cybersecurity Crossword Puzzles

browsing safely 2025-05-29

browsing safely crossword puzzle
Across
  1. bullying act of harming or harassing using technology
  2. program used to identify and remove viruses
  3. use of illegal methods to get money
  4. criminal activity used to harm anyone using the internet
  5. a set of programs that disrupts the functioning of a compute
  6. hoaxing or misleading
  7. process of 'befriending children' on social media
Down
  1. to conduct terrorism using a computer
  2. sending an email to an user and misleading them to believe its from a trusted account
  3. unethical hackers
  4. helps prevent unauthorised access to your computer
  5. victim is attacked and then forced to pay money
  6. misusing someone's personal information
  7. to protect networks or your devices
  8. illegal entry into computer system

15 Clues: unethical hackershoaxing or misleadingillegal entry into computer systemuse of illegal methods to get moneyto protect networks or your devicesto conduct terrorism using a computermisusing someone's personal informationprogram used to identify and remove virusesvictim is attacked and then forced to pay money...

Live Dictionary Crossword Day 20 2025-12-11

Live Dictionary Crossword Day 20 crossword puzzle
Across
  1. When milk is left out for too long it does this
  2. A large fabric that covers a window or something similar
  3. Protection from electronic maliciousness
  4. A father
Down
  1. Describes something that can be altered easily to its owner’s whim
  2. An earthy spice eaten whole or ground
  3. Stop fucking saying them
  4. A collective of people who share or follow extreme beliefs

8 Clues: A fatherStop fucking saying themAn earthy spice eaten whole or groundProtection from electronic maliciousnessWhen milk is left out for too long it does thisA large fabric that covers a window or something similarA collective of people who share or follow extreme beliefsDescribes something that can be altered easily to its owner’s whim

03 Almer Billie prabawa 2025-10-17

03 Almer Billie prabawa crossword puzzle
Across
  1. Memuat ulang halaman web agar tampil terbaru.
  2. Program untuk mengatur dan mempercepat unduhan file.
  3. Proses mengubah data agar tidak bisa dibaca orang lain.
  4. Lembar atau jendela kecil dalam browser untuk membuka situs lain.
  5. menampilkan gambar atau halaman web di layar.
  6. Perlindungan sistem komputer dari serangan digital.
Down
  1. Tempat menulis alamat situs web (URL) di browser.
  2. Tab baru untuk membuka halaman web lain.
  3. Memperbarui tampilan halaman yang sedang dibuka.
  4. Upaya penipuan untuk mencuri data pribadi lewat internet.

10 Clues: Tab baru untuk membuka halaman web lain.Memuat ulang halaman web agar tampil terbaru.menampilkan gambar atau halaman web di layar.Memperbarui tampilan halaman yang sedang dibuka.Tempat menulis alamat situs web (URL) di browser.Perlindungan sistem komputer dari serangan digital.Program untuk mengatur dan mempercepat unduhan file....

MEKATRONIK T3 2024-05-24

MEKATRONIK T3 crossword puzzle
Across
  1. merupakan satu teras utama revolusi industri 4.0
  2. satu sistem susunan dan sambungan fizikal komponen dalam satu litar
  3. merupakan contoh bagi sistem kawalan
  4. LITAR merupakan salah satu aspek penning dalam product mekatronik
  5. merupakan salah satu ujian kefungsian
  6. ..........manufacturing Hialeah pembuatan bah mental
Down
  1. berfungsi membekalkan arus bagi membolehkan peranti berfungsi
  2. ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
  3. ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
  4. jurutera jepun yang memperkenalkan konsep mekatronik

10 Clues: merupakan contoh bagi sistem kawalanmerupakan salah satu ujian kefungsianmerupakan satu teras utama revolusi industri 4.0..........manufacturing Hialeah pembuatan bah mentaljurutera jepun yang memperkenalkan konsep mekatronikberfungsi membekalkan arus bagi membolehkan peranti berfungsi...

Globalization and Technology 2025-02-06

Globalization and Technology crossword puzzle
Across
  1. Transaction on the internet like Amazon Pay, Paypal etc
  2. A global network the world uses for communications and other features
  3. A period of hundred years
  4. A system that gives music and transmits audio
  5. The act of buying and selling goods
  6. An Act of introducing new ideas or products
Down
  1. Process of exchanging Information through any medium
  2. A simulated experience using computer technology used by headset
  3. Moving things from one place to another
  4. Measures taken to protect a computer

10 Clues: A period of hundred yearsThe act of buying and selling goodsMeasures taken to protect a computerMoving things from one place to anotherAn Act of introducing new ideas or productsA system that gives music and transmits audioProcess of exchanging Information through any mediumTransaction on the internet like Amazon Pay, Paypal etc...

CYBERSECURITY PUZZLE 2023-09-13

CYBERSECURITY PUZZLE crossword puzzle
Across
  1. Shady..do not click!
  2. Do not visit
  3. Don't ever share this to strangers!
  4. Dishonest offer online
Down
  1. Publishing someone's private information on the internet
  2. Always change this throughout accounts!
  3. Be careful when doing this on social media!

7 Clues: Do not visitShady..do not click!Dishonest offer onlineDon't ever share this to strangers!Always change this throughout accounts!Be careful when doing this on social media!Publishing someone's private information on the internet

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity crossword 2023-03-17

Cybersecurity crossword crossword puzzle
Across
  1. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. Find a synonym of preempt
Down
  1. What is the naming convention for ecrime category ?
  2. What is 84 minutes the average time for ?
  3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. Which type of accounts are mainly targeted by adversaries ?

7 Clues: Find a synonym of preemptWhat is 84 minutes the average time for ?What is the naming convention for ecrime category ?Which type of accounts are mainly targeted by adversaries ?Which tool can reveal hidden relationships and identify attack paths within an AD environment ?...

Cybersecurity Crossword 2022-05-19

Cybersecurity Crossword crossword puzzle
Across
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. establishes a secure connection between you and the internet
  3. the practice of protecting critical systems and sensitive information from digital attacks.
Down
  1. a set of instructions, data or programs used to operate computers and execute specific tasks
  2. a standalone malware computer program that replicates itself in order to spread to other computers
  3. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  4. a computer program that can copy itself and infect a computer without permission or knowledge of the user

7 Clues: establishes a secure connection between you and the internetthe practice of protecting critical systems and sensitive information from digital attacks.a set of instructions, data or programs used to operate computers and execute specific tasksa standalone malware computer program that replicates itself in order to spread to other computers...

Cybersecurity Crossword 2023-11-10

Cybersecurity Crossword crossword puzzle
Across
  1. What type of hacker exploits systems for personal gain and bad intention
  2. What is used to hide messages so only authorized people can understand?
  3. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. Using deceptive measures to manipulate someone in disclosing personal information
  2. Data, information , device anything that is of value
  3. Acquiring unauthorized access to system or data
  4. An incident where attackers steal information without authorization?

7 Clues: Acquiring unauthorized access to system or dataData, information , device anything that is of valueAn incident where attackers steal information without authorization?What is used to hide messages so only authorized people can understand?What type of hacker exploits systems for personal gain and bad intention...

TEMA 2 2025-10-23

TEMA 2 crossword puzzle
Across
  1. Mata uang kripto pertama di dunia.
  2. Bentuk uang yang hanya bisa digunakan secara elektronik.
  3. Sistem keamanan siber untuk perlindungan data.
  4. Teknologi dasar dari mata uang kripto.
  5. Kegiatan ekonomi melalui media internet.
  6. Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
  7. Aplikasi belanja online yang berwarna oranye.
  8. Transaksi keuangan melalui jaringan komputer disebut ...
  9. Sistem pembayaran tanpa uang tunai.
  10. Bentuk pasar digital tempat jual beli online.
Down
  1. Mata uang digital yang populer dan terdesentralisasi.
  2. Perusahaan teknologi keuangan disebut ...
  3. Mata uang digital resmi dari bank sentral disebut ...
  4. kredit Alat pembayaran berbentuk kartu dari bank.
  5. shopping Proses jual beli yang terjadi secara online.
  6. Teknologi virtual yang berkembang bersama ekonomi digital.
  7. Metode pembayaran dengan memindai kode.
  8. Salah satu dompet digital terkenal di Indonesia.
  9. Salah satu e-wallet milik Gojek.
  10. banking Layanan bank yang sepenuhnya berbasis internet.

20 Clues: Salah satu e-wallet milik Gojek.Mata uang kripto pertama di dunia.Sistem pembayaran tanpa uang tunai.Teknologi dasar dari mata uang kripto.Metode pembayaran dengan memindai kode.Kegiatan ekonomi melalui media internet.Perusahaan teknologi keuangan disebut ...Aplikasi belanja online yang berwarna oranye.Bentuk pasar digital tempat jual beli online....

4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02

4.1 Computer Vulnerability - Crossword Puzzle crossword puzzle
Across
  1. The protection of information and systems from cyberattacks
  2. A threat originating from within an organization
  3. The overall protection of computer systems and data
  4. A weakness in a computer system that can be exploited
  5. The transfer of information between devices
Down
  1. The act of stealing or manipulating data
  2. Unintentional harm caused to data or systems
  3. A threat originating from the internet
  4. The practice of illegally gaining access to a computer system

9 Clues: A threat originating from the internetThe act of stealing or manipulating dataThe transfer of information between devicesUnintentional harm caused to data or systemsA threat originating from within an organizationThe overall protection of computer systems and dataA weakness in a computer system that can be exploited...

