cybersecurity Crossword Puzzles

Educational Technologies Crossword 2026-01-30

Educational Technologies Crossword crossword puzzle
Across
  1. To send a file from a device to the internet
  2. Digital or printed update shared with an audience
  3. Physical parts of a computer you can touch
  4. Protection of devices and online information
  5. Laptop commonly used in schools
  6. The process of planning and creating visual content
  7. Online tool used for graphic design and presentations
Down
  1. Program used to access online content
  2. Global network that connects computers
  3. Secret code used to access accounts
  4. Input device used to type letters and numbers
  5. Programs and apps that run on a device
  6. Device used to point, click, and scroll
  7. Digital way to send messages
  8. To save a file from the internet to a device

15 Clues: Digital way to send messagesLaptop commonly used in schoolsSecret code used to access accountsProgram used to access online contentGlobal network that connects computersPrograms and apps that run on a deviceDevice used to point, click, and scrollPhysical parts of a computer you can touchTo send a file from a device to the internet...

Career Options 2022-11-11

Career Options crossword puzzle
Across
  1. A person trained to give guidance on personal, social, or psychological problems.
  2. Joins two pieces of metal together.
  3. Types include voice, screen, stage or character.
  4. People in these jobs work to protect our communities.
  5. Protects computer systems, networks and data.
  6. Transports goods all over the country.
  7. Repairs and maintains machinery, motors, etc.
Down
  1. A scientist who studies fossils.
  2. Health of the human body.
  3. Jobs in this field include coaches, announcers and recruiters.
  4. Performs beauty treatment regimens on hair, skin and nails.
  5. Invent, design and maintain machines, structures and data systems.
  6. Defends the U.S.and its allies.
  7. Set up situations in which students can learn effectively.

14 Clues: Health of the human body.Defends the U.S.and its allies.A scientist who studies fossils.Joins two pieces of metal together.Transports goods all over the country.Protects computer systems, networks and data.Repairs and maintains machinery, motors, etc.Types include voice, screen, stage or character....

Computer Science Crossword 2024-03-21

Computer Science Crossword crossword puzzle
Across
  1. The main page of a website.
  2. A security system that controls incoming and outgoing network traffic.
  3. A small file saved by websites to remember user information.
  4. Wireless internet connection.
  5. A step-by-step procedure for calculations.
  6. A program used to navigate the internet.
  7. A list of commands executed by a program or scripting engine.
Down
  1. A scam to steal personal information via email.
  2. Information processed or stored by a computer.
  3. Finding and fixing errors in code.
  4. Protection for computer systems and networks.
  5. A way of representing data using only two digits, 0 and 1.
  6. The ability to read and write.
  7. The address of a web page.

14 Clues: The address of a web page.The main page of a website.Wireless internet connection.The ability to read and write.Finding and fixing errors in code.A program used to navigate the internet.A step-by-step procedure for calculations.Protection for computer systems and networks.Information processed or stored by a computer....

Blue Print 2024-09-11

Blue Print crossword puzzle
Across
  1. Person who flies airplanes for a job
  2. Person who promotes products or brands online
  3. Animal expert who might work at a wildlife park
  4. Person who creates new computer and console games
  5. Cook who prepares food for big events
  6. Therapist who teaches exercises to heal injuries
  7. Creator of dance routines for shows or videos
  8. Writer who reports on the latest clothing trends
Down
  1. Computer expert who protects against online threats
  2. Someone who runs for office to make laws
  3. Designer of bridges, roads, and buildings
  4. Problem-solver who works to protect nature
  5. Person in charge of making movies
  6. Sound expert who helps make songs in a studio

14 Clues: Person in charge of making moviesPerson who flies airplanes for a jobCook who prepares food for big eventsSomeone who runs for office to make lawsDesigner of bridges, roads, and buildingsProblem-solver who works to protect natureSound expert who helps make songs in a studioPerson who promotes products or brands online...

Oklahoma Computer Science 2025-05-13

Oklahoma Computer Science crossword puzzle
Across
  1. A tool to organize, calculate, and analyze data
  2. A unique number for each device on a network
  3. Programs and apps that run on a computer
  4. A list of steps to solve a problem
  5. A group of connected computers that share information
  6. Information that can be collected and used
  7. Finding and fixing errors in code
Down
  1. Protecting devices and data from digital threats
  2. A device that sends data between computers and networks
  3. Code that repeats instructions
  4. A value in a program that can change
  5. Technology doing tasks without human help
  6. Showing only specific data based on rules
  7. The physical parts of a computer

14 Clues: Code that repeats instructionsThe physical parts of a computerFinding and fixing errors in codeA list of steps to solve a problemA value in a program that can changePrograms and apps that run on a computerTechnology doing tasks without human helpShowing only specific data based on rulesInformation that can be collected and used...

Engineering 2026-01-17

Engineering crossword puzzle
Across
  1. Protection of computer systems from digital attacks
  2. Industry concerned with aviation and space flight
  3. A plan giving lists of intended events and times
  4. Consistently good in quality or performance
  5. To keep something in good condition
  6. Basic physical structures like roads, bridges, and power supplies
  7. To follow a rule or regulation
  8. To create a plan or drawing before building something
Down
  1. To put a decision or plan into effect
  2. A person who designs, builds, or maintains machines
  3. Possible to do easily or conveniently; achievable
  4. A liquid fossil fuel; crude oil
  5. Weakness in materials caused by repeated stress
  6. To roughly calculate the cost, value, or quantity
  7. A barrier constructed to hold back water

15 Clues: To follow a rule or regulationA liquid fossil fuel; crude oilTo keep something in good conditionTo put a decision or plan into effectA barrier constructed to hold back waterConsistently good in quality or performanceWeakness in materials caused by repeated stressA plan giving lists of intended events and times...

FOP 2023-04-01

FOP crossword puzzle
Across
  1. SOCA’s ________ department is the first point of contact with outside organizations.
  2. DISM’s SIG.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SPAI attended and presented at the ____ Conference.
  5. SEED hosts the ___-___-Series.
  6. SOCA is In charge of ________ relations.
  7. ______ organized the SOC Open House.
Down
  1. Gryphons aims to promote ________ to students that are passionate about it.
  2. SPAI created its own Project _____.
  3. SPAI is part of the AI Singapore Student ____ Group.
  4. SEED stands for Sharing, _______, Enriching, Development.
  5. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
  6. SOCC is in charge of maintaining and building ________ relations.
  7. League Programming competition only for freshmen.
  8. SOCC organized Freshman Orientation ______.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.SOCC organized Freshman Orientation ______.League Programming competition only for freshmen.SPAI attended and presented at the ____ Conference.SPAI is part of the AI Singapore Student ____ Group....

btyetrails4 2025-02-25

btyetrails4 crossword puzzle
Across
  1. Protecting data from unauthorized access
  2. A system software managing computer hardware
  3. The process of transferring data from one device to another
  4. Permanently removing files from a storage device
Down
  1. A type of scam email designed to steal user data
  2. Storing data over the internet instead of local systems
  3. A web address used to access websites
  4. A software that helps navigate web pages
  5. Company that provides internet access

9 Clues: A web address used to access websitesCompany that provides internet accessProtecting data from unauthorized accessA software that helps navigate web pagesA system software managing computer hardwareA type of scam email designed to steal user dataPermanently removing files from a storage deviceStoring data over the internet instead of local systems...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Cyber Midterm P1 2025-12-09

Cyber Midterm P1 crossword puzzle
Across
  1. Keeping data intact and safe
  2. Keeps data only accessible to authorized persons
  3. Reliable access to information
Down
  1. Data at rest
  2. Acronym for the triad that embodies Cybersecurity as a whole
  3. Data in transit

6 Clues: Data at restData in transitKeeping data intact and safeReliable access to informationKeeps data only accessible to authorized personsAcronym for the triad that embodies Cybersecurity as a whole

Fundamentals of Computing: McKown 2022-10-26

Fundamentals of Computing: McKown crossword puzzle
Across
  1. Series of code that completes a specific task
  2. First Digital Computer
  3. Being mean directly or indirectly to an individual or group online
  4. Father of the computer
  5. .mp3 file type
  6. Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
  7. RAM Memory - Short Term
  8. Device used to display data to the user from the computer
  9. Single unit of the binary language
  10. First computer programmers
  11. 8 bits
Down
  1. Where all of the of compentants of a computer connect to or live
  2. Device used to give the computer data from the user
  3. The brain of the computer
  4. Industry that works to secure computers and computer networks as a whole
  5. Series of commands
  6. CodeHS Programming Dog
  7. Computer language

18 Clues: 8 bits.mp3 file typeComputer languageSeries of commandsFirst Digital ComputerFather of the computerCodeHS Programming DogRAM Memory - Short TermThe brain of the computerFirst computer programmersSingle unit of the binary languageSeries of code that completes a specific taskDevice used to give the computer data from the user...

