossword puzzle
Across
  1. Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
  2. Axborot va ma'lumotlarni tarqatish vositalari
  3. Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
  4. Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
  5. Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
  6. tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
  7. Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
  1. content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
  2. Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
  3. marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
  4. computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
  5. tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
  6. Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
  7. media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
  8. Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt

15 Clues: Axborot va ma'lumotlarni tarqatish vositalariReality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiyamedia Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlarAudio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar...

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  5. First part of SC’s mission - provide (someone or something) the means to do something.
  6. IES, IET, IPRS
  7. First part of student life’s tagline
Down
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of student life’s tagline
  5. Second part of SC’s mission - participate or become involved in.
  6. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of student life’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of student life’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

ccf 2020-06-24

ccf crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of STA’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of STA’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of STA’s taglineSecond part of STA’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

Cyber Threat Landscape 2024-04-04

Cyber Threat Landscape crossword puzzle
Across
  1. Pretending to be an employee that forgot their password
  2. Type of phishing scam that involves an email with phone number to call
  3. Using digital ads to deliver malware
  4. Cybercriminals send emails claiming to be from a reputable source
  5. Sending text messages containing malicious link
  6. Type of phishing attack that targets specific people or organizations through malicious emails
  7. Software designed to disrupt a device's normal operations without the user's knowledge
Down
  1. Type of authentication that uses multi-step account log in process that requires more than just a password
  2. Type of malware that prevents users from accessing their device and data
  3. Defrauding people over the phone
  4. Cybersecurity thret using QR codes to trick users
  5. Manipulated video, photo or audio recording that used AI to make it appear real
  6. Type of scam that an email appears to be sent for legitimate request

13 Clues: Defrauding people over the phoneUsing digital ads to deliver malwareSending text messages containing malicious linkCybersecurity thret using QR codes to trick usersPretending to be an employee that forgot their passwordCybercriminals send emails claiming to be from a reputable source...

Cryptography Crossword Puzzle 2020-06-15

Cryptography Crossword Puzzle crossword puzzle
Across
  1. a type of cipher that's based on A's and B's and sounds like a breakfast food
  2. a job that you can do once you learn a lot about cryptography
  3. the art of writing and solving coded messages
  4. a type of cipher that uses symbols to represent letters and sounds like an animal
  5. when you take a normal message and put it into code
  6. another word for a secret coded message
Down
  1. a type of cipher that replaces regular letters with scrambled letters
  2. the first cipher ever made and sounds like a healthy lunch food
  3. the field that protects against electronic attacks
  4. when you solve a coded message and and find the true meaning
  5. a tool we use to solve and create coded messages and sounds like a job
  6. the regular alphabet you use everyday

12 Clues: the regular alphabet you use everydayanother word for a secret coded messagethe art of writing and solving coded messagesthe field that protects against electronic attackswhen you take a normal message and put it into codewhen you solve a coded message and and find the true meaninga job that you can do once you learn a lot about cryptography...

Risk Culture Awareness 2022-01-19

Risk Culture Awareness crossword puzzle
Across
  1. level of risk that an organization is prepared to accept
  2. Risk department that reviews and provides an independent opinion to the business on lending proposals
  3. Process and risk owners are in which line of defense?
  4. A measure of the level of risk an organization is willing to accept
Down
  1. The practice of protecting systems and information from digital attacks
  2. A mitigation strategy to eliminate the risk exposure to come into existence
  3. this function represents the third line of defense
  4. risk of loss resulting from ineffective or failed internal processes, people, systems
  5. the chance that an outcome or investment's actual gains will differ from an expected outcome or return

9 Clues: this function represents the third line of defenseProcess and risk owners are in which line of defense?level of risk that an organization is prepared to acceptA measure of the level of risk an organization is willing to acceptThe practice of protecting systems and information from digital attacks...

Get secure 2019-08-26

Get secure crossword puzzle
Across
  1. something that you wear during conference calls
  2. you need to follow them in order not to be hacked
  3. you use applications from it for in-company communication, data editing, etc.
  4. you use it if you decide to check your email when you are not in the office
Down
  1. you need to do this to log in to corporate systems
  2. you need to do it to start working with a system
  3. it helps us to be sure that our online data is protected
  4. something you may have during a call if the internet connection is bad
  5. you use them for taking vacation days, reporting, creating expense reports

9 Clues: something that you wear during conference callsyou need to do it to start working with a systemyou need to follow them in order not to be hackedyou need to do this to log in to corporate systemsit helps us to be sure that our online data is protectedsomething you may have during a call if the internet connection is bad...

Malwarebytes 2022-10-13

Malwarebytes crossword puzzle
Across
  1. Apple's personal computer
  2. programs that include rogue advertising, toolbars and pop-ups
  3. a code made up of an array of black and white squares, used a lot during the Covid Pandemic
  4. best cybersecurity in the world
  5. malicious software that keeps your files hostage while requesting money
  6. undesired email communication, often sent out in bulk
  7. security mechanism that analyses all the traffic that enters and exits your network
  8. compressed file
  9. small pieces of information that a web browser generates (also great with chocolate chips)
  10. removed malicious files found by Malwarebytes are placed in this safe location
Down
  1. browser that's used the most
  2. malicious program that disguises itself inside real looking files and downloads
  3. group of computers under the same admin
  4. malicious software that tries to gather information and pass it on to another entity
  5. malicious software
  6. malware that's attached to another program and replicates and spreads itself
  7. provides secure connection to the internet by encrypting your traffic. (also great to use for watching foreign tv)
  8. the full link to a website
  9. company that provides users with internet services
  10. blocks advertisements
  11. fake or false warning

21 Clues: compressed filemalicious softwareblocks advertisementsfake or false warningApple's personal computerthe full link to a websitebrowser that's used the mostbest cybersecurity in the worldgroup of computers under the same admincompany that provides users with internet servicesundesired email communication, often sent out in bulk...

Wraiths & Words: A Haunted Mansion Challenge 2023-09-21

Wraiths & Words: A Haunted Mansion Challenge crossword puzzle
Across
  1. Found in the graveyard
  2. Creepy statues
  3. Deceptive email pr@ctice
  4. Cybersecurity measure
  5. Malicious software
  6. Network of infected computers
  7. Mansion staff member
  8. En7ry k3y
  9. Mansion's signature tune (3 wds)
  10. Home of 999 happy haunts
  11. KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
  12. Extra layer of security
  13. Voiced of several characters in the Haunted Mansion
  14. Haunted Mansion's musical instrument
  15. Changing image in Haunted Mansion
  16. What three ghosts do
  17. Protection software
  18. To take advantage of a security flaw
  19. Mansion decor
  20. Unauthorized computer user
Down
  1. Taunt at the Haunted Mansion (2wds)
  2. 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
  3. Where portraits lengthen (2 wds)
  4. Unauthorized access
  5. 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
  6. Boo!
  7. U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
  8. Digital offensive
  9. Mansion's grand
  10. Mansion finale
  11. S3lf-r3plicating
  12. Haunted Mansion newspaper column
  13. Security weak point
  14. Malicious software demanding payment
  15. Mansion ride vehicle
  16. To fix a flaw
  17. Authentication via physical traits
  18. Contacting the dead
  19. Web tracking item
  20. Haunted Mansion location with a bride

40 Clues: Boo!En7ry k3yTo fix a flawMansion decorCreepy statuesMansion finaleMansion's grandS3lf-r3plicatingDigital offensiveWeb tracking itemMalicious softwareUnauthorized accessSecurity weak pointContacting the deadProtection softwareMansion staff memberMansion ride vehicleWhat three ghosts doCybersecurity measureFound in the graveyard...

Cyber World (Internet) 2023-06-12

Cyber World (Internet) crossword puzzle
Across
  1. Malicious software that replicates itself and infects computer systems.
  2. The process of encoding information to protect its confidentiality.
  3. The practice of protecting computers, servers, and networks from digital threats.
  4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
  2. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  3. A network of infected computers, often controlled by a hacker, used for malicious activities.
  4. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  5. A person who uses technical skills to gain unauthorized access to computer systems.
  6. A security measure that protects computer networks from unauthorized access.

10 Clues: The process of encoding information to protect its confidentiality.Malicious software that replicates itself and infects computer systems.A security measure that protects computer networks from unauthorized access.The practice of protecting computers, servers, and networks from digital threats....

Computers and Technology 2023-09-14

Computers and Technology crossword puzzle
Across
  1. A machine that can be programmed to perform tasks automatically.
  2. A portable device with a touchscreen, like an iPad.
  3. Media Online platforms where people can connect, share, and communicate.
  4. An online page or site where you can find information, like social media.
  5. Reality A technology that immerses you in a computer-generated 3D environment.
  6. Game Electronic games played on a computer or gaming console.
  7. A mobile phone that can also connect to the internet and run apps.
  8. Protecting computer systems and data from theft or damage.
Down
  1. The physical components of a computer, like the keyboard and screen.
  2. Programs and applications that run on a computer or device.
  3. Creating new ideas, products, or technologies to improve
  4. Electronic messages sent and received through the internet.
  5. A machine that processes information and performs tasks, like a PC or laptop.
  6. A global network that connects computers and allows you to access information.
  7. Writing instructions for computers to create software and websites.

15 Clues: A portable device with a touchscreen, like an iPad.Creating new ideas, products, or technologies to improveProtecting computer systems and data from theft or damage.Programs and applications that run on a computer or device.Electronic messages sent and received through the internet.Game Electronic games played on a computer or gaming console....

IT Insights 2023-10-25

IT Insights crossword puzzle
Across
  1. Electronic letters you send and receive through the Internet
  2. Acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
  3. Aerial term used to describe online data storage
  4. Team name used for St. Clair College athletic teams
  5. This device has rules to control the flow of data into and out of a network
  6. Branch of IT responsible for protecting networks and data from external attack
  7. Where you can find your course materials, and collaborate with your instructor
  8. A program that you use to access websites on the Internet
  9. Harmful software that can infect your computer and cause problems
Down
  1. St. Clair College emblem
  2. A web site where you can ask a question and it provides matches(ie. Google, Bing)
  3. A global network of connected computers where you can find information, watch videos, and communicate with others
  4. Where you can find your student timetable, transcript, etc.(abbrev.)
  5. Term used for organized, competitive computer gaming
  6. A network connection without wires

15 Clues: St. Clair College emblemA network connection without wiresAerial term used to describe online data storageTeam name used for St. Clair College athletic teamsTerm used for organized, competitive computer gamingA program that you use to access websites on the InternetElectronic letters you send and receive through the Internet...

Scientific terms 2024-09-25

Scientific terms crossword puzzle
Across
  1. The study of the nervous system.
  2. The practice of protecting computer systems and networks from cyberattacks.
  3. Intelligence The simulation of human intelligence in machines that can learn and solve problems.
  4. The application of computer science to biology, especially in the analysis of biological data.
  5. The study of genes and heredity.
  6. The complete set of genetic material of an organism.
  7. A well-substantiated explanation of an aspect of the natural world based on observation, experimentation, and reasoning.
Down
  1. The study of the physics of the universe.
  2. A proposed explanation for a phenomenon that can be tested through experimentation
  3. The design of products and processes inspired by nature.
  4. The design and construction of robots, often used to automate tasks.
  5. A set of rules or instructions to solve a problem or perform a task.
  6. The manipulation of matter on an atomic and molecular scale.
  7. The brain's ability to change and adapt throughout life.
  8. The use of living organisms to create products or processes.