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. Radio Detection and Ranging
  2. KeyW non-profit organization abbreviated
  3. KeyW's colors
  4. What is the name of our newsletter
  5. How many bridges connect Key West to Florida main land
  6. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  7. What is the name of our mascot
  8. Parrot Ball location
  9. What color is our KeyW van
  10. What type of bird is our mascot
Down
  1. When at work, what must you always carry
  2. Protection of networks, computers, programs, and data from attack
  3. KeyW's best location
  4. Time sheet
  5. KeyW CEO
  6. What is the surname of KeyW's founder
  7. Which food truck offers the best cheese steaks
  8. Applying statistical analysis to data which has a geographical or spatial aspect
  9. What month was KeyW founded
  10. How many buildings does the Severn location have

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanRadio Detection and RangingWhat month was KeyW foundedWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari crossword puzzle
Across
  1. Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
  2. O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
  3. Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
  4. Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
  5. Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
  6. Dunyodagi eng yirik e-tijorat platformalaridan biri?
  7. Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
  8. Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
  9. Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
  1. Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
  2. Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
  3. Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
  4. Elektron hukumat tizimi bo‘yicha yetakchi davlat?
  5. Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
  6. Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
  7. Sun’iy intellekt sohasida yetakchi davlatlardan biri?
  8. Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
  9. Dunyodagi eng yirik texnologik kompaniyalardan biri?
  10. O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
  11. Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?

20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat?Dunyodagi eng yirik e-tijorat platformalaridan biri?Dunyodagi eng yirik texnologik kompaniyalardan biri?Elektron tijorat bo‘yicha yetakchi davlatlardan biri?Sun’iy intellekt sohasida yetakchi davlatlardan biri?Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?...

cpsc4240 2024-10-31

cpsc4240 crossword puzzle
Across
  1. legal license that allows you to use and edit a product
  2. protecting systems and networks from digital attacks
  3. type of attack that can be caused by a nuke
  4. linuxdef
  5. number that determines process priority
  6. each one has a unique PID
  7. leaked the docs
  8. command to add user
  9. command to open this user is su
  10. command to control log settings
  11. partition that allows for temp storage
  12. link that points to another file
Down
  1. only letting users access what they need
  2. feature that logs metadata
  3. read write execute
  4. having many security layers
  5. system that has both ipv4 and ipv6
  6. file that discards all data written to it
  7. type of link that creates a direct copy
  8. file that stores password hashes
  9. sets file permission upon create
  10. process that creates child
  11. command to run a privileged command
  12. attaching a filesystem to another

24 Clues: linuxdefleaked the docsread write executecommand to add usereach one has a unique PIDfeature that logs metadatahaving many security layersprocess that creates childcommand to open this user is sucommand to control log settingsfile that stores password hashessets file permission upon createlink that points to another file...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Risiko ekonomi digital adalah kebocoran
  2. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  3. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  4. → Pemasaran melalui media sosial disebut
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  7. → Fintech merupakan singkatan dari
  8. → Perusahaan baru yang berbasis teknologi disebut
  9. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Keamanan transaksi online dikenal dengan istilah
  2. → Masa depan ekonomi digital bergantung pada literasi
  3. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  4. → Kecerdasan buatan dikenal juga dengan istilah
  5. → Transaksi keuangan secara online disebut
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  8. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  9. → Ekonomi digital menciptakan pekerjaan baru berbasis
  10. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  11. → Contoh aplikasi fintech di Indonesia adalah

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

rahef isna 2025-10-27

rahef isna crossword puzzle
Across
  1. → Masa depan ekonomi digital bergantung pada literasi
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → Risiko ekonomi digital adalah kebocoran
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Contoh aplikasi fintech di Indonesia adalah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  9. → Transaksi keuangan secara online disebut
  10. → Fintech merupakan singkatan dari
  11. → Pemasaran melalui media sosial disebut
  12. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
  1. → Kecerdasan buatan dikenal juga dengan istilah
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  6. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  7. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  8. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

Cybersecurity Crossword 2021-11-14

Cybersecurity Crossword crossword puzzle
Across
  1. Proving your identity
  2. Encrypting files and holding them hostage for money
Down
  1. A horse with a surprise
  2. software designed to corrupt or steal information
  3. Pretending to be someone you are not to extract information out of someone
  4. A denial of service attack targets this
  5. a brute force attack takes a long time to work on this

7 Clues: Proving your identityA horse with a surpriseA denial of service attack targets thissoftware designed to corrupt or steal informationEncrypting files and holding them hostage for moneya brute force attack takes a long time to work on thisPretending to be someone you are not to extract information out of someone

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Unauthorized individuals gaining physical access through closely following authorized personnel
  2. A form of business risk resulting from cyberattacks or data breache
Down
  1. Suspicious emails
  2. Another word for tailgating
  3. Unexpected behavior exhibited by software applications, such as crashes could be caused by
  4. Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
  5. could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.

7 Clues: Suspicious emailsAnother word for tailgatingA form of business risk resulting from cyberattacks or data breacheUnexpected behavior exhibited by software applications, such as crashes could be caused byUnauthorized individuals gaining physical access through closely following authorized personnel...

CyberSecurity Awareness 2025-07-23

CyberSecurity Awareness crossword puzzle
Across
  1. being hidden from public view
  2. Multi-____ Authentication
  3. conversion of information to code
  4. "Enter your username and ______."
Down
  1. fake correspondence sent by a 'Nigerian Prince'
  2. Security Assurance for the Federal Reserve
  3. security protocols; organized into 'families'

7 Clues: Multi-____ Authenticationbeing hidden from public viewconversion of information to code"Enter your username and ______."Security Assurance for the Federal Reservesecurity protocols; organized into 'families'fake correspondence sent by a 'Nigerian Prince'

cruciverba cybersecurity 2025-11-17

cruciverba cybersecurity crossword puzzle
Across
  1. : Copia di sicurezza dei dati
  2. : Trasformare i dati in codice per proteggerli
  3. : Chiave segreta per accedere a un account
Down
  1. : Software dannoso che infetta il computer
  2. : Tentativo di rubare dati fingendosi qualcuno di fidato via email
  3. : Protezione che filtra il traffico di rete
  4. : Rete privata virtuale che protegge la connessione

7 Clues: : Copia di sicurezza dei dati: Software dannoso che infetta il computer: Chiave segreta per accedere a un account: Protezione che filtra il traffico di rete: Trasformare i dati in codice per proteggerli: Rete privata virtuale che protegge la connessione: Tentativo di rubare dati fingendosi qualcuno di fidato via email

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

cybersecurity challenge 2025-10-07

cybersecurity challenge crossword puzzle
Across
  1. Blocks bad stuff from getting into your network
  2. Fake emails that try to steal your info
  3. Scrambles data so only the right people can read it
  4. Bad software that can mess up your computer
Down
  1. Locks your files and asks for money to unlock them
  2. What you type in to log into something
  3. Someone who breaks into computers or accoun

7 Clues: What you type in to log into somethingFake emails that try to steal your infoSomeone who breaks into computers or accounBad software that can mess up your computerBlocks bad stuff from getting into your networkLocks your files and asks for money to unlock themScrambles data so only the right people can read it

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a setting you turn on to camouflage yourself from internet scammers
  2. this is where you install games and streaming services
  3. a streaming service that is very well known
  4. people that lure people into giving them there bank details
  5. a way of protecting you from hackers
Down
  1. a website in which you order from and it’s delivered to your door
  2. an answer to all your questions
  3. watch videos from your favourite content creator
  4. tweet tweet
  5. a social media app with a blue logo
  6. a corporation run by bill gates
  7. some the would be powered by electricity

12 Clues: tweet tweetan answer to all your questionsa corporation run by bill gatesa social media app with a blue logoa way of protecting you from hackerssome the would be powered by electricitya streaming service that is very well knownwatch videos from your favourite content creatorthis is where you install games and streaming services...

Business Ethics/Cyber Security 2023-09-19

Business Ethics/Cyber Security crossword puzzle
Across
  1. practice of protecting critical systems
  2. work place manners
  3. the number of steps in the decision making process
  4. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
  1. exchange of information between a sender and receiver
  2. these hackers send an email or text with a link to click
  3. guidelines for how a business should conduct themselves
  4. positive internet behavior
  5. a policy users must agree to follow in order to gain internet access
  6. a set of moral principles
  7. the most common form of communication in a business
  8. these hackers ask for money

12 Clues: work place mannersa set of moral principlespositive internet behaviorthese hackers ask for moneypractice of protecting critical systemsthe number of steps in the decision making processthe most common form of communication in a businessexchange of information between a sender and receiverguidelines for how a business should conduct themselves...