Ransomware 2021-09-23

Ransomware crossword puzzle
Across
  1. Convert information into a code
  2. Protects against threat online
  3. Software created for malicious purposes
  4. New Ransomware Variant
Down
  1. A technique used by hackers to obtain sensitive information
  2. Protecting networks, devices and data from unauthorized access

6 Clues: New Ransomware VariantProtects against threat onlineConvert information into a codeSoftware created for malicious purposesA technique used by hackers to obtain sensitive informationProtecting networks, devices and data from unauthorized access

Tecnologia de la Informacion 2023-05-06

Tecnologia de la Informacion crossword puzzle
Across
  1. Implica en los trabajos en tecnología de la información
  2. La TI admite muchas funciones comerciales y ayuda a?
  3. Una de las carreras que abarca la TI
  4. Es un tipo de tecnología de información
  5. Sigla de la tecnología de información
  6. Las empresas globales utilizan la tecnología de información para?
Down
  1. ¿Qué es la tecnología de la información?
  2. ¿La tecnología de información es responsable de?
  3. ¿Porqué es necesaria la tecnología de la información?

9 Clues: Una de las carreras que abarca la TISigla de la tecnología de informaciónEs un tipo de tecnología de información¿Qué es la tecnología de la información?¿La tecnología de información es responsable de?La TI admite muchas funciones comerciales y ayuda a?¿Porqué es necesaria la tecnología de la información?...

business 2025-05-22

business crossword puzzle
Across
  1. Business model: selling directly to consumers (Business).
  2. Leaving a company, often measured in percentages (HR).
  3. A revolutionary idea that changes the market (Business).
  4. Strategy that compares performance with top competitors (Business).
Down
  1. Security that protects systems and data (Tech).
  2. Design that improves how people interact with a product (Tech).
  3. Bringing new workers into a company smoothly (HR).
  4. Total money earned (Finance).
  5. Group of people you market your product to (Marketing).

9 Clues: Total money earned (Finance).Security that protects systems and data (Tech).Bringing new workers into a company smoothly (HR).Leaving a company, often measured in percentages (HR).Group of people you market your product to (Marketing).A revolutionary idea that changes the market (Business).Business model: selling directly to consumers (Business)....

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

Cybersecurity Month 2023-09-27

Cybersecurity Month crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
  2. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
  3. Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
  1. A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
  2. A form of malware used by hackers to spy on you and your computer activities
  3. Any technology, be it software or hardware, used to keep intruders out
  4. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications

7 Clues: Any technology, be it software or hardware, used to keep intruders outA form of malware used by hackers to spy on you and your computer activitiesCoding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

The Voice: October 7th, 2024 2024-10-07

The Voice: October 7th, 2024 crossword puzzle
Across
  1. Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
  2. What _____ look like in Canada today.
  3. Limited spots left for this event!
  4. October is what awareness month?
Down
  1. One of the highlighted members this week.
  2. Since 2012, the Chamber has advocated for improved what?
  3. EcoBrooks _____ Award.

7 Clues: EcoBrooks _____ Award.October is what awareness month?Limited spots left for this event!What _____ look like in Canada today.One of the highlighted members this week.Since 2012, the Chamber has advocated for improved what?Going to represent Canada internationally Finalist for 2024 Constantinus International Award.

Queenbee Cybersecurity 2025-03-17

Queenbee Cybersecurity crossword puzzle
Across
  1. An hacker sends a ___________ email requesting the victim for sensitive information
  2. A _________ access by a third party is called a cyber attack
  3. Trojan is an example of __________ attack
Down
  1. Users need to use unique __________ passwords to strengthen defence against attacks
  2. ________ are dummy computers systems to deceive attackers
  3. A virtual wall between the computer and the internet is called as _______
  4. A person who performs a cybersecurity attack is called a _______

7 Clues: Trojan is an example of __________ attack________ are dummy computers systems to deceive attackersA _________ access by a third party is called a cyber attackA person who performs a cybersecurity attack is called a _______A virtual wall between the computer and the internet is called as _______...

IT 2024-11-28

IT crossword puzzle
Across
  1. Field focused on protecting data from cyberattacks.
  2. What does IoT stand for?
  3. Common programming language used for AI.
  4. Process of identifying and fixing software issues.
Down
  1. A key method for securing data online.
  2. Smart system connecting everyday devices.
  3. Main component of a computer system's physical setup.

7 Clues: What does IoT stand for?A key method for securing data online.Common programming language used for AI.Smart system connecting everyday devices.Process of identifying and fixing software issues.Field focused on protecting data from cyberattacks.Main component of a computer system's physical setup.

Phishing Crossword 2023-10-14

Phishing Crossword crossword puzzle
Across
  1. an email that tricks people
  2. commonly hunted by fisherman
  3. a way scams try to reach you
  4. a sense that a scammer creates when rushing you
Down
  1. a fake email address
  2. The process of verifying a claimed identity of a user or device
  3. protects against online threats

7 Clues: a fake email addressan email that tricks peoplecommonly hunted by fishermana way scams try to reach youprotects against online threatsa sense that a scammer creates when rushing youThe process of verifying a claimed identity of a user or device

CYBERSECURITY PUZZLE 2023-09-13

CYBERSECURITY PUZZLE crossword puzzle
Across
  1. Shady..do not click!
  2. Do not visit
  3. Don't ever share this to strangers!
  4. Dishonest offer online
Down
  1. Publishing someone's private information on the internet
  2. Always change this throughout accounts!
  3. Be careful when doing this on social media!

7 Clues: Do not visitShady..do not click!Dishonest offer onlineDon't ever share this to strangers!Always change this throughout accounts!Be careful when doing this on social media!Publishing someone's private information on the internet

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity crossword 2023-03-17

Cybersecurity crossword crossword puzzle
Across
  1. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. Find a synonym of preempt
Down
  1. What is the naming convention for ecrime category ?
  2. What is 84 minutes the average time for ?
  3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. Which type of accounts are mainly targeted by adversaries ?

7 Clues: Find a synonym of preemptWhat is 84 minutes the average time for ?What is the naming convention for ecrime category ?Which type of accounts are mainly targeted by adversaries ?Which tool can reveal hidden relationships and identify attack paths within an AD environment ?...

Cybersecurity Crossword 2022-05-19

Cybersecurity Crossword crossword puzzle
Across
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. establishes a secure connection between you and the internet
  3. the practice of protecting critical systems and sensitive information from digital attacks.
Down
  1. a set of instructions, data or programs used to operate computers and execute specific tasks
  2. a standalone malware computer program that replicates itself in order to spread to other computers
  3. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  4. a computer program that can copy itself and infect a computer without permission or knowledge of the user

7 Clues: establishes a secure connection between you and the internetthe practice of protecting critical systems and sensitive information from digital attacks.a set of instructions, data or programs used to operate computers and execute specific tasksa standalone malware computer program that replicates itself in order to spread to other computers...

Cybersecurity Crossword 2023-11-10

Cybersecurity Crossword crossword puzzle
Across
  1. What type of hacker exploits systems for personal gain and bad intention
  2. What is used to hide messages so only authorized people can understand?
  3. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. Using deceptive measures to manipulate someone in disclosing personal information
  2. Data, information , device anything that is of value
  3. Acquiring unauthorized access to system or data
  4. An incident where attackers steal information without authorization?

7 Clues: Acquiring unauthorized access to system or dataData, information , device anything that is of valueAn incident where attackers steal information without authorization?What is used to hide messages so only authorized people can understand?What type of hacker exploits systems for personal gain and bad intention...