15 Clues: The study of the nervous system.The study of genes and heredity.The study of the physics of the universe.The complete set of genetic material of an organism.The design of products and processes inspired by nature.The brain's ability to change and adapt throughout life.The manipulation of matter on an atomic and molecular scale....

Virus Crossword 2017-11-28

Virus Crossword crossword puzzle
Across
  1. Malware that replicates itself.
  2. A service used to send digital letters to people at specific addresses.
  3. A program that protects against viruses.
  4. A secret word or phrase that must be used to gain admission to something.
  5. Something that is added to an email and can contain a virus.
  6. Viruses that are hidden in advertisements that ask to download software.
  7. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  8. To affect a computer with a virus.
Down
  1. A program that can be installed.
  2. An unwanted
  3. A program that hides by posing as a program it is not.
  4. A computer that is targeted and given a virus to.
  5. A virus that floods a network.
  6. Software that is intended to damage or disable computers or computer systems.
  7. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

15 Clues: An unwantedA virus that floods a network.Malware that replicates itself.A program that can be installed.To affect a computer with a virus.A program that protects against viruses.A computer that is targeted and given a virus to.A program that hides by posing as a program it is not.Something that is added to an email and can contain a virus....

Camp Gateway Crossword Puzzle 2021-07-21

Camp Gateway Crossword Puzzle crossword puzzle
Across
  1. (n) a large area covered with trees and undergrowth
  2. (n) space in which to work.
  3. (n) an experience or activity
  4. (n) the state or fact of continuing to live or exist, typically in spite of an accident, ordeal, or difficult circumstances.
  5. (n) what you sleep under when you go camping
  6. (n) another word for the great outdoors
  7. (n)the process of increasing
  8. (n) the necessary items for a particular purpose
  9. (n) the interconnection via the internet of computing devices embedded in everyday things — allowing them to send and receive data
Down
  1. (n) shows the direction of magnetic north and bearings from it.
  2. (n) a state of focus
  3. (n) the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. (n) the activity of going for long walks, especially in the country or woods
  5. (n) a newly established business.
  6. (n) 3 letters for "remote" work

15 Clues: (n) a state of focus(n) space in which to work.(n)the process of increasing(n) an experience or activity(n) 3 letters for "remote" work(n) a newly established business.(n) another word for the great outdoors(n) what you sleep under when you go camping(n) the necessary items for a particular purpose(n) a large area covered with trees and undergrowth...

IT 2023-11-27

IT crossword puzzle
Across
  1. The use of largely automatic equipment in a system of operation.
  2. programs follow a step-by-step ______ to perform tasks efficiently."
  3. mechanics explores the fundamental properties and behavior of subatomic particles."
  4. A set of instructions for solving a problem, often used in computer programming.
  5. holds promise for advancements in medicine, electronics, and materials science."
  6. The design, construction, operation, and use of robots.
Down
  1. The practice of protecting computer systems, networks, and data from digital attacks.
  2. Relating to the branch of physics dealing with the behavior of very small particles.
  3. The introduction of new ideas, methods, or products.
  4. Information that is collected and stored, often used for analysis and decision-making.
  5. The manipulation of matter on an atomic or molecular scale.
  6. invest in research and development to drive ______ and stay ahead in the market."
  7. is a field that combines engineering and technology to create intelligent machines."
  8. implement ______ to streamline production processes and increase efficiency."
  9. growing reliance on digital technologies highlights the importance of strong ______ measures."
  10. rely on accurate and reliable ______ to draw meaningful conclusions."

16 Clues: The introduction of new ideas, methods, or products.The design, construction, operation, and use of robots.The manipulation of matter on an atomic or molecular scale.The use of largely automatic equipment in a system of operation.programs follow a step-by-step ______ to perform tasks efficiently."...

Media texnologiyalar kundalik hayotda 2024-10-22

Media texnologiyalar kundalik hayotda crossword puzzle
Across
  1. Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
  2. Axborot va ma'lumotlarni tarqatish vositalari
  3. Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
  4. Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
  5. Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
  6. tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
  7. Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
  1. content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
  2. Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
  3. marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
  4. computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
  5. tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
  6. Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
  7. media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
  8. Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt

15 Clues: Axborot va ma'lumotlarni tarqatish vositalariReality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiyamedia Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlarAudio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar...

Information Technology Careers & Terms 2023-10-05

Information Technology Careers & Terms crossword puzzle
Across
  1. This career is is the creative driver responsible for bringing a game to life
  2. A professional who uses programming languages to communicate with computers and software and make them perform certain tasks
  3. A technology professional who works on, builds and creates software, websites, applications and other systems
  4. An organized collection of data stored and accessed electronically
  5. A place where people can share information and communicate from all over the world
  6. The programs and other operating information used by a computer
Down
  1. A person who writes computer programs
  2. An electronic device for storing and processing data
  3. The physical parts of a computer, such as the CPU and RAM
  4. This career protects computers from malicious attacks
  5. Two or more computers that are linked in order to share resources
  6. Sometimes called systems architects, this career studies an organization's current computer systems and procedures

12 Clues: A person who writes computer programsAn electronic device for storing and processing dataThis career protects computers from malicious attacksThe physical parts of a computer, such as the CPU and RAMThe programs and other operating information used by a computerTwo or more computers that are linked in order to share resources...

Smart System 2021-06-30

Smart System crossword puzzle
Across
  1. A maintenance technique that estimates when maintenance should be performed
  2. Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients.
  3. Application that involves wireless sensor and RFID technology,
Down
  1. Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
  2. A sensor that detects movement
  3. Smart system application that reduces global emission
  4. Modification of a software product, performed after delivery, to keep a software product usable in a changed or changing environment

7 Clues: A sensor that detects movementSmart system application that reduces global emissionApplication that involves wireless sensor and RFID technology,A maintenance technique that estimates when maintenance should be performedSmart system application that leads to better diagnostic tools, to better treatment and quality of life for patients....

Chapter 11- RISK 2022-09-10

Chapter 11- RISK crossword puzzle
Across
  1. It is a situation that involves danger
  2. It is the decision of no inverting on security not even if the system is vulnerable
  3. It is the risk during the transmission or movement of information from one computer to another
  4. It is the possibility of something unwelcome or unpleasant happening
Down
  1. It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
  2. It is information resting in a hard drive, server
  3. It is the action of assessing someone or something

7 Clues: It is a situation that involves dangerIt is information resting in a hard drive, serverIt is the action of assessing someone or somethingIt is the possibility of something unwelcome or unpleasant happeningIt is the decision of no inverting on security not even if the system is vulnerable...

Malware Monthly June 2022 2022-07-06

Malware Monthly June 2022 crossword puzzle
Across
  1. Russian backed group attacking Lithuania
  2. This countries government was hit hard by Conti's "big finale"
  3. What tab in the Nebula interface allows you to monitor and export data?
  4. Automatically identify these with OneView
  5. Cybersecurity vendors identified an increase of ????% in the use of Microsoft Excel macros compared to the fourth quarter 2021.
Down
  1. One of the gangs empowered by the fall of Conti.
  2. Type of software scan used to identify vulnerabilities in OneView
  3. DNS Blocking default setting on security categories
  4. Process used by scammers to steal credit card numbers and credentials in fake Instagram plot.
  5. One of the gangs empowered by the fall of Conti.
  6. This, thought dead, botnet is back and was the top global threat of April, according to Check Point.
  7. One of the gangs empowered by the fall of Conti.
  8. Lithuania blocked shipments of goods to this Russian enclave
  9. Type of Instagram account created by scammers to fool friends of the victim into interacting with it.

14 Clues: Russian backed group attacking LithuaniaAutomatically identify these with OneViewOne of the gangs empowered by the fall of Conti.One of the gangs empowered by the fall of Conti.One of the gangs empowered by the fall of Conti.DNS Blocking default setting on security categoriesLithuania blocked shipments of goods to this Russian enclave...

Security - Hard 2023-11-28

Security - Hard crossword puzzle
Across
  1. practice of intentionally and ethically hacking into systems to discover vulnerabilities
  2. cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
  3. security model emphasizing the importance of confidentiality, integrity, and availability of information
  4. type of attack involves capturing and analyzing network traffic to obtain sensitive information
  5. attack that employs multiple methods simultaneously
  6. type of malware changes its appearance and characteristics to evade detection
Down
  1. process of hiding information within another file or message
  2. cybersecurity principle ensuring that data is accurate, complete, and unaltered
  3. practice of disguising data traffic to make it look like normal traffic
  4. Linux user's favorite game
  5. cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
  6. type of malware disguises itself as legitimate software to trick users into installing it

12 Clues: Linux user's favorite gameattack that employs multiple methods simultaneouslyprocess of hiding information within another file or messagepractice of disguising data traffic to make it look like normal traffictype of malware changes its appearance and characteristics to evade detection...

Secure Your Screen Crossword Puzzle 2023-09-19

Secure Your Screen Crossword Puzzle crossword puzzle
Across
  1. Personal ______ is any ______ that can be used to identify an individual, either on its own or in combination with other _______.
  2. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
  3. A social _____ is someone who tries to manipulate or trick others into providing sensitive information or taking certain actions.
  4. Do Your Part to be Security ______
  5. Avoid sharing personal ____ information online.
  6. If you suspect a phishing email, you should ____ to cybersecurity.
Down
  1. Avoid Connecting to ____ WIFI.
  2. A type of phishing attack where malware are embedded in __ codes
  3. An easy tool to keep track of passwords
  4. Passwords with longer ______ are more difficult to crack.
  5. Text Message from someone pretending to be our CEO asking for a gift card
  6. Only download company ______ software

12 Clues: Avoid Connecting to ____ WIFI.Do Your Part to be Security ______Only download company ______ softwareAn easy tool to keep track of passwordsAvoid sharing personal ____ information online.Passwords with longer ______ are more difficult to crack.A type of phishing attack where malware are embedded in __ codes...

Women in STEM Trivia 2018-03-02

Women in STEM Trivia crossword puzzle
Across
  1. Last name of the first female CEO for Duke Energy
  2. Phebe Novakovic worked for this branch of the government
  3. This is the nation's largest utility company
  4. Sempra Energy is based in this city
  5. Popular acronym for fields related to math, science, technology, and engineering
  6. Nobel Prize equivalent of Computer Science
  7. Last name of CEO for IBM
  8. Adriana Karaboutis holds this position at National Grid
  9. Women make up 22% of this specific engineering field
Down
  1. General Dynamics is this kind of federal contractor
  2. Marissa Mayer was given this many job offers after graduating from Stanford University
  3. Marissa Mayer is the CEO of this major company
  4. Novakovic pushed General Dynamics into the direction of this type of security
  5. Brittany Wenger was this age when she designed her Artificial Brain to help detect breast cancer
  6. The name of the computer that IBM created
  7. Rometty has degrees in both computer science and this type of engineering
  8. First company Marissa Mayer chose to work for
  9. First word of the abbreviated company title PG&E
  10. This natural vegetation supplied a useful chemical for Ellen Kendall's water filter
  11. Company that worked with wearable technology to help patients and health-care providers

20 Clues: Last name of CEO for IBMSempra Energy is based in this cityThe name of the computer that IBM createdNobel Prize equivalent of Computer ScienceThis is the nation's largest utility companyFirst company Marissa Mayer chose to work forMarissa Mayer is the CEO of this major companyFirst word of the abbreviated company title PG&E...

