cybersecurity Crossword Puzzles
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
Live Dictionary Crossword Day 20 2025-12-11
Across
- When milk is left out for too long it does this
- A large fabric that covers a window or something similar
- Protection from electronic maliciousness
- A father
Down
- Describes something that can be altered easily to its owner’s whim
- An earthy spice eaten whole or ground
- Stop fucking saying them
- A collective of people who share or follow extreme beliefs
8 Clues: A father • Stop fucking saying them • An earthy spice eaten whole or ground • Protection from electronic maliciousness • When milk is left out for too long it does this • A large fabric that covers a window or something similar • A collective of people who share or follow extreme beliefs • Describes something that can be altered easily to its owner’s whim
03 Almer Billie prabawa 2025-10-17
Across
- Memuat ulang halaman web agar tampil terbaru.
- Program untuk mengatur dan mempercepat unduhan file.
- Proses mengubah data agar tidak bisa dibaca orang lain.
- Lembar atau jendela kecil dalam browser untuk membuka situs lain.
- menampilkan gambar atau halaman web di layar.
- Perlindungan sistem komputer dari serangan digital.
Down
- Tempat menulis alamat situs web (URL) di browser.
- Tab baru untuk membuka halaman web lain.
- Memperbarui tampilan halaman yang sedang dibuka.
- Upaya penipuan untuk mencuri data pribadi lewat internet.
10 Clues: Tab baru untuk membuka halaman web lain. • Memuat ulang halaman web agar tampil terbaru. • menampilkan gambar atau halaman web di layar. • Memperbarui tampilan halaman yang sedang dibuka. • Tempat menulis alamat situs web (URL) di browser. • Perlindungan sistem komputer dari serangan digital. • Program untuk mengatur dan mempercepat unduhan file. • ...
MEKATRONIK T3 2024-05-24
Across
- merupakan satu teras utama revolusi industri 4.0
- satu sistem susunan dan sambungan fizikal komponen dalam satu litar
- merupakan contoh bagi sistem kawalan
- LITAR merupakan salah satu aspek penning dalam product mekatronik
- merupakan salah satu ujian kefungsian
- ..........manufacturing Hialeah pembuatan bah mental
Down
- berfungsi membekalkan arus bagi membolehkan peranti berfungsi
- ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
- ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
- jurutera jepun yang memperkenalkan konsep mekatronik
10 Clues: merupakan contoh bagi sistem kawalan • merupakan salah satu ujian kefungsian • merupakan satu teras utama revolusi industri 4.0 • ..........manufacturing Hialeah pembuatan bah mental • jurutera jepun yang memperkenalkan konsep mekatronik • berfungsi membekalkan arus bagi membolehkan peranti berfungsi • ...
Globalization and Technology 2025-02-06
Across
- Transaction on the internet like Amazon Pay, Paypal etc
- A global network the world uses for communications and other features
- A period of hundred years
- A system that gives music and transmits audio
- The act of buying and selling goods
- An Act of introducing new ideas or products
Down
- Process of exchanging Information through any medium
- A simulated experience using computer technology used by headset
- Moving things from one place to another
- Measures taken to protect a computer
10 Clues: A period of hundred years • The act of buying and selling goods • Measures taken to protect a computer • Moving things from one place to another • An Act of introducing new ideas or products • A system that gives music and transmits audio • Process of exchanging Information through any medium • Transaction on the internet like Amazon Pay, Paypal etc • ...
CYBERSECURITY PUZZLE 2023-09-13
7 Clues: Do not visit • Shady..do not click! • Dishonest offer online • Don't ever share this to strangers! • Always change this throughout accounts! • Be careful when doing this on social media! • Publishing someone's private information on the internet
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity crossword 2023-03-17
Across
- Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- Find a synonym of preempt
Down
- What is the naming convention for ecrime category ?
- What is 84 minutes the average time for ?
- What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- Which type of accounts are mainly targeted by adversaries ?
7 Clues: Find a synonym of preempt • What is 84 minutes the average time for ? • What is the naming convention for ecrime category ? • Which type of accounts are mainly targeted by adversaries ? • Which tool can reveal hidden relationships and identify attack paths within an AD environment ? • ...
Cybersecurity Crossword 2022-05-19
Across
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- establishes a secure connection between you and the internet
- the practice of protecting critical systems and sensitive information from digital attacks.
Down
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a standalone malware computer program that replicates itself in order to spread to other computers
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
7 Clues: establishes a secure connection between you and the internet • the practice of protecting critical systems and sensitive information from digital attacks. • a set of instructions, data or programs used to operate computers and execute specific tasks • a standalone malware computer program that replicates itself in order to spread to other computers • ...
Cybersecurity Crossword 2023-11-10
Across
- What type of hacker exploits systems for personal gain and bad intention
- What is used to hide messages so only authorized people can understand?
- What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- Using deceptive measures to manipulate someone in disclosing personal information
- Data, information , device anything that is of value
- Acquiring unauthorized access to system or data
- An incident where attackers steal information without authorization?
7 Clues: Acquiring unauthorized access to system or data • Data, information , device anything that is of value • An incident where attackers steal information without authorization? • What is used to hide messages so only authorized people can understand? • What type of hacker exploits systems for personal gain and bad intention • ...
TEMA 2 2025-10-23
Across
- Mata uang kripto pertama di dunia.
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- Sistem keamanan siber untuk perlindungan data.
- Teknologi dasar dari mata uang kripto.
- Kegiatan ekonomi melalui media internet.
- Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- Aplikasi belanja online yang berwarna oranye.
- Transaksi keuangan melalui jaringan komputer disebut ...
- Sistem pembayaran tanpa uang tunai.
- Bentuk pasar digital tempat jual beli online.
Down
- Mata uang digital yang populer dan terdesentralisasi.
- Perusahaan teknologi keuangan disebut ...
- Mata uang digital resmi dari bank sentral disebut ...
- kredit Alat pembayaran berbentuk kartu dari bank.
- shopping Proses jual beli yang terjadi secara online.
- Teknologi virtual yang berkembang bersama ekonomi digital.
- Metode pembayaran dengan memindai kode.
- Salah satu dompet digital terkenal di Indonesia.
- Salah satu e-wallet milik Gojek.
- banking Layanan bank yang sepenuhnya berbasis internet.
20 Clues: Salah satu e-wallet milik Gojek. • Mata uang kripto pertama di dunia. • Sistem pembayaran tanpa uang tunai. • Teknologi dasar dari mata uang kripto. • Metode pembayaran dengan memindai kode. • Kegiatan ekonomi melalui media internet. • Perusahaan teknologi keuangan disebut ... • Aplikasi belanja online yang berwarna oranye. • Bentuk pasar digital tempat jual beli online. • ...
4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02
Across
- The protection of information and systems from cyberattacks
- A threat originating from within an organization
- The overall protection of computer systems and data
- A weakness in a computer system that can be exploited
- The transfer of information between devices
Down
- The act of stealing or manipulating data
- Unintentional harm caused to data or systems
- A threat originating from the internet
- The practice of illegally gaining access to a computer system
9 Clues: A threat originating from the internet • The act of stealing or manipulating data • The transfer of information between devices • Unintentional harm caused to data or systems • A threat originating from within an organization • The overall protection of computer systems and data • A weakness in a computer system that can be exploited • ...