AI in education 2024-06-05

AI in education crossword puzzle
Across
  1. Protection of personal information.
  2. Lack of neutrality, prejudice.
  3. Guidelines or principles governing proper conduct.
  4. Actions taken to use something wrongly or inappropriately.
  5. The quality of being honest and having strong moral principles.
  6. The state of being clear and open.
Down
  1. The protection of data from unauthorized access or corruption.
  2. The state of being answerable or responsible.
  3. Practices designed to ensure secure data and systems.
  4. The practice of keeping information secret to prevent unauthorized access.

10 Clues: Lack of neutrality, prejudice.The state of being clear and open.Protection of personal information.The state of being answerable or responsible.Guidelines or principles governing proper conduct.Practices designed to ensure secure data and systems.Actions taken to use something wrongly or inappropriately....

Comms & Media Crossword - October Edition 2022-10-04

Comms & Media Crossword - October Edition crossword puzzle
Across
  1. This company was recently in news for launching 5G Lab-as-a-service ​
  2. Leading telecom equipment provider, & our client
  3. Virtual representation of a real-world physical system​
  4. One of the most important digital challenges today​
  5. Continuous Expenditure that companies incur
Down
  1. Satoshi Nakamoto was the pioneer behind this technology​
  2. Software based technology used in Telecom
  3. This company launched India’s 1st multiplex in Metaverse
  4. Telecom players fight for this
  5. boAt had a K-pop concert on this platform​

10 Clues: Telecom players fight for thisSoftware based technology used in TelecomboAt had a K-pop concert on this platform​Continuous Expenditure that companies incurLeading telecom equipment provider, & our clientOne of the most important digital challenges today​Virtual representation of a real-world physical system​...

MEKATRONIK T3 2024-05-24

MEKATRONIK T3 crossword puzzle
Across
  1. merupakan satu teras utama revolusi industri 4.0
  2. satu sistem susunan dan sambungan fizikal komponen dalam satu litar
  3. merupakan contoh bagi sistem kawalan
  4. LITAR merupakan salah satu aspek penning dalam product mekatronik
  5. merupakan salah satu ujian kefungsian
  6. ..........manufacturing Hialeah pembuatan bah mental
Down
  1. berfungsi membekalkan arus bagi membolehkan peranti berfungsi
  2. ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
  3. ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
  4. jurutera jepun yang memperkenalkan konsep mekatronik

10 Clues: merupakan contoh bagi sistem kawalanmerupakan salah satu ujian kefungsianmerupakan satu teras utama revolusi industri 4.0..........manufacturing Hialeah pembuatan bah mentaljurutera jepun yang memperkenalkan konsep mekatronikberfungsi membekalkan arus bagi membolehkan peranti berfungsi...

Globalization and Technology 2025-02-06

Globalization and Technology crossword puzzle
Across
  1. Transaction on the internet like Amazon Pay, Paypal etc
  2. A global network the world uses for communications and other features
  3. A period of hundred years
  4. A system that gives music and transmits audio
  5. The act of buying and selling goods
  6. An Act of introducing new ideas or products
Down
  1. Process of exchanging Information through any medium
  2. A simulated experience using computer technology used by headset
  3. Moving things from one place to another
  4. Measures taken to protect a computer

10 Clues: A period of hundred yearsThe act of buying and selling goodsMeasures taken to protect a computerMoving things from one place to anotherAn Act of introducing new ideas or productsA system that gives music and transmits audioProcess of exchanging Information through any mediumTransaction on the internet like Amazon Pay, Paypal etc...

03 Almer Billie prabawa 2025-10-17

03 Almer Billie prabawa crossword puzzle
Across
  1. Memuat ulang halaman web agar tampil terbaru.
  2. Program untuk mengatur dan mempercepat unduhan file.
  3. Proses mengubah data agar tidak bisa dibaca orang lain.
  4. Lembar atau jendela kecil dalam browser untuk membuka situs lain.
  5. menampilkan gambar atau halaman web di layar.
  6. Perlindungan sistem komputer dari serangan digital.
Down
  1. Tempat menulis alamat situs web (URL) di browser.
  2. Tab baru untuk membuka halaman web lain.
  3. Memperbarui tampilan halaman yang sedang dibuka.
  4. Upaya penipuan untuk mencuri data pribadi lewat internet.

10 Clues: Tab baru untuk membuka halaman web lain.Memuat ulang halaman web agar tampil terbaru.menampilkan gambar atau halaman web di layar.Memperbarui tampilan halaman yang sedang dibuka.Tempat menulis alamat situs web (URL) di browser.Perlindungan sistem komputer dari serangan digital.Program untuk mengatur dan mempercepat unduhan file....

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Should be tested monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: By David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Should be tested monthlyDo your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Digital Health 2025-02-26

Digital Health crossword puzzle
Across
  1. Large datasets analyzed to reveal patterns and trends.
  2. On-demand computing services over the internet.
  3. A secure, decentralized technology used for data integrity.
  4. Technology simulating human intelligence processes.
  5. Remote diagnosis and treatment of patients using technology.
  6. Ability of different systems to exchange and use information.
Down
  1. Protection of digital systems from attacks and threats.
  2. Use of digital technologies to improve healthcare delivery.
  3. Digital version of a patient's paper chart.
  4. AI technique that allows systems to learn from data.

10 Clues: Digital version of a patient's paper chart.On-demand computing services over the internet.Technology simulating human intelligence processes.AI technique that allows systems to learn from data.Large datasets analyzed to reveal patterns and trends.Protection of digital systems from attacks and threats....

pasar uang dan ekonomi digital 2024-02-28

pasar uang dan ekonomi digital crossword puzzle
Across
  1. sektor pendukung ekonomi digital
  2. contoh E-Commerce yang ada di Indonesia
  3. sumber pendanaan dalam pasar uang yang berupa utang dagang
  4. karakteristik pasar uang
  5. peluang bisnis ekonomi digital
Down
  1. pekerjaan masyarakat Indonesia dengan adanya media online
  2. masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
  3. ekonomi digital sangat efisien
  4. salah satu memanfaatkan ekonomi digital adalah membuat
  5. karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
  6. kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
  7. berperan sebagai perantara di antara pelaku dalam Pasar Uang
  8. salah satu fungsi pasar uang
  9. instrumen pasar uang yang diteritkan Bank Umum
  10. pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga

15 Clues: karakteristik pasar uangsalah satu fungsi pasar uangekonomi digital sangat efisienpeluang bisnis ekonomi digitalsektor pendukung ekonomi digitalcontoh E-Commerce yang ada di Indonesiainstrumen pasar uang yang diteritkan Bank Umumsalah satu memanfaatkan ekonomi digital adalah membuatpekerjaan masyarakat Indonesia dengan adanya media online...

browsing safely 2025-05-29

browsing safely crossword puzzle
Across
  1. bullying act of harming or harassing using technology
  2. program used to identify and remove viruses
  3. use of illegal methods to get money
  4. criminal activity used to harm anyone using the internet
  5. a set of programs that disrupts the functioning of a compute
  6. hoaxing or misleading
  7. process of 'befriending children' on social media
Down
  1. to conduct terrorism using a computer
  2. sending an email to an user and misleading them to believe its from a trusted account
  3. unethical hackers
  4. helps prevent unauthorised access to your computer
  5. victim is attacked and then forced to pay money
  6. misusing someone's personal information
  7. to protect networks or your devices
  8. illegal entry into computer system

15 Clues: unethical hackershoaxing or misleadingillegal entry into computer systemuse of illegal methods to get moneyto protect networks or your devicesto conduct terrorism using a computermisusing someone's personal informationprogram used to identify and remove virusesvictim is attacked and then forced to pay money...

4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02

4.1 Computer Vulnerability - Crossword Puzzle crossword puzzle
Across
  1. The protection of information and systems from cyberattacks
  2. A threat originating from within an organization
  3. The overall protection of computer systems and data
  4. A weakness in a computer system that can be exploited
  5. The transfer of information between devices
Down
  1. The act of stealing or manipulating data
  2. Unintentional harm caused to data or systems
  3. A threat originating from the internet
  4. The practice of illegally gaining access to a computer system

9 Clues: A threat originating from the internetThe act of stealing or manipulating dataThe transfer of information between devicesUnintentional harm caused to data or systemsA threat originating from within an organizationThe overall protection of computer systems and dataA weakness in a computer system that can be exploited...