Electricity 2023-05-30

Electricity crossword puzzle
Across
  1. If it's high, power is high
  2. Tells us how much power we get related to voltage and resistance
  3. Stops electricity from flowing, rubber
  4. Power lines connecting power supplies to homes in a large area
  5. Electricity in one direction
  6. A path for electricity to flow
  7. Anything that makes power, like a generator or a battery
  8. Electricity in two directions, going back and forth
  9. Measures the current in a circuit
  10. Too much power at one time
  11. Happens again and again
  12. Electricity that is flowing, light is on
  13. Adjusts the power in a circuit
  14. Power from water
  15. Portable power supply, can power a remote
  16. No power or power loss
Down
  1. Protects us from electric shocks
  2. Measures the voltage in a circuit
  3. Power used by a device
  4. Allows electricity to flow, metal
  5. Power from earth's heat
  6. If it's high, power is low
  7. Online protection
  8. Transfers electricity from one circuit to another with more or less power
  9. Makes your hair stand up, gives a shock
  10. Makes power, makes electricity
  11. A place to plug in a device
  12. Measurement of electrical power

28 Clues: Power from waterOnline protectionPower used by a deviceNo power or power lossPower from earth's heatHappens again and againIf it's high, power is lowToo much power at one timeIf it's high, power is highA place to plug in a deviceElectricity in one directionA path for electricity to flowMakes power, makes electricityAdjusts the power in a circuit...

Unit 5 and 10 Vocab 2023-09-02

Unit 5 and 10 Vocab crossword puzzle
Across
  1. Whether somthing is appropriate morally
  2. How trustworthy an individual is
  3. Too much
  4. To have or show a good judgement of something
  5. "Not supported or proven by evidence"
  6. Computing services on the internet
  7. "The use of largely automatic equipment in a system of manufacturing or other production process"
  8. A process or set of rules for computer to do somethng
  9. Making inappropriate materials not crearly visible
Down
  1. "Adaptation of a system, process, etc. to be operated with the use of computers and the internet"
  2. To prove an individual with teir physical characteristic
  3. "A tendency to be too ready to believe that something is real or true"
  4. Not being "observed" by people that the individual did't allow to
  5. "rapid increase in numbers"
  6. New things that have never been created before
  7. The scurity of technological devices, software and information online
  8. How responsible an individual is
  9. Using an exaggerated wordign to attract public's interest; often lead to inaccuracy of information
  10. To rely on something
  11. To have a strong attraction for technology espeacially new technologies
  12. "honest and having strong moral principles; moral uprightness"
  13. Giving or understanding a wrong information
  14. Fake

23 Clues: FakeToo muchTo rely on something"rapid increase in numbers"How trustworthy an individual isHow responsible an individual isComputing services on the internet"Not supported or proven by evidence"Whether somthing is appropriate morallyGiving or understanding a wrong informationTo have or show a good judgement of something...

Technology vocabulary 2023-12-15

Technology vocabulary crossword puzzle
Across
  1. a secret word used to access a computer system
  2. engine a program that searches for information on the internet
  3. a portable computer with a touchscreen
  4. a mobile phone with more features
  5. a regularly updated website or webpage on a specific topic
  6. an input device with keys used to type
  7. wireless technology that allows devices to connect
  8. malicious software that replicates and spreads causing harm
  9. a global network connecting computers
  10. to make something current or bring up to date
  11. media online platforms to connect with others
  12. real-time communication between users over the internet
Down
  1. a pointing device used to interact with a computer
  2. the physical components of a computer
  3. programs and application that run on a electronic device
  4. computer system that protect data, networks, etc.
  5. a software application used to access websites
  6. word short for the word 'application'
  7. to transfer data to your device
  8. to transfer data from the internet
  9. an electronic device that starts with a 'c'
  10. a collection of webpages available through internet
  11. to end a session on a website or computer
  12. electronic mail
  13. a unique name used to identify an individual on a computer

25 Clues: electronic mailto transfer data to your devicea mobile phone with more featuresto transfer data from the internetthe physical components of a computerword short for the word 'application'a global network connecting computersa portable computer with a touchscreenan input device with keys used to typeto end a session on a website or computer...

FITE: Vocab. DB 2013-05-16

FITE: Vocab. DB crossword puzzle
Across
  1. how safe your computer is online
  2. iphone
  3. how safe you are online
  4. the brain of the computer
  5. something you use to find info
  6. how you connect to the internet
  7. screen
  8. something you use like a monitor so you can see stuff in the computer
  9. comcast
  10. the wiring inside a computer
  11. wireless internet
  12. touch pad
  13. where headphones go
  14. apps for computer
  15. wired internet
Down
  1. online server
  2. dsl cable
  3. a catchy phrase used by companies
  4. short term memory or ram on a computer
  5. attachments for a computer
  6. brings up different search engine info
  7. something you send to a business to get a job
  8. how you act online
  9. the heart of the computer
  10. non wired internet
  11. something you type on
  12. places in the computer for flash drives
  13. the speed inside your computer
  14. microsoft word
  15. place for a cd on a computer
  16. something you use to put stuff into the computer
  17. an emblem for a company
  18. something that catches your eye to make you interested in a company
  19. a place to keep things
  20. flash drive slot
  21. tall modem (box) for desktop computer

36 Clues: iphonescreencomcastdsl cabletouch padonline servermicrosoft wordwired internetflash drive slotwireless internetapps for computerhow you act onlinenon wired internetwhere headphones gosomething you type ona place to keep thingshow safe you are onlinean emblem for a companythe brain of the computerthe heart of the computerattachments for a computer...

Mr. Singer's Technology Crossword 2023-02-04

Mr. Singer's Technology Crossword crossword puzzle
Across
  1. - A path for electricity to flow
  2. - a device that forwards data between networks
  3. - A collection of related data
  4. - Software that manages the resources of a computer
  5. - Information that is stored and processed by a computer
  6. - A visual way of interacting with a computer
  7. - A global network of connected devices
  8. - The last name of your technology teacher
  9. - Software that translates code into machine language
  10. - A type of networking protocol used to connect devices
  11. - A language used to create websites
  12. - A virtual place to store and access data and programs over the Internet
Down
  1. - The central processing unit, or "brain," of a computer
  2. - A unit of measurement for digital information
  3. - Data that is entered into a computer
  4. - Measures taken to protect against online threats
  5. - Finding and fixing errors in code
  6. - A brand of 3D design software
  7. - A coding platform that utilizes blocks instead of text
  8. - A set of steps for solving a problem or achieving a goal
  9. - A program that can harm a computer or steal information
  10. - A security system that blocks unauthorized access to a network
  11. - A system of numbers using only two digits, 0 and 1

23 Clues: - A collection of related data- A brand of 3D design software- A path for electricity to flow- Finding and fixing errors in code- A language used to create websites- Data that is entered into a computer- A global network of connected devices- The last name of your technology teacher- A visual way of interacting with a computer...

IT Networking Terms 2023-09-07

IT Networking Terms crossword puzzle
Across
  1. a set of computers sharing resources provided by nodes
  2. an independent U.S.A agency that is a part of the government and enforces consumer protection
  3. hardware such as computers an
  4. the process of a fraudulent scheme
  5. a U.S agency that promotes American innovation
  6. a government agency that supports small businesses
  7. a person who is hired for a salary that is also not at an executive level
  8. the center of your network that serves as the main connecting point for all of your devices
  9. converting data into a code
  10. electronics that allow you to access the internet like smartphones, laptops and tablets
  11. an an encrypted security protocol that protects internet traffic on wireless networks
Down
  1. the ability to have physical access to a computer system
  2. the process of copying files over to a secondary loin case in case of equipment failure
  3. a federal executive department that is responsible for public security
  4. a layered approach to protecting data and applications
  5. a container for storing data on a computer
  6. practice of protecting data from hackers
  7. programs used by a computer
  8. a structure used to build software on
  9. a string of special characters used to allow access to a computer service

20 Clues: programs used by a computerconverting data into a codehardware such as computers anthe process of a fraudulent schemea structure used to build software onpractice of protecting data from hackersa container for storing data on a computera U.S agency that promotes American innovationa government agency that supports small businesses...

THE INTERNET 2023-09-19

THE INTERNET crossword puzzle
Across
  1. Secret code to access protected online accounts?
  2. The device that connects a computer to the internet?
  3. The term for online storage and computing resources accessible via the internet?
  4. Transferring files from the internet to a device?
  5. Method of watching/listening to media content online in real-time?
  6. Wireless technology that allows internet access?
  7. Action of looking for information on the web?
  8. The term for online platforms for connecting with others?
  9. Symbol used to categorize and search for topics on social media?
  10. the harmful behavior of using the internet to harass others?
Down
  1. The process of converting data into a code to secure it during transmission?
  2. Security system that blocks unauthorized access to a network?
  3. The practice of protecting computer systems and networks from online threats?
  4. An online seminar/presentation conducted over the internet?
  5. Electronic communication system for sending messages over the internet?
  6. Software used to access and view web pages?
  7. A collection of web pages accessible via the internet?
  8. Device that directs internet traffic to various devices in a network?
  9. A unique address used to locate a website on the web?
  10. The term for content that spreads rapidly across the internet?

20 Clues: Software used to access and view web pages?Action of looking for information on the web?Secret code to access protected online accounts?Wireless technology that allows internet access?Transferring files from the internet to a device?The device that connects a computer to the internet?A unique address used to locate a website on the web?...

Famous Entrepreneurs 2024-02-14

Famous Entrepreneurs crossword puzzle
Across
  1. Caused Chanel to temporarily close her business
  2. One of Microsoft's goals
  3. Tesla faced these types of challenges
  4. Age of Warren Buffet when he made his 1st investment
  5. The percentage that Nike owns of the shoe industry
  6. Premier League football club formally owned by Roman Arkadyevich
  7. Founder of Chanel (first name)
  8. A deal with ____ led Microsoft to release the Windows Operating System
  9. Bill Gates attended this university
  10. The former name of Marvel
  11. Africa, Elon Musk was born in (2 words)
  12. Original name for Nike (3 words)
  13. Dr. Dre partnered with this fashion brand
Down
  1. Phil _____ founder of Nike
  2. Founder of Beats headphones (2 words)
  3. Fast fashion brands create these based on Chanel designs (2 words)
  4. Steve ____ is the co-founder of Apple
  5. Stan Lee created the _____ Four with his friend
  6. Roman Arkadyevich was raised by his______
  7. Company co-founded by Musk focused on artificial intelligence
  8. Warren Buffet was born in Omaha,___________
  9. Jobs developed Apple because he could not_____ a personal computer
  10. The 2008 Financial _____ was a big challenge for Buffet
  11. Stan Lee is the founder of this company
  12. Jimmy ______: Partner with Dr. Dre for Beats

25 Clues: One of Microsoft's goalsThe former name of MarvelPhil _____ founder of NikeFounder of Chanel (first name)Original name for Nike (3 words)Bill Gates attended this universitySteve ____ is the co-founder of AppleTesla faced these types of challengesFounder of Beats headphones (2 words)Stan Lee is the founder of this company...