TDD 2023-09-19

TDD crossword puzzle
Across
  1. Think before you _____.​
  2. One of the common internet search engine used nowadays.
  3. Do not share your account ______ to anyone.​
  4. We should avoid sharing any _______ news without validating the sources.​
  5. #1 popular social media. CEO – Mark Zuckerberg​
Down
  1. ______ has been recognized as Cybersecurity awareness month.
  2. One of Amcor values.
  3. _______ make human sick as well as computer.​
  4. Operating System
  5. Short form of wireless network.​
  6. ____ your laptop when you are stepping away. You need a key to unlock it.​
  7. They are referred as small insects in mother nature. IT referred them as errors in computer program/system.​

12 Clues: Operating SystemOne of Amcor values.Think before you _____.​Short form of wireless network.​Do not share your account ______ to anyone.​_______ make human sick as well as computer.​#1 popular social media. CEO – Mark Zuckerberg​One of the common internet search engine used nowadays.______ has been recognized as Cybersecurity awareness month....

internet safety 2023-04-19

internet safety crossword puzzle
Across
  1. a part of a computer system or network which is designed to block unwanted access
  2. like a cold for your computer
  3. the state of being protected against the criminal use of electronic data
  4. bulling done over the internet
  5. a person or thing that hacks
  6. a world wide computer network
  7. websites and apps that let users create and share content EX.Snapchat
Down
  1. a piece of information needed to log in to the internet
  2. the state of being free from public attention
  3. be careful what you make public
  4. information made available by a website
  5. facts given to learn about someone or something

12 Clues: a person or thing that hackslike a cold for your computera world wide computer networkbulling done over the internetbe careful what you make publicinformation made available by a websitethe state of being free from public attentionfacts given to learn about someone or somethinga piece of information needed to log in to the internet...

Quality Month Quiz 2022-11-04

Quality Month Quiz crossword puzzle
Across
  1. a type of cybersecurity attack that attempts to steal your information
  2. Plays A VITAL ROLE IN YOUR APPRAISAL
  3. Skill / Knowledge to do a process
  4. Property of accuracy and completeness
  5. are implemented to mitigate the identified risks
  6. Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
  1. Tailgating is also termed as
  2. Portrays the hierarchy in organisation / function
  3. plan to achieve a long-term or overall objective
  4. Non-fulfilment of a requirement
  5. A weakness of an asset or control that could potentially be exploited by one or more threats
  6. How many Quality Management Principle in QMS

12 Clues: Tailgating is also termed asNon-fulfilment of a requirementSkill / Knowledge to do a processPlays A VITAL ROLE IN YOUR APPRAISALProperty of accuracy and completenessHow many Quality Management Principle in QMSplan to achieve a long-term or overall objectiveare implemented to mitigate the identified risks...

Tech Talks: Crossword Edition 2025-08-28

Tech Talks: Crossword Edition crossword puzzle
Across
  1. Structured support to help startups develop and scale
  2. Field involving the design and creation of automated machines
  3. Protecting systems and networks from digital threats
  4. Using fingerprints, facial recognition, or voice for authentication
  5. Technology that uses living organisms or cells to develop products
Down
  1. Testing environment for disruptive technologies
  2. Raising capital from the public to fund innovation projects
  3. High-risk funding enabling tech companies to grow rapidly
  4. Collaborative network of startups, funders, and enablers driving innovation
  5. MOSTI platform certifying local R&D products for procurement
  6. Tech innovation transforming financial services
  7. Unmanned aerial vehicle used in delivery, agriculture, and surveillance

12 Clues: Testing environment for disruptive technologiesTech innovation transforming financial servicesProtecting systems and networks from digital threatsStructured support to help startups develop and scaleHigh-risk funding enabling tech companies to grow rapidlyRaising capital from the public to fund innovation projects...

Queenbee Cybersecurity 2025-03-17

Queenbee Cybersecurity crossword puzzle
Across
  1. An hacker sends a ___________ email requesting the victim for sensitive information
  2. A _________ access by a third party is called a cyber attack
  3. Trojan is an example of __________ attack
Down
  1. Users need to use unique __________ passwords to strengthen defence against attacks
  2. ________ are dummy computers systems to deceive attackers
  3. A virtual wall between the computer and the internet is called as _______
  4. A person who performs a cybersecurity attack is called a _______

7 Clues: Trojan is an example of __________ attack________ are dummy computers systems to deceive attackersA _________ access by a third party is called a cyber attackA person who performs a cybersecurity attack is called a _______A virtual wall between the computer and the internet is called as _______...

Zero-Trust 2025-07-23

Zero-Trust crossword puzzle
Across
  1. Zero Trust eliminates ___ ports to reduce attack surface.
  2. – Zero Trust enforces least ___ access to minimize risk.
  3. Every session in a Zero Trust model must be fully ___.
  4. OT compliance standard Secomea adheres to (abbr.).
  5. A secure remote access company built for OT.
  6. Traffic allowed in Zero Trust: ___-only.
Down
  1. Access should only be granted when it is scheduled and ___.
  2. – What Zero Trust replaces: ___ perimeter security.
  3. All users and devices must be continuously ___.
  4. European directive Secomea helps manufacturers comply with (abbr.).
  5. This cybersecurity model assumes no inherent trust: Zero ___.

11 Clues: Traffic allowed in Zero Trust: ___-only.A secure remote access company built for OT.All users and devices must be continuously ___.OT compliance standard Secomea adheres to (abbr.).– What Zero Trust replaces: ___ perimeter security.Every session in a Zero Trust model must be fully ___.– Zero Trust enforces least ___ access to minimize risk....

AI Lesson 2023-03-06

AI Lesson crossword puzzle
Across
  1. A type of machine learning that is modeled after the structure and function of the human brain
  2. data __________
  3. e.g. Siri, Alexa
  4. using machines to perform tasks that are normally done by humans
  5. e.g. fingerprints, facial recognition software
  6. the design, construction, operation and use of robots
  7. AI that learns about knowledge that humans know naturally
Down
  1. using firewalls and antivirus software to prevent computers from being attacked
  2. using large datasets to find patterns and insights
  3. AI that learns and improves from experience by itself
  4. a household that uses internet-connected devices to control appliances
  5. feeling/emotion
  6. a set of instructions that complete a task

13 Clues: data __________feeling/emotione.g. Siri, Alexaa set of instructions that complete a taske.g. fingerprints, facial recognition softwareusing large datasets to find patterns and insightsAI that learns and improves from experience by itselfthe design, construction, operation and use of robotsAI that learns about knowledge that humans know naturally...

Digital Technology 2025-04-26

Digital Technology crossword puzzle
Across
  1. After the pandemic, ____became normal in many industries.
  2. _____ is common in car manufacturing factories today.
  3. _____ forces companies to rethink their strategies.
  4. _____ helps doctors detect diseases earlier.
  5. Some companies practice _____ to hire cheaper labor abroad.
  6. A ____must find new clients to stay successful.
  7. A _____ usually needs to innovate to survive against big companies.
Down
  1. _____ experts are essential to protect sensitive company information.
  2. Many small businesses survive thanks to ____ platforms.
  3. With _____ , you can visit a museum without leaving your house.
  4. ____ reduces the need for repetitive human tasks.
  5. _____ helps banks process transactions faster and more securely.
  6. Laws about the _____ aim to prevent employee burnout.

13 Clues: _____ helps doctors detect diseases earlier.A ____must find new clients to stay successful.____ reduces the need for repetitive human tasks._____ forces companies to rethink their strategies._____ is common in car manufacturing factories today.Laws about the _____ aim to prevent employee burnout....

Service Desk 2026 POPIA Awareness Crossword Puzzle 2026-03-03

Service Desk 2026 POPIA Awareness Crossword Puzzle crossword puzzle
Across
  1. when logging a hornbill task, what is a unique user identifier that is mandatory?
  2. A single click can expose ___ information, resulting in a POPIA breach.
  3. Quick ___ helps limit exposure of personal data
  4. Personal information must not be accessed by ___ persons.
  5. Treat all user data as strictly confidential
Down
  1. Every agent is responsible for following ___ best practices
  2. Lock your ____ when you leave it
  3. Store ____ securely and dispose of them properly
  4. use ___ tools to communicate
  5. Must be strong & unique

10 Clues: Must be strong & uniqueuse ___ tools to communicateLock your ____ when you leave itTreat all user data as strictly confidentialQuick ___ helps limit exposure of personal dataStore ____ securely and dispose of them properlyPersonal information must not be accessed by ___ persons.Every agent is responsible for following ___ best practices...

Aniya’s cybersecurity crossword puzzle 2026-04-01

Aniya’s cybersecurity crossword puzzle crossword puzzle
Across
  1. – Gains unauthorized access
  2. – Malware disguised as safe software
  3. – Verifies identity
  4. – Secretly collects user data
  5. – Protects a network from threats
  6. – Malware that spreads by attaching to files
  7. – Harmful software
Down
  1. – Connected computers
  2. – Secret code to access accounts
  3. – Turns data into code
  4. – Shows unwanted ads
  5. – Locks files and demands payment
  6. – Tricks users into giving information
  7. – Malware that spreads without user action
  8. – Detects and removes malware

15 Clues: – Harmful software– Verifies identity– Shows unwanted ads– Connected computers– Turns data into code– Gains unauthorized access– Secretly collects user data– Detects and removes malware– Secret code to access accounts– Locks files and demands payment– Protects a network from threats– Malware disguised as safe software...

Zine Crossword 2022-04-16

Zine Crossword crossword puzzle
Across
  1. Considered to be the first hacker
  2. The website on which anonymous would plan their attacks
  3. The film that produced the famous hacking mask
Down
  1. The protection of information on the internet
  2. One of the colors of the three types of hackers
  3. The headwear associated with hacking
  4. A form of harm done on the internet
  5. Famous hacking group

8 Clues: Famous hacking groupConsidered to be the first hackerA form of harm done on the internetThe headwear associated with hackingThe protection of information on the internetThe film that produced the famous hacking maskOne of the colors of the three types of hackersThe website on which anonymous would plan their attacks

soujanya hazra 2025-06-19

soujanya hazra crossword puzzle
Across
  1. Designed to protect network
  2. Illegal entry into a computer system or network.
  3. the process of 'befriending' children on social media.
  4. Hoaxing or misleading.
  5. It is an act of harming or harassing using information technology in a deliberate manner
Down
  1. Vital Information Resources Under Seize
  2. Any criminal activity intended to harm anyone using the computer.
  3. They do Cybercrime.

