cybersecurity Crossword Puzzles
MIC Quiz 2 2023-04-25
Across
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
Down
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
Digital Media crossword puzzle. 2023-09-14
5 Clues: ur chatting • playing games • subway surfers • so u don’t get hacked • A social media app based on chatting with friends cybersecurity a way of protecting you from hackers
MIC Quiz 2 2023-04-26
Across
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
Down
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
Cyber Aware 2022-11-17
Across
- an email that attempts to gain sensitive data or credentials
- software that compromises the operation of a system by performing an unauthorized function or process
- hacker with criminal intent
- activity or process where information systems are protected from unauthorized use
Down
- a person who uses computers to gain unauthorized access to data
- a dishonest scheme
- disclosure of sensitive information outside organization
- an observable occurrence in an information system or network
8 Clues: a dishonest scheme • hacker with criminal intent • disclosure of sensitive information outside organization • an email that attempts to gain sensitive data or credentials • an observable occurrence in an information system or network • a person who uses computers to gain unauthorized access to data • ...
AI in Cyberspace: Beyond the Hype 2025-03-07
Across
- A term often paired with "learning" in AI advancements.
- The practice of protecting computer systems from threats.
- A type of network modeled after the human brain.
- AI systems designed to operate without human intervention.
Down
- Related to intelligence that mimics human decision-making.
- The use of AI to protect cyberspace from cyber threats.
- A step-by-step procedure used in AI for decision-making.
- The process AI systems undergo to improve performance.
8 Clues: A type of network modeled after the human brain. • The process AI systems undergo to improve performance. • The use of AI to protect cyberspace from cyber threats. • A term often paired with "learning" in AI advancements. • A step-by-step procedure used in AI for decision-making. • The practice of protecting computer systems from threats. • ...
Cyber Security Crossword 1 2025-09-22
Across
- Part of the Internet hidden behind passwords
- Area of computer science concerned with keeping data safe
- A dishonest scheme designed to cheat someone out of money, property, or other valuable things
- Gaining access to data without permission
Down
- Type of fraud where someone pretends to be someone else.
- Part of the Internet where illegal activity occurs
- Part of the Internet accessible via search engines
- Tricking someone into giving up personal information, often via email.
8 Clues: Gaining access to data without permission • Part of the Internet hidden behind passwords • Part of the Internet where illegal activity occurs • Part of the Internet accessible via search engines • Type of fraud where someone pretends to be someone else. • Area of computer science concerned with keeping data safe • ...
Blikken jubileum NWO Woord van het jaar 2024-01-22
Across
- Open deur voor hackers.
- Iedereen mag mee doen met deze cursus
- De beste plek om je auto schoon te maken van heel Scandinavië
- Surft snel weg in de auto
- Sesamstraatbewoner zonder bekakte r ontmoet presentatrice van Lingo
- Hard rock samenwerkingsverband van Steve Harris en Bruce Dickinson?
- Timmerman met een Ierse opa
- Wordt vaak geserveerd met kletskoek
- Wordt hierop verband gewikkeld?
- Partijtje van complottheoristen?
- Wordt hierop het nieuwe functiehuis gebouwd?
- Conclaaf in de lerarenkamer
- Tijd om in beweging te komen?
- Dit vormden de zeven dwergen
- Werken aan een suffe klus.
Down
- Geeft energie aan financiële zaken.
- Terughoudendheid is op zijn plaats op kantoor
- Internetpolitie
- Oproepen tot rekenen moet je tijdig in de agenda zetten.
- Allen die naar de dierentuin gaan
- Tegemoetkoming voor het winnende boontje
- Dit jaar door USV Hercules aan Ajax opgelegd, niet duurzaam
- Rustgevende hobby op de computer?
- Kwaal bij aanvragers in de NWA en het KIC?
- Familie van de airbag en de kniebeschermer.
25 Clues: Internetpolitie • Open deur voor hackers. • Surft snel weg in de auto • Werken aan een suffe klus. • Timmerman met een Ierse opa • Conclaaf in de lerarenkamer • Dit vormden de zeven dwergen • Tijd om in beweging te komen? • Wordt hierop verband gewikkeld? • Partijtje van complottheoristen? • Allen die naar de dierentuin gaan • Rustgevende hobby op de computer? • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
charlotte's computer apps review 2022-05-02
Across
- Protects your computer from cyber attacks
- Where all of your stuff is stored.