Criminal Justice Careers 2024-05-07

Criminal Justice Careers crossword puzzle
Across
  1. An investigator who collects information to solve crimes
  2. This type of officer works to prevent the distribution and use of illegal drugs
  3. Maintains order in courtrooms
  4. This agent monitors US borders for illegal activity
  5. Those responsible for managing wildlife are fish and game...
  6. This type of psychologist studies human behavior in connection with crime
  7. Use their knowledge of insects to help in investigations
  8. A person who advises and represents another in legal matters
  9. Study skeletal remains to help in investigations
Down
  1. People who want to protect the US from digital attacks should go into...
  2. This type of officer supervises and maintains order in prisons
  3. Support victims of crime
  4. Provide investigators with a psychological/physical description of a suspect
  5. This investigator collects evidence at crime scenes
  6. Enforce laws and protect citizens by patrolling and responding to crimes
  7. Assists attorneys
  8. Preside over trials
  9. A person who investigates financial statements to look for fraud is a forensic...
  10. Enforces laws and monitors safety on roads and highways
  11. This type of officer supervises convicted criminals who have been given an alternative sentence
  12. An individual who works in the FBI to protect the US from organized crime, terrorism and more

21 Clues: Assists attorneysPreside over trialsSupport victims of crimeMaintains order in courtroomsStudy skeletal remains to help in investigationsThis investigator collects evidence at crime scenesThis agent monitors US borders for illegal activityEnforces laws and monitors safety on roads and highwaysAn investigator who collects information to solve crimes...

Scientific Discoveries and Inventions 13 2024-11-03

Scientific Discoveries and Inventions 13 crossword puzzle
Across
  1. "The study of landforms and the processes that shape them."
  2. "The protection of digital data and systems from cyber attacks."
  3. "A particle representing a quantum of light or other electromagnetic radiation."
  4. "The preservation of humans at low temperatures for possible revival."
  5. "The breakdown of organic substances by natural organisms."
  6. "The science of creating three-dimensional images with laser technology."
  7. "The removal of tissue for diagnostic examination."
  8. "An unstable isotope that decays, emitting radiation."
  9. "The ability to meet current needs without compromising future resources."
Down
  1. "The study of life in the universe beyond Earth."
  2. "The study of the mechanics of living organisms and their movements."
  3. "The scientific study of animal biology."
  4. "The branch of biology dealing with hormones and glands."
  5. "The science of designing equipment to fit the human body."
  6. "A parasitic disease caused by Toxoplasma gondii, often in animals."
  7. "The study of electronic properties of materials at low temperatures."
  8. "Organelles known as the 'powerhouses' of cells, producing energy."
  9. "A method of growing plants in a water-based solution, without soil."
  10. "A technique that modifies genes to treat or prevent disease."
  11. "A force that makes a body follow a curved path toward the center."

20 Clues: "The scientific study of animal biology.""The study of life in the universe beyond Earth.""The removal of tissue for diagnostic examination.""An unstable isotope that decays, emitting radiation.""The branch of biology dealing with hormones and glands.""The study of landforms and the processes that shape them."...

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. Search Engine
Down
  1. CX

3 Clues: CXDXSearch Engine

CIS 178 Participation Cybersecurity Joseph Certuche 2023-07-13

CIS 178 Participation Cybersecurity Joseph Certuche crossword puzzle
Across
  1. short for malicious
  2. act of listening in
  3. duplicate copy of data
  4. to describe any fraudulent business
  5. screen out hackers, viruses, and worms
  6. humans can get it too.
  7. monitors a victim's online activity
  8. to ensure and confirm identity
  9. decoy system to attract attackers
  10. overlay on a legitimate page
  11. software program that montitors computer
  12. capture keystrokes
Down
  1. high-profile business attack
  2. Generates revenue for its developer
  3. face swapped or digitally altered
  4. online advertising to deliver malware
  5. technique for acquiring sensitive data
  6. error, fault or flaw
  7. type of malicious software
  8. flaw in the system
  9. encyption technology

21 Clues: flaw in the systemcapture keystrokesshort for maliciousact of listening inerror, fault or flawencyption technologyduplicate copy of datahumans can get it too.type of malicious softwarehigh-profile business attackoverlay on a legitimate pageto ensure and confirm identityface swapped or digitally altereddecoy system to attract attackers...

CYB 2024-05-07

CYB crossword puzzle
Across
  1. the term used for various pop-up advertisements that show up on your computer or mobile device
  2. malware that holds a victim's data unless the victim pays a ransom to the attacker
  3. malware, that spreads between computers and causes damage to data and software
  4. malicious software that spies on the victim
Down
  1. malware that downloads onto a computer disguised as a legitimate program
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. a type of malware that can automatically self-replicate without human interaction

7 Clues: malicious software that spies on the victimmalware that downloads onto a computer disguised as a legitimate programmalware, that spreads between computers and causes damage to data and softwarethe practice of protecting systems, networks, and programs from digital attacks...

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. A campus radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of student life’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of student life’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

Crossword Puzzle 2021-10-26

Crossword Puzzle crossword puzzle
Across
  1. How many Level 1 DGS on Golf?
  2. What is the first name of the new OIM on Golf?
  3. What is the current color code for lifting gears?
  4. What do you call a gradual physiological adaptation that improves an individual’s ability to tolerate heat stress?
  5. How many Golden Rules to live by:
  6. In what month do we celebrate Cybersecurity awareness?
Down
  1. How many years LTI free is Golf?
  2. Plastic waste shall be disposed into ... bin
  3. An apparatus used for moving patients who require medical care
  4. Three elements that are required to start a fire: oxygen, heat, and ...
  5. How many consecutive shifts can personal isolation can be used for?
  6. How many alternative muster stations available in G-Loc?
  7. Portable, life-saving devices designed to treat people experiencing sudden cardiac arrest, a medical condition in which the heart suddenly and unexpectedly stops beating

13 Clues: How many Level 1 DGS on Golf?How many years LTI free is Golf?How many Golden Rules to live by:Plastic waste shall be disposed into ... binWhat is the first name of the new OIM on Golf?What is the current color code for lifting gears?In what month do we celebrate Cybersecurity awareness?How many alternative muster stations available in G-Loc?...

Cybersecurity/Web Design - use your KNOWLEDGE PLANNER 2019-11-05

Cybersecurity/Web Design - use your KNOWLEDGE PLANNER crossword puzzle
Across
  1. to help protect a computer network from unauthorised access
  2. Hacking’ - Testing a computer systems to find security vulnerabilities
  3. is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
  4. group of people at which the website is aimed e.g. teenage girls
  5. test that a human can pass but a computer program cannot
  6. reason for which the website has been created e.g. to entertain
  7. to scramble information so that it can be sent safely over the Internet
  8. attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
Down
  1. by reproducing itself or infecting other programs by modifying them.
  2. a secret word to unlock a device – must include numbers/special characters
  3. Testing
  4. Audience
  5. a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
  6. to use and understand
  7. preferred way to present/layout digital material

15 Clues: TestingAudienceto use and understandpreferred way to present/layout digital materialtest that a human can pass but a computer program cannotto help protect a computer network from unauthorised accessreason for which the website has been created e.g. to entertaingroup of people at which the website is aimed e.g. teenage girls...

The internet 2023-06-19

The internet crossword puzzle
Across
  1. media Online platforms for people to connect, communicate, and share content
  2. Sending data or files from a device to the internet or another user
  3. Protecting devices, networks, and data from digital threats, like hackers and viruses
  4. Method of sending messages electronically between people
  5. Collection of related webpages accessed with a browser
  6. Receiving data or files from the internet and saving them on a device
  7. Regularly updated website or web page featuring personal or informational content
Down
  1. Technology allowing devices to connect wirelessly to the internet or a network
  2. Program used to access and view websites on the World Wide Web
  3. game Interactive entertainment played together or against others using the internet
  4. engine Tool that helps find information, images, or websites using keywords
  5. Transmitting video or audio content allowing users to watch or listen without downloading
  6. Unique address of a website on the internet, often starting with "www"

13 Clues: Collection of related webpages accessed with a browserMethod of sending messages electronically between peopleProgram used to access and view websites on the World Wide WebSending data or files from a device to the internet or another userReceiving data or files from the internet and saving them on a device...

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Stay _____ and be on the lookout for security threats or incidents.
  2. An email scam that that targets unsuspecting users to give up information.
  3. Measures taken to protect your or your organization's information from cyber attack
  4. Never write these down on a sticky note or a whiteboard.
Down
  1. An unauthorized person that tries to gain access to your computer.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. _____ is when an unauthorized person follows you into a secure location.
  5. Lock your _____ and your mobile phone anytime they are not in use.
  6. Report all possible cyber _____ to the IT Service Desk.
  7. Files with sensitive information should always be kept in a _____ file room or drawer.
  8. Always keep a _____ workspace that is free of confidential information.
  9. Alway install updates to your computer or mobile phone. Don't click "Remind me later."

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

Cyber/Digital Literacy 2024-11-06

Cyber/Digital Literacy crossword puzzle
Across
  1. example of computer virus
  2. of malware that can make copies of itself and spread automatically across computers in a network.
  3. has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
  1. -Refers to the trail of data you leave when using the internet.
  2. is use protect your personal information
  3. Who's actively participate in cyberspace and the online community offered through the internet
  4. Type of crime that uses computers or networks harm.

7 Clues: example of computer virusis use protect your personal informationType of crime that uses computers or networks harm.-Refers to the trail of data you leave when using the internet.Who's actively participate in cyberspace and the online community offered through the internet...

Internet 2023-07-05

Internet crossword puzzle
Across
  1. A digital message sent electronically to communicate with others.
  2. Safety Guidelines and precautions to ensure safe and responsible internet use.
  3. Gaming Playing games with other people over the internet.
  4. To transfer data or files from the internet to your computer.
  5. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
  6. Media Websites and applications that allow people to connect and share content online.
  7. A global network that connects computers and allows communication and access to information.
Down
  1. A collection of web pages that can be accessed on the internet.
  2. To communicate with others in real time using text messages on the internet.
  3. Connected to or available through the internet.
  4. A wireless technology that allows devices to connect to the internet without using cables.
  5. A program used to access and navigate websites on the internet.
  6. Playing audio or video content directly from the internet without downloading it.
  7. Engine A tool that helps you find information on the internet.
  8. To transfer data or files from your computer to the internet.

