cybersecurity Crossword Puzzles

TEMA 2: EKONOMI DIGITAL 2025-10-23

TEMA 2: EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

KeyW Crossword 2017-01-18

KeyW Crossword crossword puzzle
Across
  1. When at work, what must you always carry
  2. Applying statistical analysis to data which has a geographical or spatial aspect
  3. KeyW non-profit organization abbreviated
  4. KeyW's best location
  5. What is the name of our newsletter
  6. KeyW CEO
  7. Time sheet
  8. What is the surname of KeyW's founder
  9. What type of bird is our mascot
Down
  1. KeyW's colors
  2. What month was KeyW founded
  3. What is the name of our mascot
  4. Radio Detection and Ranging
  5. How many buildings does the Severn location have
  6. Protection of networks, computers, programs, and data from attack
  7. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  8. Parrot Ball location
  9. How many miles connect Key West to Florida main land
  10. Which food truck offers the best cheese steaks
  11. What color is our KeyW van

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

science-and-technology 2 2023-11-25

science-and-technology 2 crossword puzzle
Across
  1. Device that speeds up charged particles.
  2. The path of an object around a celestial body.
  3. Managing temperature and weather conditions.
  4. Computer-generated simulation of a three-dimensional environment.
  5. Design and construction of new biological parts.
  6. Device that converts hydrogen into electricity.
  7. Study of ionized gases (plasma).
Down
  1. Protection of computer systems from theft or damage.
  2. Altering genes in an organism's DNA.
  3. Relating to electric and magnetic fields.
  4. Elementary particle and a fundamental constituent of matter.
  5. Study of extremely low temperatures.
  6. Manipulation of matter on a molecular or atomic scale.
  7. Electromagnetic radiation with longer wavelengths than visible light.
  8. Long-term alteration in Earth's climate.
  9. Small rocky object orbiting the sun.
  10. Application of biological principles to medicine.
  11. Programs and applications for computers.
  12. Thread-like structure of DNA in the nucleus.
  13. Ability of machines to learn from data.

20 Clues: Study of ionized gases (plasma).Altering genes in an organism's DNA.Study of extremely low temperatures.Small rocky object orbiting the sun.Ability of machines to learn from data.Device that speeds up charged particles.Long-term alteration in Earth's climate.Programs and applications for computers.Relating to electric and magnetic fields....

Technology Crossword 2024-05-29

Technology Crossword crossword puzzle
Across
  1. AI
  2. a computer that works like a human brain
  3. a form of a monitarilly valuable item
  4. Something that is a threat to us non physically
  5. this is a watch or VR headset
  6. Something that can be invaded
  7. an orbit of artifical stars in a pattern
  8. a form of tourism that is very expensive and not many have a chance to go.
  9. Exploring the largest part of earth
  10. Advanced Computing
Down
  1. Finger print or face id
  2. a form of engineering
  3. A form of travel out of this world
  4. Threat of Unemployment
  5. Analysis of data
  6. Something seen as a toy for some but fly
  7. having people colonize a close planet
  8. Something almost everyone uses
  9. many people have these devices
  10. a way of making sure that you get what you need to get well

20 Clues: AIAnalysis of dataAdvanced Computinga form of engineeringThreat of UnemploymentFinger print or face idthis is a watch or VR headsetSomething that can be invadedSomething almost everyone usesmany people have these devicesA form of travel out of this worldExploring the largest part of eartha form of a monitarilly valuable item...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS 2025-04-15

TTS crossword puzzle
Across
  1. Perlindungan hukum untuk identitas produk
  2. Scientist Analis data untuk pengambilan keputusan
  3. Perundungan melalui media digital
  4. Simbol penanda pencarian fleksibel pada mesin pencari
  5. Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
  6. Platform berbagi video terbesar di dunia
  7. Cipta Perlindungan hukum untuk karya kreatif
  8. Kebencian Ungkapan yang menghina dan merendahkan
  9. Simbol pengurang kata kunci dalam pencarian
  10. Penulis kode program komputer
  11. Platform berbagi foto dan video populer
  12. Lembaga pemerintah pengelola HAKI
Down
  1. Buatan" Penulisan untuk pencarian frasa spesifik
  2. Ideologi yang menganjurkan kekerasan
  3. Digital Pedoman moral dalam pembuatan konten digital
  4. Developer Pengembang dan pengelola situs web
  5. Analyst Pakar keamanan sistem komputer
  6. Budaya Tujuan penyebaran konten budaya
  7. Konten seksual yang eksplisit
  8. Informasi palsu yang tersebar luas
  9. Jaipong Contoh konten budaya Sunda di media digital
  10. Perlindungan hukum untuk inovasi
  11. Designer Perancang antarmuka pengguna
  12. Singkatan dari Hak Kekayaan Intelektual
  13. Operator logika untuk pencarian gabungan kata kunci

25 Clues: Konten seksual yang eksplisitPenulis kode program komputerPerlindungan hukum untuk inovasiPerundungan melalui media digitalLembaga pemerintah pengelola HAKIInformasi palsu yang tersebar luasIdeologi yang menganjurkan kekerasanDesigner Perancang antarmuka penggunaAnalyst Pakar keamanan sistem komputerBudaya Tujuan penyebaran konten budaya...

Technology vocabulary 2025-09-03

Technology vocabulary crossword puzzle
Across
  1. Virtual reality, a 3D digital world.
  2. An electronic machine that processes information.
  3. Technology you can put on your body.
  4. A person who loves technology.
  5. To bring software to the newest version.
  6. Computers that can act and “think” like humans.
  7. A program used on a phone or computer.
  8. A small electronic device.
  9. A screen you can control by touching.
  10. To take a file from the internet.
  11. Wireless internet connection.
Down
  1. A picture of what’s on your screen.
  2. To look through websites or files.
  3. Someone who writes computer code.
  4. Protecting computers and data from attacks.
  5. To write words on a keyboard.
  6. To turn off and then back on again.
  7. To add a file to an email.
  8. A place or device that gives Wi-Fi access.
  9. To send a file to the internet.
  10. A portable computer.

21 Clues: A portable computer.To add a file to an email.A small electronic device.To write words on a keyboard.Wireless internet connection.A person who loves technology.To send a file to the internet.Someone who writes computer code.To take a file from the internet.To look through websites or files.A picture of what’s on your screen....

Words In Eagle 101 I Learned 2025-10-07

Words In Eagle 101 I Learned crossword puzzle
Across
  1. Drug Abuse Resistance Education
  2. To stand up to something you believe in.
  3. Can happen to the lungs of people who smoke.
  4. Stress or worriness. A type of emotion.
  5. How to be a good citizen on the internet.
  6. An e-cigarette.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. Mr. Rieck's favorite sports team.
  9. The act of having a bond with another person.
  10. A movie we watched in Eagle 101.
Down
  1. Security on electronic devices.
  2. We watch them every Friday to keep things on the happy side of life.
  3. An opioid and drug that messes with your body.
  4. Coloring or listening to music for a reset.
  5. A motivational speaker.
  6. A timer race Mr. Rieck uses.
  7. A fear of something (Mr. Rieck's is 67)
  8. Drugs such as vapes that have flavor.
  9. A type of drug.
  10. Someone who is outgoing and willing to work in a group.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Security on electronic devices.Drug Abuse Resistance EducationA movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

test 2022-07-15

test crossword puzzle
Across
  1. Music festival they attended -
  2. Michael proposed in ___ beach -
  3. European country michael lived in -
  4. How they met
  5. On the way to Big Sur they stopped at an ___ farm -
  6. Day of the week they attend life group -
  7. City of the music festival they attended -
  8. Basketball team michael supports -
  9. Sammi’s side hustle -
  10. How we are honoring sammis dad at the wedding -
  11. Month they met -
  12. City they took their engagement photos -
  13. Sauce michael hates -
Down
  1. State michael was raised in -
  2. Industry sammi works in -
  3. Sammis favorite flowers -
  4. Sammis bridal shower was a ___ party -
  5. Brand of sammi’s car -
  6. Type of dance sammi did growing up -
  7. Destination of first plane ride together -
  8. Type of engineer Michael is -
  9. Year they met -
  10. Color of michaels bathroom before they painted it -
  11. Location of their first post together on IG -
  12. Engagement ring shape -

25 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

Cisco 2022-11-30

Cisco crossword puzzle
Across
  1. intentional tampering
  2. machine within a machine
  3. machine for printing text onto paper
  4. information non-consensually given to the public
  5. something on many screens
  6. output device that displays images
  7. place of sale
  8. official procedure
  9. common handheld device
  10. faster protocol
  11. thick rope of wire
  12. putting something into another forcefully
  13. an autonomous device
  14. device that often works with mice
  15. IO device that displays images
  16. IO device for computer
Down
  1. negative or not good
  2. our fearless leader
  3. slower protocol
  4. protection of systems
  5. to engineer
  6. company
  7. can be divided into vlans
  8. attack strategy
  9. connects networks
  10. our country
  11. a form of social engineering
  12. something often worn by humans
  13. IO device for computers
  14. a type of robot
  15. encoded message
  16. device
  17. aspect of human lift
  18. a type of person

34 Clues: devicecompanyto engineerour countryplace of saleslower protocolattack strategyfaster protocola type of robotencoded messagea type of personconnects networksofficial procedurethick rope of wireour fearless leadernegative or not goodan autonomous deviceaspect of human liftintentional tamperingprotection of systemscommon handheld device...

Crossword Puzzle 2023-12-12

Crossword Puzzle crossword puzzle
Across
  1. Coordinated anti-terrorism effort
  2. Diplomatic negotiation process
  3. Mutual defense pact
  4. Emotional response to stress or danger
  5. Country with aggressive territorial claims in the West Philippine Sea
  6. Protection against cyber threats
  7. Manipulation of information to influence opinions
  8. Policies aimed at reducing gender-based disparities
  9. Targeting of adversary's decision-making processes
  10. Island in the West Philippine Sea claimed by multiple countries
  11. Localized peace talks with insurgent groups
Down
  1. Common mental health condition characterized by persistent sadness
  2. Act of risking one's life to save others
  3. Joint military exercises
  4. Replacement of old weaponry with newer, more advanced systems
  5. Primary fighter aircraft used by the Air Force
  6. Country's plan for protecting itself from external threats
  7. Large warship equipped for open-sea combat
  8. Strategy to address the root causes of insurgency
  9. International court ruling on the West Philippine Sea dispute
  10. Declaration of the government to end insurgency

21 Clues: Mutual defense pactJoint military exercisesDiplomatic negotiation processProtection against cyber threatsCoordinated anti-terrorism effortEmotional response to stress or dangerAct of risking one's life to save othersLarge warship equipped for open-sea combatLocalized peace talks with insurgent groupsPrimary fighter aircraft used by the Air Force...