8 Clues: They do Cybercrime.Hoaxing or misleading.Designed to protect networkVital Information Resources Under SeizeIllegal entry into a computer system or network.the process of 'befriending' children on social media.Any criminal activity intended to harm anyone using the computer....

INFORMATION GOVERNANCE SUMMER FUN 2017-08-08

INFORMATION GOVERNANCE SUMMER FUN crossword puzzle
Across
  1. Coming soon,in May 2018!
  2. New term under GDPR
  3. Increasing threat for us all
  4. Have you filled the new role required under GDPR?
  5. Process which becomes a legal requirement under GDPR
Down
  1. Part of important review by NDG 2016
  2. Mustn't forget this important law for patients
  3. What could happen to to you in 2018 if you steal personal data
  4. Part of revised definition for sensitive personal data under GDPR

9 Clues: New term under GDPRComing soon,in May 2018!Increasing threat for us allPart of important review by NDG 2016Mustn't forget this important law for patientsHave you filled the new role required under GDPR?Process which becomes a legal requirement under GDPRWhat could happen to to you in 2018 if you steal personal data...

Science and Technology 2025-02-11

Science and Technology crossword puzzle
Across
  1. A computer-generated simulation of a three-dimensional environment
  2. The application of scientific knowledge for practical purposes
  3. The branch of technology dealing with robots
  4. Related to genes and heredity
  5. Avoiding depletion of natural resources for long-term balance
Down
  1. Information processed or stored by a computer (
  2. The use of technology to complete tasks with minimal human input
  3. Protection against cyber threats and attacks
  4. A new idea or method

9 Clues: A new idea or methodRelated to genes and heredityProtection against cyber threats and attacksThe branch of technology dealing with robotsInformation processed or stored by a computer (Avoiding depletion of natural resources for long-term balanceThe application of scientific knowledge for practical purposes...

HACKING TERMS 2023-11-13

HACKING TERMS crossword puzzle
Across
  1. Software designed to harm or exploit computer systems
  2. A deliberate attempt to exploit computer systems or networks.
  3. A reward offered for discovering and reporting software bugs
  4. A secret word or phrase used for authentication.
  5. A series of instructions for a computer to execute.
  6. Protective measures against digital threats
Down
  1. Ethical hackers working to improve security
  2. The right to keep personal information and activities confidential.
  3. A weakness or flaw in a system that can be exploited.
  4. The process of converting information into a code for security.

10 Clues: Ethical hackers working to improve securityProtective measures against digital threatsA secret word or phrase used for authentication.A series of instructions for a computer to execute.Software designed to harm or exploit computer systemsA weakness or flaw in a system that can be exploited....

Tech Terms 2023-12-01

Tech Terms crossword puzzle
Across
  1. - Software for accessing and navigating the internet. (7)
  2. - Step-by-step procedure for solving a problem. (8)
  3. Reality - Computer-generated environment that simulates reality. (13)
  4. - Secret code to access a protected system. (8)
  5. - Transfer files from the internet to a computer. (8)
Down
  1. - Measures to protect computer systems from theft or damage. (12)
  2. - Security system that prevents unauthorized access. (8)
  3. - Process of converting data into a code to secure it. (10)
  4. - Portable device with touchscreen features. (10)
  5. - Writing instructions for a computer program. (6)

10 Clues: - Secret code to access a protected system. (8)- Portable device with touchscreen features. (10)- Writing instructions for a computer program. (6)- Step-by-step procedure for solving a problem. (8)- Transfer files from the internet to a computer. (8)- Security system that prevents unauthorized access. (8)...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET crossword puzzle
Across
  1. Lapisan OSI ke 3
  2. topologi jaringan berbentuk bintang
  3. Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
  4. Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
  5. salah satu prinsip keamanan jaringan
Down
  1. mekanisme pertukaran data
  2. kegiatan tata kelola data
  3. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
  4. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  5. Salah satu macam jenis jaringan komputer

10 Clues: Lapisan OSI ke 3mekanisme pertukaran datakegiatan tata kelola datatopologi jaringan berbentuk bintangsalah satu prinsip keamanan jaringanSalah satu macam jenis jaringan komputerperangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)...

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26

RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI crossword puzzle
Across
  1. Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
  2. Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
  3. Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
  4. Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
  1. Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
  2. MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
  3. IoT ATAMASINING MA'NOSI
  4. To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
  5. Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
  6. DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI

10 Clues: IoT ATAMASINING MA'NOSISun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYATo‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita....

CODING VOCABULARY 2023-02-03

CODING VOCABULARY crossword puzzle
Across
  1. NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
  2. ANY CHARACTER OR OBJECT USED IN BLOCK CODING
  3. A FREE PROGRAMMING LANGUAGE
  4. MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
  5. ASKING IF A CONDITION IS MET
  6. SET OF LOGICAL STEPS CARRIED OUT IN ORDER
  7. OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
  8. FINDING WEAKNESSES IN DIGITAL DEVICES
  9. IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
  1. PROTECTING SENSITIVE DIGITAL INFORMATION
  2. TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
  3. MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
  4. DATA ENTERED BY A USER
  5. INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
  6. NAMES USED TO HOLD ONE OR MORE VALUES
  7. THE WAY SOMETHING IS WRITTEN

16 Clues: DATA ENTERED BY A USERA FREE PROGRAMMING LANGUAGEASKING IF A CONDITION IS METTHE WAY SOMETHING IS WRITTENNAMES USED TO HOLD ONE OR MORE VALUESFINDING WEAKNESSES IN DIGITAL DEVICESPROTECTING SENSITIVE DIGITAL INFORMATIONSET OF LOGICAL STEPS CARRIED OUT IN ORDERANY CHARACTER OR OBJECT USED IN BLOCK CODINGINSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Techniques 2024-11-06

Cybersecurity Techniques crossword puzzle
Across
  1. A protocol designed to provide privacy and security over the internet by encapsulating traffic
  2. The latest security protocol for Wi-Fi, enhancing protections against attacks.
  3. An advanced Linux technology used for monitoring and packet observability in real-time.
  4. A term related to busting common misconceptions in the open and secure cyberspace.
Down
  1. Data collected from devices or systems for monitoring and analysis, used in intelligent security
  2. Malicious software designed to infiltrate or damage computer systems.
  3. The practice of collecting, analyzing, and preserving digital evidence.

7 Clues: Malicious software designed to infiltrate or damage computer systems.The practice of collecting, analyzing, and preserving digital evidence.The latest security protocol for Wi-Fi, enhancing protections against attacks.A term related to busting common misconceptions in the open and secure cyberspace....

Advance CTE Career Clusters 2026-03-23

Advance CTE Career Clusters crossword puzzle
Across
  1. Moving goods and people globally via air, land, or sea.
  2. Focuses on wellness, medicine, and community care.
  3. Managing travel, dining, and large gatherings.
  4. Careers in banking, insurance, and money management.
  5. Focuses on agriscience, food systems, and cultivation.
Down
  1. Careers in teaching and training from early childhood to adulthood.
  2. Connecting customers to products through promotion and branding.
  3. The cluster for AI, cybersecurity, and data analytics.
  4. Uses robotics and AI to improve production and engineering.
  5. Includes first responders, law, and government roles.
  6. Creative roles in fashion, film, and visual arts.
  7. Leading businesses or starting your own company.
  8. Managing utilities, fuels, and environmental preservation.
  9. Designing, planning, and building our physical environment.

14 Clues: Managing travel, dining, and large gatherings.Leading businesses or starting your own company.Creative roles in fashion, film, and visual arts.Focuses on wellness, medicine, and community care.Careers in banking, insurance, and money management.Includes first responders, law, and government roles....

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Month Crossword 2023-09-18

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A security process that requires users to provide two different authentication factors before gaining access.
  2. Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
  3. Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
  4. An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
  5. Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  6. A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
  7. A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
  8. An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
  1. An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
  2. The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
  3. The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
  4. The process of examining network traffic to identify anomalies and potential security threats.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
  6. A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
  7. A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.

15 Clues: The process of examining network traffic to identify anomalies and potential security threats.Software designed to detect, prevent, and remove malicious software from a computer or network.The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality....

Technological Impacts on Business & Commerce 2023-05-03

Technological Impacts on Business & Commerce crossword puzzle
Across
  1. Radio Frequency Identification
  2. Global Positioning System
  3. A type of social media used by many businesses
  4. An immersive, interactive, computer-generated experience
  5. A type of mobile technology
  6. A common type of online payment system.
  7. Bullying someone online
  8. Technologies that require little to no human involvement to operate
  9. Computers that mimic human cognitive abilities
Down
  1. Customizing goods or services to consumers needs and preferences
  2. Safeguarding computer systems and networks
  3. The network of real-world things that exchange data form one another
  4. The network of businesses involved in product distribution
  5. Natural Language Processing
  6. The exchange of goods and services electronically
  7. Providing for the needs of this generation without compromising the needs for future generations
  8. A type of skill that is essential for ICT.