15 Clues: Connected to or available through the internet.Gaming Playing games with other people over the internet.To transfer data or files from the internet to your computer.To transfer data or files from your computer to the internet.Engine A tool that helps you find information on the internet....

Principles of Cybersecurity Chapter 5 Vocabulary 2023-03-07

Principles of Cybersecurity Chapter 5 Vocabulary crossword puzzle
Across
  1. Voice-based phishing in which the hacker calls the user impersonating someone else
  2. Use of SMS messages as the means of reach- ing victims.
  3. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
  4. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
  5. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
  6. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
  7. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
  8. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
  9. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
  10. Document created by the owner of the network containing information on proper usage of the network and related asset
  11. Any data that can be used to pinpoint a specific person
  12. Process of closing an employee’s accounts and records when he or she leaves the company
  13. Electromagnetic signals given off by all electronic equipment
  14. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
  15. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
  1. Attempting to obtain personal information through fake e-mails that appear to be real
  2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
  3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
  4. Secured room in which servers and net- working equipment are installed.
  5. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
  6. Responsibilities are divided so no single individual has complete control over a process or task
  7. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
  8. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
  9. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
  10. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
  11. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
  12. The type of fire based on the fuel that feeds the fire.

27 Clues: Use of SMS messages as the means of reach- ing victims.Any data that can be used to pinpoint a specific personThe type of fire based on the fuel that feeds the fire.Electromagnetic signals given off by all electronic equipmentSecured room in which servers and net- working equipment are installed....

25 key words that represent Cybersecurity 2023-09-07

25 key words that represent Cybersecurity crossword puzzle
Across
  1. Any technology, be it software or hardware, used to keep intruders out.
  2. Software package that performs a specific function directly for a person who is intended to use a computer system.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  4. A scam where a hacker poses as a legitimate business or organization
  5. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
  6. A set of instructions, or a system of rules, written in a particular programming language
  7. A computer program that can copy itself and infect a computer without permission
  8. A mode in the computer that stores data on servers in different locations
  9. Two or more computers connected together to share resources
  10. A method of connecting a series of computers and devices in a private encrypted network,
  11. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  12. A form of malware that hijacks your system and encrypts your files
  13. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
  14. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
  1. A means of attack on a computer system
  2. A technique to prevent unauthorized users from accessing sensitive data
  3. Smallest unit of a digital image
  4. A set of rules governing the format of data sent via the internet or local network.
  5. The capacity a network can transfer data
  6. Allows devices to communicate with each other
  7. Coding used to protect your information from hackers.
  8. The result of a hacker successfully breaking into a system
  9. A form of malware used by hackers to spy on you and your computer activities.
  10. Any attempt to breach a logical environment's security boundary
  11. a misleading computer program that looks innocent, but in fact allows the hacker into your system

25 Clues: Smallest unit of a digital imageA means of attack on a computer systemThe capacity a network can transfer dataAllows devices to communicate with each otherCoding used to protect your information from hackers.The result of a hacker successfully breaking into a systemTwo or more computers connected together to share resources...

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

Viruses - Maria DiMeglio 2018-11-15

Viruses - Maria DiMeglio crossword puzzle
Across
  1. a type of virus that is disguised as something else
  2. people who hack into a company's network to find and help resolve problems in the company's cybersecurity
  3. a way a scammer can get your personal information through fake websites and/or fraud emails or texts
  4. a way to message someone electronically
  5. a monitor is an example of this; isn't affected by viruses
  6. email virus that held a seemingly innocent message, but sent itself to the top 50 people in the victim's address book
  7. makes copies of itself in order to spread through a network
Down
  1. a virus intended to do harm
  2. floods a network with fake traffic
  3. a type of virus in which a person or group of people encrypt someone else's files and asks for money in exchange for restoring them
  4. what software is made of
  5. software that can prevent virus attacks
  6. the first virus intended to do damage in the real world
  7. unwanted software, not necessarily harmful
  8. a virus is a type of this

15 Clues: what software is made ofa virus is a type of thisa virus intended to do harmfloods a network with fake trafficsoftware that can prevent virus attacksa way to message someone electronicallyunwanted software, not necessarily harmfula type of virus that is disguised as something elsethe first virus intended to do damage in the real world...

Digital Citizenship Vocabulary 2024-03-05

Digital Citizenship Vocabulary crossword puzzle
Across
  1. Knowing how to use digital technology safely and effectively.
  2. Using someone else's work in a legal and fair way, like for school projects.
  3. How you present yourself online through usernames, profiles, etc.
  4. Protecting your computer and information from digital attacks and hackers.
  5. Being able to find and use information online in a smart and responsible way.
  6. Using two different ways to prove who you are before accessing accounts online.
  7. Following rules for good behavior and respect when using the internet.
Down
  1. The trail of information you leave behind when using the internet.
  2. Tricky headlines or links designed to get you to click on them.
  3. Keeping personal information safe and not sharing it with others online.
  4. Bullying or hurting others online.
  5. How others see you based on what you do and say online.
  6. Your freedoms and protections when using digital technology.
  7. Tricking people into giving personal information by pretending to be someone else online.
  8. Things people create, like art or writing, that they own the rights to.

15 Clues: Bullying or hurting others online.How others see you based on what you do and say online.Your freedoms and protections when using digital technology.Knowing how to use digital technology safely and effectively.Tricky headlines or links designed to get you to click on them.How you present yourself online through usernames, profiles, etc....

IT Insights 2023-10-24

IT Insights crossword puzzle
Across
  1. A program that you use to access websites on the Internet
  2. acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
  3. where you can find our course materials, and collaborate with your instructor
  4. aerial term used to describe online data storage
  5. a web site where you can ask a question and it provides matches
  6. team name used for St. Clair College athletic teams
  7. St. Clair College emblem
Down
  1. term used for organized, competitive computer gaming
  2. this device has rules to control the flow of data into and out of a network
  3. a global network of connected computers where you can find information, watch videos, and communicate with others
  4. branch of IT responsible for protecting networks and data from external attack
  5. harmful software that can infect your computer and cause problems
  6. electronic letters you send and receive through the Internet
  7. a network connection without wires
  8. where you can find your timetable, transcript, etc.(abbrev.)

15 Clues: St. Clair College emblema network connection without wiresaerial term used to describe online data storageteam name used for St. Clair College athletic teamsterm used for organized, competitive computer gamingA program that you use to access websites on the Internetelectronic letters you send and receive through the Internet...

August Newsletter Crossword 2024-07-30

August Newsletter Crossword crossword puzzle
Across
  1. Systems Engineering is updating JIRA, JAMA, and Plan0View Projects for what purpose?
  2. To meet the IT Team, please visit them where?
  3. What is the last name of the 4th person in the first column of the August Birthdays?
  4. Who is the AP Team working with to complete network laydown?
  5. What kind of safety concern is the result of debris puncturing a tire?
Down
  1. How much money can you earn by participating in Healthyroads JT4 Wellness Incentive Program? (Spelled Out)
  2. Who is the newest hire on our JT4 security team?
  3. Upon publication, new PMIs should be coordinated with whom?
  4. The 11DOS JT4 Team is helping the 11DOS by lending our expertise in what kind of planning?
  5. Who is the first TROC RCO?
  6. The 11th Annual Golf Tournament is what kind of start?
  7. Which employee just finished HARRIER maintenance training?

12 Clues: Who is the first TROC RCO?To meet the IT Team, please visit them where?Who is the newest hire on our JT4 security team?The 11th Annual Golf Tournament is what kind of start?Which employee just finished HARRIER maintenance training?Upon publication, new PMIs should be coordinated with whom?Who is the AP Team working with to complete network laydown?...

GAMER ARMY CROSSWORD 2024-06-05

GAMER ARMY CROSSWORD crossword puzzle
Across
  1. Floating Robot that buzzes when it flys in the air
  2. action on someone who puts things together.
  3. a thing done by skills or courages
  4. A headset you wear that makes you see a world a person made that you can walk into.
  5. take something or someone to an other place.
  6. a place on particular issues can be exchanged
  7. High definition on internet That has hyperspeed of power.
Down
  1. Being protected by an electronic face that watches.
  2. A person who unlawful violences to the civilians
  3. Two halves of a school year in high school.
  4. a Player name or person who plays that player.
  5. A sign that shows peace or other signs that are called… to bring to their own country.
  6. A thing you did that makes you popular and become a worlds and most… actor or person
  7. One problem happen to another problem that turn into a huge problem called.
  8. something that is visible and not completely border.

15 Clues: a thing done by skills or couragesTwo halves of a school year in high school.action on someone who puts things together.take something or someone to an other place.a place on particular issues can be exchangeda Player name or person who plays that player.A person who unlawful violences to the civilians...

Cyber-security 2021-01-17

Cyber-security crossword puzzle
Across
  1. refers to the security of a computer or computer system
  2. authentication mechanisms, access channels and systems all have to work properly
  3. demands a ransom from you to get things back on track.
  4. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
  1. ensure that information is hidden from people unauthorised to access it.
  2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
  3. helps hackers spy on systems and their users.
  4. self-replicating and spreads without end-user action, causing real devastation.
  5. ensuring that data has not been tampered with and, therefore, can be trusted.
  6. are attempts to expose users to unwanted, potentially malicious advertising.
  7. malicious instructions that appear as legitimate programs.

11 Clues: helps hackers spy on systems and their users.demands a ransom from you to get things back on track.refers to the security of a computer or computer systemmalicious instructions that appear as legitimate programs.ensure that information is hidden from people unauthorised to access it....

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US
  5. Steve's book, The Way to Design, was released in what format in late 2018?
  6. On-demand vet service in the FC portfolio
Down
  1. Foundation led this meditation company's series A
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. Foundation's newest unicorn
  5. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. What FC company raised $155 million in 2018 and expanded into Europe?
  5. Foundation led this meditation company's series A
Down
  1. Steve's book, The Way to Design, was released in what format in late 2018?
  2. Foundation's newest unicorn
  3. The New York Times said this company will emerge as the leading residential solar installer in the US
  4. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  5. The conference Joanne and Steve spoke at in 2018
  6. On-demand vet service in the FC portfolio

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The conference Joanne and Steve spoke at in 2018
  2. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
  5. On-demand vet service in the FC portfolio
Down
  1. The New York Times said this company will emerge as the leading residential solar installer in the US
  2. The street name of FC's new Palo Alto office
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. Steve's book, The Way to Design, was released in what format in late 2018?
  5. Bolt Thread's Microsilk fabric is made by
  6. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

Crossword Puzzle 2021-02-07

Crossword Puzzle crossword puzzle
Across
  1. FoP that support client to address interruptions like those presented by COVID-19
  2. A secure collaborative innovation management platform
  3. FoP that assist clients to stay up-to-date with security and privacy leading practices and compliance requirements.
  4. FoP that captures emerging market demands
Down
  1. FoP that help clients control and optimize costs
  2. Our global strategy and ambition to deliver long-term value to clients, people and society.