NEWSLETTER 2023-11-13

NEWSLETTER crossword puzzle
Across
  1. The activity, you do to get to places.
  2. Another word for young people....
  3. Ghana’s Winter.
  4. I want for Christmas is......
  5. The invisible line that divides the earth into two equal parts.
  6. Picture on social media.
  7. Your identity summarized onto one thing.
  8. Plans for the New Year.
  9. Program used to harm computers.
  10. Color associated with the New Year.
  11. MIDG end-of-year package for employees.
  12. Popular hangout zone in Accra.
  13. ....is responsible for the safety and manner on the internet and other connection.
Down
  1. Merry Christmas
  2. Baby Crocodile
  3. .....is the most showed movie during Christmas movie in Ghana.
  4. Margins ID Group is made up of four....
  5. .... flies when you’re having fun.
  6. Sits atop the Christmas tree.
  7. Pronto’s location.
  8. A machine that can be used to write, connect to the writer, the internet and play games.
  9. Identity theft is an example of...
  10. A letter sent on the internet.
  11. What makes you, you.

24 Clues: Baby CrocodileMerry ChristmasGhana’s Winter.Pronto’s location.What makes you, you.Plans for the New Year.Picture on social media.I want for Christmas is......Sits atop the Christmas tree.A letter sent on the internet.Popular hangout zone in Accra.Program used to harm computers.Another word for young people........ flies when you’re having fun....

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

Tugas Daring Yesika Intan Aurelia 2025-04-24

Tugas Daring Yesika Intan Aurelia crossword puzzle
Across
  1. UI designer merancang tampilan?
  2. menyebarluaskan konten digital disebut?
  3. Hoaks termasuk dalam konten?
  4. Salah satu platform berbagi konten tulisan adalah?
  5. Orang yang merancang sistem jaringan komputer disebut?
  6. Search engine menggunakan apa untuk mengindeks data?
  7. HAKI melindungi karya cipta agar tidak?
  8. Profesi yang menjaga keamanan data disebut?
  9. Data analyst bertugas menganalisis?
  10. Salah satu situs validasi fakta di Indonesia adalah?
  11. YouTube digunakan untuk menyebarkan konten berupa?
  12. Fungsi utama search engine adalah untuk?
Down
  1. Validasi konten bisa dilakukan dengan cara?
  2. Algoritma pada search engine membantu menentukan?
  3. Konten digital bisa berupa teks, gambar, video, dan ?
  4. Contoh selain Google adalah?
  5. Programmer bertugas membuat?
  6. Hak cipta diberikan kepada?
  7. Konten negatif dapat berdampak pada?
  8. Mesin pencari paling populer saat ini adalah?
  9. HAKI meliputi hak cipta dan?
  10. Contoh karya yang dilindungi HAKI adalah?
  11. Ciri konten valid adalah mencantumkan?
  12. Pelanggaran HAKI dapat dikenai?
  13. Software pengolah gambar adalah?

25 Clues: Hak cipta diberikan kepada?Contoh selain Google adalah?Hoaks termasuk dalam konten?Programmer bertugas membuat?HAKI meliputi hak cipta dan?UI designer merancang tampilan?Pelanggaran HAKI dapat dikenai?Software pengolah gambar adalah?Data analyst bertugas menganalisis?Konten negatif dapat berdampak pada?Ciri konten valid adalah mencantumkan?...

New Pork Rinds Crossword Puzzle 2025-08-20

New Pork Rinds Crossword Puzzle crossword puzzle
Across
  1. Called
  2. Quinoa, for example
  3. The coolest person ever
  4. Strange
  5. Escape from prison
  6. Disney dragon sidekick
  7. Best when solving a crossword puzzle
  8. A certain town clerk always says, "You're so ___."
  9. One may fall asleep at work if they have it
  10. Sinatra or hot dog
  11. Sport considered America's Greatest Pasttime
  12. Slang for guitar
  13. Children's bathtub toy
  14. Inspirational words
  15. Athletes who like to club
Down
  1. been hacked, Message concerning cybersecurity
  2. Outdated childish insult
  3. Roundabout
  4. frequent party guest
  5. "Your room is a ____"
  6. Tip over
  7. Amount that you can order in
  8. "___ goes his name-o"
  9. Before "Engine" and after "Top"
  10. cartoon bear who favors honey
  11. Super
  12. powerful wizard
  13. Gymnastics movement or secure storage
  14. Fried chicken state, in short
  15. "Broaden your ____"
  16. Assumes
  17. Pull aggressively
  18. Sun movement
  19. Pokemon trainer

34 Clues: SuperCalledStrangeAssumesTip overRoundaboutSun movementpowerful wizardPokemon trainerSlang for guitarPull aggressivelyEscape from prisonSinatra or hot dogQuinoa, for example"Broaden your ____"Inspirational wordsfrequent party guest"Your room is a ____""___ goes his name-o"Disney dragon sidekickChildren's bathtub toyThe coolest person ever...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  2. → Contoh aplikasi fintech di Indonesia adalah
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  6. → Perusahaan baru yang berbasis teknologi disebut
  7. → Masa depan ekonomi digital bergantung pada literasi
  8. → Pemasaran melalui media sosial disebut
  9. → Berjualan melalui marketplace online termasuk kegiatan
  10. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Fintech merupakan singkatan dari
  2. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  3. → Kecerdasan buatan dikenal juga dengan istilah
  4. → Transaksi keuangan secara online disebut
  5. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  6. → Keamanan transaksi online dikenal dengan istilah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Risiko ekonomi digital adalah kebocoran
  9. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  10. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27

TEMA 2 PERKEMBANGAN EKONOMI DIGITAL crossword puzzle
Across
  1. Istilah lain dari pembayaran tanpa uang tunai.
  2. Sistem keamanan digital yang digunakan untuk melindungi data.
  3. Mata uang digital yang tidak diatur oleh bank sentral.
  4. Sistem ekonomi yang berbasis pada teknologi dan internet.
  5. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Salah satu contoh dompet digital di Indonesia.
  8. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  9. Media sosial yang sering digunakan untuk promosi produk.
  10. Proses promosi produk melalui media sosial.
Down
  1. Pihak yang menjual barang atau jasa di internet.
  2. Tokopedia dan Shopee termasuk jenis platform ini.
  3. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
  4. Istilah untuk kegiatan belajar atau kursus secara online.
  5. Proses jual beli melalui internet.
  6. Singkatan dari Financial Technology.
  7. Teknologi penyimpanan data berbasis internet.
  8. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  9. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  10. Tempat di mana penjual dan pembeli bertemu secara online.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Istilah lain dari pembayaran tanpa uang tunai.Salah satu contoh dompet digital di Indonesia.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

TEMA 02 : EKONOMI DIGITAL 2025-10-23

TEMA 02 : EKONOMI DIGITAL crossword puzzle
Across
  1. Proses promosi produk melalui media sosial.
  2. Media sosial yang sering digunakan untuk promosi produk.
  3. Sistem keamanan digital yang digunakan untuk melindungi data.
  4. Pihak yang menjual barang atau jasa di internet.
  5. Platform pemerintah untuk mendukung transaksi digital di Indonesia.
  6. Data besar yang digunakan untuk menganalisis perilaku konsumen.
  7. Teknologi penyimpanan data berbasis internet.
  8. Istilah untuk kegiatan belajar atau kursus secara online.
  9. Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
  10. Istilah lain dari pembayaran tanpa uang tunai.
Down
  1. Sistem ekonomi yang berbasis pada teknologi dan internet.
  2. Singkatan dari Financial Technology.
  3. Tokopedia dan Shopee termasuk jenis platform ini.
  4. Mata uang digital yang tidak diatur oleh bank sentral.
  5. Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
  6. Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
  7. Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
  8. Tempat di mana penjual dan pembeli bertemu secara online.
  9. Salah satu contoh dompet digital di Indonesia.
  10. Proses jual beli melalui internet.

20 Clues: Proses jual beli melalui internet.Singkatan dari Financial Technology.Proses promosi produk melalui media sosial.Teknologi penyimpanan data berbasis internet.Salah satu contoh dompet digital di Indonesia.Istilah lain dari pembayaran tanpa uang tunai.Pihak yang menjual barang atau jasa di internet.Tokopedia dan Shopee termasuk jenis platform ini....

WORDS IN EAGLE 101 2025-10-07

WORDS IN EAGLE 101 crossword puzzle
Across
  1. An e-cigarette.
  2. Someone who is outgoing and willing to work in a group.
  3. Coloring or listening to music for a reset.
  4. We watch them every Friday to keep things on the happy side of life.
  5. A timer race Mr. Rieck uses.
  6. Can happen to the lungs of people who smoke.
  7. The things you feel on the inside(Joy, sad,ect.)
  8. A motivational speaker.
Down
  1. Drug Abuse Resistance Education
  2. Drugs such as vapes that have flavor.
  3. Stress or worriness. A type of emotion.
  4. How to be a good citizen on the internet.
  5. Security on electronic devices.
  6. A movie we watched in Eagle 101.
  7. An opioid and drug that messes with your body.
  8. The act of having a bond with another person.
  9. To stand up to something you believe in.
  10. A type of drug.
  11. A fear of something (Mr. Rieck's is 67)
  12. Mr. Rieck's favorite sports team.

20 Clues: An e-cigarette.A type of drug.A motivational speaker.A timer race Mr. Rieck uses.Drug Abuse Resistance EducationSecurity on electronic devices.A movie we watched in Eagle 101.Mr. Rieck's favorite sports team.Drugs such as vapes that have flavor.Stress or worriness. A type of emotion.A fear of something (Mr. Rieck's is 67)...

Mr Robot 2022-11-15

Mr Robot crossword puzzle
Across
  1. prevent attacks by blocking malicious traffic
  2. unwanted files or programs that can cause harm to a computer
  3. private information being kept secret
  4. people who seek to exploit weaknesses in software
  5. a set of characters that allows access to a system
  6. software designed to detect and destroy viruses
Down
  1. flaws in software
  2. the art of protecting networks, devices, and data from attacks
  3. type of email use to steal information about you

9 Clues: flaws in softwareprivate information being kept secretprevent attacks by blocking malicious trafficsoftware designed to detect and destroy virusestype of email use to steal information about youpeople who seek to exploit weaknesses in softwarea set of characters that allows access to a system...