17 Clues: Bullying someone onlineGlobal Positioning SystemNatural Language ProcessingA type of mobile technologyRadio Frequency IdentificationA common type of online payment system.Safeguarding computer systems and networksA type of skill that is essential for ICT.A type of social media used by many businessesComputers that mimic human cognitive abilities...

Education 2025-08-08

Education crossword puzzle
Across
  1. – Not just a name —where finance meets fun.
  2. – GBS emphasises this as one of the USP
  3. — Once a GBS student, always one—albeit slightly sarcastic.
  4. - Easy Lunch between ____
  5. – Period during which a student can cancel without tuition penalty
  6. – rewards that help students
  7. – Framework applied across GBS’s regulatory documents
  8. – Core value in GBS’s mission to create an inclusive environment
  9. – Central theme in GBS’s policies on personal data handling
Down
  1. — Where students start, and strong futures build.
  2. – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
  3. — The _____ that whispers, ‘Look at me, I promise futures!
  4. – Keeping hackers’ fingers off your grades.
  5. – Referring to NSS scores.
  6. – Online events offering insight into GBS programs
  7. – Where silence studies hard
  8. – Studying trips without leaving the campus

17 Clues: - Easy Lunch between ____– Referring to NSS scores.– rewards that help students– Where silence studies hard– GBS emphasises this as one of the USP– Keeping hackers’ fingers off your grades.– Not just a name —where finance meets fun.– Studying trips without leaving the campus— Where students start, and strong futures build....

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Knowledge Exchange Christmas Quiz 2023-12-05

Knowledge Exchange Christmas Quiz crossword puzzle
Across
  1. Intranet location to learn more about IT initiatives.
  2. Santa's helpers.
  3. Last IT Tuesday topic
Down
  1. At Savannah, we have a culture of continuous ....
  2. The Centre of is where you can find further information on continuous improvement
  3. Guides Santas Sleigh
  4. The Snowman with a corncob pipe and button nose.

7 Clues: Santa's helpers.Guides Santas SleighLast IT Tuesday topicThe Snowman with a corncob pipe and button nose.At Savannah, we have a culture of continuous ....Intranet location to learn more about IT initiatives.The Centre of is where you can find further information on continuous improvement

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. What is the name of our mascot
  2. Parrot Ball location
  3. KeyW's colors
  4. What month was KeyW founded
  5. What color is our KeyW van
  6. KeyW's best location
  7. How many buildings does the Severn location have
  8. Protection of networks, computers, programs, and data from attack
  9. Applying statistical analysis to data which has a geographical or spatial aspect
  10. Time sheet
  11. What type of bird is our mascot
  12. Which food truck offers the best cheese steaks
Down
  1. What is the surname of KeyW's founder
  2. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  3. What is the name of our newsletter
  4. Radio Detection and Ranging
  5. How many miles connect Key West to Florida main land
  6. KeyW non-profit organization abbreviated
  7. KeyW CEO
  8. When at work, what must you always carry

20 Clues: KeyW CEOTime sheetKeyW's colorsParrot Ball locationKeyW's best locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderKeyW non-profit organization abbreviated...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. What Stacey used to refer Michael to when they first started dating
  2. Where did Michael and Stacey meet
  3. Michael’s birthday month
  4. Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
  5. The number of years the couple is together
  6. Honeymoon destination
  7. Their favourite season
  8. How many years did Michael live overseas for (hint: bribe Father of Groom)
  9. What the groom has for breakfast everyday
  10. Michael’s job industry
  11. Number of their siblings all together
  12. Stacey’s favourite food (hint: ask father of bride)
  13. Michael’s middle name
  14. Who’s the better cook
Down
  1. Mr & Mrs _____
  2. City where Michael was born
  3. Michael’s favourite drink
  4. Where did Michael propose
  5. Brand of Michael’s car
  6. Flavour of the wedding cake
  7. Stacey’s birthday month
  8. Favourite AFL team (hint: ask Best Man)
  9. Stacey’s best friend
  10. How long has Stacey been in Australia for
  11. The age gap between the bride and the groom

25 Clues: Mr & Mrs _____Stacey’s best friendHoneymoon destinationMichael’s middle nameWho’s the better cookBrand of Michael’s carTheir favourite seasonMichael’s job industryStacey’s birthday monthMichael’s birthday monthMichael’s favourite drinkWhere did Michael proposeCity where Michael was bornFlavour of the wedding cakeWhere did Michael and Stacey meet...

Crosswords 2024-07-16

Crosswords crossword puzzle
Across
  1. plan for successful digital transformation
  2. immediate data analysis
  3. large sets of data analyzed for insights
  4. combining data from different sources
  5. management of the flow of goods and services
  6. successful digital use by employees
  7. system that integrates various business processes
  8. virtual model of a physical object or system
  9. protection in digital business environments
  10. network of interconnected devices
  11. system for managing customer relationships
  12. accuracy and reliability of data
Down
  1. digital change impacting business processes
  2. redesigning business processes for improvement
  3. use of technology to perform tasks
  4. analysis of data for business insights
  5. based ERP solutions
  6. process of adopting ERP systems
  7. technology enhancing supply chain transparency
  8. integration of artificial intelligence in business
  9. isolated data storage within an organization
  10. improved by ERP systems
  11. analytics for customer engagement
  12. considerations in using AI and big data
  13. user experience in digital product design

25 Clues: based ERP solutionsimmediate data analysisimproved by ERP systemsprocess of adopting ERP systemsaccuracy and reliability of dataanalytics for customer engagementnetwork of interconnected devicesuse of technology to perform taskssuccessful digital use by employeescombining data from different sourcesanalysis of data for business insights...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

Maura & Spencer 2023-05-19

Maura & Spencer crossword puzzle
Across
  1. Spencer's favorite basketball player
  2. Where they moved after college
  3. The name of their cat
  4. Favorite "Fast Food"
  5. Brides Favorite Alcoholic Drink
  6. Spencer's Favorite Hobby
  7. Where did Maura & Spencer travel to this year
  8. Who gave out their phone number first?
  9. Where do they live
  10. Maura and Spencers First Born
  11. Maura's favorite Disney Movie
  12. How many years will they be together in September?
  13. Maura's middle name
  14. Maura's Job
Down
  1. Maura's Favorite Color
  2. What social media platform did Spencer use to slide in Maura's DM's
  3. Where did Maura go after DC
  4. Maura's Favorite Hobby
  5. Where Maura and Spencer met
  6. Where did Spencer propose?
  7. Spencer's Favorite Color
  8. What month did they get engaged
  9. The last addition to Maura & Spencers family
  10. Grooms Favorite Alcoholic Drink
  11. Spencers Job
  12. What was Maura's sport growing up
  13. Spencer's middle name

27 Clues: Maura's JobSpencers JobWhere do they liveMaura's middle nameFavorite "Fast Food"The name of their catSpencer's middle nameMaura's Favorite ColorMaura's Favorite HobbySpencer's Favorite ColorSpencer's Favorite HobbyWhere did Spencer propose?Where did Maura go after DCWhere Maura and Spencer metMaura and Spencers First Born...

Lushi and John 2025-02-22

Lushi and John crossword puzzle
Across
  1. Lushi's favorite alcoholic beverage
  2. First date restaurant
  3. John’s middle name
  4. Lushi’s favorite dessert
  5. John’s go-to drink
  6. Lushi’s favorite color
  7. Lushi’s favorite holiday
  8. John’s work industry
  9. City where they met
  10. Total number of their dogs
  11. Lushi’s favorite snack to make
  12. Month of their engagement
  13. Total countries visited together
  14. John’s favorite music band
  15. Favorite shared activity
Down
  1. Lushi’s favorite cuisine
  2. John’s hometown
  3. John’s favorite food
  4. University John attended
  5. Their dream honeymoon destination
  6. First international trip destination
  7. Who is older between them
  8. Place where John proposed
  9. Lushi’s favorite board game
  10. how John likes his coffee
  11. Lushi’s favorite time of year
  12. City they live in
  13. Lushi’s mom’s employer
  14. Name of their corgi
  15. Month of dating anniversary
  16. John’s favorite video game
  17. Color of John’s eyes

32 Clues: John’s hometownCity they live inJohn’s middle nameJohn’s go-to drinkCity where they metName of their corgiJohn’s favorite foodJohn’s work industryColor of John’s eyesFirst date restaurantLushi’s favorite colorLushi’s mom’s employerLushi’s favorite cuisineUniversity John attendedLushi’s favorite dessertLushi’s favorite holiday...