6 Clues: FoP that captures emerging market demandsFoP that help clients control and optimize costsA secure collaborative innovation management platformFoP that support client to address interruptions like those presented by COVID-19Our global strategy and ambition to deliver long-term value to clients, people and society....

Cybersecurity Awareness Month 2024 Crossword 2024-09-19

Cybersecurity Awareness Month 2024 Crossword crossword puzzle
Across
  1. The Hightower Approved Generative AI tool.
  2. When you should report suspicious activity or behavior to your Cybersecurity team.
  3. How often you should reboot your work and personal devices.
Down
  1. A type of email sent by malicious actors.
  2. An update for Software or applications that is deployed to fix a security issue or weakness.
  3. Malicious software that is intended to cause harm to a device or entire network

6 Clues: A type of email sent by malicious actors.The Hightower Approved Generative AI tool.How often you should reboot your work and personal devices.Malicious software that is intended to cause harm to a device or entire networkWhen you should report suspicious activity or behavior to your Cybersecurity team....

Vocabulary Power 3 Chapters 13-15 2024-10-17

Vocabulary Power 3 Chapters 13-15 crossword puzzle
Across
  1. The ___ reason for the meeting was to discuss budget cuts for the upcoming quarter.
  2. He missed several deadlines, and ___, the client decided to terminate the contract.
  3. The charity aims to ___ awareness of mental health issues through social media campaigns.
  4. She was ___ to accept the job offer because it required relocating to another country.
  5. Cybersecurity falls under the ___ of the IT department in most companies.
Down
  1. Climate change has had a ___ impact on the global ecosystem.
  2. Many people ___ their success to hard work and perseverance.
  3. The new shopping mall will ___ a large portion of the town’s commercial area.
  4. The investigative journalist sought to ___ corruption within the government.
  5. In this project, your ___ will be to manage the team's schedule and deliverables.
  6. After months of negotiations, the company finally agreed to ___ the confidential documents.
  7. Strict deadlines often ___ creativity in high-pressure work environments.

12 Clues: Climate change has had a ___ impact on the global ecosystem.Many people ___ their success to hard work and perseverance.Strict deadlines often ___ creativity in high-pressure work environments.Cybersecurity falls under the ___ of the IT department in most companies.The investigative journalist sought to ___ corruption within the government....

Technology 2023-09-28

Technology crossword puzzle
Across
  1. Writing instructions for computers to execute specific tasks.
  2. Programs and applications that run on a computer.
  3. Devices with internet connectivity and the ability to interact with other devices or systems.
  4. Structured collection of data organized for efficient retrieval and management.
  5. Use of biological systems, organisms, or cells to develop products or technologies.
  6. Use of computers and software for various applications.
  7. Global system of interconnected computer networks.
  8. Study and manipulation of matter on an atomic and molecular scale.
  9. Creating physical objects from a digital model using successive layering of materials.
Down
  1. Step-by-step instructions for solving a particular problem or task.
  2. Technology that overlays digital information onto the real world.
  3. Development of computer systems that can perform tasks requiring human intelligence.
  4. Design, construction, operation, and use of robots.
  5. Protection of computer systems, networks, and data from theft or damage.
  6. Use of largely automatic equipment in a system of operation.
  7. Delivery of computing services over the internet.
  8. Physical components of a computer system.
  9. Computer-generated simulation of a three-dimensional environment.
  10. Transmission of information over a distance using electronic means.
  11. Unmanned aerial vehicles operated remotely or autonomously.

20 Clues: Physical components of a computer system.Programs and applications that run on a computer.Delivery of computing services over the internet.Global system of interconnected computer networks.Design, construction, operation, and use of robots.Use of computers and software for various applications....

IT vocabulary 2023-09-07

IT vocabulary crossword puzzle
Across
  1. A short-range wireless connection. Usually used for devices like headphones
  2. When deleted items are restored to their previous state
  3. When things such as updates are done automatically
  4. A code of numbers or letters that allow for login
  5. What companies use to expose you to their products
  6. Allows devices to connect without a physical connection
  7. The components that make a device
  8. A connection of different devices to each other
  9. The amount of space you have for data
  10. Restoring data from a previous backup
Down
  1. The screen where the information is displayed from a computer
  2. Saving all the data on a device so it can be restored at a later date
  3. The term for programs on devices
  4. A process that brings a program to a more up to date state
  5. Using multiple
  6. A computer that provides resources, data, services, or programs to other computers,over a network.
  7. Your security for systems online
  8. The term to describe information of any sort on a device
  9. A program that blocks your access to a system until a sum of money is paid
  10. Its like mail, but online

20 Clues: Using multipleIts like mail, but onlineThe term for programs on devicesYour security for systems onlineThe components that make a deviceThe amount of space you have for dataRestoring data from a previous backupA connection of different devices to each otherA code of numbers or letters that allow for login...

español 2024-05-14

español crossword puzzle
Across
  1. calculator
  2. email
  3. to fix
  4. to look for
  5. mouse
  6. to function (to work)
  7. to print
  8. to watch
  9. cybersecurity
  10. TV
  11. to send a text
  12. GPS navigation
  13. study of technology and computers
  14. tablet
  15. to turn off/to switch off
  16. autonomous vehicles
  17. monitor
  18. to send
  19. everyday objects
  20. fast
  21. social media
  22. empty
  23. keyboard
  24. to turn on
  25. to save
  26. uncharged
  27. ipad
  28. the internet
  29. dead
  30. to open
  31. to print
  32. to upload
  33. channel
  34. internet / navegar en la red - internet/web surfing
  35. headphones
  36. internet of things
  37. laptop
  38. screen
  39. to download
Down
  1. full
  2. cyber threat
  3. to erase/to delete
  4. lack of privacy
  5. devices
  6. charged
  7. remote control
  8. cyberbullying
  9. password
  10. sustainable technology
  11. @
  12. identity theft
  13. email address
  14. file
  15. internet connection
  16. printer
  17. artificial intelligence
  18. to send and email
  19. website
  20. robots
  21. charger
  22. home page/main page
  23. text message
  24. instagram profile
  25. to put (to put/turn on)
  26. to close
  27. the wifi
  28. the cloud
  29. program
  30. to record
  31. slow
  32. cell phone

71 Clues: @TVfullfilefastipaddeadslowemailmouseemptyto fixtabletrobotslaptopscreendeviceschargedprinterwebsitemonitorto sendchargerto saveto openchannelprogrampasswordto printto watchkeyboardto closeto printthe wifiunchargedto uploadthe cloudto recordcalculatorto turn onheadphonescell phoneto look forto downloadcyber threatsocial mediatext message...

Public Safety 2024-08-08

Public Safety crossword puzzle
Across
  1. A serious injury to a body.
  2. Helping someone who is in cardiac arrest
  3. The continuous observation of a place, person, or group.
  4. Responder, The people who arrive first to arrive to an emergency.
  5. Casualty Incident, Healthcare systems and full because of a large number of casualties in a short period of time.
  6. Support, Services that are provided to people who are a victim of a crime.
  7. A biological substance that presents a threat to public safety
  8. Alert, Old person goes missing.
  9. Destroying property with fire
  10. Command System, The control of an emergency response team.
  11. People who protect online networks from digital attacks.
Down
  1. A device that uses electricity to restore the hearts normal rhythm.
  2. Safety, The practice of ensuring safety in the workplace.
  3. Health, The science of protecting a communities health.
  4. Assessment, Identifying where the weak points are in your project.
  5. Legislative process for dividing land into zones for the citizens.
  6. Shooter, A person attempting to kill people in a confined space with a fire arm
  7. Being ready to respond anytime.
  8. alert, Child goes missing.
  9. Assessment, Analyzing the possible issues that could negatively impact a project.

20 Clues: alert, Child goes missing.A serious injury to a body.Destroying property with fireBeing ready to respond anytime.Alert, Old person goes missing.Helping someone who is in cardiac arrestHealth, The science of protecting a communities health.The continuous observation of a place, person, or group....

Week 1 Crossword Puzzle 2022-01-13

Week 1 Crossword Puzzle crossword puzzle
Across
  1. alternative access to a system for malware, sometimes an entry point by someone who leaves a company, or used to re-establish a connection
  2. A data handling regulation only found in CANADA
  3. The 'A' in the CIA Triade
  4. Vulnerability + Threat =
  5. A script _______ is also known as a green hat hacker or someone who is new to programming little experience
  6. Using a voice channel to conduct phishing
  7. Organization that publishes cybersecurity frameworks
  8. Psychological control discouraging an attack
  9. A regulation applicable to Europe
  10. A control such as a gateway or fence
Down
  1. information that we may have received can be absolutely attributed to somebody. There’s no way that they can take it back.
  2. The 'C' in the CIA Triade
  3. fancy word for information gathering, can be active or passive
  4. "hacking the human"
  5. Acronym for a military/state or crime syndicates with lot of resources to attack
  6. provides a common basis for the coordination of standards development for the purpose of systems interconnection
  7. Hacker with a political agenda
  8. Can be polymorphic and is usually memory resident
  9. Acronym for information that is freely available for information gathering
  10. The 'I' in the CIA Triade

20 Clues: "hacking the human"Vulnerability + Threat =The 'C' in the CIA TriadeThe 'A' in the CIA TriadeThe 'I' in the CIA TriadeHacker with a political agendaA regulation applicable to EuropeA control such as a gateway or fenceUsing a voice channel to conduct phishingPsychological control discouraging an attackA data handling regulation only found in CANADA...

JG informaatika ristsõna 2023-01-20

JG informaatika ristsõna crossword puzzle
Across
  1. Bolt asutaja(d) (ainult perekonnanimi)
  2. Rämpspost teisesõnaga
  3. Missugune amet (lühend) korraldab küberturvalisuse ennetustegevusi Eestis
  4. Cybernetica poolt loodud IT terminoloogia leksikon (lühend)
  5. E-kirjale lisatud teksti-, pildi- vm fail
  6. Ruudukestest koosneva mustrina esitatud maatrikskood
  7. Interneti osa, kus toimub peamine kuritegelik tegevus
  8. Inglise keeles riistvara
  9. Eesti suurim rahvusvaheline robootika festival
  10. Isik, kes murrab luba küsimata sisse mõnda süsteemi
  11. Tehisintellekti ingl lühend
  12. Inglise keelse IT termini AI lühendi vaste eesti keeles
  13. Jõhvis avatud tehnoloogiakool
  14. Emotsioonimärkide eesti keelne nimetus :)
  15. Täpne samm-sammuline, kuid mitte tingimata formaalne juhend millegi tegemiseks
  16. Ohtlik programm, mis võib levitada end ise ja kutsuda esile soovimatuid sündmusi või arvuti kokkujooksmist
  17. Tuntuim tehisintellekti tööriist
  18. Kood, milles informatsioon on esitatud kahendsüsteemis
Down
  1. Programmikoodi koostamine, testimine ja parandamine
  2. Inglise keeles küberturvalisus
  3. Veebilehtede anonüümne sirvimisrežiim, mis ei salvesta kasutaja sirvimisajalugu
  4. Inglise keeles tarkvara
  5. IT pikk nimetus
  6. Sotsiaalvõrgustik, mis loodi 2004. aastal
  7. Tasuta, nutikas kaheastmeline isikutuvastus
  8. Internetikeskkonnas toimuv tegevus, näitekst teise inimese nimele tehtud libakontod, sõimamine ja ähvardamine foorumites, võõraste piltide ülesriputamine ja moonutamine
  9. Tuntuim krüptoraha
  10. Missuguse ülikooli kolledž asub Kohtla-Järvel (lühend)
  11. Ussi nimeline programmerimiskeel
  12. Rakendusprogramm internetis liikumiseks ja veebilehtede kuvamiseks

30 Clues: IT pikk nimetusTuntuim krüptorahaRämpspost teisesõnagaInglise keeles tarkvaraInglise keeles riistvaraTehisintellekti ingl lühendJõhvis avatud tehnoloogiakoolInglise keeles küberturvalisusUssi nimeline programmerimiskeelTuntuim tehisintellekti tööriistBolt asutaja(d) (ainult perekonnanimi)Sotsiaalvõrgustik, mis loodi 2004. aastal...