TEMA 2 2025-10-23

TEMA 2 crossword puzzle
Across
  1. Mata uang kripto pertama di dunia.
  2. Bentuk uang yang hanya bisa digunakan secara elektronik.
  3. Sistem keamanan siber untuk perlindungan data.
  4. Teknologi dasar dari mata uang kripto.
  5. Kegiatan ekonomi melalui media internet.
  6. Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
  7. Aplikasi belanja online yang berwarna oranye.
  8. Transaksi keuangan melalui jaringan komputer disebut ...
  9. Sistem pembayaran tanpa uang tunai.
  10. Bentuk pasar digital tempat jual beli online.
Down
  1. Mata uang digital yang populer dan terdesentralisasi.
  2. Perusahaan teknologi keuangan disebut ...
  3. Mata uang digital resmi dari bank sentral disebut ...
  4. kredit Alat pembayaran berbentuk kartu dari bank.
  5. shopping Proses jual beli yang terjadi secara online.
  6. Teknologi virtual yang berkembang bersama ekonomi digital.
  7. Metode pembayaran dengan memindai kode.
  8. Salah satu dompet digital terkenal di Indonesia.
  9. Salah satu e-wallet milik Gojek.
  10. banking Layanan bank yang sepenuhnya berbasis internet.

20 Clues: Salah satu e-wallet milik Gojek.Mata uang kripto pertama di dunia.Sistem pembayaran tanpa uang tunai.Teknologi dasar dari mata uang kripto.Metode pembayaran dengan memindai kode.Kegiatan ekonomi melalui media internet.Perusahaan teknologi keuangan disebut ...Aplikasi belanja online yang berwarna oranye.Bentuk pasar digital tempat jual beli online....

Live Dictionary Crossword Day 20 2025-12-11

Live Dictionary Crossword Day 20 crossword puzzle
Across
  1. When milk is left out for too long it does this
  2. A large fabric that covers a window or something similar
  3. Protection from electronic maliciousness
  4. A father
Down
  1. Describes something that can be altered easily to its owner’s whim
  2. An earthy spice eaten whole or ground
  3. Stop fucking saying them
  4. A collective of people who share or follow extreme beliefs

8 Clues: A fatherStop fucking saying themAn earthy spice eaten whole or groundProtection from electronic maliciousnessWhen milk is left out for too long it does thisA large fabric that covers a window or something similarA collective of people who share or follow extreme beliefsDescribes something that can be altered easily to its owner’s whim

Cybersecurity Crossword 2021-11-14

Cybersecurity Crossword crossword puzzle
Across
  1. Proving your identity
  2. Encrypting files and holding them hostage for money
Down
  1. A horse with a surprise
  2. software designed to corrupt or steal information
  3. Pretending to be someone you are not to extract information out of someone
  4. A denial of service attack targets this
  5. a brute force attack takes a long time to work on this

7 Clues: Proving your identityA horse with a surpriseA denial of service attack targets thissoftware designed to corrupt or steal informationEncrypting files and holding them hostage for moneya brute force attack takes a long time to work on thisPretending to be someone you are not to extract information out of someone

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Unauthorized individuals gaining physical access through closely following authorized personnel
  2. A form of business risk resulting from cyberattacks or data breache
Down
  1. Suspicious emails
  2. Another word for tailgating
  3. Unexpected behavior exhibited by software applications, such as crashes could be caused by
  4. Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
  5. could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.

7 Clues: Suspicious emailsAnother word for tailgatingA form of business risk resulting from cyberattacks or data breacheUnexpected behavior exhibited by software applications, such as crashes could be caused byUnauthorized individuals gaining physical access through closely following authorized personnel...

CyberSecurity Awareness 2025-07-23

CyberSecurity Awareness crossword puzzle
Across
  1. being hidden from public view
  2. Multi-____ Authentication
  3. conversion of information to code
  4. "Enter your username and ______."
Down
  1. fake correspondence sent by a 'Nigerian Prince'
  2. Security Assurance for the Federal Reserve
  3. security protocols; organized into 'families'

7 Clues: Multi-____ Authenticationbeing hidden from public viewconversion of information to code"Enter your username and ______."Security Assurance for the Federal Reservesecurity protocols; organized into 'families'fake correspondence sent by a 'Nigerian Prince'

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

cruciverba cybersecurity 2025-11-17

cruciverba cybersecurity crossword puzzle
Across
  1. : Copia di sicurezza dei dati
  2. : Trasformare i dati in codice per proteggerli
  3. : Chiave segreta per accedere a un account
Down
  1. : Software dannoso che infetta il computer
  2. : Tentativo di rubare dati fingendosi qualcuno di fidato via email
  3. : Protezione che filtra il traffico di rete
  4. : Rete privata virtuale che protegge la connessione

7 Clues: : Copia di sicurezza dei dati: Software dannoso che infetta il computer: Chiave segreta per accedere a un account: Protezione che filtra il traffico di rete: Trasformare i dati in codice per proteggerli: Rete privata virtuale che protegge la connessione: Tentativo di rubare dati fingendosi qualcuno di fidato via email

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. Radio Detection and Ranging
  2. KeyW non-profit organization abbreviated
  3. KeyW's colors
  4. What is the name of our newsletter
  5. How many bridges connect Key West to Florida main land
  6. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  7. What is the name of our mascot
  8. Parrot Ball location
  9. What color is our KeyW van
  10. What type of bird is our mascot
Down
  1. When at work, what must you always carry
  2. Protection of networks, computers, programs, and data from attack
  3. KeyW's best location
  4. Time sheet
  5. KeyW CEO
  6. What is the surname of KeyW's founder
  7. Which food truck offers the best cheese steaks
  8. Applying statistical analysis to data which has a geographical or spatial aspect
  9. What month was KeyW founded
  10. How many buildings does the Severn location have

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanRadio Detection and RangingWhat month was KeyW foundedWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari crossword puzzle
Across
  1. Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
  2. O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
  3. Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
  4. Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
  5. Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
  6. Dunyodagi eng yirik e-tijorat platformalaridan biri?
  7. Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
  8. Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
  9. Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
  1. Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
  2. Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
  3. Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
  4. Elektron hukumat tizimi bo‘yicha yetakchi davlat?
  5. Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
  6. Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
  7. Sun’iy intellekt sohasida yetakchi davlatlardan biri?
  8. Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
  9. Dunyodagi eng yirik texnologik kompaniyalardan biri?
  10. O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
  11. Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?

20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat?Dunyodagi eng yirik e-tijorat platformalaridan biri?Dunyodagi eng yirik texnologik kompaniyalardan biri?Elektron tijorat bo‘yicha yetakchi davlatlardan biri?Sun’iy intellekt sohasida yetakchi davlatlardan biri?Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?...

cpsc4240 2024-10-31

cpsc4240 crossword puzzle
Across
  1. legal license that allows you to use and edit a product
  2. protecting systems and networks from digital attacks
  3. type of attack that can be caused by a nuke
  4. linuxdef
  5. number that determines process priority
  6. each one has a unique PID
  7. leaked the docs
  8. command to add user
  9. command to open this user is su
  10. command to control log settings
  11. partition that allows for temp storage
  12. link that points to another file
Down
  1. only letting users access what they need
  2. feature that logs metadata
  3. read write execute
  4. having many security layers
  5. system that has both ipv4 and ipv6
  6. file that discards all data written to it
  7. type of link that creates a direct copy
  8. file that stores password hashes
  9. sets file permission upon create
  10. process that creates child
  11. command to run a privileged command
  12. attaching a filesystem to another