CWSI Cyber CrossWord 2025-03-25

CWSI Cyber CrossWord crossword puzzle
Across
  1. Foundation of both cybersecurity and team collaboration
  2. Common attack vector for phishing and scams
  3. What you should never do with suspicious links or attachments
  4. A vulnerability in software waiting to be exploited
  5. Guidelines that govern secure workplace behavior
Down
  1. A physical or digital object used for multi-factor authentication
  2. What hackers see unaware employees as
  3. A potential danger that exploits system vulnerabilities
  4. The chance that a threat will exploit a vulnerability

9 Clues: What hackers see unaware employees asCommon attack vector for phishing and scamsGuidelines that govern secure workplace behaviorA vulnerability in software waiting to be exploitedThe chance that a threat will exploit a vulnerabilityFoundation of both cybersecurity and team collaborationA potential danger that exploits system vulnerabilities...

End Users and Cybersecurity 2023-10-13

End Users and Cybersecurity crossword puzzle
Across
  1. 85% of people posting puppy photos are trying to _____ you
  2. _____ are connected to the internet
  3. ensure that the correct information is relayed to the right destination across the network
  4. _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
  5. network of connections between people, things, data, and processes
  6. shortened URLs
Down
  1. variant of malware
  2. person who uses IT products or services
  3. occurs when an end user receives an illegitimate message or email
  4. providing education to end users can mitigate cybersecurity _____
  5. almost every employee has access to this
  6. help protect your internet connection and privacy online

12 Clues: shortened URLsvariant of malware_____ are connected to the internetperson who uses IT products or servicesalmost every employee has access to thishelp protect your internet connection and privacy online85% of people posting puppy photos are trying to _____ youoccurs when an end user receives an illegitimate message or email...

Compliance Week - Day 1 Puzzle 2022-10-09

Compliance Week - Day 1 Puzzle crossword puzzle
Across
  1. Intimidation of an individual after reporting an allegation of misconduct.
  2. When PHI is exposed, a _______ of the patient's privacy has been committed.
  3. Never share your ________ with anyone.
  4. The ____ is an anonymous way to report a compliance concern. (707.825.1027)
  5. Health insurance portability & accountability act.
Down
  1. Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
  2. Computer security
  3. It is our job to _______ our clients health record.
  4. Verify this for every client every time (3 words)
  5. An official inspection of an individual's or organization's accounts.
  6. Protected health information.

11 Clues: Computer securityProtected health information.Never share your ________ with anyone.Verify this for every client every time (3 words)Health insurance portability & accountability act.It is our job to _______ our clients health record.An official inspection of an individual's or organization's accounts....

1 2025-05-22

1 crossword puzzle
Across
  1. – A program or practical use of something in real life
  2. – Something given in recognition of excellence or achievement
  3. – Something given or added to help achieve a goal
  4. – A result gained by effort or skill
Down
  1. – Protection of computer systems and networks from attacks
  2. – The use or study of computers and technology
  3. – An area of study, activity, or interest
  4. – A fundamental element or basis of something
  5. – The strong effect or influence of something
  6. – A reward given to someone for winning or achieving something
  7. – An organized collection of information stored electronically
  8. – Something handed down from the past

12 Clues: – A result gained by effort or skill– Something handed down from the past– An area of study, activity, or interest– A fundamental element or basis of something– The strong effect or influence of something– The use or study of computers and technology– Something given or added to help achieve a goal...

ch1-2-3 2021-09-25

ch1-2-3 crossword puzzle
Across
  1. quality of dealing with ideas rather than events
  2. malicious software
  3. track online activity and capture data
  4. study of what is right or wrong in human conduct
  5. a way to discover and fix a problem in a system
  6. process to protect individual and organization
Down
  1. the beliefs of the individuals or groups as to what is wrong and right
  2. replicates itself independently in a network
  3. automatically delivers advertisements
  4. holds a computer system captive until payment is made
  5. the degree to which something is able or fit to be used
  6. usually spreads by USB drives, emails or network shares

12 Clues: malicious softwareautomatically delivers advertisementstrack online activity and capture datareplicates itself independently in a networkprocess to protect individual and organizationa way to discover and fix a problem in a systemquality of dealing with ideas rather than eventsstudy of what is right or wrong in human conduct...

Love Data Week Crossword 2025-01-24

Love Data Week Crossword crossword puzzle
Across
  1. Acronym for the Office of the Chief Information Officer
  2. The process of making uniform or homogeneous
  3. Examination of data
  4. GNB’s Chief Information Officer
  5. The protection of computers and networks against unauthorised access and sabotage
Down
  1. Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
  2. VPN’s offering
  3. Info that gives info about other info?
  4. Secrecy and fidelity one cannot break
  5. Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
  6. Unauthorized access to personal information
  7. Perform very well in data analysis?

12 Clues: VPN’s offeringExamination of dataGNB’s Chief Information OfficerPerform very well in data analysis?Secrecy and fidelity one cannot breakInfo that gives info about other info?Unauthorized access to personal informationThe process of making uniform or homogeneousAcronym for the Office of the Chief Information Officer...

Shifting Security 2026-02-19

Shifting Security crossword puzzle
Across
  1. The school the introduced the theory of securitization
  2. Realism is centered on territoy soverignity and ___ defense
  3. Security is not only about real world but includes the internet
  4. A form of security that does not focus on people but the society (climate change).
  5. The theory for traditional security
Down
  1. Conveys the notion that security is more than just state but should involve individuals
  2. Means continously changing
  3. The question that we are presenting on.
  4. Traditional security is _______
  5. The persons who stated that security must cross multiple sector
  6. Defined the concept of human security
  7. Security shifted from traditional to ______________

12 Clues: Means continously changingTraditional security is _______The theory for traditional securityDefined the concept of human securityThe question that we are presenting on.Security shifted from traditional to ______________The school the introduced the theory of securitizationRealism is centered on territoy soverignity and ___ defense...

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
  2. fundamental component of ipsec virtual private networks (vpn).
  3. actual barriers deployed to prevent direct contact with systems.
  4. way to store and transmit data so only the intended recipient can read or process it.
  5. to encrypt and decrypt messages.
  6. has a fixed block size of 128, 192 or 256 bits.
  7. use one key to encrypt data and a different key to decrypt data.
  8. implementing cryptography into a web browser.
  9. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
  1. hardware and software solutions used to manage access resources and systems.
  2. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
  3. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  4. science of making and breaking secret codes.
  5. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  6. a protocol that provides a secure remote access connection to network devices.

15 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).actual barriers deployed to prevent direct contact with systems....

Cybersecurity Awareness Month - 2024 2024-10-09

Cybersecurity Awareness Month - 2024 crossword puzzle
Across
  1. - When somebody sends an e-mail with a link to a bogus website it is called
  2. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
  3. - Protecting the data against unauthorized access or disclosure is
  4. - Its a type of malware that disguises itself as legitimate code.
  5. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
  6. - This can slow down your computer AND watch everywhere you go on the internet
  7. - Data that is used to Identify specific individual
  8. - Impact of Threat exploiting a vulnerability is known as
Down
  1. - The control that you have over your personal information and how that information is used
  2. - A globally accepted and recognized standard for cyber security is
  3. - Three principles of ISMS are Confidentiality, ____ and Availability
  4. - Critical security component that determines what resources a user can access and what actions they can perform
  5. - An event that impacts the organization and requires a response and recovery.
  6. -PII Bank information falls under which category of data classification.
  7. - Unique sets of characters used to authenticate user identity and protect personal data or system access.

15 Clues: - Data that is used to Identify specific individual- Impact of Threat exploiting a vulnerability is known as- Its a type of malware that disguises itself as legitimate code.- Protecting the data against unauthorized access or disclosure is- A globally accepted and recognized standard for cyber security is...

Prestige Cybersecurity Awareness Month 2025-10-16

Prestige Cybersecurity Awareness Month crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. A type of cyber attack that tricks users into revealing personal information
  3. The principle of ensuring data is not altered or tampered with
  4. A software update that fixes security vulnerabilities
  5. Malware that locks data and demands payment for release
  6. A file or program that appears harmless but contains malicious code
  7. Software designed to disrupt, damage, or gain unauthorized access
  8. The process of converting data into a coded form to prevent unauthorized access
Down
  1. The practice of hiding messages so only the intended recipient can read them
  2. Software that secretly gathers user information
  3. A person who gains unauthorized access to systems for malicious purposes
  4. An extra layer of security requiring two forms of identification
  5. A secret word or phrase used to gain access
  6. A fake website or email designed to look legitimate
  7. A service that encrypts your internet connection for privacy

15 Clues: A secret word or phrase used to gain accessSoftware that secretly gathers user informationA fake website or email designed to look legitimateA software update that fixes security vulnerabilitiesMalware that locks data and demands payment for releaseA service that encrypts your internet connection for privacy...

ACC 2022-09-27

ACC crossword puzzle
Across
  1. We waive any right of recovery we may have
  2. platform used to log calls
  3. ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
  4. our ABI know it all
  5. are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
  1. contains a collection of additional coverages and increased limits for certain coverages
  2. an inspection required in the state of NY
  3. optional coverage maximizes limits
  4. provides coverages at no cost
  5. Option for liability limit
  6. script used to answer a call

11 Clues: our ABI know it allplatform used to log callsOption for liability limitscript used to answer a callprovides coverages at no costoptional coverage maximizes limitsan inspection required in the state of NYWe waive any right of recovery we may havecontains a collection of additional coverages and increased limits for certain coverages...

ict 2024-07-02

ict crossword puzzle
Across
  1. Number system with two digits, 0 and 1, used by computers.
  2. Security system that monitors and controls network traffic.
  3. Process of converting information into a secure form.
  4. Organized collection of data.
  5. Intelligence: Simulation of human intelligence by machines.
Down
  1. Device connected to a computer (e.g., printer, mouse).
  2. Technique of creating virtual versions of computer resources.
  3. Protection of computer systems from digital attacks
  4. Finding and fixing errors or bugs in software code.
  5. Step-by-step procedure for solving a problem.
  6. System: Software that manages computer hardware and software resources.

11 Clues: Organized collection of data.Step-by-step procedure for solving a problem.Protection of computer systems from digital attacksFinding and fixing errors or bugs in software code.Process of converting information into a secure form.Device connected to a computer (e.g., printer, mouse).Number system with two digits, 0 and 1, used by computers....