- An app that you use functions in.
- The page at the very end of something to show where you got your information
- What app do you make a poster or card on?
- Teacher.
- What app do you use to communicate with teachers or other students during school time?
- Mean people that try to steal your information online
- An app used to make your works cited page.
- Copying other people's words is known as _____
Down
- This class.
- An app that makes it easy to present your ideas.
- Something that is really bad in Ms. Burghorns class
- You can make videos or podcasts on _____.
- Something supplied by the school so we can do all of this.
- An app used to make a survey.
- What is the default size margin?
- Format for English essays
- Quick access to websites or apps.
- What app can you write essays and papers in.
20 Clues: Teacher. • This class. • Format for English essays • An app used to make a survey. • What is the default size margin? • An app that you use functions in. • Quick access to websites or apps. • Where all of your stuff is stored. • Protects your computer from cyber attacks • You can make videos or podcasts on _____. • What app do you make a poster or card on? • ...
RHS Clubs and Organizations 2025-03-20
Across
- Readers unite
- OuiOui
- PomPoms and Megaphones
- Dead language
- If you want to be a veterinarian you should join this club
- Students who enjoy SteM
- High kicks and splits
- Gamers compete here
- Touchdown
- Makeup and Hair
- 3 point shot
- Best note takers in the school
- Silly gooses on the six strings
- People who care about the planet
- Do Re Mi Fa So La Ti Do
- The military at RHS
- Flag Twirling
Down
- Students who live for drama
- More sophisticated music
- Bird's View
- Students that love to compare styles
- Solving quarrels between students
- Articulate arguments and long monologues
- Spiking over a net
- School sanctioned fights
- Build yourself a friend
- Keeping people safe online
- Board games
- Underwater students
- We've got spirit! Yes We do!
- Hit a homerun
- Boot Scootin Boogie
- Students who live for the past
- Swinging rackets
- A musical bunch
35 Clues: OuiOui • Touchdown • Bird's View • Board games • 3 point shot • Readers unite • Dead language • Hit a homerun • Flag Twirling • Makeup and Hair • A musical bunch • Swinging rackets • Spiking over a net • Underwater students • Boot Scootin Boogie • Gamers compete here • The military at RHS • High kicks and splits • PomPoms and Megaphones • Build yourself a friend • Students who enjoy SteM • ...
TEKA TEKI SILANG EKONOMI DIGITAL 2024-10-26
Across
- contoh aplikasi di ekonomi digital dalam bidang Transportasi
- tersambung ke internet (daring)
- pembeli tidak perlu berhari-hari untuk belanja langsung ke Cina
- sesuatu yang berupa teks, gambar, video serta identitas yang tersimpan di internet
- standar kode QR nasional untuk pembayaran di Indonesia
- perusahaan atau perorangan yang menyediakan barang untuk dijual ke konsumen
- kegiatan produksi, distribusi, konsumsi
- peraturan dan undang undang dalam perlindungan konsumen
- menggunakan teknologi dan jaringan internet dalam menyimpan data dan memproses data
- banyaknya persaingan dalam ekonomi digital
- ciri utama ekonomi digital
Down
- keamanan data di internet
- kecerdasan buatan
- web atau aplikasi yang memungkinkan pembeli untuk mencari, memesan, dan membayar produk secara digital
- ponsel yang telah menunjang penggunaan berbagai aplikasi digital
- konsumen membeli jersey ke penjual tanpa perantara
- contoh aplikasi di ekonomi digital dalam bidang bisnis
- contoh aplikasi di ekonomi digital dalam bidang kesehatan
- contoh aplikasi di ekonomi digital dalam bidang perbankan
- kemampuan memahami dan menggunakan teknologi digital secara efektif
20 Clues: kecerdasan buatan • keamanan data di internet • ciri utama ekonomi digital • tersambung ke internet (daring) • kegiatan produksi, distribusi, konsumsi • banyaknya persaingan dalam ekonomi digital • konsumen membeli jersey ke penjual tanpa perantara • contoh aplikasi di ekonomi digital dalam bidang bisnis • standar kode QR nasional untuk pembayaran di Indonesia • ...