KeyW Crossword 2017-01-19
Across
- Radio Detection and Ranging
- KeyW non-profit organization abbreviated
- KeyW's colors
- What is the name of our newsletter
- How many bridges connect Key West to Florida main land
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our mascot
- Parrot Ball location
- What color is our KeyW van
- What type of bird is our mascot
Down
- When at work, what must you always carry
- Protection of networks, computers, programs, and data from attack
- KeyW's best location
- Time sheet
- KeyW CEO
- What is the surname of KeyW's founder
- Which food truck offers the best cheese steaks
- Applying statistical analysis to data which has a geographical or spatial aspect
- What month was KeyW founded
- How many buildings does the Severn location have
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • Radio Detection and Ranging • What month was KeyW founded • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07
Across
- Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
- O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
- Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
- Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
- Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
- Dunyodagi eng yirik e-tijorat platformalaridan biri?
- Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
- Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
- Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
- Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
- Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
- Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
- Elektron hukumat tizimi bo‘yicha yetakchi davlat?
- Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
- Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
- Sun’iy intellekt sohasida yetakchi davlatlardan biri?
- Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
- Dunyodagi eng yirik texnologik kompaniyalardan biri?
- O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
- Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?
20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat? • Dunyodagi eng yirik e-tijorat platformalaridan biri? • Dunyodagi eng yirik texnologik kompaniyalardan biri? • Elektron tijorat bo‘yicha yetakchi davlatlardan biri? • Sun’iy intellekt sohasida yetakchi davlatlardan biri? • Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma? • ...
cpsc4240 2024-10-31
Across
- legal license that allows you to use and edit a product
- protecting systems and networks from digital attacks
- type of attack that can be caused by a nuke
- linuxdef
- number that determines process priority
- each one has a unique PID
- leaked the docs
- command to add user
- command to open this user is su
- command to control log settings
- partition that allows for temp storage
- link that points to another file
Down
- only letting users access what they need
- feature that logs metadata
- read write execute
- having many security layers
- system that has both ipv4 and ipv6
- file that discards all data written to it
- type of link that creates a direct copy
- file that stores password hashes
- sets file permission upon create
- process that creates child
- command to run a privileged command
- attaching a filesystem to another
24 Clues: linuxdef • leaked the docs • read write execute • command to add user • each one has a unique PID • feature that logs metadata • having many security layers • process that creates child • command to open this user is su • command to control log settings • file that stores password hashes • sets file permission upon create • link that points to another file • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Risiko ekonomi digital adalah kebocoran
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Fintech merupakan singkatan dari
- → Perusahaan baru yang berbasis teknologi disebut
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Keamanan transaksi online dikenal dengan istilah
- → Masa depan ekonomi digital bergantung pada literasi
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Contoh aplikasi fintech di Indonesia adalah
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
rahef isna 2025-10-27
Across
- → Masa depan ekonomi digital bergantung pada literasi
- → Perusahaan baru yang berbasis teknologi disebut
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → Risiko ekonomi digital adalah kebocoran
- → Berjualan melalui marketplace online termasuk kegiatan
- → Contoh aplikasi fintech di Indonesia adalah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Pemasaran melalui media sosial disebut
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
- → Kecerdasan buatan dikenal juga dengan istilah
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
Cybersecurity Crossword 2021-11-14
Across
- Proving your identity
- Encrypting files and holding them hostage for money
Down
- A horse with a surprise
- software designed to corrupt or steal information
- Pretending to be someone you are not to extract information out of someone
- A denial of service attack targets this
- a brute force attack takes a long time to work on this
7 Clues: Proving your identity • A horse with a surprise • A denial of service attack targets this • software designed to corrupt or steal information • Encrypting files and holding them hostage for money • a brute force attack takes a long time to work on this • Pretending to be someone you are not to extract information out of someone
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crossword 2023-07-25
Across
- Unauthorized individuals gaining physical access through closely following authorized personnel
- A form of business risk resulting from cyberattacks or data breache
Down
- Suspicious emails
- Another word for tailgating
- Unexpected behavior exhibited by software applications, such as crashes could be caused by
- Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
- could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.
7 Clues: Suspicious emails • Another word for tailgating • A form of business risk resulting from cyberattacks or data breache • Unexpected behavior exhibited by software applications, such as crashes could be caused by • Unauthorized individuals gaining physical access through closely following authorized personnel • ...
CyberSecurity Awareness 2025-07-23
7 Clues: Multi-____ Authentication • being hidden from public view • conversion of information to code • "Enter your username and ______." • Security Assurance for the Federal Reserve • security protocols; organized into 'families' • fake correspondence sent by a 'Nigerian Prince'
cruciverba cybersecurity 2025-11-17
Across
- : Copia di sicurezza dei dati
- : Trasformare i dati in codice per proteggerli
- : Chiave segreta per accedere a un account
Down
- : Software dannoso che infetta il computer
- : Tentativo di rubare dati fingendosi qualcuno di fidato via email
- : Protezione che filtra il traffico di rete
- : Rete privata virtuale che protegge la connessione
7 Clues: : Copia di sicurezza dei dati • : Software dannoso che infetta il computer • : Chiave segreta per accedere a un account • : Protezione che filtra il traffico di rete • : Trasformare i dati in codice per proteggerli • : Rete privata virtuale che protegge la connessione • : Tentativo di rubare dati fingendosi qualcuno di fidato via email
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
Digital media literacy 2023-09-14
Across
- a setting you turn on to camouflage yourself from internet scammers
- this is where you install games and streaming services
- a streaming service that is very well known
- people that lure people into giving them there bank details
- a way of protecting you from hackers
Down
- a website in which you order from and it’s delivered to your door
- an answer to all your questions
- watch videos from your favourite content creator
- tweet tweet
- a social media app with a blue logo
- a corporation run by bill gates
- some the would be powered by electricity
12 Clues: tweet tweet • an answer to all your questions • a corporation run by bill gates • a social media app with a blue logo • a way of protecting you from hackers • some the would be powered by electricity • a streaming service that is very well known • watch videos from your favourite content creator • this is where you install games and streaming services • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
TDD 2023-09-19
Across
- Think before you _____.
- One of the common internet search engine used nowadays.
- Do not share your account ______ to anyone.
- We should avoid sharing any _______ news without validating the sources.
- #1 popular social media. CEO – Mark Zuckerberg
Down
- ______ has been recognized as Cybersecurity awareness month.
- One of Amcor values.
- _______ make human sick as well as computer.
- Operating System
- Short form of wireless network.
- ____ your laptop when you are stepping away. You need a key to unlock it.
- They are referred as small insects in mother nature. IT referred them as errors in computer program/system.
12 Clues: Operating System • One of Amcor values. • Think before you _____. • Short form of wireless network. • Do not share your account ______ to anyone. • _______ make human sick as well as computer. • #1 popular social media. CEO – Mark Zuckerberg • One of the common internet search engine used nowadays. • ______ has been recognized as Cybersecurity awareness month. • ...
internet safety 2023-04-19
Across
- a part of a computer system or network which is designed to block unwanted access
- like a cold for your computer
- the state of being protected against the criminal use of electronic data
- bulling done over the internet
- a person or thing that hacks
- a world wide computer network
- websites and apps that let users create and share content EX.Snapchat
Down
- a piece of information needed to log in to the internet
- the state of being free from public attention
- be careful what you make public
- information made available by a website
- facts given to learn about someone or something
12 Clues: a person or thing that hacks • like a cold for your computer • a world wide computer network • bulling done over the internet • be careful what you make public • information made available by a website • the state of being free from public attention • facts given to learn about someone or something • a piece of information needed to log in to the internet • ...