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Penipuan online melalui email atau situs palsu.
  4. Penyusupan sistem oleh pihak tidak berwenang.
  5. Pencurian data kartu kredit atau kartu debit
  6. Teknik mengakses sistem tanpa otorisasi.
  7. Alamat identifikasi unik setiap perangkat di jaringan.
  8. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  9. Kata sandi dalam sistem keamanan.
  10. Jenis virus komputer
Down
  1. Program pengintai aktivitas pengguna tanpa izin.
  2. Sistem keamanan biometrik yang menggunakan sidik jari.
  3. Proses identifikasi atau verifikasi pengguna
  4. Aksi mencari celah dalam sistem komputer.
  5. Istilah lain untuk keamanan jaringan
  6. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  7. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  8. Penyerang digital yang memiliki tujuan jahat.
  9. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Istilah lain untuk keamanan jaringan
  2. Penipuan online melalui email atau situs palsu.
  3. Penyerang digital yang memiliki tujuan jahat.
  4. Alamat identifikasi unik setiap perangkat di jaringan.
  5. Aksi mencari celah dalam sistem komputer.
  6. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  7. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  8. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  9. Sistem keamanan biometrik yang menggunakan sidik jari.
Down
  1. Proses identifikasi atau verifikasi pengguna
  2. Sandi digital yang dipakai untuk keamanan transaksi.
  3. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  4. Teknik mengakses sistem tanpa otorisasi.
  5. Program pengintai aktivitas pengguna tanpa izin.
  6. Penyusupan sistem oleh pihak tidak berwenang.
  7. Pencurian data kartu kredit atau kartu debit
  8. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  9. Jenis virus komputer
  10. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  11. Kata sandi dalam sistem keamanan.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS_EvandaDandy_14xh 2025-04-15

TTS_EvandaDandy_14xh crossword puzzle
Across
  1. Orang yang membuat desain antarmuka.
  2. HAKI singkatan dari...?
  3. Lembaga yang mengurus HAKI di Indonesia.
  4. Menyebarkan konten ke publik secara digital disebut?
  5. Hak yang melindungi karya cipta.
  6. Simbol yang digunakan untuk pencarian kata bebas.
  7. Profesi yang membuat aplikasi disebut?
  8. Platform berbagi video populer.
  9. Informasi palsu di internet disebut?
  10. PENGELOLA sistem jaringan.
Down
  1. Proses membuat konten disebut?
  2. Proses memeriksa kebenaran konten disebut?
  3. Kata kunci yang digunakan untuk mengabaikan kata tertentu.
  4. Salah satu bentuk HAKI untuk brand dagang.
  5. Elemen tradisional dalam konten digital disebut unsur...?
  6. Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
  7. yang menganalisis data.
  8. Simbol untuk laporan konten di media sosial.
  9. Ahli keamanan siber disebut...?
  10. Contoh media digital untuk menyebarkan budaya.
  11. Sistem otomatis untuk menyaring konten.
  12. Mesin pencari paling populer.
  13. Konten berbahaya disebut konten...?
  14. Simbol untuk mencari sinonim kata (gunakan ~).
  15. Hak eksklusif atas penemuan teknologi.

25 Clues: yang menganalisis data.HAKI singkatan dari...?Mesin pencari paling populer.Platform berbagi video populer.Proses membuat konten disebut?Hak yang melindungi karya cipta.PENGELOLA sistem jaringan.Simbol untuk mencari sinonim kata (gunakan ~).Simbol yang digunakan untuk pencarian kata bebas....

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

IT Terminology 2025-05-15

IT Terminology crossword puzzle
Across
  1. Distributed ledger technology with cryptographic linking.
  2. Using scripts or software to perform tasks without manual input.
  3. Project management method using small, iterative steps.
  4. Open-source operating system with many distributions.
  5. Network of malware-infected devices controlled remotely.
  6. Practice of protecting digital assets from threats.
  7. Converting data into unreadable code for protection.
  8. Flooding a network with traffic to disrupt service.
  9. A sequence of instructions used in software tasks.
  10. Low-level code interacting directly with hardware.
  11. On-demand delivery of IT resources over the internet.
  12. Malware that demands payment to unlock encrypted data.
Down
  1. Computers mimicking human cognitive functions.
  2. Professional who interprets data to help decision-making.
  3. Wireless technology for short-distance device communication.
  4. Numeric label identifying devices on a network.
  5. Loss of signal strength in networking cables.
  6. Attempt to infiltrate digital systems maliciously.
  7. Developer who creates the visual interface of websites.
  8. Temporary storage for fast data retrieval.

20 Clues: Temporary storage for fast data retrieval.Loss of signal strength in networking cables.Computers mimicking human cognitive functions.Numeric label identifying devices on a network.Attempt to infiltrate digital systems maliciously.A sequence of instructions used in software tasks.Low-level code interacting directly with hardware....

tema 2 perkembangan ekonomi digital 2025-10-27

tema 2 perkembangan ekonomi digital crossword puzzle
Across
  1. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  5. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  8. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  9. → Pemasaran melalui media sosial disebut
  10. → Contoh aplikasi fintech di Indonesia adalah
Down
  1. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → Transaksi keuangan secara online disebut
  5. → Fintech merupakan singkatan dari
  6. → Berjualan melalui marketplace online termasuk kegiatan
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masa depan ekonomi digital bergantung pada literasi
  9. → Risiko ekonomi digital adalah kebocoran
  10. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 2025-10-27

TEMA 2 crossword puzzle
Across
  1. Tokopedia dan Shopee termasuk jenis platform ini.
  2. Teknologi penyimpanan data berbasis internet.
  3. Proses jual beli melalui internet.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Proses promosi produk melalui media sosial.
  6. Salah satu contoh dompet digital di Indonesia.
  7. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Singkatan dari Financial Technology.
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Media sosial yang sering digunakan untuk promosi produk.
  2. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Tempat di mana penjual dan pembeli bertemu secara online.
  7. Sistem ekonomi yang berbasis pada teknologi dan internet.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  10. Pihak yang menjual barang atau jasa di internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

TEMA 2: EKONOMI DIGITAL 2025-10-23

TEMA 2: EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

test 2022-07-15

test crossword puzzle
Across
  1. Music festival they attended -
  2. Michael proposed in ___ beach -
  3. European country michael lived in -
  4. How they met
  5. On the way to Big Sur they stopped at an ___ farm -
  6. Day of the week they attend life group -
  7. City of the music festival they attended -
  8. Basketball team michael supports -
  9. Sammi’s side hustle -
  10. How we are honoring sammis dad at the wedding -
  11. Month they met -
  12. City they took their engagement photos -
  13. Sauce michael hates -
Down
  1. State michael was raised in -
  2. Industry sammi works in -
  3. Sammis favorite flowers -
  4. Sammis bridal shower was a ___ party -
  5. Brand of sammi’s car -
  6. Type of dance sammi did growing up -
  7. Destination of first plane ride together -
  8. Type of engineer Michael is -
  9. Year they met -
  10. Color of michaels bathroom before they painted it -
  11. Location of their first post together on IG -
  12. Engagement ring shape -

25 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

Cisco 2022-11-30

Cisco crossword puzzle
Across
  1. intentional tampering
  2. machine within a machine
  3. machine for printing text onto paper
  4. information non-consensually given to the public
  5. something on many screens
  6. output device that displays images
  7. place of sale
  8. official procedure
  9. common handheld device
  10. faster protocol
  11. thick rope of wire
  12. putting something into another forcefully
  13. an autonomous device
  14. device that often works with mice
  15. IO device that displays images
  16. IO device for computer
Down
  1. negative or not good
  2. our fearless leader
  3. slower protocol
  4. protection of systems
  5. to engineer
  6. company
  7. can be divided into vlans
  8. attack strategy
  9. connects networks
  10. our country
  11. a form of social engineering
  12. something often worn by humans
  13. IO device for computers
  14. a type of robot
  15. encoded message
  16. device
  17. aspect of human lift
  18. a type of person

34 Clues: devicecompanyto engineerour countryplace of saleslower protocolattack strategyfaster protocola type of robotencoded messagea type of personconnects networksofficial procedurethick rope of wireour fearless leadernegative or not goodan autonomous deviceaspect of human liftintentional tamperingprotection of systemscommon handheld device...

Crossword Puzzle 2023-12-12

Crossword Puzzle crossword puzzle
Across
  1. Coordinated anti-terrorism effort
  2. Diplomatic negotiation process
  3. Mutual defense pact
  4. Emotional response to stress or danger
  5. Country with aggressive territorial claims in the West Philippine Sea
  6. Protection against cyber threats
  7. Manipulation of information to influence opinions
  8. Policies aimed at reducing gender-based disparities
  9. Targeting of adversary's decision-making processes
  10. Island in the West Philippine Sea claimed by multiple countries
  11. Localized peace talks with insurgent groups
Down
  1. Common mental health condition characterized by persistent sadness
  2. Act of risking one's life to save others
  3. Joint military exercises
  4. Replacement of old weaponry with newer, more advanced systems
  5. Primary fighter aircraft used by the Air Force
  6. Country's plan for protecting itself from external threats
  7. Large warship equipped for open-sea combat
  8. Strategy to address the root causes of insurgency
  9. International court ruling on the West Philippine Sea dispute
  10. Declaration of the government to end insurgency

21 Clues: Mutual defense pactJoint military exercisesDiplomatic negotiation processProtection against cyber threatsCoordinated anti-terrorism effortEmotional response to stress or dangerAct of risking one's life to save othersLarge warship equipped for open-sea combatLocalized peace talks with insurgent groupsPrimary fighter aircraft used by the Air Force...

NEWSLETTER 2023-11-13

NEWSLETTER crossword puzzle
Across
  1. The activity, you do to get to places.
  2. Another word for young people....
  3. Ghana’s Winter.
  4. I want for Christmas is......
  5. The invisible line that divides the earth into two equal parts.
  6. Picture on social media.
  7. Your identity summarized onto one thing.
  8. Plans for the New Year.
  9. Program used to harm computers.
  10. Color associated with the New Year.
  11. MIDG end-of-year package for employees.
  12. Popular hangout zone in Accra.
  13. ....is responsible for the safety and manner on the internet and other connection.
Down
  1. Merry Christmas
  2. Baby Crocodile
  3. .....is the most showed movie during Christmas movie in Ghana.
  4. Margins ID Group is made up of four....
  5. .... flies when you’re having fun.
  6. Sits atop the Christmas tree.
  7. Pronto’s location.
  8. A machine that can be used to write, connect to the writer, the internet and play games.
  9. Identity theft is an example of...
  10. A letter sent on the internet.
  11. What makes you, you.