24 Clues: linuxdefleaked the docsread write executecommand to add usereach one has a unique PIDfeature that logs metadatahaving many security layersprocess that creates childcommand to open this user is sucommand to control log settingsfile that stores password hashessets file permission upon createlink that points to another file...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Risiko ekonomi digital adalah kebocoran
  2. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  3. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  4. → Pemasaran melalui media sosial disebut
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  7. → Fintech merupakan singkatan dari
  8. → Perusahaan baru yang berbasis teknologi disebut
  9. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Keamanan transaksi online dikenal dengan istilah
  2. → Masa depan ekonomi digital bergantung pada literasi
  3. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  4. → Kecerdasan buatan dikenal juga dengan istilah
  5. → Transaksi keuangan secara online disebut
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  8. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  9. → Ekonomi digital menciptakan pekerjaan baru berbasis
  10. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  11. → Contoh aplikasi fintech di Indonesia adalah

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

rahef isna 2025-10-27

rahef isna crossword puzzle
Across
  1. → Masa depan ekonomi digital bergantung pada literasi
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → Risiko ekonomi digital adalah kebocoran
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Contoh aplikasi fintech di Indonesia adalah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  9. → Transaksi keuangan secara online disebut
  10. → Fintech merupakan singkatan dari
  11. → Pemasaran melalui media sosial disebut
  12. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
  1. → Kecerdasan buatan dikenal juga dengan istilah
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  6. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  7. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  8. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a setting you turn on to camouflage yourself from internet scammers
  2. this is where you install games and streaming services
  3. a streaming service that is very well known
  4. people that lure people into giving them there bank details
  5. a way of protecting you from hackers
Down
  1. a website in which you order from and it’s delivered to your door
  2. an answer to all your questions
  3. watch videos from your favourite content creator
  4. tweet tweet
  5. a social media app with a blue logo
  6. a corporation run by bill gates
  7. some the would be powered by electricity

12 Clues: tweet tweetan answer to all your questionsa corporation run by bill gatesa social media app with a blue logoa way of protecting you from hackerssome the would be powered by electricitya streaming service that is very well knownwatch videos from your favourite content creatorthis is where you install games and streaming services...

Business Ethics/Cyber Security 2023-09-19

Business Ethics/Cyber Security crossword puzzle
Across
  1. practice of protecting critical systems
  2. work place manners
  3. the number of steps in the decision making process
  4. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
  1. exchange of information between a sender and receiver
  2. these hackers send an email or text with a link to click
  3. guidelines for how a business should conduct themselves
  4. positive internet behavior
  5. a policy users must agree to follow in order to gain internet access
  6. a set of moral principles
  7. the most common form of communication in a business
  8. these hackers ask for money

12 Clues: work place mannersa set of moral principlespositive internet behaviorthese hackers ask for moneypractice of protecting critical systemsthe number of steps in the decision making processthe most common form of communication in a businessexchange of information between a sender and receiverguidelines for how a business should conduct themselves...

TDD 2023-09-19

TDD crossword puzzle
Across
  1. Think before you _____.​
  2. One of the common internet search engine used nowadays.
  3. Do not share your account ______ to anyone.​
  4. We should avoid sharing any _______ news without validating the sources.​
  5. #1 popular social media. CEO – Mark Zuckerberg​
Down
  1. ______ has been recognized as Cybersecurity awareness month.
  2. One of Amcor values.
  3. _______ make human sick as well as computer.​
  4. Operating System
  5. Short form of wireless network.​
  6. ____ your laptop when you are stepping away. You need a key to unlock it.​
  7. They are referred as small insects in mother nature. IT referred them as errors in computer program/system.​

12 Clues: Operating SystemOne of Amcor values.Think before you _____.​Short form of wireless network.​Do not share your account ______ to anyone.​_______ make human sick as well as computer.​#1 popular social media. CEO – Mark Zuckerberg​One of the common internet search engine used nowadays.______ has been recognized as Cybersecurity awareness month....

internet safety 2023-04-19

internet safety crossword puzzle
Across
  1. a part of a computer system or network which is designed to block unwanted access
  2. like a cold for your computer
  3. the state of being protected against the criminal use of electronic data
  4. bulling done over the internet
  5. a person or thing that hacks
  6. a world wide computer network
  7. websites and apps that let users create and share content EX.Snapchat
Down
  1. a piece of information needed to log in to the internet
  2. the state of being free from public attention
  3. be careful what you make public
  4. information made available by a website
  5. facts given to learn about someone or something

12 Clues: a person or thing that hackslike a cold for your computera world wide computer networkbulling done over the internetbe careful what you make publicinformation made available by a websitethe state of being free from public attentionfacts given to learn about someone or somethinga piece of information needed to log in to the internet...

Quality Month Quiz 2022-11-04

Quality Month Quiz crossword puzzle
Across
  1. a type of cybersecurity attack that attempts to steal your information
  2. Plays A VITAL ROLE IN YOUR APPRAISAL
  3. Skill / Knowledge to do a process
  4. Property of accuracy and completeness
  5. are implemented to mitigate the identified risks
  6. Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
  1. Tailgating is also termed as
  2. Portrays the hierarchy in organisation / function
  3. plan to achieve a long-term or overall objective
  4. Non-fulfilment of a requirement
  5. A weakness of an asset or control that could potentially be exploited by one or more threats
  6. How many Quality Management Principle in QMS

12 Clues: Tailgating is also termed asNon-fulfilment of a requirementSkill / Knowledge to do a processPlays A VITAL ROLE IN YOUR APPRAISALProperty of accuracy and completenessHow many Quality Management Principle in QMSplan to achieve a long-term or overall objectiveare implemented to mitigate the identified risks...

Tech Talks: Crossword Edition 2025-08-28

Tech Talks: Crossword Edition crossword puzzle
Across
  1. Structured support to help startups develop and scale
  2. Field involving the design and creation of automated machines
  3. Protecting systems and networks from digital threats
  4. Using fingerprints, facial recognition, or voice for authentication
  5. Technology that uses living organisms or cells to develop products
Down
  1. Testing environment for disruptive technologies
  2. Raising capital from the public to fund innovation projects
  3. High-risk funding enabling tech companies to grow rapidly
  4. Collaborative network of startups, funders, and enablers driving innovation
  5. MOSTI platform certifying local R&D products for procurement
  6. Tech innovation transforming financial services
  7. Unmanned aerial vehicle used in delivery, agriculture, and surveillance

12 Clues: Testing environment for disruptive technologiesTech innovation transforming financial servicesProtecting systems and networks from digital threatsStructured support to help startups develop and scaleHigh-risk funding enabling tech companies to grow rapidlyRaising capital from the public to fund innovation projects...

Zero-Trust 2025-07-23

Zero-Trust crossword puzzle
Across
  1. Zero Trust eliminates ___ ports to reduce attack surface.
  2. – Zero Trust enforces least ___ access to minimize risk.
  3. Every session in a Zero Trust model must be fully ___.
  4. OT compliance standard Secomea adheres to (abbr.).
  5. A secure remote access company built for OT.
  6. Traffic allowed in Zero Trust: ___-only.
Down
  1. Access should only be granted when it is scheduled and ___.
  2. – What Zero Trust replaces: ___ perimeter security.
  3. All users and devices must be continuously ___.
  4. European directive Secomea helps manufacturers comply with (abbr.).
  5. This cybersecurity model assumes no inherent trust: Zero ___.

11 Clues: Traffic allowed in Zero Trust: ___-only.A secure remote access company built for OT.All users and devices must be continuously ___.OT compliance standard Secomea adheres to (abbr.).– What Zero Trust replaces: ___ perimeter security.Every session in a Zero Trust model must be fully ___.– Zero Trust enforces least ___ access to minimize risk....

AI Lesson 2023-03-06

AI Lesson crossword puzzle
Across
  1. A type of machine learning that is modeled after the structure and function of the human brain
  2. data __________
  3. e.g. Siri, Alexa
  4. using machines to perform tasks that are normally done by humans
  5. e.g. fingerprints, facial recognition software
  6. the design, construction, operation and use of robots
  7. AI that learns about knowledge that humans know naturally
Down
  1. using firewalls and antivirus software to prevent computers from being attacked
  2. using large datasets to find patterns and insights
  3. AI that learns and improves from experience by itself
  4. a household that uses internet-connected devices to control appliances
  5. feeling/emotion
  6. a set of instructions that complete a task

13 Clues: data __________feeling/emotione.g. Siri, Alexaa set of instructions that complete a taske.g. fingerprints, facial recognition softwareusing large datasets to find patterns and insightsAI that learns and improves from experience by itselfthe design, construction, operation and use of robotsAI that learns about knowledge that humans know naturally...