Quality Month Quiz 2022-11-04
Across
- a type of cybersecurity attack that attempts to steal your information
- Plays A VITAL ROLE IN YOUR APPRAISAL
- Skill / Knowledge to do a process
- Property of accuracy and completeness
- are implemented to mitigate the identified risks
- Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
- Tailgating is also termed as
- Portrays the hierarchy in organisation / function
- plan to achieve a long-term or overall objective
- Non-fulfilment of a requirement
- A weakness of an asset or control that could potentially be exploited by one or more threats
- How many Quality Management Principle in QMS
12 Clues: Tailgating is also termed as • Non-fulfilment of a requirement • Skill / Knowledge to do a process • Plays A VITAL ROLE IN YOUR APPRAISAL • Property of accuracy and completeness • How many Quality Management Principle in QMS • plan to achieve a long-term or overall objective • are implemented to mitigate the identified risks • ...
Tech Talks: Crossword Edition 2025-08-28
Across
- Structured support to help startups develop and scale
- Field involving the design and creation of automated machines
- Protecting systems and networks from digital threats
- Using fingerprints, facial recognition, or voice for authentication
- Technology that uses living organisms or cells to develop products
Down
- Testing environment for disruptive technologies
- Raising capital from the public to fund innovation projects
- High-risk funding enabling tech companies to grow rapidly
- Collaborative network of startups, funders, and enablers driving innovation
- MOSTI platform certifying local R&D products for procurement
- Tech innovation transforming financial services
- Unmanned aerial vehicle used in delivery, agriculture, and surveillance
12 Clues: Testing environment for disruptive technologies • Tech innovation transforming financial services • Protecting systems and networks from digital threats • Structured support to help startups develop and scale • High-risk funding enabling tech companies to grow rapidly • Raising capital from the public to fund innovation projects • ...
Queenbee Cybersecurity 2025-03-17
Across
- An hacker sends a ___________ email requesting the victim for sensitive information
- A _________ access by a third party is called a cyber attack
- Trojan is an example of __________ attack
Down
- Users need to use unique __________ passwords to strengthen defence against attacks
- ________ are dummy computers systems to deceive attackers
- A virtual wall between the computer and the internet is called as _______
- A person who performs a cybersecurity attack is called a _______
7 Clues: Trojan is an example of __________ attack • ________ are dummy computers systems to deceive attackers • A _________ access by a third party is called a cyber attack • A person who performs a cybersecurity attack is called a _______ • A virtual wall between the computer and the internet is called as _______ • ...
Zero-Trust 2025-07-23
Across
- Zero Trust eliminates ___ ports to reduce attack surface.
- – Zero Trust enforces least ___ access to minimize risk.
- Every session in a Zero Trust model must be fully ___.
- OT compliance standard Secomea adheres to (abbr.).
- A secure remote access company built for OT.
- Traffic allowed in Zero Trust: ___-only.
Down
- Access should only be granted when it is scheduled and ___.
- – What Zero Trust replaces: ___ perimeter security.
- All users and devices must be continuously ___.
- European directive Secomea helps manufacturers comply with (abbr.).
- This cybersecurity model assumes no inherent trust: Zero ___.
11 Clues: Traffic allowed in Zero Trust: ___-only. • A secure remote access company built for OT. • All users and devices must be continuously ___. • OT compliance standard Secomea adheres to (abbr.). • – What Zero Trust replaces: ___ perimeter security. • Every session in a Zero Trust model must be fully ___. • – Zero Trust enforces least ___ access to minimize risk. • ...
AI Lesson 2023-03-06
Across
- A type of machine learning that is modeled after the structure and function of the human brain
- data __________
- e.g. Siri, Alexa
- using machines to perform tasks that are normally done by humans
- e.g. fingerprints, facial recognition software
- the design, construction, operation and use of robots
- AI that learns about knowledge that humans know naturally
Down
- using firewalls and antivirus software to prevent computers from being attacked
- using large datasets to find patterns and insights
- AI that learns and improves from experience by itself
- a household that uses internet-connected devices to control appliances
- feeling/emotion
- a set of instructions that complete a task
13 Clues: data __________ • feeling/emotion • e.g. Siri, Alexa • a set of instructions that complete a task • e.g. fingerprints, facial recognition software • using large datasets to find patterns and insights • AI that learns and improves from experience by itself • the design, construction, operation and use of robots • AI that learns about knowledge that humans know naturally • ...
Digital Technology 2025-04-26
Across
- After the pandemic, ____became normal in many industries.
- _____ is common in car manufacturing factories today.
- _____ forces companies to rethink their strategies.
- _____ helps doctors detect diseases earlier.
- Some companies practice _____ to hire cheaper labor abroad.
- A ____must find new clients to stay successful.
- A _____ usually needs to innovate to survive against big companies.
Down
- _____ experts are essential to protect sensitive company information.
- Many small businesses survive thanks to ____ platforms.
- With _____ , you can visit a museum without leaving your house.
- ____ reduces the need for repetitive human tasks.
- _____ helps banks process transactions faster and more securely.
- Laws about the _____ aim to prevent employee burnout.
13 Clues: _____ helps doctors detect diseases earlier. • A ____must find new clients to stay successful. • ____ reduces the need for repetitive human tasks. • _____ forces companies to rethink their strategies. • _____ is common in car manufacturing factories today. • Laws about the _____ aim to prevent employee burnout. • ...
Service Desk 2026 POPIA Awareness Crossword Puzzle 2026-03-03
Across
- when logging a hornbill task, what is a unique user identifier that is mandatory?
- A single click can expose ___ information, resulting in a POPIA breach.
- Quick ___ helps limit exposure of personal data
- Personal information must not be accessed by ___ persons.
- Treat all user data as strictly confidential
Down
- Every agent is responsible for following ___ best practices
- Lock your ____ when you leave it
- Store ____ securely and dispose of them properly
- use ___ tools to communicate
- Must be strong & unique
10 Clues: Must be strong & unique • use ___ tools to communicate • Lock your ____ when you leave it • Treat all user data as strictly confidential • Quick ___ helps limit exposure of personal data • Store ____ securely and dispose of them properly • Personal information must not be accessed by ___ persons. • Every agent is responsible for following ___ best practices • ...
Aniya’s cybersecurity crossword puzzle 2026-04-01
Across
- – Gains unauthorized access
- – Malware disguised as safe software
- – Verifies identity
- – Secretly collects user data
- – Protects a network from threats
- – Malware that spreads by attaching to files
- – Harmful software
Down
- – Connected computers
- – Secret code to access accounts
- – Turns data into code
- – Shows unwanted ads
- – Locks files and demands payment
- – Tricks users into giving information
- – Malware that spreads without user action
- – Detects and removes malware
15 Clues: – Harmful software • – Verifies identity • – Shows unwanted ads • – Connected computers • – Turns data into code • – Gains unauthorized access • – Secretly collects user data • – Detects and removes malware • – Secret code to access accounts • – Locks files and demands payment • – Protects a network from threats • – Malware disguised as safe software • ...
Zine Crossword 2022-04-16
Across
- Considered to be the first hacker
- The website on which anonymous would plan their attacks
- The film that produced the famous hacking mask
Down
- The protection of information on the internet
- One of the colors of the three types of hackers
- The headwear associated with hacking
- A form of harm done on the internet
- Famous hacking group
8 Clues: Famous hacking group • Considered to be the first hacker • A form of harm done on the internet • The headwear associated with hacking • The protection of information on the internet • The film that produced the famous hacking mask • One of the colors of the three types of hackers • The website on which anonymous would plan their attacks
soujanya hazra 2025-06-19
Across
- Designed to protect network
- Illegal entry into a computer system or network.
- the process of 'befriending' children on social media.
- Hoaxing or misleading.
- It is an act of harming or harassing using information technology in a deliberate manner
Down
- Vital Information Resources Under Seize
- Any criminal activity intended to harm anyone using the computer.
- They do Cybercrime.