24 Clues: Baby CrocodileMerry ChristmasGhana’s Winter.Pronto’s location.What makes you, you.Plans for the New Year.Picture on social media.I want for Christmas is......Sits atop the Christmas tree.A letter sent on the internet.Popular hangout zone in Accra.Program used to harm computers.Another word for young people........ flies when you’re having fun....

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

Tugas Daring Yesika Intan Aurelia 2025-04-24

Tugas Daring Yesika Intan Aurelia crossword puzzle
Across
  1. UI designer merancang tampilan?
  2. menyebarluaskan konten digital disebut?
  3. Hoaks termasuk dalam konten?
  4. Salah satu platform berbagi konten tulisan adalah?
  5. Orang yang merancang sistem jaringan komputer disebut?
  6. Search engine menggunakan apa untuk mengindeks data?
  7. HAKI melindungi karya cipta agar tidak?
  8. Profesi yang menjaga keamanan data disebut?
  9. Data analyst bertugas menganalisis?
  10. Salah satu situs validasi fakta di Indonesia adalah?
  11. YouTube digunakan untuk menyebarkan konten berupa?
  12. Fungsi utama search engine adalah untuk?
Down
  1. Validasi konten bisa dilakukan dengan cara?
  2. Algoritma pada search engine membantu menentukan?
  3. Konten digital bisa berupa teks, gambar, video, dan ?
  4. Contoh selain Google adalah?
  5. Programmer bertugas membuat?
  6. Hak cipta diberikan kepada?
  7. Konten negatif dapat berdampak pada?
  8. Mesin pencari paling populer saat ini adalah?
  9. HAKI meliputi hak cipta dan?
  10. Contoh karya yang dilindungi HAKI adalah?
  11. Ciri konten valid adalah mencantumkan?
  12. Pelanggaran HAKI dapat dikenai?
  13. Software pengolah gambar adalah?

25 Clues: Hak cipta diberikan kepada?Contoh selain Google adalah?Hoaks termasuk dalam konten?Programmer bertugas membuat?HAKI meliputi hak cipta dan?UI designer merancang tampilan?Pelanggaran HAKI dapat dikenai?Software pengolah gambar adalah?Data analyst bertugas menganalisis?Konten negatif dapat berdampak pada?Ciri konten valid adalah mencantumkan?...

New Pork Rinds Crossword Puzzle 2025-08-20

New Pork Rinds Crossword Puzzle crossword puzzle
Across
  1. Called
  2. Quinoa, for example
  3. The coolest person ever
  4. Strange
  5. Escape from prison
  6. Disney dragon sidekick
  7. Best when solving a crossword puzzle
  8. A certain town clerk always says, "You're so ___."
  9. One may fall asleep at work if they have it
  10. Sinatra or hot dog
  11. Sport considered America's Greatest Pasttime
  12. Slang for guitar
  13. Children's bathtub toy
  14. Inspirational words
  15. Athletes who like to club
Down
  1. been hacked, Message concerning cybersecurity
  2. Outdated childish insult
  3. Roundabout
  4. frequent party guest
  5. "Your room is a ____"
  6. Tip over
  7. Amount that you can order in
  8. "___ goes his name-o"
  9. Before "Engine" and after "Top"
  10. cartoon bear who favors honey
  11. Super
  12. powerful wizard
  13. Gymnastics movement or secure storage
  14. Fried chicken state, in short
  15. "Broaden your ____"
  16. Assumes
  17. Pull aggressively
  18. Sun movement
  19. Pokemon trainer

34 Clues: SuperCalledStrangeAssumesTip overRoundaboutSun movementpowerful wizardPokemon trainerSlang for guitarPull aggressivelyEscape from prisonSinatra or hot dogQuinoa, for example"Broaden your ____"Inspirational wordsfrequent party guest"Your room is a ____""___ goes his name-o"Disney dragon sidekickChildren's bathtub toyThe coolest person ever...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  2. → Contoh aplikasi fintech di Indonesia adalah
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  6. → Perusahaan baru yang berbasis teknologi disebut
  7. → Masa depan ekonomi digital bergantung pada literasi
  8. → Pemasaran melalui media sosial disebut
  9. → Berjualan melalui marketplace online termasuk kegiatan
  10. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Fintech merupakan singkatan dari
  2. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Transaksi keuangan secara online disebut
  5. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  6. → Keamanan transaksi online dikenal dengan istilah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Risiko ekonomi digital adalah kebocoran
  9. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  10. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

TEMA 02 : EKONOMI DIGITAL 2025-10-23

TEMA 02 : EKONOMI DIGITAL crossword puzzle
Across
  1. Proses promosi produk melalui media sosial.
  2. Media sosial yang sering digunakan untuk promosi produk.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Pihak yang menjual barang atau jasa di internet.
  5. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  6. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  7. Teknologi penyimpanan data berbasis internet.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Sistem ekonomi yang berbasis pada teknologi dan internet.
  2. Singkatan dari Financial Technology.
  3. Tokopedia dan Shopee termasuk jenis platform ini.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  8. Tempat di mana penjual dan pembeli bertemu secara online.
  9. Salah satu contoh dompet digital di Indonesia.
  10. Proses jual beli melalui internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

WORDS IN EAGLE 101 2025-10-07

WORDS IN EAGLE 101 crossword puzzle
Across
  1. An e-cigarette.
  2. Someone who is outgoing and willing to work in a group.
  3. Coloring or listening to music for a reset.
  4. We watch them every Friday to keep things on the happy side of life.
  5. A timer race Mr. Rieck uses.
  6. Can happen to the lungs of people who smoke.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. A motivational speaker.
Down
  1. Drug Abuse Resistance Education
  2. Drugs such as vapes that have flavor.
  3. Stress or worriness. A type of emotion.
  4. How to be a good citizen on the internet.
  5. Security on electronic devices.
  6. A movie we watched in Eagle 101.
  7. An opioid and drug that messes with your body.
  8. The act of having a bond with another person.
  9. To stand up to something you believe in.
  10. A type of drug.
  11. A fear of something (Mr. Rieck's is 67)
  12. Mr. Rieck's favorite sports team.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Drug Abuse Resistance EducationSecurity on electronic devices.A movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

KeyW Crossword 2017-01-18

KeyW Crossword crossword puzzle
Across
  1. When at work, what must you always carry
  2. Applying statistical analysis to data which has a geographical or spatial aspect
  3. KeyW non-profit organization abbreviated
  4. KeyW's best location
  5. What is the name of our newsletter
  6. KeyW CEO
  7. Time sheet
  8. What is the surname of KeyW's founder
  9. What type of bird is our mascot
Down
  1. KeyW's colors
  2. What month was KeyW founded
  3. What is the name of our mascot
  4. Radio Detection and Ranging
  5. How many buildings does the Severn location have
  6. Protection of networks, computers, programs, and data from attack
  7. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  8. Parrot Ball location
  9. How many miles connect Key West to Florida main land
  10. Which food truck offers the best cheese steaks
  11. What color is our KeyW van

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

science-and-technology 2 2023-11-25

science-and-technology 2 crossword puzzle
Across
  1. Device that speeds up charged particles.
  2. The path of an object around a celestial body.
  3. Managing temperature and weather conditions.
  4. Computer-generated simulation of a three-dimensional environment.
  5. Design and construction of new biological parts.
  6. Device that converts hydrogen into electricity.
  7. Study of ionized gases (plasma).
Down
  1. Protection of computer systems from theft or damage.
  2. Altering genes in an organism's DNA.
  3. Relating to electric and magnetic fields.
  4. Elementary particle and a fundamental constituent of matter.
  5. Study of extremely low temperatures.
  6. Manipulation of matter on a molecular or atomic scale.
  7. Electromagnetic radiation with longer wavelengths than visible light.
  8. Long-term alteration in Earth's climate.
  9. Small rocky object orbiting the sun.
  10. Application of biological principles to medicine.
  11. Programs and applications for computers.
  12. Thread-like structure of DNA in the nucleus.
  13. Ability of machines to learn from data.

20 Clues: Study of ionized gases (plasma).Altering genes in an organism's DNA.Study of extremely low temperatures.Small rocky object orbiting the sun.Ability of machines to learn from data.Device that speeds up charged particles.Long-term alteration in Earth's climate.Programs and applications for computers.Relating to electric and magnetic fields....