Digital Technology 2025-04-26

Digital Technology crossword puzzle
Across
  1. After the pandemic, ____became normal in many industries.
  2. _____ is common in car manufacturing factories today.
  3. _____ forces companies to rethink their strategies.
  4. _____ helps doctors detect diseases earlier.
  5. Some companies practice _____ to hire cheaper labor abroad.
  6. A ____must find new clients to stay successful.
  7. A _____ usually needs to innovate to survive against big companies.
Down
  1. _____ experts are essential to protect sensitive company information.
  2. Many small businesses survive thanks to ____ platforms.
  3. With _____ , you can visit a museum without leaving your house.
  4. ____ reduces the need for repetitive human tasks.
  5. _____ helps banks process transactions faster and more securely.
  6. Laws about the _____ aim to prevent employee burnout.

13 Clues: _____ helps doctors detect diseases earlier.A ____must find new clients to stay successful.____ reduces the need for repetitive human tasks._____ forces companies to rethink their strategies._____ is common in car manufacturing factories today.Laws about the _____ aim to prevent employee burnout....

Zine Crossword 2022-04-16

Zine Crossword crossword puzzle
Across
  1. Considered to be the first hacker
  2. The website on which anonymous would plan their attacks
  3. The film that produced the famous hacking mask
Down
  1. The protection of information on the internet
  2. One of the colors of the three types of hackers
  3. The headwear associated with hacking
  4. A form of harm done on the internet
  5. Famous hacking group

8 Clues: Famous hacking groupConsidered to be the first hackerA form of harm done on the internetThe headwear associated with hackingThe protection of information on the internetThe film that produced the famous hacking maskOne of the colors of the three types of hackersThe website on which anonymous would plan their attacks

soujanya hazra 2025-06-19

soujanya hazra crossword puzzle
Across
  1. Designed to protect network
  2. Illegal entry into a computer system or network.
  3. the process of 'befriending' children on social media.
  4. Hoaxing or misleading.
  5. It is an act of harming or harassing using information technology in a deliberate manner
Down
  1. Vital Information Resources Under Seize
  2. Any criminal activity intended to harm anyone using the computer.
  3. They do Cybercrime.

8 Clues: They do Cybercrime.Hoaxing or misleading.Designed to protect networkVital Information Resources Under SeizeIllegal entry into a computer system or network.the process of 'befriending' children on social media.Any criminal activity intended to harm anyone using the computer....

Science and Technology 2025-02-11

Science and Technology crossword puzzle
Across
  1. A computer-generated simulation of a three-dimensional environment
  2. The application of scientific knowledge for practical purposes
  3. The branch of technology dealing with robots
  4. Related to genes and heredity
  5. Avoiding depletion of natural resources for long-term balance
Down
  1. Information processed or stored by a computer (
  2. The use of technology to complete tasks with minimal human input
  3. Protection against cyber threats and attacks
  4. A new idea or method

9 Clues: A new idea or methodRelated to genes and heredityProtection against cyber threats and attacksThe branch of technology dealing with robotsInformation processed or stored by a computer (Avoiding depletion of natural resources for long-term balanceThe application of scientific knowledge for practical purposes...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Techniques 2024-11-06

Cybersecurity Techniques crossword puzzle
Across
  1. A protocol designed to provide privacy and security over the internet by encapsulating traffic
  2. The latest security protocol for Wi-Fi, enhancing protections against attacks.
  3. An advanced Linux technology used for monitoring and packet observability in real-time.
  4. A term related to busting common misconceptions in the open and secure cyberspace.
Down
  1. Data collected from devices or systems for monitoring and analysis, used in intelligent security
  2. Malicious software designed to infiltrate or damage computer systems.
  3. The practice of collecting, analyzing, and preserving digital evidence.

7 Clues: Malicious software designed to infiltrate or damage computer systems.The practice of collecting, analyzing, and preserving digital evidence.The latest security protocol for Wi-Fi, enhancing protections against attacks.A term related to busting common misconceptions in the open and secure cyberspace....

HACKING TERMS 2023-11-13

HACKING TERMS crossword puzzle
Across
  1. Software designed to harm or exploit computer systems
  2. A deliberate attempt to exploit computer systems or networks.
  3. A reward offered for discovering and reporting software bugs
  4. A secret word or phrase used for authentication.
  5. A series of instructions for a computer to execute.
  6. Protective measures against digital threats
Down
  1. Ethical hackers working to improve security
  2. The right to keep personal information and activities confidential.
  3. A weakness or flaw in a system that can be exploited.
  4. The process of converting information into a code for security.

10 Clues: Ethical hackers working to improve securityProtective measures against digital threatsA secret word or phrase used for authentication.A series of instructions for a computer to execute.Software designed to harm or exploit computer systemsA weakness or flaw in a system that can be exploited....

Tech Terms 2023-12-01

Tech Terms crossword puzzle
Across
  1. - Software for accessing and navigating the internet. (7)
  2. - Step-by-step procedure for solving a problem. (8)
  3. Reality - Computer-generated environment that simulates reality. (13)
  4. - Secret code to access a protected system. (8)
  5. - Transfer files from the internet to a computer. (8)
Down
  1. - Measures to protect computer systems from theft or damage. (12)
  2. - Security system that prevents unauthorized access. (8)
  3. - Process of converting data into a code to secure it. (10)
  4. - Portable device with touchscreen features. (10)
  5. - Writing instructions for a computer program. (6)

10 Clues: - Secret code to access a protected system. (8)- Portable device with touchscreen features. (10)- Writing instructions for a computer program. (6)- Step-by-step procedure for solving a problem. (8)- Transfer files from the internet to a computer. (8)- Security system that prevents unauthorized access. (8)...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET crossword puzzle
Across
  1. Lapisan OSI ke 3
  2. topologi jaringan berbentuk bintang
  3. Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
  4. Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
  5. salah satu prinsip keamanan jaringan
Down
  1. mekanisme pertukaran data
  2. kegiatan tata kelola data
  3. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
  4. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  5. Salah satu macam jenis jaringan komputer

10 Clues: Lapisan OSI ke 3mekanisme pertukaran datakegiatan tata kelola datatopologi jaringan berbentuk bintangsalah satu prinsip keamanan jaringanSalah satu macam jenis jaringan komputerperangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)...

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI crossword puzzle
Across
  1. Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
  2. Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
  3. Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
  4. Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
  1. Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
  2. MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
  3. IoT ATAMASINING MA'NOSI
  4. To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
  5. Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
  6. DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI

10 Clues: IoT ATAMASINING MA'NOSISun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYATo‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita....

INFORMATION GOVERNANCE SUMMER FUN 2017-08-08

INFORMATION GOVERNANCE SUMMER FUN crossword puzzle
Across
  1. Coming soon,in May 2018!
  2. New term under GDPR
  3. Increasing threat for us all
  4. Have you filled the new role required under GDPR?
  5. Process which becomes a legal requirement under GDPR
Down
  1. Part of important review by NDG 2016
  2. Mustn't forget this important law for patients
  3. What could happen to to you in 2018 if you steal personal data
  4. Part of revised definition for sensitive personal data under GDPR

9 Clues: New term under GDPRComing soon,in May 2018!Increasing threat for us allPart of important review by NDG 2016Mustn't forget this important law for patientsHave you filled the new role required under GDPR?Process which becomes a legal requirement under GDPRWhat could happen to to you in 2018 if you steal personal data...

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Month Crossword 2023-09-18

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A security process that requires users to provide two different authentication factors before gaining access.
  2. Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
  3. Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
  4. An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
  5. Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  6. A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
  7. A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
  8. An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
  1. An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
  2. The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
  3. The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
  4. The process of examining network traffic to identify anomalies and potential security threats.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
  6. A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
  7. A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.

15 Clues: The process of examining network traffic to identify anomalies and potential security threats.Software designed to detect, prevent, and remove malicious software from a computer or network.The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality....