8 Clues: They do Cybercrime. • Hoaxing or misleading. • Designed to protect network • Vital Information Resources Under Seize • Illegal entry into a computer system or network. • the process of 'befriending' children on social media. • Any criminal activity intended to harm anyone using the computer. • ...
INFORMATION GOVERNANCE SUMMER FUN 2017-08-08
Across
- Coming soon,in May 2018!
- New term under GDPR
- Increasing threat for us all
- Have you filled the new role required under GDPR?
- Process which becomes a legal requirement under GDPR
Down
- Part of important review by NDG 2016
- Mustn't forget this important law for patients
- What could happen to to you in 2018 if you steal personal data
- Part of revised definition for sensitive personal data under GDPR
9 Clues: New term under GDPR • Coming soon,in May 2018! • Increasing threat for us all • Part of important review by NDG 2016 • Mustn't forget this important law for patients • Have you filled the new role required under GDPR? • Process which becomes a legal requirement under GDPR • What could happen to to you in 2018 if you steal personal data • ...
Science and Technology 2025-02-11
Across
- A computer-generated simulation of a three-dimensional environment
- The application of scientific knowledge for practical purposes
- The branch of technology dealing with robots
- Related to genes and heredity
- Avoiding depletion of natural resources for long-term balance
Down
- Information processed or stored by a computer (
- The use of technology to complete tasks with minimal human input
- Protection against cyber threats and attacks
- A new idea or method
9 Clues: A new idea or method • Related to genes and heredity • Protection against cyber threats and attacks • The branch of technology dealing with robots • Information processed or stored by a computer ( • Avoiding depletion of natural resources for long-term balance • The application of scientific knowledge for practical purposes • ...
HACKING TERMS 2023-11-13
Across
- Software designed to harm or exploit computer systems
- A deliberate attempt to exploit computer systems or networks.
- A reward offered for discovering and reporting software bugs
- A secret word or phrase used for authentication.
- A series of instructions for a computer to execute.
- Protective measures against digital threats
Down
- Ethical hackers working to improve security
- The right to keep personal information and activities confidential.
- A weakness or flaw in a system that can be exploited.
- The process of converting information into a code for security.
10 Clues: Ethical hackers working to improve security • Protective measures against digital threats • A secret word or phrase used for authentication. • A series of instructions for a computer to execute. • Software designed to harm or exploit computer systems • A weakness or flaw in a system that can be exploited. • ...
Tech Terms 2023-12-01
Across
- - Software for accessing and navigating the internet. (7)
- - Step-by-step procedure for solving a problem. (8)
- Reality - Computer-generated environment that simulates reality. (13)
- - Secret code to access a protected system. (8)
- - Transfer files from the internet to a computer. (8)
Down
- - Measures to protect computer systems from theft or damage. (12)
- - Security system that prevents unauthorized access. (8)
- - Process of converting data into a code to secure it. (10)
- - Portable device with touchscreen features. (10)
- - Writing instructions for a computer program. (6)
10 Clues: - Secret code to access a protected system. (8) • - Portable device with touchscreen features. (10) • - Writing instructions for a computer program. (6) • - Step-by-step procedure for solving a problem. (8) • - Transfer files from the internet to a computer. (8) • - Security system that prevents unauthorized access. (8) • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Lapisan OSI ke 3
- topologi jaringan berbentuk bintang
- Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
- Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
- salah satu prinsip keamanan jaringan
Down
- mekanisme pertukaran data
- kegiatan tata kelola data
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Salah satu macam jenis jaringan komputer
10 Clues: Lapisan OSI ke 3 • mekanisme pertukaran data • kegiatan tata kelola data • topologi jaringan berbentuk bintang • salah satu prinsip keamanan jaringan • Salah satu macam jenis jaringan komputer • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet) • ...
RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26
Across
- Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
- Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
- Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
- Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
- Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
- MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
- IoT ATAMASINING MA'NOSI
- To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
- Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
- DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI
10 Clues: IoT ATAMASINING MA'NOSI • Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni. • MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA • To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi. • Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon. • Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita. • ...
CODING VOCABULARY 2023-02-03
Across
- NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
- ANY CHARACTER OR OBJECT USED IN BLOCK CODING
- A FREE PROGRAMMING LANGUAGE
- MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
- ASKING IF A CONDITION IS MET
- SET OF LOGICAL STEPS CARRIED OUT IN ORDER
- OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
- FINDING WEAKNESSES IN DIGITAL DEVICES
- IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
- PROTECTING SENSITIVE DIGITAL INFORMATION
- TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
- MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
- DATA ENTERED BY A USER
- INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
- NAMES USED TO HOLD ONE OR MORE VALUES
- THE WAY SOMETHING IS WRITTEN
16 Clues: DATA ENTERED BY A USER • A FREE PROGRAMMING LANGUAGE • ASKING IF A CONDITION IS MET • THE WAY SOMETHING IS WRITTEN • NAMES USED TO HOLD ONE OR MORE VALUES • FINDING WEAKNESSES IN DIGITAL DEVICES • PROTECTING SENSITIVE DIGITAL INFORMATION • SET OF LOGICAL STEPS CARRIED OUT IN ORDER • ANY CHARACTER OR OBJECT USED IN BLOCK CODING • INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Techniques 2024-11-06
Across
- A protocol designed to provide privacy and security over the internet by encapsulating traffic
- The latest security protocol for Wi-Fi, enhancing protections against attacks.
- An advanced Linux technology used for monitoring and packet observability in real-time.
- A term related to busting common misconceptions in the open and secure cyberspace.
Down
- Data collected from devices or systems for monitoring and analysis, used in intelligent security
- Malicious software designed to infiltrate or damage computer systems.
- The practice of collecting, analyzing, and preserving digital evidence.
7 Clues: Malicious software designed to infiltrate or damage computer systems. • The practice of collecting, analyzing, and preserving digital evidence. • The latest security protocol for Wi-Fi, enhancing protections against attacks. • A term related to busting common misconceptions in the open and secure cyberspace. • ...
Advance CTE Career Clusters 2026-03-23
Across
- Moving goods and people globally via air, land, or sea.
- Focuses on wellness, medicine, and community care.
- Managing travel, dining, and large gatherings.
- Careers in banking, insurance, and money management.
- Focuses on agriscience, food systems, and cultivation.
Down
- Careers in teaching and training from early childhood to adulthood.
- Connecting customers to products through promotion and branding.
- The cluster for AI, cybersecurity, and data analytics.
- Uses robotics and AI to improve production and engineering.
- Includes first responders, law, and government roles.
- Creative roles in fashion, film, and visual arts.
- Leading businesses or starting your own company.
- Managing utilities, fuels, and environmental preservation.
- Designing, planning, and building our physical environment.
14 Clues: Managing travel, dining, and large gatherings. • Leading businesses or starting your own company. • Creative roles in fashion, film, and visual arts. • Focuses on wellness, medicine, and community care. • Careers in banking, insurance, and money management. • Includes first responders, law, and government roles. • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Month Crossword 2023-09-18
Across
- A security process that requires users to provide two different authentication factors before gaining access.
- Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- The process of examining network traffic to identify anomalies and potential security threats.
- Software designed to detect, prevent, and remove malicious software from a computer or network.
- A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.
15 Clues: The process of examining network traffic to identify anomalies and potential security threats. • Software designed to detect, prevent, and remove malicious software from a computer or network. • The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality. • ...
Technological Impacts on Business & Commerce 2023-05-03
Across
- Radio Frequency Identification
- Global Positioning System
- A type of social media used by many businesses
- An immersive, interactive, computer-generated experience
- A type of mobile technology
- A common type of online payment system.