Anson Khoo Kai Loon 8G 2023-01-19

Anson Khoo Kai Loon  8G crossword puzzle
Across
  1. People use this to study online during the pandemic.
  2. To protect others from looking in your phone.
  3. protects you from networks & programs digital attacks.
  4. We can use ________ to communicate with others all around the world.
  5. You can send a ______ to your friends to play with.
Down
  1. A website that people use to buy something online.
  2. A website that people use to search.
  3. You need to press _______ to shut your computer/laptop.
  4. Made by Mark Zuckerberg.
  5. Its use in almost all electronic devices.
  6. An old website that people use to search something.

11 Clues: Made by Mark Zuckerberg.A website that people use to search.Its use in almost all electronic devices.To protect others from looking in your phone.A website that people use to buy something online.An old website that people use to search something.You can send a ______ to your friends to play with.People use this to study online during the pandemic....

Internet Crossword 2024-12-04

Internet Crossword crossword puzzle
Across
  1. the global computer system that interconnects technology
  2. a unique form of personal data which website ask for
  3. a platform where resources are managed on a a computer
  4. the language of the computer which are performed on a computer
  5. the delivery of IT resources throughout the Internet
  6. the programs that build a computer
Down
  1. the physical connection of computers together
  2. a barricade that monitors information going in or out
  3. the protection of computers, data, and the Internet
  4. the amount of data your computer can handle
  5. a coding error on a computer

11 Clues: a coding error on a computerthe programs that build a computerthe amount of data your computer can handlethe physical connection of computers togetherthe protection of computers, data, and the Interneta unique form of personal data which website ask forthe delivery of IT resources throughout the Internet...

Logiscool v3 2025-11-11

Logiscool v3 crossword puzzle
Across
  1. What you type to tell AI what to do
  2. Describes vehicles that can drive themselves
  3. Protecting computers and data from harm
  4. Doing the right thing in technology and AI
Down
  1. A programming language for coders
  2. A virtual world where people can meet and play
  3. A computer program that chats like a person
  4. Co-founder of DeepMind and leader in AI innovation
  5. Flying robots used for photos, deliveries, or rescue
  6. Teen inventor who created tech to fight cyberbullying (Gitanjali ___)
  7. Smart systems that can think and learn like humans

11 Clues: A programming language for codersWhat you type to tell AI what to doProtecting computers and data from harmDoing the right thing in technology and AIA computer program that chats like a personDescribes vehicles that can drive themselvesA virtual world where people can meet and playCo-founder of DeepMind and leader in AI innovation...

Rush Health Cybersecurity 2020-02-24

Rush Health Cybersecurity crossword puzzle
Across
  1. Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
  2. Type of attack to steal username and password
  3. Type of unwanted emails
  4. a standalone malware computer program that replicates itself in order to spread to other computers
  5. Someone that does harm to a computer
  6. Scrambling information so that only those with the keys can read it
Down
  1. Type of malware that requires a ransom to remove the malware.
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. any software program in which advertising banners are displayed while the program is running.
  4. Something that can harm your computer

10 Clues: Type of unwanted emailsSomeone that does harm to a computerSomething that can harm your computerType of attack to steal username and passwordType of malware that requires a ransom to remove the malware.Scrambling information so that only those with the keys can read it...

All Things Cybersecurity 2021-03-31

All Things Cybersecurity crossword puzzle
Across
  1. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. Small files that Web sites put on your computer hard disk drive when you first visit.
  3. Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  4. Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. A local or restricted communications network, especially a private network created using World Wide Web software.

10 Clues: An attempt by hackers to damage or destroy a computer network or system.Someone who seeks and exploits weaknesses in a computer system or computer network.Small files that Web sites put on your computer hard disk drive when you first visit....

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. Software used to protect against viruses and malware.
  2. A program that replicates itself and spreads to other computers.
  3. An organization that identifies security flaws in software.
  4. An encrypted connection between a web browser and a server.
  5. A technique to deceive individuals into providing sensitive information.
  6. A type of attack that floods a network to disrupt its operation.
Down
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A secret code that only authorized parties should be able to read.
  3. The practice of keeping software up to date to protect against vulnerabilities.
  4. A sequence of characters used to authenticate identity or access.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Basic cybersecurity terms 2024-07-29

Basic cybersecurity terms crossword puzzle
Across
  1. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
  2. The process of converting information or data into a code, especially to prevent unauthorized access.
  3. A security process that verifies the identity of a user or device attempting to access a system.
  4. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Basics #1 2024-09-17

Cybersecurity Basics #1 crossword puzzle
Across
  1. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
  2. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
  3. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
  4. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
  1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
  2. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
  3. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
  4. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
  5. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
  6. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.

10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only....

Compliance And Cybersecurity 2024-12-23

Compliance And Cybersecurity crossword puzzle
Across
  1. The process of confirming the identity of a user or device
  2. A malicious software program that encrypts files for ransom
  3. A set of rules or guidelines adopted by an organization.
  4. Do not share a password with members
Down
  1. A defensive system protecting networks from cyberattacks
  2. The act of adhering to laws, regulations, and standards.
  3. What does the HIPAA Privacy Rule protect?
  4. The deliberate act of stealing personal information online
  5. Data that is unreadable without decryption
  6. Rules to guard patient data

10 Clues: Rules to guard patient dataDo not share a password with membersWhat does the HIPAA Privacy Rule protect?Data that is unreadable without decryptionA defensive system protecting networks from cyberattacksThe act of adhering to laws, regulations, and standards.A set of rules or guidelines adopted by an organization....

CYBERSECURITY CROSSWORD PUZZLE 2025-08-15

CYBERSECURITY CROSSWORD PUZZLE crossword puzzle
Across
  1. The process of converting data into a coded format to prevent unauthorized access.
  2. Malicious software designed to damage or disrupt systems.
  3. A network security device that monitors and filters incoming and outgoing traffic.
  4. A cyberattack method that tricks users into revealing sensitive information.
  5. A copy of data kept in case the original is lost or damaged.
Down
  1. Software that secretly monitors and collects user information.
  2. Secure connection method over the internet, often used for privacy.
  3. A self-replicating program that infects files or systems.
  4. An update to fix software vulnerabilities.
  5. A secret string used for authentication.

10 Clues: A secret string used for authentication.An update to fix software vulnerabilities.Malicious software designed to damage or disrupt systems.A self-replicating program that infects files or systems.A copy of data kept in case the original is lost or damaged.Software that secretly monitors and collects user information....

Cybersecurity Amelie BTS1 2025-12-02

Cybersecurity Amelie BTS1 crossword puzzle
Across
  1. A group of Internet-connected devices, each of which runs one or more bots.
  2. Completely Automated Public Turing test to tell Computers and Humans Apart.
  3. information that is officially secret.
Down
  1. An occasion when private information can be seen by people who should not be able to see it.
  2. deriving from or relating to a previously unknown vulnerability to attack in some software.
  3. (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
  4. (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
  5. (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
  6. Programs that surreptitiously monitor and report the actions of a computer user.
  7. theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.

10 Clues: information that is officially secret.A group of Internet-connected devices, each of which runs one or more bots.Completely Automated Public Turing test to tell Computers and Humans Apart.Programs that surreptitiously monitor and report the actions of a computer user....

TBP FL-D 10/23 2023-10-23

TBP FL-D 10/23 crossword puzzle
Across
  1. Type of current produced by solar panels.
  2. The c in E=mc^2.
  3. Amount of heat required to raise temperature by 1 degree Celsius.
Down
  1. Type of engineer responsible for harnessing electricity.
  2. This cat may or may not be alive.
  3. Building with the most popular bathroom on UCF campus.
  4. Plastic polymer that can be recycled and reformed into another shape
  5. The cybersecurity team that works to defend an organization.
  6. Support structure that uses triangles.

9 Clues: The c in E=mc^2.This cat may or may not be alive.Support structure that uses triangles.Type of current produced by solar panels.Building with the most popular bathroom on UCF campus.Type of engineer responsible for harnessing electricity.The cybersecurity team that works to defend an organization....

SBU TBP Crossword 10/5 2022-10-04

SBU TBP Crossword 10/5 crossword puzzle
Across
  1. Species with the most genetic similarity to humans.
  2. Series of educational lectures hosted by Tau Beta Pi.
  3. Protection against unauthorized electronic data access.
  4. Process of converting data into a code for protection.
Down
  1. Mathematical function without "in-between" values.
  2. Longest bone in the human body.
  3. A structure consisting of beams connected in triangular shapes.
  4. ____'s constant gives the relationship between the energy and frequency of a photon.
  5. Third most common element in the universe.

9 Clues: Longest bone in the human body.Third most common element in the universe.Mathematical function without "in-between" values.Species with the most genetic similarity to humans.Series of educational lectures hosted by Tau Beta Pi.Process of converting data into a code for protection.Protection against unauthorized electronic data access....

30 2023-06-06

30 crossword puzzle
Across
  1. - Online storage and computing services
  2. - Uniform Resource Locator, the address of a web page
  3. - Measures to protect computer systems and data from digital threats
  4. - Buying and selling goods or services online
  5. - Component that stores electrical energy
  6. - Conductive material for transmitting electricity
  7. - Device that changes the voltage of an electrical current
Down
  1. - Device that stores and provides electrical energy
  2. - Electrical socket for connecting devices to the power supply
  3. - Safety device that breaks the circuit when current exceeds a certain level
  4. - Complete path for electrical current
  5. - Device used to control the flow of electrical current
  6. - Component that restricts the flow of electricity

13 Clues: - Complete path for electrical current- Online storage and computing services- Component that stores electrical energy- Buying and selling goods or services online- Component that restricts the flow of electricity- Conductive material for transmitting electricity- Device that stores and provides electrical energy...

Cybersecurity Decoded 2 2020-07-30

Cybersecurity Decoded 2 crossword puzzle
Across
  1. childhood game
  2. Not canned food
  3. used to fix jeans... or software
  4. Dr's are known to have the messiest ones
  5. the iron giant
  6. Fake mustache, trench coat, sunglasses
Down
  1. they come out after the rain
  2. type of cleanliness
  3. sugar comes in these
  4. Troy's downfall

10 Clues: childhood gamethe iron giantNot canned foodTroy's downfalltype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A technique to deceive individuals into providing sensitive information.
  2. Software used to protect against viruses and malware.
  3. A sequence of characters used to authenticate identity or access.
  4. A program that replicates itself and spreads to other computers.
  5. An encrypted connection between a web browser and a server.
Down
  1. The practice of keeping software up to date to protect against vulnerabilities.
  2. A system that verifies a user's identity through a unique physical characteristic.
  3. A secret code that only authorized parties should be able to read.
  4. A type of attack that floods a network to disrupt its operation.
  5. An organization that identifies security flaws in software.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A type of attack that floods a network to disrupt its operation.A program that replicates itself and spreads to other computers....