CODING VOCABULARY 2023-02-03

CODING VOCABULARY crossword puzzle
Across
  1. NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
  2. ANY CHARACTER OR OBJECT USED IN BLOCK CODING
  3. A FREE PROGRAMMING LANGUAGE
  4. MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
  5. ASKING IF A CONDITION IS MET
  6. SET OF LOGICAL STEPS CARRIED OUT IN ORDER
  7. OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
  8. FINDING WEAKNESSES IN DIGITAL DEVICES
  9. IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
  1. PROTECTING SENSITIVE DIGITAL INFORMATION
  2. TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
  3. MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
  4. DATA ENTERED BY A USER
  5. INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
  6. NAMES USED TO HOLD ONE OR MORE VALUES
  7. THE WAY SOMETHING IS WRITTEN

16 Clues: DATA ENTERED BY A USERA FREE PROGRAMMING LANGUAGEASKING IF A CONDITION IS METTHE WAY SOMETHING IS WRITTENNAMES USED TO HOLD ONE OR MORE VALUESFINDING WEAKNESSES IN DIGITAL DEVICESPROTECTING SENSITIVE DIGITAL INFORMATIONSET OF LOGICAL STEPS CARRIED OUT IN ORDERANY CHARACTER OR OBJECT USED IN BLOCK CODINGINSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO...

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Knowledge Exchange Christmas Quiz 2023-12-05

Knowledge Exchange Christmas Quiz crossword puzzle
Across
  1. Intranet location to learn more about IT initiatives.
  2. Santa's helpers.
  3. Last IT Tuesday topic
Down
  1. At Savannah, we have a culture of continuous ....
  2. The Centre of is where you can find further information on continuous improvement
  3. Guides Santas Sleigh
  4. The Snowman with a corncob pipe and button nose.

7 Clues: Santa's helpers.Guides Santas SleighLast IT Tuesday topicThe Snowman with a corncob pipe and button nose.At Savannah, we have a culture of continuous ....Intranet location to learn more about IT initiatives.The Centre of is where you can find further information on continuous improvement

Technological Impacts on Business & Commerce 2023-05-03

Technological Impacts on Business & Commerce crossword puzzle
Across
  1. Radio Frequency Identification
  2. Global Positioning System
  3. A type of social media used by many businesses
  4. An immersive, interactive, computer-generated experience
  5. A type of mobile technology
  6. A common type of online payment system.
  7. Bullying someone online
  8. Technologies that require little to no human involvement to operate
  9. Computers that mimic human cognitive abilities
Down
  1. Customizing goods or services to consumers needs and preferences
  2. Safeguarding computer systems and networks
  3. The network of real-world things that exchange data form one another
  4. The network of businesses involved in product distribution
  5. Natural Language Processing
  6. The exchange of goods and services electronically
  7. Providing for the needs of this generation without compromising the needs for future generations
  8. A type of skill that is essential for ICT.

17 Clues: Bullying someone onlineGlobal Positioning SystemNatural Language ProcessingA type of mobile technologyRadio Frequency IdentificationA common type of online payment system.Safeguarding computer systems and networksA type of skill that is essential for ICT.A type of social media used by many businessesComputers that mimic human cognitive abilities...

Education 2025-08-08

Education crossword puzzle
Across
  1. – Not just a name —where finance meets fun.
  2. – GBS emphasises this as one of the USP
  3. — Once a GBS student, always one—albeit slightly sarcastic.
  4. - Easy Lunch between ____
  5. – Period during which a student can cancel without tuition penalty
  6. – rewards that help students
  7. – Framework applied across GBS’s regulatory documents
  8. – Core value in GBS’s mission to create an inclusive environment
  9. – Central theme in GBS’s policies on personal data handling
Down
  1. — Where students start, and strong futures build.
  2. – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
  3. — The _____ that whispers, ‘Look at me, I promise futures!
  4. – Keeping hackers’ fingers off your grades.
  5. – Referring to NSS scores.
  6. – Online events offering insight into GBS programs
  7. – Where silence studies hard
  8. – Studying trips without leaving the campus

17 Clues: - Easy Lunch between ____– Referring to NSS scores.– rewards that help students– Where silence studies hard– GBS emphasises this as one of the USP– Keeping hackers’ fingers off your grades.– Not just a name —where finance meets fun.– Studying trips without leaving the campus— Where students start, and strong futures build....

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. What is the name of our mascot
  2. Parrot Ball location
  3. KeyW's colors
  4. What month was KeyW founded
  5. What color is our KeyW van
  6. KeyW's best location
  7. How many buildings does the Severn location have
  8. Protection of networks, computers, programs, and data from attack
  9. Applying statistical analysis to data which has a geographical or spatial aspect
  10. Time sheet
  11. What type of bird is our mascot
  12. Which food truck offers the best cheese steaks
Down
  1. What is the surname of KeyW's founder
  2. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  3. What is the name of our newsletter
  4. Radio Detection and Ranging
  5. How many miles connect Key West to Florida main land
  6. KeyW non-profit organization abbreviated
  7. KeyW CEO
  8. When at work, what must you always carry

20 Clues: KeyW CEOTime sheetKeyW's colorsParrot Ball locationKeyW's best locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderKeyW non-profit organization abbreviated...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. What Stacey used to refer Michael to when they first started dating
  2. Where did Michael and Stacey meet
  3. Michael’s birthday month
  4. Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
  5. The number of years the couple is together
  6. Honeymoon destination
  7. Their favourite season
  8. How many years did Michael live overseas for (hint: bribe Father of Groom)
  9. What the groom has for breakfast everyday
  10. Michael’s job industry
  11. Number of their siblings all together
  12. Stacey’s favourite food (hint: ask father of bride)
  13. Michael’s middle name
  14. Who’s the better cook
Down
  1. Mr & Mrs _____
  2. City where Michael was born
  3. Michael’s favourite drink
  4. Where did Michael propose
  5. Brand of Michael’s car
  6. Flavour of the wedding cake
  7. Stacey’s birthday month
  8. Favourite AFL team (hint: ask Best Man)
  9. Stacey’s best friend
  10. How long has Stacey been in Australia for
  11. The age gap between the bride and the groom

25 Clues: Mr & Mrs _____Stacey’s best friendHoneymoon destinationMichael’s middle nameWho’s the better cookBrand of Michael’s carTheir favourite seasonMichael’s job industryStacey’s birthday monthMichael’s birthday monthMichael’s favourite drinkWhere did Michael proposeCity where Michael was bornFlavour of the wedding cakeWhere did Michael and Stacey meet...

Crosswords 2024-07-16

Crosswords crossword puzzle
Across
  1. plan for successful digital transformation
  2. immediate data analysis
  3. large sets of data analyzed for insights
  4. combining data from different sources
  5. management of the flow of goods and services
  6. successful digital use by employees
  7. system that integrates various business processes
  8. virtual model of a physical object or system
  9. protection in digital business environments
  10. network of interconnected devices
  11. system for managing customer relationships
  12. accuracy and reliability of data
Down
  1. digital change impacting business processes
  2. redesigning business processes for improvement
  3. use of technology to perform tasks
  4. analysis of data for business insights
  5. based ERP solutions
  6. process of adopting ERP systems
  7. technology enhancing supply chain transparency
  8. integration of artificial intelligence in business
  9. isolated data storage within an organization
  10. improved by ERP systems
  11. analytics for customer engagement
  12. considerations in using AI and big data
  13. user experience in digital product design

25 Clues: based ERP solutionsimmediate data analysisimproved by ERP systemsprocess of adopting ERP systemsaccuracy and reliability of dataanalytics for customer engagementnetwork of interconnected devicesuse of technology to perform taskssuccessful digital use by employeescombining data from different sourcesanalysis of data for business insights...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

Maura & Spencer 2023-05-19

Maura & Spencer crossword puzzle
Across
  1. Spencer's favorite basketball player
  2. Where they moved after college
  3. The name of their cat
  4. Favorite "Fast Food"
  5. Brides Favorite Alcoholic Drink
  6. Spencer's Favorite Hobby
  7. Where did Maura & Spencer travel to this year
  8. Who gave out their phone number first?
  9. Where do they live
  10. Maura and Spencers First Born
  11. Maura's favorite Disney Movie
  12. How many years will they be together in September?
  13. Maura's middle name
  14. Maura's Job
Down
  1. Maura's Favorite Color
  2. What social media platform did Spencer use to slide in Maura's DM's
  3. Where did Maura go after DC
  4. Maura's Favorite Hobby
  5. Where Maura and Spencer met
  6. Where did Spencer propose?
  7. Spencer's Favorite Color
  8. What month did they get engaged
  9. The last addition to Maura & Spencers family
  10. Grooms Favorite Alcoholic Drink
  11. Spencers Job
  12. What was Maura's sport growing up
  13. Spencer's middle name

27 Clues: Maura's JobSpencers JobWhere do they liveMaura's middle nameFavorite "Fast Food"The name of their catSpencer's middle nameMaura's Favorite ColorMaura's Favorite HobbySpencer's Favorite ColorSpencer's Favorite HobbyWhere did Spencer propose?Where did Maura go after DCWhere Maura and Spencer metMaura and Spencers First Born...