- Bullying someone online
- Technologies that require little to no human involvement to operate
- Computers that mimic human cognitive abilities
Down
- Customizing goods or services to consumers needs and preferences
- Safeguarding computer systems and networks
- The network of real-world things that exchange data form one another
- The network of businesses involved in product distribution
- Natural Language Processing
- The exchange of goods and services electronically
- Providing for the needs of this generation without compromising the needs for future generations
- A type of skill that is essential for ICT.
17 Clues: Bullying someone online • Global Positioning System • Natural Language Processing • A type of mobile technology • Radio Frequency Identification • A common type of online payment system. • Safeguarding computer systems and networks • A type of skill that is essential for ICT. • A type of social media used by many businesses • Computers that mimic human cognitive abilities • ...
Education 2025-08-08
Across
- – Not just a name —where finance meets fun.
- – GBS emphasises this as one of the USP
- — Once a GBS student, always one—albeit slightly sarcastic.
- - Easy Lunch between ____
- – Period during which a student can cancel without tuition penalty
- – rewards that help students
- – Framework applied across GBS’s regulatory documents
- – Core value in GBS’s mission to create an inclusive environment
- – Central theme in GBS’s policies on personal data handling
Down
- — Where students start, and strong futures build.
- – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
- — The _____ that whispers, ‘Look at me, I promise futures!
- – Keeping hackers’ fingers off your grades.
- – Referring to NSS scores.
- – Online events offering insight into GBS programs
- – Where silence studies hard
- – Studying trips without leaving the campus
17 Clues: - Easy Lunch between ____ • – Referring to NSS scores. • – rewards that help students • – Where silence studies hard • – GBS emphasises this as one of the USP • – Keeping hackers’ fingers off your grades. • – Not just a name —where finance meets fun. • – Studying trips without leaving the campus • — Where students start, and strong futures build. • ...
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Knowledge Exchange Christmas Quiz 2023-12-05
7 Clues: Santa's helpers. • Guides Santas Sleigh • Last IT Tuesday topic • The Snowman with a corncob pipe and button nose. • At Savannah, we have a culture of continuous .... • Intranet location to learn more about IT initiatives. • The Centre of is where you can find further information on continuous improvement
KeyW Crossword 2017-01-19
Across
- What is the name of our mascot
- Parrot Ball location
- KeyW's colors
- What month was KeyW founded
- What color is our KeyW van
- KeyW's best location
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- Applying statistical analysis to data which has a geographical or spatial aspect
- Time sheet
- What type of bird is our mascot
- Which food truck offers the best cheese steaks
Down
- What is the surname of KeyW's founder
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our newsletter
- Radio Detection and Ranging
- How many miles connect Key West to Florida main land
- KeyW non-profit organization abbreviated
- KeyW CEO
- When at work, what must you always carry
20 Clues: KeyW CEO • Time sheet • KeyW's colors • Parrot Ball location • KeyW's best location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • KeyW non-profit organization abbreviated • ...
Wedding 2024-06-08
Across
- What Stacey used to refer Michael to when they first started dating
- Where did Michael and Stacey meet
- Michael’s birthday month
- Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
- The number of years the couple is together
- Honeymoon destination
- Their favourite season
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- What the groom has for breakfast everyday
- Michael’s job industry
- Number of their siblings all together
- Stacey’s favourite food (hint: ask father of bride)
- Michael’s middle name
- Who’s the better cook
Down
- Mr & Mrs _____
- City where Michael was born
- Michael’s favourite drink
- Where did Michael propose
- Brand of Michael’s car
- Flavour of the wedding cake
- Stacey’s birthday month
- Favourite AFL team (hint: ask Best Man)
- Stacey’s best friend
- How long has Stacey been in Australia for
- The age gap between the bride and the groom
25 Clues: Mr & Mrs _____ • Stacey’s best friend • Honeymoon destination • Michael’s middle name • Who’s the better cook • Brand of Michael’s car • Their favourite season • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Michael’s favourite drink • Where did Michael propose • City where Michael was born • Flavour of the wedding cake • Where did Michael and Stacey meet • ...
Crosswords 2024-07-16
Across
- plan for successful digital transformation
- immediate data analysis
- large sets of data analyzed for insights
- combining data from different sources
- management of the flow of goods and services
- successful digital use by employees
- system that integrates various business processes
- virtual model of a physical object or system
- protection in digital business environments
- network of interconnected devices
- system for managing customer relationships
- accuracy and reliability of data
Down
- digital change impacting business processes
- redesigning business processes for improvement
- use of technology to perform tasks
- analysis of data for business insights
- based ERP solutions
- process of adopting ERP systems
- technology enhancing supply chain transparency
- integration of artificial intelligence in business
- isolated data storage within an organization
- improved by ERP systems
- analytics for customer engagement
- considerations in using AI and big data
- user experience in digital product design
25 Clues: based ERP solutions • immediate data analysis • improved by ERP systems • process of adopting ERP systems • accuracy and reliability of data • analytics for customer engagement • network of interconnected devices • use of technology to perform tasks • successful digital use by employees • combining data from different sources • analysis of data for business insights • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
Maura & Spencer 2023-05-19
Across
- Spencer's favorite basketball player
- Where they moved after college
- The name of their cat
- Favorite "Fast Food"
- Brides Favorite Alcoholic Drink
- Spencer's Favorite Hobby
- Where did Maura & Spencer travel to this year
- Who gave out their phone number first?
- Where do they live
- Maura and Spencers First Born
- Maura's favorite Disney Movie
- How many years will they be together in September?
- Maura's middle name
- Maura's Job
Down
- Maura's Favorite Color
- What social media platform did Spencer use to slide in Maura's DM's
- Where did Maura go after DC
- Maura's Favorite Hobby
- Where Maura and Spencer met
- Where did Spencer propose?
- Spencer's Favorite Color
- What month did they get engaged
- The last addition to Maura & Spencers family
- Grooms Favorite Alcoholic Drink
- Spencers Job
- What was Maura's sport growing up
- Spencer's middle name
27 Clues: Maura's Job • Spencers Job • Where do they live • Maura's middle name • Favorite "Fast Food" • The name of their cat • Spencer's middle name • Maura's Favorite Color • Maura's Favorite Hobby • Spencer's Favorite Color • Spencer's Favorite Hobby • Where did Spencer propose? • Where did Maura go after DC • Where Maura and Spencer met • Maura and Spencers First Born • ...
Lushi and John 2025-02-22
Across
- Lushi's favorite alcoholic beverage
- First date restaurant
- John’s middle name
- Lushi’s favorite dessert
- John’s go-to drink
- Lushi’s favorite color
- Lushi’s favorite holiday
- John’s work industry
- City where they met
- Total number of their dogs
- Lushi’s favorite snack to make
- Month of their engagement
- Total countries visited together
- John’s favorite music band
- Favorite shared activity
Down
- Lushi’s favorite cuisine
- John’s hometown
- John’s favorite food
- University John attended
- Their dream honeymoon destination
- First international trip destination
- Who is older between them
- Place where John proposed
- Lushi’s favorite board game
- how John likes his coffee
- Lushi’s favorite time of year
- City they live in
- Lushi’s mom’s employer
- Name of their corgi
- Month of dating anniversary
- John’s favorite video game
- Color of John’s eyes
32 Clues: John’s hometown • City they live in • John’s middle name • John’s go-to drink • City where they met • Name of their corgi • John’s favorite food • John’s work industry • Color of John’s eyes • First date restaurant • Lushi’s favorite color • Lushi’s mom’s employer • Lushi’s favorite cuisine • University John attended • Lushi’s favorite dessert • Lushi’s favorite holiday • ...