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Intro Vocabulary 2023-09-07

Cybersecurity Intro Vocabulary crossword puzzle
Across
  1. the avenue or path the hacker uses to commit the attack
  2. usually operates outside the law
  3. a hacker who is generally ethical and law-abiding.
  4. the act of circumventing or breaking past security boundaries.
Down
  1. process of protecting a system against unintended or malicious changes or use
  2. a malicious software code that is unleashed and attempts to perform its destructive content
  3. an attempt to steal, damage, or destroy data or a computer system
  4. a person who engages in hacking
  5. They do no harm, but they don't ask permission
  6. hacking into a phone system

10 Clues: hacking into a phone systema person who engages in hackingusually operates outside the lawThey do no harm, but they don't ask permissiona hacker who is generally ethical and law-abiding.the avenue or path the hacker uses to commit the attackthe act of circumventing or breaking past security boundaries....

Cybersecurity Awareness Puzzle 2023-09-20

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. ______ is a type of phishing that uses voice calls to manipulate a target.
  2. Type of malware that threatens to expose information unless a payment is made.
  3. Cyber defense agency that is hosting National Cybersecurity Awareness Month.
  4. Social engineering tactic that research is done on the victim to personalize the attack.
  5. Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
  1. A new social engineering attack involves QR codes and is a form of a *ishing attacks.
  2. According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
  3. Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
  4. A ________ manager is best the way to create and maintain strong passwords.
  5. In 2023, this brand name was abused the most in phishing attacks.

10 Clues: In 2023, this brand name was abused the most in phishing attacks.______ is a type of phishing that uses voice calls to manipulate a target.A ________ manager is best the way to create and maintain strong passwords.Cyber defense agency that is hosting National Cybersecurity Awareness Month....

Key Cybersecurity Vocabulary 2025-07-10

Key Cybersecurity Vocabulary crossword puzzle
Across
  1. Tools that collect and analyze security data to detect threats
  2. Detects and blocks suspicious activities in real time
  3. Keeping systems up to date with software fixes to close security hole
  4. A network of infected computers controlled by an attacker, often used for DDoS
Down
  1. Tricking people into revealing confidential information
  2. Monitors network traffic for suspicious activity and alerts administrators
  3. Probing a system for open ports to find possible vulnerabilities
  4. A fake communication used to trick users into giving up sensitive data
  5. Requires two methods to verify a user’s identity
  6. Verifying the identity of a user, device, or process before allowing access

10 Clues: Requires two methods to verify a user’s identityDetects and blocks suspicious activities in real timeTricking people into revealing confidential informationTools that collect and analyze security data to detect threatsProbing a system for open ports to find possible vulnerabilities...

IT Cybersecurity terms 2025-08-28

IT Cybersecurity terms crossword puzzle
Across
  1. Regular software updates to fix vulnerabilities
  2. Extra step beyond a password
  3. Do this when you leave your desk
  4. Always create a copy of important files
  5. Encrypts your connection on public Wi-Fi
  6. Fake message trying to steal information
Down
  1. Turn the device off and on to fix issues
  2. Strongest defense is user awareness
  3. Protect files or drives from unauthorized access
  4. Never share this secret login credential

10 Clues: Extra step beyond a passwordDo this when you leave your deskStrongest defense is user awarenessAlways create a copy of important filesTurn the device off and on to fix issuesNever share this secret login credentialEncrypts your connection on public Wi-FiFake message trying to steal informationRegular software updates to fix vulnerabilities...

Computer Concepts 2025-11-18

Computer Concepts crossword puzzle
Across
  1. software that detects and removes harmful programs
  2. images, visuals, and video are processed by a ___ processing unit
  3. protection of computers, networks, and data from attacks
  4. number system made of 0s and 1s
  5. the main circuit board that connects all components
  6. short-term working space used by a computer, also called RAM
  7. security tool that blocks unwanted network traffic
Down
  1. the screen that shows images and text
  2. scrambling data so only authorised users can read it
  3. number system based on 10
  4. the ___ processing unit is where calculations are performed
  5. scam where someone is tricked into giving personal information
  6. harmful software designed to damage or steal information

13 Clues: number system based on 10number system made of 0s and 1sthe screen that shows images and textsoftware that detects and removes harmful programssecurity tool that blocks unwanted network trafficthe main circuit board that connects all componentsscrambling data so only authorised users can read it...

Provalus Crossword 2025-09-30

Provalus Crossword crossword puzzle
Across
  1. The one medication on the list that is an anti-arrythmic
  2. Which is the insurance plan that covers low-income individuals?
  3. Which Aux code is used for lunch?
  4. The keyboard shortcut for "select all"
  5. The Medicare part that covers hospital visits
  6. The protection of digital data
  7. How many folders deep can you go in OneDrive?
Down
  1. Which is the insurance plan that covers individuals above 65?
  2. Disregarding concerns
  3. How many days long is the probation period?
  4. How many times you should say a customer's name in a phone call
  5. What Citrix is
  6. The components of active listening are attention and ____

13 Clues: What Citrix isDisregarding concernsThe protection of digital dataWhich Aux code is used for lunch?The keyboard shortcut for "select all"How many days long is the probation period?The Medicare part that covers hospital visitsHow many folders deep can you go in OneDrive?The one medication on the list that is an anti-arrythmic...

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  4. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  5. MALICIOUS SOFTWARE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
  3. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
  4. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  5. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID....

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. MALICIOUS SOFTWARE.
  4. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  5. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
  3. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  4. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  5. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES....

Cybersecurity Crossword Puzzle 2023-05-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Term for sexually explicit material available on the internet
  2. Software designs to damage or gain unauthorized access to a computer system
  3. Act of sending deceptive emails to trick individuals
  4. Every aspect of protecting an organization and its employees and assets against cyber threats
  5. Process of gaining unauthorized access to computer systems
Down
  1. One of the internet abuse effects for teenagers
  2. Act of deliberately using digital communication to harass or intimidate someone
  3. Software designed to protect against malicious software
  4. Practice of protecting information by converting it into a secret code
  5. A secret word or phrase that must be used to gain admission

10 Clues: One of the internet abuse effects for teenagersAct of sending deceptive emails to trick individualsSoftware designed to protect against malicious softwareProcess of gaining unauthorized access to computer systemsA secret word or phrase that must be used to gain admissionTerm for sexually explicit material available on the internet...

Cybersecurity Week 1 2021-10-05

Cybersecurity Week 1 crossword puzzle
Across
  1. Short for malicious software designed to obtain information from a computer without the user's consent
  2. Protection of information assets within internetworked information systems
  3. Ensures the timely and reliable access and use of information systems
  4. Full use of a vulnerability for the benefit of an attacker
Down
  1. Protection of information from authorized access and disclosure
  2. A protected string of characters that authenticate a computer user to a system
  3. the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
  4. The protection of information from unauthorized modification
  5. A system or combination of systems that enforces a boundary between two or more networks
  6. An individual who attempts to gain unauthorized access to a computer system

10 Clues: Full use of a vulnerability for the benefit of an attackerThe protection of information from unauthorized modificationProtection of information from authorized access and disclosureEnsures the timely and reliable access and use of information systemsProtection of information assets within internetworked information systems...

Cybersecurity Hex Crossword 2023-11-03

Cybersecurity Hex Crossword crossword puzzle
Across
  1. 43 4C 41 53 53
  2. 43 52 4F 53 53 57 4F 52 44
  3. 50 48 4F 4E 45
  4. 4C 49 46 45
Down
  1. 4C 41 50 54 4F 50 0A
  2. 4D 41 54 48
  3. 54 45 53 54
  4. 43 59 42 45 52
  5. 53 43 48 4F 4F 4C
  6. 46 55 4E

10 Clues: 46 55 4E4D 41 54 4854 45 53 544C 49 46 4543 4C 41 53 5343 59 42 45 5250 48 4F 4E 4553 43 48 4F 4F 4C4C 41 50 54 4F 50 0A43 52 4F 53 53 57 4F 52 44

TPWD Cybersecurity Awareness 2024-10-08

TPWD Cybersecurity Awareness crossword puzzle
Across
  1. A fake email designed to trick users into giving up personal information
  2. A way to verify a person's identity online
  3. A malicious software designed to harm a computer
  4. A software update that fixes vulnerabilities in a program
  5. Software that blocks harmful content from reaching your computer
Down
  1. A security breach that involves unauthorized access to data
  2. A security feature that requires more than one form of verification
  3. A network of infected computers controlled by a hacker
  4. The practice of protecting information from unauthorized access
  5. A set of guidelines for handling sensitive data

10 Clues: A way to verify a person's identity onlineA set of guidelines for handling sensitive dataA malicious software designed to harm a computerA network of infected computers controlled by a hackerA software update that fixes vulnerabilities in a programA security breach that involves unauthorized access to data...

Foundations of Cybersecurity 2024-11-20

Foundations of Cybersecurity crossword puzzle
Across
  1. This device inspects and filters network traffic
  2. the process of converting data into a code
  3. the process of verifying an identity before granting access
  4. the process of encoding information so that only the person that the message was intended for can read it
Down
  1. the practice of sending fake emails
  2. a network of compromised computers that are controlled by a single attacker
  3. a weakness within a computer system
  4. software that is designed to disrupt or damage access to a computer
  5. a type of malicious software that secretly gathers a user's personal data
  6. a type of malware that encrypts a victim's files or locks their device, and then demands payment

10 Clues: the practice of sending fake emailsa weakness within a computer systemthe process of converting data into a codeThis device inspects and filters network trafficthe process of verifying an identity before granting accesssoftware that is designed to disrupt or damage access to a computer...

technolgy 2024-12-20

technolgy crossword puzzle
Across
  1. Protecting digital information from threats.
  2. An online community for connecting with others.
  3. A person skilled in technology.
  4. A computer that provides data to other computers.
  5. Someone very interested in computers.
  6. A software used to access websites.
  7. To transfer a file from the internet to your device.
  8. To create an account on a website or app.
  9. Abbreviation for Artificial Intelligence.
Down
  1. Software that is free to use.
  2. Smart devices worn on the body, like fitness trackers.
  3. MEDIA Online platforms for sharing content and communication.
  4. HOTSPOT A location where wireless internet is available.
  5. PROVIDER A company that provides internet access.
  6. To transfer a file from your device to the internet.
  7. A computer-generated immersive experience.
  8. To log into an account.