Cybersecurity Puzzle 2021-11-04

Cybersecurity Puzzle crossword puzzle
Across
  1. A defensive technology designed to keep the bad guys out.
  2. Technology that allows us to store and access files or services remotely via the internet.
  3. A group of computers, printers and devices that are interconnected and governed as a whole.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A set of programs that tells computers how to perform a set of tasks.

5 Clues: A defensive technology designed to keep the bad guys out.A set of programs that tells computers how to perform a set of tasks.Technology that allows us to store and access files or services remotely via the internet.A group of computers, printers and devices that are interconnected and governed as a whole....

Cybersecurity Definitions 2024-06-16

Cybersecurity Definitions crossword puzzle
Across
  1. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  2. An attack method where a perpetrator deceives individuals into divulging confidential information.
  3. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. A program that replicates itself to spread to other computers.
  2. A person who uses computers to gain unauthorized access to data.

5 Clues: A program that replicates itself to spread to other computers.A person who uses computers to gain unauthorized access to data.The practice of protecting systems, networks, and programs from digital attacks.Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems....

Science and Technology 2023-10-31

Science and Technology crossword puzzle
Across
  1. - A professional who designs and builds technology.
  2. - Science of living organisms.
  3. - Medical imaging using radiation.
  4. - Transmitting information over long distances.
  5. - Field of creating and programming robots.
  6. - Protection of computer systems from attacks.
  7. - Device for processing and storing data.
  8. - Study of the environment and ecosystems.
  9. - Study of matter, energy, and the fundamental forces of nature.
  10. - Study of flight and aircraft design.
  11. - Instrument for magnifying small objects.
  12. - Smallest unit of a chemical compound.
Down
  1. - Use of living organisms in technology.
  2. - Study of the atmosphere and weather.
  3. - Creating genetically identical organisms.
  4. - Related to the smallest units of energy.
  5. - Manipulating matter on a nanoscale.
  6. - Study of heredity and DNA.
  7. - Famous physicist known for the theory of relativity.
  8. - Study of extremely small structures.
  9. - Study of celestial objects and the universe.
  10. - Vehicle designed for travel in outer space.
  11. - Study of the composition of matter.
  12. - Optical device for observing distant objects.
  13. - Pertaining to circuits and devices using electricity.
  14. - Substance with a distinct molecular composition.
  15. - Object orbiting a celestial body.
  16. - Device that emits a focused beam of light.
  17. - Substance to stimulate immunity to disease.
  18. - A step-by-step problem-solving procedure.

30 Clues: - Study of heredity and DNA.- Science of living organisms.- Medical imaging using radiation.- Object orbiting a celestial body.- Manipulating matter on a nanoscale.- Study of the composition of matter.- Study of the atmosphere and weather.- Study of extremely small structures.- Study of flight and aircraft design....

Science and Technology 2023-10-31

Science and Technology crossword puzzle
Across
  1. - Famous physicist known for the theory of relativity.
  2. - Creating genetically identical organisms.
  3. - Study of flight and aircraft design.
  4. - Protection of computer systems from attacks.
  5. - Device that emits a focused beam of light.
  6. - Science of living organisms.
  7. - Study of the composition of matter.
  8. - Medical imaging using radiation.
  9. - Vehicle designed for travel in outer space.
  10. - Device for processing and storing data.
  11. - Study of the atmosphere and weather.
  12. - Transmitting information over long distances.
  13. - Study of extremely small structures.
  14. - Substance to stimulate immunity to disease.
  15. - Study of the environment and ecosystems.
  16. - Pertaining to circuits and devices using electricity.
  17. - Object orbiting a celestial body.
Down
  1. - Study of celestial objects and the universe.
  2. - Related to the smallest units of energy.
  3. - Use of living organisms in technology.
  4. - Smallest unit of a chemical compound.
  5. - Instrument for magnifying small objects.
  6. - A step-by-step problem-solving procedure.
  7. - Field of creating and programming robots.
  8. - Substance with a distinct molecular composition.
  9. - Study of matter, energy, and the fundamental forces of nature.
  10. - Optical device for observing distant objects.
  11. - Manipulating matter on a nanoscale.
  12. - A professional who designs and builds technology.
  13. - Study of heredity and DNA.

30 Clues: - Study of heredity and DNA.- Science of living organisms.- Medical imaging using radiation.- Object orbiting a celestial body.- Study of the composition of matter.- Manipulating matter on a nanoscale.- Study of flight and aircraft design.- Study of the atmosphere and weather.- Study of extremely small structures....

Informatika 2024-08-26

Informatika crossword puzzle
Across
  1. Malware yang dapat memantau dan merekam aktivitas pengguna komputer atau perangkat selular.
  2. Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data
  3. Orang yang menjalankan atau membuat program sebuah komputer
  4. Peretasan
  5. Kejahatan dunia maya dimana biasanya target dihubungi melalui surel, telepon, atau pesan teks oleh seseorang yang menyamar dari lembaga sah untuk mengelabui target untuk memberikan data sensitif.
  6. Peretas topi hitam
  7. Badan Siber dan Sandi Negara
  8. Pusat Koordinasi Tim Tanggap Darurat Komputer
Down
  1. Keamanan informasi Internet
  2. MAlware yang tampak seperti aplikasi perangkat lunak jinak, tetapi perangkat lunak ini membawa komponen yang jahat didalamnya.
  3. Gerakan aktivis/hacktivist internasional yang tersebar dan dikenal luas karena berbagai serangan dunia maya terhadap beberapa lembaga pemerintah, perusahaan, dan organisasi bisnis lainnya.
  4. Asal kata data dari bahasa latin
  5. Sifat data yang berarti menggambarkan sesuatu
  6. Era peretasan 1, preretas disebut...
  7. Program komputer yang mampu menyalin dirinya sendiri ke komputer lain.
  8. Sifat data yang berupa numerik (angka)
  9. Usaha untuk memikat pengguna internet untuk masuk ke situs web palsu.
  10. Salah satu media sosial yang berlogo kamera.
  11. Akronim Robot dan network.
  12. Objek untuk mengontrol akses ke informasi atau sumber daya lain.
  13. Salahsatu sifat informasi

21 Clues: PeretasanPeretas topi hitamSalahsatu sifat informasiAkronim Robot dan network.Keamanan informasi InternetBadan Siber dan Sandi NegaraAsal kata data dari bahasa latinEra peretasan 1, preretas disebut...Sifat data yang berupa numerik (angka)Salah satu media sosial yang berlogo kamera.Sifat data yang berarti menggambarkan sesuatu...

Technology 2023-09-30

Technology crossword puzzle
Across
  1. Writing instructions for computers to execute specific tasks.
  2. Programs and applications that run on a computer.
  3. Devices with internet connectivity and the ability to interact with other devices or systems.
  4. Structured collection of data organized for efficient retrieval and management.
  5. Use of biological systems, organisms, or cells to develop products or technologies.
  6. Use of computers and software for various applications.
  7. Global system of interconnected computer networks.
  8. Study and manipulation of matter on an atomic and molecular scale.
  9. Creating physical objects from a digital model using successive layering of materials.
Down
  1. Step-by-step instructions for solving a particular problem or task.
  2. Technology that overlays digital information onto the real world.
  3. Development of computer systems that can perform tasks requiring human intelligence.
  4. Design, construction, operation, and use of robots.
  5. Protection of computer systems, networks, and data from theft or damage.
  6. Use of largely automatic equipment in a system of operation.
  7. Delivery of computing services over the internet.
  8. Physical components of a computer system.
  9. Computer-generated simulation of a three-dimensional environment.
  10. Transmission of information over a distance using electronic means.
  11. Unmanned aerial vehicles operated remotely or autonomously.

20 Clues: Physical components of a computer system.Programs and applications that run on a computer.Delivery of computing services over the internet.Global system of interconnected computer networks.Design, construction, operation, and use of robots.Use of computers and software for various applications....

Computer Science History and Cybersecurity 2021-03-08

Computer Science History and Cybersecurity crossword puzzle
Across
  1. hashing is the foundation of this technology that has been used to implement crypto-currencies
  2. Park once the top-secret home of the World War Two Codebreakers
  3. cipher that is easily broken using brute force
  4. was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
  5. designed to translate content with the intent of translating it back
  6. German cipher during WWII
Down
  1. Japanese naval code during WWII
  2. bncd (single shift cipher, decrypt for answer)
  3. one of the founders of Computer Science who worked as a code-breaker in England during WWII
  4. designed to translate content with NO intent of translating it back
  5. early computers were _________ and hot!
  6. first naval battle of WWII where code breaking played a major role
  7. both the sender and the receiver must have this for encryption to work
  8. decisive naval battle of WWII where code breaking played a major role

14 Clues: German cipher during WWIIJapanese naval code during WWIIearly computers were _________ and hot!bncd (single shift cipher, decrypt for answer)cipher that is easily broken using brute forcewas the U.S. Navy's Combat Intelligence Unit, called OP–20–GPark once the top-secret home of the World War Two Codebreakers...

National Cybersecurity Awareness Month Crossword 2018-09-21

National Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Report suspicious emails by using the “Report to CyberSafe” _____ in the Outlook toolbar
  2. Avoid using _____ WiFi hotspots and charging station USB ports
  3. When creating a _____ , use special characters and numbers, and consider using a passphrase, or a unique set of words, to make it easier for you to remember
  4. Emails from external or non-USPS senders will automatically display [_____] in the subject line
  5. Cybersecurity is our shared _____
  6. Lock your _____ and mobile phone when not in use
  7. Don't click on _____ within emails from an unknown or untrusted source
  8. Never use your USPS _____ address for non-work purposes (e.g. social media, online shopping, listserv subscriptions)
Down
  1. Don't open or download _____ from unknown or suspicious senders
  2. If you need to charge a device, plug into an _____. Never connect your personal or work devices to USPS computers or equipment
  3. _____ over hyperlinks to reveal the destination before clicking
  4. The keyphrase #_____# can be added to the subject line of an email to encrypt the contents when sending to an external recipient
  5. When traveling abroad for personal travel, _____ bring your USPS mobile device or computer
  6. _____ is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity

14 Clues: Cybersecurity is our shared _____Lock your _____ and mobile phone when not in useAvoid using _____ WiFi hotspots and charging station USB portsDon't open or download _____ from unknown or suspicious senders_____ over hyperlinks to reveal the destination before clickingDon't click on _____ within emails from an unknown or untrusted source...