TTS INFORMATIKA 2025-04-14
Across
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Penipuan online melalui email atau situs palsu.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Teknik mengakses sistem tanpa otorisasi.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Kata sandi dalam sistem keamanan.
- Jenis virus komputer
Down
- Program pengintai aktivitas pengguna tanpa izin.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Aksi mencari celah dalam sistem komputer.
- Istilah lain untuk keamanan jaringan
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Penyerang digital yang memiliki tujuan jahat.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Istilah lain untuk keamanan jaringan
- Penipuan online melalui email atau situs palsu.
- Penyerang digital yang memiliki tujuan jahat.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Aksi mencari celah dalam sistem komputer.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Sistem keamanan biometrik yang menggunakan sidik jari.
Down
- Proses identifikasi atau verifikasi pengguna
- Sandi digital yang dipakai untuk keamanan transaksi.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Teknik mengakses sistem tanpa otorisasi.
- Program pengintai aktivitas pengguna tanpa izin.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Jenis virus komputer
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Kata sandi dalam sistem keamanan.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS_EvandaDandy_14xh 2025-04-15
Across
- Orang yang membuat desain antarmuka.
- HAKI singkatan dari...?
- Lembaga yang mengurus HAKI di Indonesia.
- Menyebarkan konten ke publik secara digital disebut?
- Hak yang melindungi karya cipta.
- Simbol yang digunakan untuk pencarian kata bebas.
- Profesi yang membuat aplikasi disebut?
- Platform berbagi video populer.
- Informasi palsu di internet disebut?
- PENGELOLA sistem jaringan.
Down
- Proses membuat konten disebut?
- Proses memeriksa kebenaran konten disebut?
- Kata kunci yang digunakan untuk mengabaikan kata tertentu.
- Salah satu bentuk HAKI untuk brand dagang.
- Elemen tradisional dalam konten digital disebut unsur...?
- Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
- yang menganalisis data.
- Simbol untuk laporan konten di media sosial.
- Ahli keamanan siber disebut...?
- Contoh media digital untuk menyebarkan budaya.
- Sistem otomatis untuk menyaring konten.
- Mesin pencari paling populer.
- Konten berbahaya disebut konten...?
- Simbol untuk mencari sinonim kata (gunakan ~).
- Hak eksklusif atas penemuan teknologi.
25 Clues: yang menganalisis data. • HAKI singkatan dari...? • Mesin pencari paling populer. • Platform berbagi video populer. • Proses membuat konten disebut? • Hak yang melindungi karya cipta. • PENGELOLA sistem jaringan. • Simbol untuk mencari sinonim kata (gunakan ~). • Simbol yang digunakan untuk pencarian kata bebas. • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
IT Terminology 2025-05-15
Across
- Distributed ledger technology with cryptographic linking.
- Using scripts or software to perform tasks without manual input.
- Project management method using small, iterative steps.
- Open-source operating system with many distributions.
- Network of malware-infected devices controlled remotely.
- Practice of protecting digital assets from threats.
- Converting data into unreadable code for protection.
- Flooding a network with traffic to disrupt service.
- A sequence of instructions used in software tasks.
- Low-level code interacting directly with hardware.
- On-demand delivery of IT resources over the internet.
- Malware that demands payment to unlock encrypted data.
Down
- Computers mimicking human cognitive functions.
- Professional who interprets data to help decision-making.
- Wireless technology for short-distance device communication.
- Numeric label identifying devices on a network.
- Loss of signal strength in networking cables.
- Attempt to infiltrate digital systems maliciously.
- Developer who creates the visual interface of websites.
- Temporary storage for fast data retrieval.
20 Clues: Temporary storage for fast data retrieval. • Loss of signal strength in networking cables. • Computers mimicking human cognitive functions. • Numeric label identifying devices on a network. • Attempt to infiltrate digital systems maliciously. • A sequence of instructions used in software tasks. • Low-level code interacting directly with hardware. • ...
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Perusahaan baru yang berbasis teknologi disebut
- → Kecerdasan buatan dikenal juga dengan istilah
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pemasaran melalui media sosial disebut
- → Contoh aplikasi fintech di Indonesia adalah
Down
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Berjualan melalui marketplace online termasuk kegiatan
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masa depan ekonomi digital bergantung pada literasi
- → Risiko ekonomi digital adalah kebocoran
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 2025-10-27
Across
- Tokopedia dan Shopee termasuk jenis platform ini.
- Teknologi penyimpanan data berbasis internet.
- Proses jual beli melalui internet.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Proses promosi produk melalui media sosial.
- Salah satu contoh dompet digital di Indonesia.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Singkatan dari Financial Technology.
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Media sosial yang sering digunakan untuk promosi produk.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Pihak yang menjual barang atau jasa di internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
TEMA 2: EKONOMI DIGITAL 2025-10-23
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
test 2022-07-15
Across
- Music festival they attended -
- Michael proposed in ___ beach -
- European country michael lived in -
- How they met
- On the way to Big Sur they stopped at an ___ farm -
- Day of the week they attend life group -
- City of the music festival they attended -
- Basketball team michael supports -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Month they met -
- City they took their engagement photos -
- Sauce michael hates -
Down
- State michael was raised in -
- Industry sammi works in -
- Sammis favorite flowers -
- Sammis bridal shower was a ___ party -
- Brand of sammi’s car -
- Type of dance sammi did growing up -
- Destination of first plane ride together -
- Type of engineer Michael is -
- Year they met -
- Color of michaels bathroom before they painted it -
- Location of their first post together on IG -
- Engagement ring shape -
25 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
Cisco 2022-11-30
Across
- intentional tampering
- machine within a machine
- machine for printing text onto paper
- information non-consensually given to the public
- something on many screens
- output device that displays images
- place of sale
- official procedure
- common handheld device
- faster protocol
- thick rope of wire
- putting something into another forcefully
- an autonomous device
- device that often works with mice
- IO device that displays images
- IO device for computer
Down
- negative or not good
- our fearless leader
- slower protocol
- protection of systems
- to engineer
- company
- can be divided into vlans
- attack strategy
- connects networks
- our country
- a form of social engineering
- something often worn by humans
- IO device for computers
- a type of robot
- encoded message
- device
- aspect of human lift
- a type of person
34 Clues: device • company • to engineer • our country • place of sale • slower protocol • attack strategy • faster protocol • a type of robot • encoded message • a type of person • connects networks • official procedure • thick rope of wire • our fearless leader • negative or not good • an autonomous device • aspect of human lift • intentional tampering • protection of systems • common handheld device • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
NEWSLETTER 2023-11-13
Across
- The activity, you do to get to places.
- Another word for young people....
- Ghana’s Winter.
- I want for Christmas is......
- The invisible line that divides the earth into two equal parts.
- Picture on social media.
- Your identity summarized onto one thing.
- Plans for the New Year.
- Program used to harm computers.
- Color associated with the New Year.
- MIDG end-of-year package for employees.
- Popular hangout zone in Accra.
- ....is responsible for the safety and manner on the internet and other connection.
Down
- Merry Christmas
- Baby Crocodile
- .....is the most showed movie during Christmas movie in Ghana.
- Margins ID Group is made up of four....
- .... flies when you’re having fun.
- Sits atop the Christmas tree.
- Pronto’s location.
- A machine that can be used to write, connect to the writer, the internet and play games.
- Identity theft is an example of...
- A letter sent on the internet.
- What makes you, you.