17 Clues: To log into an account.Software that is free to use.A person skilled in technology.A software used to access websites.Someone very interested in computers.To create an account on a website or app.Abbreviation for Artificial Intelligence.A computer-generated immersive experience.Protecting digital information from threats....

Info - security 2017-11-27

Info - security crossword puzzle
Across
  1. be attentive
  2. lure someone
  3. name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
  4. protect networks, computers, programs and data from attack
  5. should not be shared
  6. monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. designed to detect and destroy computer viruses
  2. exploit weaknesses to gain access
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. protects personal data published via the Internet

10 Clues: be attentivelure someoneshould not be sharedexploit weaknesses to gain accessdesigned to detect and destroy computer virusesprotects personal data published via the Internetprotect networks, computers, programs and data from attackmalicious software designed to block access to a computer system until a sum of money is paid....

Profesi dan peluang usaha di bidang tkjt 2023-11-17

Profesi dan peluang usaha di bidang tkjt crossword puzzle
Across
  1. seseorang yang ahli dalam membuat animasi
  2. seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
  3. DBA termasuk singkatan dari
  4. bentuk perlindungan terhadap sistem yang terhubung ke internet
  5. melakukan instalasi dan konfigurasi adalah tugas?
Down
  1. seseorang yang ahli dalam bidang perfilm an atau video
  2. menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
  3. seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
  4. orang yang membuat poster,logo, disebut?
  5. peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu

10 Clues: DBA termasuk singkatan dariorang yang membuat poster,logo, disebut?seseorang yang ahli dalam membuat animasimelakukan instalasi dan konfigurasi adalah tugas?seseorang yang ahli dalam bidang perfilm an atau videobentuk perlindungan terhadap sistem yang terhubung ke internetmenganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?...

Crossword #7 2023-11-07

Crossword #7 crossword puzzle
Across
  1. A Brazilian type of music that will be performed by the Connection Trio.
  2. Production of this play has been delayed due to a COVID outbreak.
  3. The conference in which Marshall athletics compete
  4. A magic dragon.
Down
  1. Men's soccer faces this team this week.
  2. Education of this will be a part of the 4th Avenue Innovation Center
  3. A low battery will need a ________
  4. No.0 on the men's basketball team.
  5. Declared war on Hamas leading to unrest on campuses across the nation
  6. Science, Technology,Engineering and Mathematics.

10 Clues: A magic dragon.A low battery will need a ________No.0 on the men's basketball team.Men's soccer faces this team this week.Science, Technology,Engineering and Mathematics.The conference in which Marshall athletics competeProduction of this play has been delayed due to a COVID outbreak....

Crossword Puzzle for you 2025-08-04

Crossword Puzzle for you crossword puzzle
Across
  1. Person who works for a company or organization
  2. Machine that produces hard copies of digital documents
  3. The process of manufacturing goods in large quantities
  4. Person or business that buys products or services from a company
  5. Secure room housing computer servers and networking equipment
Down
  1. Practice of protecting systems and data from digital attacks
  2. Technology using radio waves for tracking and identification
  3. Material essential for electronic device manufacturing
  4. On-site maintenance or support provided to customers
  5. Device used for billing and transactions in retail

10 Clues: Person who works for a company or organizationDevice used for billing and transactions in retailOn-site maintenance or support provided to customersMaterial essential for electronic device manufacturingMachine that produces hard copies of digital documentsThe process of manufacturing goods in large quantities...

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Revision Quiz 2024-10-20

Cybersecurity Revision Quiz crossword puzzle
Across
  1. This is when someone watches over your shoulder to see your private details.
  2. This protects information by turning it into a secret code.
  3. This is when someone is mean or rude online just to upset others.
  4. This is a way to unlock devices using fingerprints or face scans (B________).
Down
  1. This is a sneaky program that spies on your computer activity.
  2. This is someone you can talk to if you're worried about something online. (two words)
  3. This looks like a gift but secretly harms your computer.
  4. This is when someone tricks you into giving personal information.
  5. This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
  6. This software protects your computer from harmful viruses.

10 Clues: This looks like a gift but secretly harms your computer.This software protects your computer from harmful viruses.This protects information by turning it into a secret code.This is a sneaky program that spies on your computer activity.This is when someone tricks you into giving personal information....

Cybersecurity Crossword Puzzle 2025-11-26

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Applying updates to software to fix vulnerabilities
  2. Process of verifying the identity of a user or device
  3. Malicious software that locks data and demands payment for release.
Down
  1. Manipulating people into revealing confidential information
  2. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  3. Secret string of characters used for authentication
  4. Process of converting data into a coded form to prevent unauthorized access
  5. Software designed to disrupt, damage, or gain unauthorized access to a system
  6. Secure tunnel for online communication, often used for privacy
  7. Network security system that monitors and controls incoming and outgoing traffic

10 Clues: Applying updates to software to fix vulnerabilitiesSecret string of characters used for authenticationProcess of verifying the identity of a user or deviceManipulating people into revealing confidential informationSecure tunnel for online communication, often used for privacyMalicious software that locks data and demands payment for release....

Computer Science 2024-10-25

Computer Science crossword puzzle
Across
  1. password an easily guessed password
  2. Protecting your systems
Down
  1. a memorized secret with a sequence of words
  2. device A technique someone uses to remember
  3. password A password that is strong
  4. random password Make up your own password

6 Clues: Protecting your systemspassword an easily guessed passwordpassword A password that is stronga memorized secret with a sequence of wordsrandom password Make up your own passworddevice A technique someone uses to remember

keamanan digital 2025-08-28

keamanan digital crossword puzzle
Across
  1. apa jenis kode rahasia untuk melindungi akun?
  2. apa tindakan mencuri data dengan menyamar
Down
  1. apa ancaman digital berupa program?
  2. apa kata lain dari keamanan digital
  3. apa perangkat lunak untuk blokir virus
  4. apa metode verifikasi ganda untuk keamanan akun?

6 Clues: apa ancaman digital berupa program?apa kata lain dari keamanan digitalapa perangkat lunak untuk blokir virusapa tindakan mencuri data dengan menyamarapa jenis kode rahasia untuk melindungi akun?apa metode verifikasi ganda untuk keamanan akun?

Computer Studies 9/10 Crossword 2024-05-21

Computer Studies 9/10 Crossword crossword puzzle
Across
  1. A high-level programming language often used for web development.
  2. The physical components of a computer system.
  3. A software application used to access the web.
  4. An interconnected group of computers.
  5. The smallest unit of digital information.
  6. The primary storage device in a computer.
  7. A sequence of characters.
  8. A temporary storage that provides fast access to data.
  9. A set of instructions that a computer follows to perform a task.
  10. The standard language for creating web pages.
Down
  1. The main circuit board of a computer.
  2. A named collection of related data.
  3. Basic unit of data in computing.
  4. A global system of interconnected computer networks.
  5. The practice of protecting computers and data from unauthorized access.
  6. A device for entering data into a computer.
  7. To find and correct errors in a program.
  8. A way of sending information over the internet securely.
  9. The "brain" of the computer.
  10. An error in a program.

20 Clues: An error in a program.A sequence of characters.The "brain" of the computer.Basic unit of data in computing.A named collection of related data.The main circuit board of a computer.An interconnected group of computers.To find and correct errors in a program.The smallest unit of digital information.The primary storage device in a computer....

Andy & George’s Wedding Crossword 2024-05-28

Andy & George’s Wedding Crossword crossword puzzle
Across
  1. What school did George go to?
  2. What is our favourite number?
  3. What was our wedding present from Bob & Wendy?
  4. How many years have we been together?
  5. What school did Andy go to?
  6. Where did George go to uni?
  7. Where did we first meet?
  8. Where do we live?
  9. Where did Andy go to uni?
  10. On what street was their first flat?
  11. What is George’s middle name?
Down
  1. What’s Andy’s favourite flavour of icecream?
  2. What colour is the diamond in George’s ring?
  3. Where does George work?
  4. What industry does Andy work in?
  5. What did Andy study at uni?
  6. What name is George saved under in Andy’s phone?
  7. What’s Andy’s coffee order?
  8. Where did we get engaged?
  9. What is Andy’s favourite hobby?
  10. What’s George’s favourite film?
  11. What was our first dog called?
  12. What colour are George’s eyes?
  13. What is Andy’s middle name?

24 Clues: Where do we live?Where does George work?Where did we first meet?Where did we get engaged?Where did Andy go to uni?What did Andy study at uni?What school did Andy go to?Where did George go to uni?What’s Andy’s coffee order?What is Andy’s middle name?What school did George go to?What is our favourite number?What is George’s middle name?...

Human Ingenuity and Technology 2024-12-06

Human Ingenuity and Technology crossword puzzle
Across
  1. Platforms for online social interaction
  2. Field focused on designing intelligent machines
  3. Autonomous vehicles with no human driver
  4. Protection of computer systems from theft or damage
  5. Additive manufacturing process creating three-dimensional objects
  6. Creating a genetically identical copy of an organism
  7. Manipulation of matter on an atomic scale
  8. Proposed point of rapid technological growth
  9. A new device or method created through innovation
  10. Objects orbiting Earth for communication and research
  11. Simulated experience that can mimic the real world
Down
  1. Residence equipped with interconnected devices for automation
  2. Smart devices worn on the body for various applications
  3. Using biological systems for technological applications
  4. Sustainable energy sources like solar and wind
  5. Virtual money used for online transactions
  6. Creative problem-solving of mankind
  7. Multi-functional mobile device
  8. Altered organisms for improved traits
  9. Machines simulating human intelligence

20 Clues: Multi-functional mobile deviceCreative problem-solving of mankindAltered organisms for improved traitsMachines simulating human intelligencePlatforms for online social interactionAutonomous vehicles with no human driverManipulation of matter on an atomic scaleVirtual money used for online transactionsProposed point of rapid technological growth...