Cybersecurity Awareness Month Crossword Puzzle! 2024-10-08

Cybersecurity Awareness Month Crossword Puzzle! crossword puzzle
Across
  1. A secret word or phrase to access an account.
  2. Misleading content designed to get you to click on a link.
  3. A small piece of code that fixes security vulnerabilities in software.
  4. When unauthorized access is gained to a system or data.
  5. A type of malicious software that replicates and spreads on its own.
  6. Software that secretly gathers information from your device.
  7. A method of converting data into a secure format that cannot be read without a key.
  8. New software version with improvements and bug fixes.
  9. Software designed to harm or exploit your computer.
Down
  1. Software that detects and removes harmful programs from your computer.
  2. A copy of important data kept in case the original is lost or damaged.
  3. A scam to trick you into revealing personal information.
  4. A security barrier that monitors and controls incoming and outgoing network traffic.
  5. Unwanted and unsolicited emails or messages.

14 Clues: Unwanted and unsolicited emails or messages.A secret word or phrase to access an account.Software designed to harm or exploit your computer.New software version with improvements and bug fixes.When unauthorized access is gained to a system or data.A scam to trick you into revealing personal information....

Tan Su Kyi - 8 Gamma 2023-01-19

Tan Su Kyi - 8 Gamma crossword puzzle
Across
  1. An app where you use to communicate and call with your friend.
  2. We should _________ our password once a year.
  3. You have the _________ to find out what information the government & other organisations store about you.
Down
  1. It is a practice of protecting systems, networks & programs from digital attacks.
  2. Created when that data has been processed and become meaningful.
  3. A social media app that you can connect with friends, family and other people you know.
  4. Any company might hold your ________ information that you have in your account.

7 Clues: We should _________ our password once a year.An app where you use to communicate and call with your friend.Created when that data has been processed and become meaningful.Any company might hold your ________ information that you have in your account.It is a practice of protecting systems, networks & programs from digital attacks....

Incident Response 2018-10-03

Incident Response crossword puzzle
Across
  1. A _ _ _ _ _ _ is a copy of an electronic record, maintained to protect the information from loss and often compressed to
  2. An Internet scam that targets unsuspecting users through email
  3. space.
  4. A cybersecurity _ _ _ _ _ _ _ _ is considered to be any event that threatens the confidentiality, integrity or availability of an
Down
  1. A type of malware designed to block access to a computer system or data until a sum of money is paid
  2. information resources.
  3. If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message

7 Clues: space.information resources.An Internet scam that targets unsuspecting users through emailIf you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the messageA type of malware designed to block access to a computer system or data until a sum of money is paid...

Pilot Puzzle Program 2022-02-11

Pilot Puzzle Program crossword puzzle
Across
  1. A sector of safety that is not related to outdoor work (hint: digital)
  2. given by FM prior to performing non-exempt work
  3. same _____ falls are a hazard anywhere
  4. common PPE when working with any kind of sample
  5. ___ drills happen regularly to be prepared in the event of an evacuation
  6. this is a requirement when working in a CA or RA
  7. a 360 ___ is essential after returning to your vehicle
  8. Always know where the closest ___ is in case there is a building emergency
Down
  1. the biggest safety concern working in a nuclear plant
  2. historically marked across sites using lollypops
  3. fire extinguishers needs to have a full maintenance inspection every ___ months
  4. a required document to be briefed to when in a CA or RA
  5. hazard that changes depending on seasons
  6. always know where the closest ___ is in case someone has a cardiac event
  7. briefing held during warm months
  8. required to be written and discussed prior to beginning work to cover hazards
  9. You always should conduct a ___ before starting a new job or when conditions change

17 Clues: briefing held during warm monthssame _____ falls are a hazard anywherehazard that changes depending on seasonsgiven by FM prior to performing non-exempt workcommon PPE when working with any kind of samplehistorically marked across sites using lollypopsthis is a requirement when working in a CA or RA...

IT Companies 2024-04-20

IT Companies crossword puzzle
Across
  1. A multinational technology corporation that develops, manufactures, licenses, supports, and sells computer software, consumer electronics, and personal computers
  2. one of the most popular company that sell premium phone
  3. profound and often rapid change or transformation that occurs within a society, system, or organization
  4. company that create first phone
Down
  1. Part of IT department, that control security part of IT companies
  2. IT GIGANT that have theyself browser, search system
  3. one of the companies of the largest oligarch, which is responsible for the wireless network in all parts of the world

7 Clues: company that create first phoneIT GIGANT that have theyself browser, search systemone of the most popular company that sell premium phonePart of IT department, that control security part of IT companiesprofound and often rapid change or transformation that occurs within a society, system, or organization...

Digital Literacy Crossword 2024-10-09

Digital Literacy Crossword crossword puzzle
Across
  1. The exchange of information or ideas between people.
  2. A group of people who watch, listen to, or engage with a presentation or performance.
  3. Wrongful deception intended to result in financial or personal gain.
  4. The ability to enter or use something.
  5. Individuals or organisations that support an event or activity, usually financially.
  6. A compulsive dependence on a substance or behaviour, often harmful.
  7. A state of being comfortable, healthy, or happy.
  8. The right to keep personal information confidential and free from public scrutiny.
Down
  1. A particular way of viewing or considering something.
  2. The size, extent, or importance of something.
  3. A display or demonstration of information to an audience.
  4. A dishonest scheme or trick to deceive people, usually for money.
  5. An approximate calculation or judgment regarding a quantity or value.
  6. Measures taken to protect computers and networks from digital attacks.
  7. The act of communicating or engaging with others.
  8. A list of items to be discussed or acted upon, often in a meeting.
  9. A software application used to view and navigate the internet.

17 Clues: The ability to enter or use something.The size, extent, or importance of something.A state of being comfortable, healthy, or happy.The act of communicating or engaging with others.The exchange of information or ideas between people.A particular way of viewing or considering something.A display or demonstration of information to an audience....

Daily Vocab for Cybersecurity 2022-02-01

Daily Vocab for Cybersecurity crossword puzzle
Across
  1. Type of URL hijacking
  2. Phishing done through text messages.
  3. Voice phishing through the phone or a voicemail.
Down
  1. When you gather information on the victim.
  2. Redirection from a legit website to a bogus one.
  3. Phishing with inside information.
  4. Spearing the CEO.
  5. _________ information is extracting information from the victim.
  6. Lying to get information.
  7. Dumpster ________ is when you gather personal information from things that people have thrown out from their trash.

10 Clues: Spearing the CEO.Type of URL hijackingLying to get information.Phishing with inside information.Phishing done through text messages.When you gather information on the victim.Redirection from a legit website to a bogus one.Voice phishing through the phone or a voicemail._________ information is extracting information from the victim....

ICT Processes and Cybersecurity 2022-11-10

ICT Processes and Cybersecurity crossword puzzle
Across
  1. Makes systems access easier
  2. ERP module for logging all support tickets
  3. Verifying the identity of a user
  4. A type of social engineering
  5. Log ticket here without ERP credentials
Down
  1. Secret word or phrase
  2. Cyber security protects them
  3. Redirecting unresolved service request
  4. Type of priority of a service request
  5. Only for emergency service requests

10 Clues: Secret word or phraseMakes systems access easierCyber security protects themA type of social engineeringVerifying the identity of a userOnly for emergency service requestsType of priority of a service requestRedirecting unresolved service requestLog ticket here without ERP credentialsERP module for logging all support tickets

Cybersecurity Awareness Month Crossword! 2023-09-25

Cybersecurity Awareness Month Crossword! crossword puzzle
Across
  1. software designed to disrupt, damage or gain unauthorized access to a computer system
  2. a process to identify who should to have access to a system
  3. malicious software designed to block access to computer system until money is paid
  4. an electronic device used for processing and storing information
  5. an input device used with a computer
  6. a network security controller and monitor
Down
  1. cyberattack tactic designed to scare someone into visiting a spoofed or infected website
  2. the process of converting information or data into a code to prevent unauthorized access
  3. 2 or more computers connected together to share resources
  4. emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information

10 Clues: an input device used with a computera network security controller and monitor2 or more computers connected together to share resourcesa process to identify who should to have access to a systeman electronic device used for processing and storing informationmalicious software designed to block access to computer system until money is paid...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paidA ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid.A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

CyberSecurity CrossWord 2023-07-29

CyberSecurity CrossWord crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

Cybersecurity Principles 2023-12-14

Cybersecurity Principles crossword puzzle
Across
  1. This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
  2. This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
  1. This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
  2. This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
  3. This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.

5 Clues: This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required....

CyberSecurity Crossword 2024-10-28

CyberSecurity Crossword crossword puzzle
Across
  1. We have to ____ over a hyperlink that's displayed in the email message
  2. Malware attack that capture all keyboard inputs
Down
  1. Malware received from emails typically encrypts files and documents on the target machines
  2. What do you call an email that looks legitimate but is actually a scam?
  3. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity

5 Clues: Malware attack that capture all keyboard inputsWe have to ____ over a hyperlink that's displayed in the email messageWhat do you call an email that looks legitimate but is actually a scam?Malware received from emails typically encrypts files and documents on the target machines...

First Principles of Cybersecurity 2019-10-15

First Principles of Cybersecurity crossword puzzle
Across
  1. hiding data from people who don't need to have access to it
  2. using mulitple strategies to protect something
  3. making sure that only the necessary people have access
  4. reducin the number of weaknesses in something
  5. labeling objects based on how they can be used and by whom
  6. removing any clutter and only displaying the important information
Down
  1. making designs as simple and intuitive as possible
  2. keeping things separate based on categories
  3. making it easy to swap one part out for another
  4. only doing one thing at a time

10 Clues: only doing one thing at a timekeeping things separate based on categoriesreducin the number of weaknesses in somethingusing mulitple strategies to protect somethingmaking it easy to swap one part out for anothermaking designs as simple and intuitive as possiblemaking sure that only the necessary people have access...

information technology 2023-10-28

information technology crossword puzzle
Across
  1. is the process of designing, creating, testing, and maintaining software applications
  2. is a branch of IT that protects computer systems and data from unauthorized access
  3. is the study of computers and computing technology
Down
  1. is the process of creating and maintaining websites
  2. refers to the practice of connecting computer systems and other devices

5 Clues: is the study of computers and computing technologyis the process of creating and maintaining websitesrefers to the practice of connecting computer systems and other devicesis a branch of IT that protects computer systems and data from unauthorized accessis the process of designing, creating, testing, and maintaining software applications