24 Clues: Baby Crocodile • Merry Christmas • Ghana’s Winter. • Pronto’s location. • What makes you, you. • Plans for the New Year. • Picture on social media. • I want for Christmas is...... • Sits atop the Christmas tree. • A letter sent on the internet. • Popular hangout zone in Accra. • Program used to harm computers. • Another word for young people.... • .... flies when you’re having fun. • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
Tugas Daring Yesika Intan Aurelia 2025-04-24
Across
- UI designer merancang tampilan?
- menyebarluaskan konten digital disebut?
- Hoaks termasuk dalam konten?
- Salah satu platform berbagi konten tulisan adalah?
- Orang yang merancang sistem jaringan komputer disebut?
- Search engine menggunakan apa untuk mengindeks data?
- HAKI melindungi karya cipta agar tidak?
- Profesi yang menjaga keamanan data disebut?
- Data analyst bertugas menganalisis?
- Salah satu situs validasi fakta di Indonesia adalah?
- YouTube digunakan untuk menyebarkan konten berupa?
- Fungsi utama search engine adalah untuk?
Down
- Validasi konten bisa dilakukan dengan cara?
- Algoritma pada search engine membantu menentukan?
- Konten digital bisa berupa teks, gambar, video, dan ?
- Contoh selain Google adalah?
- Programmer bertugas membuat?
- Hak cipta diberikan kepada?
- Konten negatif dapat berdampak pada?
- Mesin pencari paling populer saat ini adalah?
- HAKI meliputi hak cipta dan?
- Contoh karya yang dilindungi HAKI adalah?
- Ciri konten valid adalah mencantumkan?
- Pelanggaran HAKI dapat dikenai?
- Software pengolah gambar adalah?
25 Clues: Hak cipta diberikan kepada? • Contoh selain Google adalah? • Hoaks termasuk dalam konten? • Programmer bertugas membuat? • HAKI meliputi hak cipta dan? • UI designer merancang tampilan? • Pelanggaran HAKI dapat dikenai? • Software pengolah gambar adalah? • Data analyst bertugas menganalisis? • Konten negatif dapat berdampak pada? • Ciri konten valid adalah mencantumkan? • ...
New Pork Rinds Crossword Puzzle 2025-08-20
Across
- Called
- Quinoa, for example
- The coolest person ever
- Strange
- Escape from prison
- Disney dragon sidekick
- Best when solving a crossword puzzle
- A certain town clerk always says, "You're so ___."
- One may fall asleep at work if they have it
- Sinatra or hot dog
- Sport considered America's Greatest Pasttime
- Slang for guitar
- Children's bathtub toy
- Inspirational words
- Athletes who like to club
Down
- been hacked, Message concerning cybersecurity
- Outdated childish insult
- Roundabout
- frequent party guest
- "Your room is a ____"
- Tip over
- Amount that you can order in
- "___ goes his name-o"
- Before "Engine" and after "Top"
- cartoon bear who favors honey
- Super
- powerful wizard
- Gymnastics movement or secure storage
- Fried chicken state, in short
- "Broaden your ____"
- Assumes
- Pull aggressively
- Sun movement
- Pokemon trainer
34 Clues: Super • Called • Strange • Assumes • Tip over • Roundabout • Sun movement • powerful wizard • Pokemon trainer • Slang for guitar • Pull aggressively • Escape from prison • Sinatra or hot dog • Quinoa, for example • "Broaden your ____" • Inspirational words • frequent party guest • "Your room is a ____" • "___ goes his name-o" • Disney dragon sidekick • Children's bathtub toy • The coolest person ever • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Contoh aplikasi fintech di Indonesia adalah
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Perusahaan baru yang berbasis teknologi disebut
- → Masa depan ekonomi digital bergantung pada literasi
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Fintech merupakan singkatan dari
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Keamanan transaksi online dikenal dengan istilah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Risiko ekonomi digital adalah kebocoran
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
TEMA 02 : EKONOMI DIGITAL 2025-10-23
Across
- Proses promosi produk melalui media sosial.
- Media sosial yang sering digunakan untuk promosi produk.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Pihak yang menjual barang atau jasa di internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Teknologi penyimpanan data berbasis internet.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Singkatan dari Financial Technology.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Salah satu contoh dompet digital di Indonesia.
- Proses jual beli melalui internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
WORDS IN EAGLE 101 2025-10-07
Across
- An e-cigarette.
- Someone who is outgoing and willing to work in a group.
- Coloring or listening to music for a reset.
- We watch them every Friday to keep things on the happy side of life.
- A timer race Mr. Rieck uses.
- Can happen to the lungs of people who smoke.
- The things you feel on the inside(Joy, sad,ect.)
- A motivational speaker.
Down
- Drug Abuse Resistance Education
- Drugs such as vapes that have flavor.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- Security on electronic devices.
- A movie we watched in Eagle 101.
- An opioid and drug that messes with your body.
- The act of having a bond with another person.
- To stand up to something you believe in.
- A type of drug.
- A fear of something (Mr. Rieck's is 67)
- Mr. Rieck's favorite sports team.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Drug Abuse Resistance Education • Security on electronic devices. • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
KeyW Crossword 2017-01-18
Across
- When at work, what must you always carry
- Applying statistical analysis to data which has a geographical or spatial aspect
- KeyW non-profit organization abbreviated
- KeyW's best location
- What is the name of our newsletter
- KeyW CEO
- Time sheet
- What is the surname of KeyW's founder
- What type of bird is our mascot
Down
- KeyW's colors
- What month was KeyW founded
- What is the name of our mascot
- Radio Detection and Ranging
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- Parrot Ball location
- How many miles connect Key West to Florida main land
- Which food truck offers the best cheese steaks
- What color is our KeyW van
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
science-and-technology 2 2023-11-25
Across
- Device that speeds up charged particles.
- The path of an object around a celestial body.
- Managing temperature and weather conditions.
- Computer-generated simulation of a three-dimensional environment.
- Design and construction of new biological parts.
- Device that converts hydrogen into electricity.
- Study of ionized gases (plasma).
Down
- Protection of computer systems from theft or damage.
- Altering genes in an organism's DNA.
- Relating to electric and magnetic fields.
- Elementary particle and a fundamental constituent of matter.
- Study of extremely low temperatures.
- Manipulation of matter on a molecular or atomic scale.
- Electromagnetic radiation with longer wavelengths than visible light.
- Long-term alteration in Earth's climate.
- Small rocky object orbiting the sun.
- Application of biological principles to medicine.
- Programs and applications for computers.
- Thread-like structure of DNA in the nucleus.
- Ability of machines to learn from data.
20 Clues: Study of ionized gases (plasma). • Altering genes in an organism's DNA. • Study of extremely low temperatures. • Small rocky object orbiting the sun. • Ability of machines to learn from data. • Device that speeds up charged particles. • Long-term alteration in Earth's climate. • Programs and applications for computers. • Relating to electric and magnetic fields. • ...
Words In Eagle 101 I Learned 2025-10-07
Across
- Drug Abuse Resistance Education
- To stand up to something you believe in.
- Can happen to the lungs of people who smoke.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- An e-cigarette.
- The things you feel on the inside(Joy, sad,ect.)
- Mr. Rieck's favorite sports team.
- The act of having a bond with another person.
- A movie we watched in Eagle 101.
Down
- Security on electronic devices.
- We watch them every Friday to keep things on the happy side of life.
- An opioid and drug that messes with your body.
- Coloring or listening to music for a reset.
- A motivational speaker.
- A timer race Mr. Rieck uses.
- A fear of something (Mr. Rieck's is 67)
- Drugs such as vapes that have flavor.
- A type of drug.