AnaBela Meitasari XF, 02 2025-04-15

AnaBela Meitasari XF, 02 crossword puzzle
Across
  1. Proses memeriksa kebenaran informasi disebut
  2. Ahli yang menangani keamanan jaringan
  3. Pekerja yang mengelola database
  4. platform populer untuk menyebarkan video budaya
  5. Batik adalah contoh konten digital bertema
  6. Perlindungan untuk logo atau simbol disebut
  7. Profesi yang merancang dan membangun perangkat lunak
  8. Lembaga pengawas konten di internet di Indonesia
  9. Berita palsu disebut juga
  10. konten di gital yang memperkenalkan tarian daerah tersebut
  11. Jenis konten yang merugikan dan harus disaring
  12. Profesi yang menganalisis data
Down
  1. Orang yang mendesain tampilan website
  2. Hak atas penemuan teknologi baru
  3. Hak yang melindungi karya musik dan tulisan
  4. Operator untuk mencari dalam situs tertentu
  5. Lembaga resmi pendaftaran HAKI di Indonesia
  6. Sistem yang memblokir konten berbahaya
  7. Operator pencarian untuk mengecualikan kata tertentu
  8. salah satu bentuk produksi konten berupa suara
  9. Kata kunci untuk mencari frasa persis
  10. Situs yang digunakan untuk mencari informasi di internet
  11. Hak eksklusif atas ciptaan disebut
  12. lstilah untuk hasil pencarian yang muncul di google

24 Clues: Berita palsu disebut jugaProfesi yang menganalisis dataPekerja yang mengelola databaseHak atas penemuan teknologi baruHak eksklusif atas ciptaan disebutOrang yang mendesain tampilan websiteAhli yang menangani keamanan jaringanKata kunci untuk mencari frasa persisSistem yang memblokir konten berbahayaBatik adalah contoh konten digital bertema...

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Sistem keamanan biometrik yang menggunakan sidik jari.
  2. Proses identifikasi atau verifikasi pengguna
  3. Penyusupan sistem oleh pihak tidak berwenang.
  4. Jenis virus komputer
  5. Pencurian data kartu kredit atau kartu debit
  6. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  7. Teknik mengakses sistem tanpa otorisasi.
  8. Penyerang digital yang memiliki tujuan jahat.
Down
  1. Kata sandi dalam sistem keamanan.
  2. Istilah lain untuk keamanan jaringan
  3. Alamat identifikasi unik setiap perangkat di jaringan.
  4. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  5. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
  6. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  7. Aksi mencari celah dalam sistem komputer.
  8. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  9. Penipuan online melalui email atau situs palsu.
  10. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  11. Program pengintai aktivitas pengguna tanpa izin.
  12. Sandi digital yang dipakai untuk keamanan transaksi.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Proses identifikasi atau verifikasi penggunaPencurian data kartu kredit atau kartu debitPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-14

TTS INFORMATIKA crossword puzzle
Across
  1. Penyerang digital yang memiliki tujuan jahat.
  2. Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
  3. Proses identifikasi atau verifikasi pengguna
  4. Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
  5. Sistem keamanan biometrik yang menggunakan sidik jari.
  6. Program pengintai aktivitas pengguna tanpa izin.
  7. Teknik mengakses sistem tanpa otorisasi.
  8. Jenis virus komputer
  9. Kata sandi dalam sistem keamanan.
  10. Istilah lain untuk keamanan jaringan
Down
  1. Penyusupan sistem oleh pihak tidak berwenang.
  2. Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
  3. Aksi mencari celah dalam sistem komputer.
  4. Alamat identifikasi unik setiap perangkat di jaringan.
  5. Pencurian data kartu kredit atau kartu debit
  6. Penipuan online melalui email atau situs palsu.
  7. Sandi digital yang dipakai untuk keamanan transaksi.
  8. Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
  9. Usaha melindungi sistem komputer dari pencurian atau kerusakan.
  10. Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.

20 Clues: Jenis virus komputerKata sandi dalam sistem keamanan.Istilah lain untuk keamanan jaringanTeknik mengakses sistem tanpa otorisasi.Aksi mencari celah dalam sistem komputer.Pencurian data kartu kredit atau kartu debitProses identifikasi atau verifikasi penggunaPenyusupan sistem oleh pihak tidak berwenang.Penyerang digital yang memiliki tujuan jahat....

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

TEKA - TEKI SILANG EKONOMI DIGITAL 2025-08-21

TEKA - TEKI SILANG EKONOMI DIGITAL crossword puzzle
Across
  1. Transaksi melalui jaringan internet
  2. Sistem penyimpanan data berbasis internet
  3. Perusahaan rintisan berbasis teknologi
  4. Metode pembayaran tanpa uang tunai
  5. Konsultan investasi keuangan
  6. masyarakat yang sebelumnya terpinggirkan dapat mengakses layanan keuangan, pendidikan,dan lainnya
  7. Platform jual beli online
  8. Pertanian berbasis teknologi
  9. Inovasi finansial berbasis teknologi
  10. Perantara pembayaran digital seperti OVO dan DANA
  11. layanan pendiidkan atau pendidikan berbasis teknologi
Down
  1. internet Komponen yang ada pada infrastruktur digital
  2. Contoh robo advisors
  3. Mengumpulkan dana dari banyak orang melalui plastfrom digital atau penggalangan donasi
  4. Sistem keamanan data
  5. Mata uang kripto paling terkenal
  6. Pinjaman modal secara online tetapi melalui investor bukan sembarangan orang dan terawasi oleh OJK
  7. Penyedia layanan keuangan dalam skala kecil atau masyarakat yang tidak memiliki pengetahuan cara akses pinjaman ke bank, biasanya pinjam dana melalui BPR (Bank Pengkrediatan Rakyat) untuk usaha kecil / UMKM
  8. Layanan transportasi yang menghubungkan dengan pengemudi dan ada real time nya
  9. layanan kesehatan atau konsultasi kesehatan secara online

20 Clues: Contoh robo advisorsSistem keamanan dataPlatform jual beli onlineKonsultan investasi keuanganPertanian berbasis teknologiMata uang kripto paling terkenalMetode pembayaran tanpa uang tunaiTransaksi melalui jaringan internetInovasi finansial berbasis teknologiPerusahaan rintisan berbasis teknologiSistem penyimpanan data berbasis internet...

Know your Math 2025-08-30

Know your Math crossword puzzle
Across
  1. Solves large-scale systems in structural engineering.
  2. Used in image compression techniques like PCA.
  3. Applied in heat transfer and fluid flow analysis.
  4. the Determines solvability of engineering systems.
  5. Average off the values
  6. Used to approximate functions in aircraft control systems.
  7. Applied in medical testing for disease prediction.
  8. Applied in vibration analysis of mechanical structures.
  9. Used in reliability engineering to model component lifetimes.
  10. Helps in predicting combined system failure chances.
  11. Helps detect anomalies in network traffic for cybersecurity.
Down
  1. Used in spam email detection.
  2. Used to analyze asymmetry in business profits distribution.
  3. Used in power flow analysis of electrical grids.
  4. Essential in facial recognition algorithms.
  5. Speeds up computations in control systems.
  6. Measures risk in stock market analysis.
  7. Central Value of the data set
  8. Applied in electrical circuit analysis for sinusoidal signals.
  9. Used in robotics for motion transformation between coordinate systems.

20 Clues: Average off the valuesUsed in spam email detection.Central Value of the data setMeasures risk in stock market analysis.Speeds up computations in control systems.Essential in facial recognition algorithms.Used in image compression techniques like PCA.Used in power flow analysis of electrical grids.Applied in heat transfer and fluid flow analysis....

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Masa depan ekonomi digital bergantung pada literasi
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → Risiko ekonomi digital adalah kebocoran
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Contoh aplikasi fintech di Indonesia adalah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  9. → Transaksi keuangan secara online disebut
  10. → Fintech merupakan singkatan dari
  11. → Pemasaran melalui media sosial disebut
  12. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
  1. → Kecerdasan buatan dikenal juga dengan istilah
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  6. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  7. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  8. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

Cybersecurity Crossword Puzzle 2023-11-10

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A champion of cybersecurity
  2. The process of identifying a users identity
  3. Changing the IP address of an email so it appears to come from a trusted source
  4. Malicious software used to damage or infect a system
  5. A means of attack, a vulnerability
  6. Technology used to keep hackers out of a system
Down
  1. Coding to protect information
  2. Malware that hijacks a system in return for payment
  3. Malware that corrupts a system, then spreads to other systems
  4. Practice of posing as someone legitimate to gain access

10 Clues: A champion of cybersecurityCoding to protect informationA means of attack, a vulnerabilityThe process of identifying a users identityTechnology used to keep hackers out of a systemMalware that hijacks a system in return for paymentMalicious software used to damage or infect a systemPractice of posing as someone legitimate to gain access...

STEM in the News 2023-09-26

STEM in the News crossword puzzle
Across
  1. regulates anyone who stores, transmits, or possesses cardholder data
  2. Rules created for keeping things under control
  3. The act of staying safe online
  4. Using or creating ways to use services for malicious purposes
  5. Regulates use and transfer of Healthcare data
Down
  1. Moving something from one place to another
  2. An online exploit of a service or information
  3. Handles the storing, handling, and transmission of digital data
  4. Created by the EU to protect their citizens online
  5. Online or relating to a computer

10 Clues: The act of staying safe onlineOnline or relating to a computerMoving something from one place to anotherAn online exploit of a service or informationRegulates use and transfer of Healthcare dataRules created for keeping things under controlCreated by the EU to protect their citizens online...

The Department of Homeland Security Crossword 2024-12-09

The Department of Homeland Security Crossword crossword puzzle
Across
  1. The main mission of DHS is to stop this threat.
  2. CISA, stands for ___________ and Infrastructure Security Agency.
  3. ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
  4. DHS operates at the ______ level.
  5. One weakness of the DHS is the __________ jurisdiction.
  6. The DHS Oversees ______ security and lawful immigration.
Down
  1. One of the DHS agencies.
  2. The person who appoints the Secretary of Homeland Security.
  3. DHS works to help communities recover through ________.
  4. The DHS is the newest _______-level department.

10 Clues: One of the DHS agencies.DHS operates at the ______ level.The main mission of DHS is to stop this threat.The DHS is the newest _______-level department.DHS works to help communities recover through ________.One weakness of the DHS is the __________ jurisdiction.The DHS Oversees ______ security and lawful immigration....

Theme: Technology 2024-07-24

Theme: Technology crossword puzzle
Across
  1. An organized collection of data
  2. A machine capable of carrying out complex actions automatically
  3. A global network connecting millions of private public academic and government networks
  4. A process or set of rules to be followed in calculations or other problem-solving operations
  5. The programs and other operating information used by a computer
Down
  1. The practice of protecting systems networks and programs from digital attacks
  2. A mobile phone with advanced features
  3. A portable personal computer
  4. An unmanned aerial vehicle
  5. Abbreviation for Artificial Intelligence

10 Clues: An unmanned aerial vehicleA portable personal computerAn organized collection of dataA mobile phone with advanced featuresAbbreviation for Artificial IntelligenceA machine capable of carrying out complex actions automaticallyThe programs and other operating information used by a computer...