Lushi and John 2025-02-22

Lushi and John crossword puzzle
Across
  1. Lushi's favorite alcoholic beverage
  2. First date restaurant
  3. John’s middle name
  4. Lushi’s favorite dessert
  5. John’s go-to drink
  6. Lushi’s favorite color
  7. Lushi’s favorite holiday
  8. John’s work industry
  9. City where they met
  10. Total number of their dogs
  11. Lushi’s favorite snack to make
  12. Month of their engagement
  13. Total countries visited together
  14. John’s favorite music band
  15. Favorite shared activity
Down
  1. Lushi’s favorite cuisine
  2. John’s hometown
  3. John’s favorite food
  4. University John attended
  5. Their dream honeymoon destination
  6. First international trip destination
  7. Who is older between them
  8. Place where John proposed
  9. Lushi’s favorite board game
  10. how John likes his coffee
  11. Lushi’s favorite time of year
  12. City they live in
  13. Lushi’s mom’s employer
  14. Name of their corgi
  15. Month of dating anniversary
  16. John’s favorite video game
  17. Color of John’s eyes

32 Clues: John’s hometownCity they live inJohn’s middle nameJohn’s go-to drinkCity where they metName of their corgiJohn’s favorite foodJohn’s work industryColor of John’s eyesFirst date restaurantLushi’s favorite colorLushi’s mom’s employerLushi’s favorite cuisineUniversity John attendedLushi’s favorite dessertLushi’s favorite holiday...

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Penipuan online melalui email atau situs palsu.
  4. Penyusupan sistem oleh pihak tidak berwenang.
  5. Pencurian data kartu kredit atau kartu debit
  6. Teknik mengakses sistem tanpa otorisasi.
  7. Alamat identifikasi unik setiap perangkat di jaringan.
  8. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  9. Kata sandi dalam sistem keamanan.
  10. Jenis virus komputer
Down
  1. Program pengintai aktivitas pengguna tanpa izin.
  2. Sistem keamanan biometrik yang menggunakan sidik jari.
  3. Proses identifikasi atau verifikasi pengguna
  4. Aksi mencari celah dalam sistem komputer.
  5. Istilah lain untuk keamanan jaringan
  6. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  7. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  8. Penyerang digital yang memiliki tujuan jahat.
  9. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Istilah lain untuk keamanan jaringan
  2. Penipuan online melalui email atau situs palsu.
  3. Penyerang digital yang memiliki tujuan jahat.
  4. Alamat identifikasi unik setiap perangkat di jaringan.
  5. Aksi mencari celah dalam sistem komputer.
  6. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  7. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  8. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  9. Sistem keamanan biometrik yang menggunakan sidik jari.
Down
  1. Proses identifikasi atau verifikasi pengguna
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  4. Teknik mengakses sistem tanpa otorisasi.
  5. Program pengintai aktivitas pengguna tanpa izin.
  6. Penyusupan sistem oleh pihak tidak berwenang.
  7. Pencurian data kartu kredit atau kartu debit
  8. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  9. Jenis virus komputer
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  11. Kata sandi dalam sistem keamanan.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS_EvandaDandy_14xh 2025-04-15

TTS_EvandaDandy_14xh crossword puzzle
Across
  1. Orang yang membuat desain antarmuka.
  2. HAKI singkatan dari...?
  3. Lembaga yang mengurus HAKI di Indonesia.
  4. Menyebarkan konten ke publik secara digital disebut?
  5. Hak yang melindungi karya cipta.
  6. Simbol yang digunakan untuk pencarian kata bebas.
  7. Profesi yang membuat aplikasi disebut?
  8. Platform berbagi video populer.
  9. Informasi palsu di internet disebut?
  10. PENGELOLA sistem jaringan.
Down
  1. Proses membuat konten disebut?
  2. Proses memeriksa kebenaran konten disebut?
  3. Kata kunci yang digunakan untuk mengabaikan kata tertentu.
  4. Salah satu bentuk HAKI untuk brand dagang.
  5. Elemen tradisional dalam konten digital disebut unsur...?
  6. Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
  7. yang menganalisis data.
  8. Simbol untuk laporan konten di media sosial.
  9. Ahli keamanan siber disebut...?
  10. Contoh media digital untuk menyebarkan budaya.
  11. Sistem otomatis untuk menyaring konten.
  12. Mesin pencari paling populer.
  13. Konten berbahaya disebut konten...?
  14. Simbol untuk mencari sinonim kata (gunakan ~).
  15. Hak eksklusif atas penemuan teknologi.

25 Clues: yang menganalisis data.HAKI singkatan dari...?Mesin pencari paling populer.Platform berbagi video populer.Proses membuat konten disebut?Hak yang melindungi karya cipta.PENGELOLA sistem jaringan.Simbol untuk mencari sinonim kata (gunakan ~).Simbol yang digunakan untuk pencarian kata bebas....

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

IT Terminology 2025-05-15

IT Terminology crossword puzzle
Across
  1. Distributed ledger technology with cryptographic linking.
  2. Using scripts or software to perform tasks without manual input.
  3. Project management method using small, iterative steps.
  4. Open-source operating system with many distributions.
  5. Network of malware-infected devices controlled remotely.
  6. Practice of protecting digital assets from threats.
  7. Converting data into unreadable code for protection.
  8. Flooding a network with traffic to disrupt service.
  9. A sequence of instructions used in software tasks.
  10. Low-level code interacting directly with hardware.
  11. On-demand delivery of IT resources over the internet.
  12. Malware that demands payment to unlock encrypted data.
Down
  1. Computers mimicking human cognitive functions.
  2. Professional who interprets data to help decision-making.
  3. Wireless technology for short-distance device communication.
  4. Numeric label identifying devices on a network.
  5. Loss of signal strength in networking cables.
  6. Attempt to infiltrate digital systems maliciously.
  7. Developer who creates the visual interface of websites.
  8. Temporary storage for fast data retrieval.

20 Clues: Temporary storage for fast data retrieval.Loss of signal strength in networking cables.Computers mimicking human cognitive functions.Numeric label identifying devices on a network.Attempt to infiltrate digital systems maliciously.A sequence of instructions used in software tasks.Low-level code interacting directly with hardware....

tema 2 perkembangan ekonomi digital 2025-10-27

tema 2 perkembangan ekonomi digital crossword puzzle
Across
  1. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  5. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  8. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  9. → Pemasaran melalui media sosial disebut
  10. → Contoh aplikasi fintech di Indonesia adalah
Down
  1. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → Transaksi keuangan secara online disebut
  5. → Fintech merupakan singkatan dari
  6. → Berjualan melalui marketplace online termasuk kegiatan
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masa depan ekonomi digital bergantung pada literasi
  9. → Risiko ekonomi digital adalah kebocoran
  10. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 2025-10-27

TEMA 2 crossword puzzle
Across
  1. Tokopedia dan Shopee termasuk jenis platform ini.
  2. Teknologi penyimpanan data berbasis internet.
  3. Proses jual beli melalui internet.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Proses promosi produk melalui media sosial.
  6. Salah satu contoh dompet digital di Indonesia.
  7. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Singkatan dari Financial Technology.
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Media sosial yang sering digunakan untuk promosi produk.
  2. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Tempat di mana penjual dan pembeli bertemu secara online.
  7. Sistem ekonomi yang berbasis pada teknologi dan internet.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  10. Pihak yang menjual barang atau jasa di internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....