Words In Eagle 101 I Learned 2025-10-07

Words In Eagle 101 I Learned crossword puzzle
Across
  1. Drug Abuse Resistance Education
  2. To stand up to something you believe in.
  3. Can happen to the lungs of people who smoke.
  4. Stress or worriness. A type of emotion.
  5. How to be a good citizen on the internet.
  6. An e-cigarette.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. Mr. Rieck's favorite sports team.
  9. The act of having a bond with another person.
  10. A movie we watched in Eagle 101.
Down
  1. Security on electronic devices.
  2. We watch them every Friday to keep things on the happy side of life.
  3. An opioid and drug that messes with your body.
  4. Coloring or listening to music for a reset.
  5. A motivational speaker.
  6. A timer race Mr. Rieck uses.
  7. A fear of something (Mr. Rieck's is 67)
  8. Drugs such as vapes that have flavor.
  9. A type of drug.
  10. Someone who is outgoing and willing to work in a group.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Security on electronic devices.Drug Abuse Resistance EducationA movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

TECHNOLOGY 2026-02-26

TECHNOLOGY crossword puzzle
Across
  1. Secret word used for security
  2. Software designed to damage or disrupt systems
  3. Tool to store and generate secure passwords
  4. Digital elements added to the real world
  5. Someone who gains unauthorized access to systems
  6. Physical parts of a computer
  7. Protecting networks, devices, and data from attacks
  8. Extremely large datasets analyzed for trends
  9. Converting information into a secret code
  10. To get a file from the internet
  11. Data left behind when using technology
  12. Delivering video or audio content online
  13. Computer-generated 3D environment
Down
  1. To send a file to the internet
  2. Storing and accessing data online
  3. A machine for processing information
  4. Used to type on a computer
  5. Programs used on a computer
  6. Global system connecting computers
  7. Machines or programs that simulate human thinking
  8. Mobile device for calls and apps
  9. Software for smartphones or tablets
  10. A machine programmed to perform tasks
  11. Security system that controls network traffic

24 Clues: Used to type on a computerPrograms used on a computerPhysical parts of a computerSecret word used for securityTo send a file to the internetTo get a file from the internetMobile device for calls and appsStoring and accessing data onlineComputer-generated 3D environmentGlobal system connecting computersSoftware for smartphones or tablets...

Technology Crossword 2024-05-29

Technology Crossword crossword puzzle
Across
  1. AI
  2. a computer that works like a human brain
  3. a form of a monitarilly valuable item
  4. Something that is a threat to us non physically
  5. this is a watch or VR headset
  6. Something that can be invaded
  7. an orbit of artifical stars in a pattern
  8. a form of tourism that is very expensive and not many have a chance to go.
  9. Exploring the largest part of earth
  10. Advanced Computing
Down
  1. Finger print or face id
  2. a form of engineering
  3. A form of travel out of this world
  4. Threat of Unemployment
  5. Analysis of data
  6. Something seen as a toy for some but fly
  7. having people colonize a close planet
  8. Something almost everyone uses
  9. many people have these devices
  10. a way of making sure that you get what you need to get well

20 Clues: AIAnalysis of dataAdvanced Computinga form of engineeringThreat of UnemploymentFinger print or face idthis is a watch or VR headsetSomething that can be invadedSomething almost everyone usesmany people have these devicesA form of travel out of this worldExploring the largest part of eartha form of a monitarilly valuable item...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS 2025-04-15

TTS crossword puzzle
Across
  1. Perlindungan hukum untuk identitas produk
  2. Scientist Analis data untuk pengambilan keputusan
  3. Perundungan melalui media digital
  4. Simbol penanda pencarian fleksibel pada mesin pencari
  5. Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
  6. Platform berbagi video terbesar di dunia
  7. Cipta Perlindungan hukum untuk karya kreatif
  8. Kebencian Ungkapan yang menghina dan merendahkan
  9. Simbol pengurang kata kunci dalam pencarian
  10. Penulis kode program komputer
  11. Platform berbagi foto dan video populer
  12. Lembaga pemerintah pengelola HAKI
Down
  1. Buatan" Penulisan untuk pencarian frasa spesifik
  2. Ideologi yang menganjurkan kekerasan
  3. Digital Pedoman moral dalam pembuatan konten digital
  4. Developer Pengembang dan pengelola situs web
  5. Analyst Pakar keamanan sistem komputer
  6. Budaya Tujuan penyebaran konten budaya
  7. Konten seksual yang eksplisit
  8. Informasi palsu yang tersebar luas
  9. Jaipong Contoh konten budaya Sunda di media digital
  10. Perlindungan hukum untuk inovasi
  11. Designer Perancang antarmuka pengguna
  12. Singkatan dari Hak Kekayaan Intelektual
  13. Operator logika untuk pencarian gabungan kata kunci

25 Clues: Konten seksual yang eksplisitPenulis kode program komputerPerlindungan hukum untuk inovasiPerundungan melalui media digitalLembaga pemerintah pengelola HAKIInformasi palsu yang tersebar luasIdeologi yang menganjurkan kekerasanDesigner Perancang antarmuka penggunaAnalyst Pakar keamanan sistem komputerBudaya Tujuan penyebaran konten budaya...

Technology vocabulary 2025-09-03

Technology vocabulary crossword puzzle
Across
  1. Virtual reality, a 3D digital world.
  2. An electronic machine that processes information.
  3. Technology you can put on your body.
  4. A person who loves technology.
  5. To bring software to the newest version.
  6. Computers that can act and “think” like humans.
  7. A program used on a phone or computer.
  8. A small electronic device.
  9. A screen you can control by touching.
  10. To take a file from the internet.
  11. Wireless internet connection.
Down
  1. A picture of what’s on your screen.
  2. To look through websites or files.
  3. Someone who writes computer code.
  4. Protecting computers and data from attacks.
  5. To write words on a keyboard.
  6. To turn off and then back on again.
  7. To add a file to an email.
  8. A place or device that gives Wi-Fi access.
  9. To send a file to the internet.
  10. A portable computer.

21 Clues: A portable computer.To add a file to an email.A small electronic device.To write words on a keyboard.Wireless internet connection.A person who loves technology.To send a file to the internet.Someone who writes computer code.To take a file from the internet.To look through websites or files.A picture of what’s on your screen....

Mr Robot 2022-11-15

Mr Robot crossword puzzle
Across
  1. prevent attacks by blocking malicious traffic
  2. unwanted files or programs that can cause harm to a computer
  3. private information being kept secret
  4. people who seek to exploit weaknesses in software
  5. a set of characters that allows access to a system
  6. software designed to detect and destroy viruses
Down
  1. flaws in software
  2. the art of protecting networks, devices, and data from attacks
  3. type of email use to steal information about you

9 Clues: flaws in softwareprivate information being kept secretprevent attacks by blocking malicious trafficsoftware designed to detect and destroy virusestype of email use to steal information about youpeople who seek to exploit weaknesses in softwarea set of characters that allows access to a system...

CWSI Cyber CrossWord 2025-03-25

CWSI Cyber CrossWord crossword puzzle
Across
  1. Foundation of both cybersecurity and team collaboration
  2. Common attack vector for phishing and scams
  3. What you should never do with suspicious links or attachments
  4. A vulnerability in software waiting to be exploited
  5. Guidelines that govern secure workplace behavior
Down
  1. A physical or digital object used for multi-factor authentication
  2. What hackers see unaware employees as
  3. A potential danger that exploits system vulnerabilities
  4. The chance that a threat will exploit a vulnerability

9 Clues: What hackers see unaware employees asCommon attack vector for phishing and scamsGuidelines that govern secure workplace behaviorA vulnerability in software waiting to be exploitedThe chance that a threat will exploit a vulnerabilityFoundation of both cybersecurity and team collaborationA potential danger that exploits system vulnerabilities...

End Users and Cybersecurity 2023-10-13

End Users and Cybersecurity crossword puzzle
Across
  1. 85% of people posting puppy photos are trying to _____ you
  2. _____ are connected to the internet
  3. ensure that the correct information is relayed to the right destination across the network
  4. _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
  5. network of connections between people, things, data, and processes
  6. shortened URLs
Down
  1. variant of malware
  2. person who uses IT products or services
  3. occurs when an end user receives an illegitimate message or email
  4. providing education to end users can mitigate cybersecurity _____
  5. almost every employee has access to this
  6. help protect your internet connection and privacy online

12 Clues: shortened URLsvariant of malware_____ are connected to the internetperson who uses IT products or servicesalmost every employee has access to thishelp protect your internet connection and privacy online85% of people posting puppy photos are trying to _____ youoccurs when an end user receives an illegitimate message or email...

ch1-2-3 2021-09-25

ch1-2-3 crossword puzzle
Across
  1. quality of dealing with ideas rather than events
  2. malicious software
  3. track online activity and capture data
  4. study of what is right or wrong in human conduct
  5. a way to discover and fix a problem in a system
  6. process to protect individual and organization
Down
  1. the beliefs of the individuals or groups as to what is wrong and right
  2. replicates itself independently in a network
  3. automatically delivers advertisements
  4. holds a computer system captive until payment is made
  5. the degree to which something is able or fit to be used
  6. usually spreads by USB drives, emails or network shares

12 Clues: malicious softwareautomatically delivers advertisementstrack online activity and capture datareplicates itself independently in a networkprocess to protect individual and organizationa way to discover and fix a problem in a systemquality of dealing with ideas rather than eventsstudy of what is right or wrong in human conduct...

Love Data Week Crossword 2025-01-24

Love Data Week Crossword crossword puzzle
Across
  1. Acronym for the Office of the Chief Information Officer
  2. The process of making uniform or homogeneous
  3. Examination of data
  4. GNB’s Chief Information Officer
  5. The protection of computers and networks against unauthorised access and sabotage
Down
  1. Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
  2. VPN’s offering
  3. Info that gives info about other info?
  4. Secrecy and fidelity one cannot break
  5. Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
  6. Unauthorized access to personal information
  7. Perform very well in data analysis?

12 Clues: VPN’s offeringExamination of dataGNB’s Chief Information OfficerPerform very well in data analysis?Secrecy and fidelity one cannot breakInfo that gives info about other info?Unauthorized access to personal informationThe process of making uniform or homogeneousAcronym for the Office of the Chief Information Officer...