FITAVocab.lo 2013-05-15

FITAVocab.lo crossword puzzle
Across
  1. code of positive conduct one uses such as plagiarism, copyright, etc.
  2. rules and behaviors designed to keep individuals safe online
  3. a search engine that goes through all the search engines.
  4. speed of machine
  5. short term memory for your computer
  6. a
Down
  1. a website that protects young people from cyber bullies
  2. protecting information on computer systems/networks
  3. a program that allows you to search information on the internet.
  4. a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.

10 Clues: aspeed of machineshort term memory for your computerprotecting information on computer systems/networksa website that protects young people from cyber bulliesa search engine that goes through all the search engines.rules and behaviors designed to keep individuals safe onlinea program that allows you to search information on the internet....

Tugas - Jaringan komputer dan internet 2024-01-11

Tugas - Jaringan komputer dan internet crossword puzzle
Across
  1. aspek teknis pada jaringan komputer
  2. nama lain jaringan komputer
  3. Jenis jaringan komputer
  4. aspek utama keamanan jaringan
  5. yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
  6. topologi jaringan yang lebih sederhana yaitu
Down
  1. Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
  2. server komponen jaringan komputer
  3. lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
  4. Network interface card

10 Clues: Network interface cardJenis jaringan komputernama lain jaringan komputeraspek utama keamanan jaringanserver komponen jaringan komputeraspek teknis pada jaringan komputertopologi jaringan yang lebih sederhana yaitulapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu...

Technology 2025-05-05

Technology crossword puzzle
Across
  1. Writing code to create software or applications.
  2. The physical parts of a computer system.
  3. Protection of internet-connected systems from cyber threats.
  4. The use of scientific knowledge for practical purposes.
  5. A mobile phone with advanced features and internet access.
Down
  1. Programs and operating information used by a computer.
  2. A software program designed for a specific task on devices.
  3. A global network connecting millions of computers worldwide.
  4. A group of interconnected computers or devices.
  5. An electronic device that processes data and performs tasks.

10 Clues: The physical parts of a computer system.A group of interconnected computers or devices.Writing code to create software or applications.Programs and operating information used by a computer.The use of scientific knowledge for practical purposes.A mobile phone with advanced features and internet access....

Technology & Social Media 2025-06-13

Technology & Social Media crossword puzzle
Across
  1. – Something that spreads quickly on the internet.
  2. – A saved copy of files or data in case you lose them.
  3. – Programs or apps used on a computer or phone.
  4. – A machine or tool that helps do tasks, like a phone or laptop.
  5. – A small, smart electronic tool or device.
Down
  1. – A person who affects others' opinions online.
  2. – Related to technology using numbers, like computers.
  3. – A new idea or method that improves something.
  4. – Protection against online attacks and hackers.
  5. – The right to keep your personal information safe.

10 Clues: – A small, smart electronic tool or device.– A person who affects others' opinions online.– A new idea or method that improves something.– Programs or apps used on a computer or phone.– Protection against online attacks and hackers.– Something that spreads quickly on the internet.– The right to keep your personal information safe....

Career Focus 7 2025-11-05

Career Focus 7 crossword puzzle
Across
  1. What the trainee earns upon successful completion
  2. Critical skill needed for protecting digital assets
  3. Formal training received at an RTO like TAFE
Down
  1. The capacity to adjust to a new work task or technology
  2. Type of program: A university preparation or bridging course
  3. The ability to move skills from one job to another
  4. The overall program of study you're enrolled in
  5. National GTO with an Albury-Wodonga presence
  6. In demand professional who builds applications or software systems
  7. LETTER A one-page letter sent with a resume

10 Clues: LETTER A one-page letter sent with a resumeNational GTO with an Albury-Wodonga presenceFormal training received at an RTO like TAFEThe overall program of study you're enrolled inWhat the trainee earns upon successful completionThe ability to move skills from one job to anotherCritical skill needed for protecting digital assets...

Industry 4.0 2025-10-17

Industry 4.0 crossword puzzle
Across
  1. Visual display of performance metrics
  2. A digitally Tech-enabled logistics network (two words)
  3. A reality, which creates a fully immersive digital environment
  4. Digital modelling of real-world processes
  5. Software that defines functions, protocols, and data formats to allow different software applications to communicate with each other.
  6. Supervisory Control and Data Acquisition (abbreviation)
  7. A Network of connected machines sharing data (3)Cybersecurity
  8. The Monitoring of the location of equipment and resources
  9. The examination of raw data information to find useful patterns
  10. A manufacturing process focused on reducing waste
  11. A type of manufacturing often referred to as 3D printing
  12. A type of maintenance that uses data analytics to prevent equipment failure
  13. This type of reality overlays digital information on the real world
  14. Near-field communication for contactless exchange
  15. A manufacturing software system for managing shop-floor operations (abbrev)
  16. A System which makes Machines capable of operating without human control
  17. A computerised network of remote servers which host internet data
  18. Software systems that controls warehouse management operations (abbreviation)
Down
  1. Minimising environmental impact of operations
  2. Protection against online threats in connected systems
  3. A collaborative robot that interacts physically with humans.
  4. A decentralised digital ledger that stores linked blocks of cryptographically secured records
  5. A type of factory whose physical processes and machinery are governed by an AI system, reducing the human workforce
  6. Manufacturing equipment which is fully controlled by digital systems.
  7. Key Performance Indicator
  8. Large volume of data that can now be collected from all aspects of manufacturing
  9. The capability of computational systems to perform tasks typically associated with human intelligence
  10. A software system that integrates and manages core business processes within an organization, such as production, supply chain, finance, and human resources
  11. A virtual model of a physical machine, part, process, or system
  12. A reality which is a blend of physical and digital worlds
  13. A Device used to collect and transmit performance data
  14. Radio-frequency identification for tracking
  15. Short for Overall Equipment Effectiveness)

33 Clues: Key Performance IndicatorVisual display of performance metricsDigital modelling of real-world processesShort for Overall Equipment Effectiveness)Radio-frequency identification for trackingMinimising environmental impact of operationsA manufacturing process focused on reducing wasteNear-field communication for contactless exchange...

Information Security 2022-09-29

Information Security crossword puzzle
Across
  1. A type of malware that records every single press of the keyboard that you make
  2. A key only used by one individual to decrypt
  3. A key that can be used by anyone to encrypt messages
  4. Gaining unauthorised access to or control of a computer system
  5. A trap for cybersecurity criminals
  6. Bullying that takes place online
  7. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
  8. Special viruses that move from computer to computer without human action
  9. Impersonation of email address or device to gain unauthorized access to information or systems
  10. Copy of data
  11. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
  12. A weaknesses in computers
  13. scrambled data
  14. Ethical hacking in order to find any cybersecurity weaknesses
  15. Raw data that is put into context and has meaning
Down
  1. core of an operating system
  2. General term for programs that gains access to your system for unethical reasons
  3. Email that contains a message with a suspicious link designed to steal personal information
  4. annoying malware that spams you with ads
  5. Software that protects computers from virus related harm
  6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
  7. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
  8. Malicious code typically disguised as a legitimate program
  9. To take advantage of a system's weakness
  10. I am not a robot
  11. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
  12. Secretly watches computer activity
  13. Collection of malware infested computers that form a network to attack
  14. Electronic messages sent through the internet
  15. Readable data
  16. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  17. An internal security team that defends against both real attackers and Red Teams

32 Clues: Copy of dataReadable datascrambled dataI am not a robotA weaknesses in computerscore of an operating systemBullying that takes place onlineA trap for cybersecurity criminalsSecretly watches computer activityannoying malware that spams you with adsTo take advantage of a system's weaknessA key only used by one individual to decrypt...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-15

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Technology Field concerned with social media privacy.
  2. A message sent on Twitter.
  3. A platform founded by Mark Zuckerburg.
Down
  1. A self portrait taken by using the front camera.
  2. A network for online picture sharing.
  3. The fastest growing social media platform.
  4. An act that can be made by a Facebook user.

7 Clues: A message sent on Twitter.A network for online picture sharing.A platform founded by Mark Zuckerburg.The fastest growing social media platform.An act that can be made by a Facebook user.A self portrait taken by using the front camera.Technology Field concerned with social media privacy.

SecuritySquares-Advanced 2023-03-03

SecuritySquares-Advanced crossword puzzle
Across
  1. 01101100 01101111 01110111 01100101 01110011 00001010
  2. A piece of code put in to fix an error
  3. Unique string of numbers that identifies a device connected to a network
  4. Intent to do harm
  5. The second in CIA triad
  6. When an attacker tricks users into clicking on hidden elements
  7. A characteristic or distinctive pattern that can be searched for
  8. Rivest-Shamir-Adleman
  9. Pay or else
  10. A type of media manipulation
Down
  1. A White hat hacker
  2. Converting enciphered text to plain text
  3. Unique identifier assigned to a NIC
  4. The use of mathematical techniques to provide security services
  5. A scam without a rod and reel but with voice mail
  6. The process of uncovering trends and patterns in large amounts of data
  7. Information Technology Infrastructure Library
  8. The process for overseeing the cybersecurity teams

18 Clues: Pay or elseIntent to do harmA White hat hackerRivest-Shamir-AdlemanThe second in CIA triadA type of media manipulationUnique identifier assigned to a NICA piece of code put in to fix an errorConverting enciphered text to plain textInformation Technology Infrastructure LibraryA scam without a rod and reel but with voice mail...

Thematic Puzzle 2024-12-16

Thematic Puzzle crossword puzzle
Across
  1. – “A structure for growing plants, also related to gases trapping heat.”
  2. – “The variety of life in the world or a particular habitat.”
  3. Exchange – “The sharing of ideas, traditions, and values between cultures.”
  4. – “A distributed digital ledger system.”
  5. – “Securing information through coding.”
  6. – “A global network connecting billions of devices.”
  7. Footprint – “The total emissions of carbon dioxide by an individual or group.”
  8. – “At risk of extinction.”
Down
  1. – “Protecting data from unauthorized access.”
  2. – “The natural home of a plant or animal.”
  3. – “A type of energy source that is sustainable.”
  4. Trade – “Exchange of goods and services internationally.”
  5. – “The act of protecting and preserving nature.”
  6. – “A community of interacting organisms and their environment.”
  7. Energy – “Energy from sustainable sources like solar or wind.”

15 Clues: – “At risk of extinction.”– “A distributed digital ledger system.”– “Securing information through coding.”– “The natural home of a plant or animal.”– “Protecting data from unauthorized access.”– “A type of energy source that is sustainable.”– “The act of protecting and preserving nature.”– “A global network connecting billions of devices.”...