- Someone who is outgoing and willing to work in a group.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Security on electronic devices. • Drug Abuse Resistance Education • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
TECHNOLOGY 2026-02-26
Across
- Secret word used for security
- Software designed to damage or disrupt systems
- Tool to store and generate secure passwords
- Digital elements added to the real world
- Someone who gains unauthorized access to systems
- Physical parts of a computer
- Protecting networks, devices, and data from attacks
- Extremely large datasets analyzed for trends
- Converting information into a secret code
- To get a file from the internet
- Data left behind when using technology
- Delivering video or audio content online
- Computer-generated 3D environment
Down
- To send a file to the internet
- Storing and accessing data online
- A machine for processing information
- Used to type on a computer
- Programs used on a computer
- Global system connecting computers
- Machines or programs that simulate human thinking
- Mobile device for calls and apps
- Software for smartphones or tablets
- A machine programmed to perform tasks
- Security system that controls network traffic
24 Clues: Used to type on a computer • Programs used on a computer • Physical parts of a computer • Secret word used for security • To send a file to the internet • To get a file from the internet • Mobile device for calls and apps • Storing and accessing data online • Computer-generated 3D environment • Global system connecting computers • Software for smartphones or tablets • ...
Technology Crossword 2024-05-29
Across
- AI
- a computer that works like a human brain
- a form of a monitarilly valuable item
- Something that is a threat to us non physically
- this is a watch or VR headset
- Something that can be invaded
- an orbit of artifical stars in a pattern
- a form of tourism that is very expensive and not many have a chance to go.
- Exploring the largest part of earth
- Advanced Computing
Down
- Finger print or face id
- a form of engineering
- A form of travel out of this world
- Threat of Unemployment
- Analysis of data
- Something seen as a toy for some but fly
- having people colonize a close planet
- Something almost everyone uses
- many people have these devices
- a way of making sure that you get what you need to get well
20 Clues: AI • Analysis of data • Advanced Computing • a form of engineering • Threat of Unemployment • Finger print or face id • this is a watch or VR headset • Something that can be invaded • Something almost everyone uses • many people have these devices • A form of travel out of this world • Exploring the largest part of earth • a form of a monitarilly valuable item • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS 2025-04-15
Across
- Perlindungan hukum untuk identitas produk
- Scientist Analis data untuk pengambilan keputusan
- Perundungan melalui media digital
- Simbol penanda pencarian fleksibel pada mesin pencari
- Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
- Platform berbagi video terbesar di dunia
- Cipta Perlindungan hukum untuk karya kreatif
- Kebencian Ungkapan yang menghina dan merendahkan
- Simbol pengurang kata kunci dalam pencarian
- Penulis kode program komputer
- Platform berbagi foto dan video populer
- Lembaga pemerintah pengelola HAKI
Down
- Buatan" Penulisan untuk pencarian frasa spesifik
- Ideologi yang menganjurkan kekerasan
- Digital Pedoman moral dalam pembuatan konten digital
- Developer Pengembang dan pengelola situs web
- Analyst Pakar keamanan sistem komputer
- Budaya Tujuan penyebaran konten budaya
- Konten seksual yang eksplisit
- Informasi palsu yang tersebar luas
- Jaipong Contoh konten budaya Sunda di media digital
- Perlindungan hukum untuk inovasi
- Designer Perancang antarmuka pengguna
- Singkatan dari Hak Kekayaan Intelektual
- Operator logika untuk pencarian gabungan kata kunci
25 Clues: Konten seksual yang eksplisit • Penulis kode program komputer • Perlindungan hukum untuk inovasi • Perundungan melalui media digital • Lembaga pemerintah pengelola HAKI • Informasi palsu yang tersebar luas • Ideologi yang menganjurkan kekerasan • Designer Perancang antarmuka pengguna • Analyst Pakar keamanan sistem komputer • Budaya Tujuan penyebaran konten budaya • ...
Technology vocabulary 2025-09-03
Across
- Virtual reality, a 3D digital world.
- An electronic machine that processes information.
- Technology you can put on your body.
- A person who loves technology.
- To bring software to the newest version.
- Computers that can act and “think” like humans.
- A program used on a phone or computer.
- A small electronic device.
- A screen you can control by touching.
- To take a file from the internet.
- Wireless internet connection.
Down
- A picture of what’s on your screen.
- To look through websites or files.
- Someone who writes computer code.
- Protecting computers and data from attacks.
- To write words on a keyboard.
- To turn off and then back on again.
- To add a file to an email.
- A place or device that gives Wi-Fi access.
- To send a file to the internet.
- A portable computer.
21 Clues: A portable computer. • To add a file to an email. • A small electronic device. • To write words on a keyboard. • Wireless internet connection. • A person who loves technology. • To send a file to the internet. • Someone who writes computer code. • To take a file from the internet. • To look through websites or files. • A picture of what’s on your screen. • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
CWSI Cyber CrossWord 2025-03-25
Across
- Foundation of both cybersecurity and team collaboration
- Common attack vector for phishing and scams
- What you should never do with suspicious links or attachments
- A vulnerability in software waiting to be exploited
- Guidelines that govern secure workplace behavior
Down
- A physical or digital object used for multi-factor authentication
- What hackers see unaware employees as
- A potential danger that exploits system vulnerabilities
- The chance that a threat will exploit a vulnerability
9 Clues: What hackers see unaware employees as • Common attack vector for phishing and scams • Guidelines that govern secure workplace behavior • A vulnerability in software waiting to be exploited • The chance that a threat will exploit a vulnerability • Foundation of both cybersecurity and team collaboration • A potential danger that exploits system vulnerabilities • ...
End Users and Cybersecurity 2023-10-13
Across
- 85% of people posting puppy photos are trying to _____ you
- _____ are connected to the internet
- ensure that the correct information is relayed to the right destination across the network
- _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
- network of connections between people, things, data, and processes
- shortened URLs
Down
- variant of malware
- person who uses IT products or services
- occurs when an end user receives an illegitimate message or email
- providing education to end users can mitigate cybersecurity _____
- almost every employee has access to this
- help protect your internet connection and privacy online
12 Clues: shortened URLs • variant of malware • _____ are connected to the internet • person who uses IT products or services • almost every employee has access to this • help protect your internet connection and privacy online • 85% of people posting puppy photos are trying to _____ you • occurs when an end user receives an illegitimate message or email • ...
ch1-2-3 2021-09-25
Across
- quality of dealing with ideas rather than events
- malicious software
- track online activity and capture data
- study of what is right or wrong in human conduct
- a way to discover and fix a problem in a system
- process to protect individual and organization
Down
- the beliefs of the individuals or groups as to what is wrong and right
- replicates itself independently in a network
- automatically delivers advertisements
- holds a computer system captive until payment is made
- the degree to which something is able or fit to be used
- usually spreads by USB drives, emails or network shares
12 Clues: malicious software • automatically delivers advertisements • track online activity and capture data • replicates itself independently in a network • process to protect individual and organization • a way to discover and fix a problem in a system • quality of dealing with ideas rather than events • study of what is right or wrong in human conduct • ...
Love Data Week Crossword 2025-01-24
Across
- Acronym for the Office of the Chief Information Officer
- The process of making uniform or homogeneous
- Examination of data
- GNB’s Chief Information Officer
- The protection of computers and networks against unauthorised access and sabotage
Down
- Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
- VPN’s offering
- Info that gives info about other info?
- Secrecy and fidelity one cannot break
- Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
- Unauthorized access to personal information
- Perform very well in data analysis?
12 Clues: VPN’s offering • Examination of data • GNB’s Chief Information Officer • Perform very well in data analysis? • Secrecy and fidelity one cannot break • Info that gives info about other info? • Unauthorized access to personal information • The process of making uniform or homogeneous • Acronym for the Office of the Chief Information Officer • ...