RU ITEC41 2025-04-18
Across
- Converting data into a secure format to prevent unauthorized access.
- Protection of data and systems from cyber threats.
- Ensuring information is only accessible to authorized individuals.
- Safeguarding data from unauthorized access or damage.
- Legal rights over creations, such as digital content.
- Legal entitlements related to digital privacy and data.
- A weakness that can be exploited in a system.
- Deceptive attempts to acquire sensitive information, often via email.
- Software designed to disrupt or damage systems.
- Unauthorized access to or exposure of data.
Down
- Limiting access to data or systems based on authorization.
- The accuracy and consistency of data.
- Responsibility for actions and decisions, especially regarding data.
- Permission granted for the use of personal data.
- Illegal activities conducted through digital means.
- The trace of an individual's online activity.
- Defense against digital threats and attacks.
- Monitoring or tracking of online activity.
- Unauthorized access to systems or networks.
- The right to keep personal information secure and undisclosed.
20 Clues: The accuracy and consistency of data. • Monitoring or tracking of online activity. • Unauthorized access to systems or networks. • Unauthorized access to or exposure of data. • Defense against digital threats and attacks. • The trace of an individual's online activity. • A weakness that can be exploited in a system. • Software designed to disrupt or damage systems. • ...
cybercrime 2024-11-09
Across
- Virus or worm code hidden within a seemingly harmless program
- Theft Stealing another person’s identity to impersonate them online
- Fake messages asking for sensitive information
- Protection Protecting children from inappropriate online content
- Act of unauthorized copying or using someone's content
- Fake sites mimicking real ones to steal information
- Passwords, PINs, and fingerprints used for digital security
- Protecting data and systems from cyber attacks
- Software designed to harm or exploit computers
- Common scam emails that trick people into sharing private info
- Attacks aimed at disrupting or disabling a network
Down
- Financial theft through hacking or scams
- Law-breaking activities online
- The backbone of online communications targeted by cybercriminals
- Method of verifying identity online, often in two steps
- Tracking software that monitors user activity without consent
- Criminals who exploit security weaknesses online
- Testing Breaking into a system to test its defenses legally
- Program that spreads across computers, copying itself
- Illegal access to systems without permission
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Fake messages asking for sensitive information • Protecting data and systems from cyber attacks • Software designed to harm or exploit computers • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
CyberCTFHub 2025-06-10
Across
- An error in a computer program
- Malware designed to hide its presence
- Software that secretly collects user information
- A type of malware that disguises itself as normal software
- A language used to interact with databases
- A one-way process to convert data to a fixed value
- Someone who gains unauthorised access to systems
- A way to take advantage of a software flaw
- Software designed to harm or exploit a device
- The process of converting data into a secret code
Down
- A system that blocks unwanted network traffic
- A network of infected computers controlled remotely
- A secret word used to gain access to something
- Hiding data inside images or other files
- A fix released for software vulnerabilities
- Malware that locks files and demands payment
- A fake email or message that tries to trick you into giving personal information
- Software that records everything you type
- A tool that hides your IP and encrypts your connection
- A cybersecurity competition to test hacking skills
20 Clues: An error in a computer program • Malware designed to hide its presence • Hiding data inside images or other files • Software that records everything you type • A language used to interact with databases • A way to take advantage of a software flaw • A fix released for software vulnerabilities • Malware that locks files and demands payment • ...
Science and Technology 2024-12-16
Across
- Computing - Storing and accessing data over the Internet
- Footprint - Measure of greenhouse gas emissions
- - Efforts to protect natural resources
- - Living without depleting resources
- - When a species no longer exists
- - Technology that designs and operates robots
- Mining - Extracting patterns from large datasets
- - At risk of extinction
- Computing - Using quantum mechanics for calculations
- - Protecting systems from online threats
- - Inclusion of different people or ideas.
- - Worldwide integration and interaction of economies.
Down
- - The increase in city development and growth.
- - A glass structure for growing plants
- - Engineering at an atomic scale
- - A decentralized digital ledger
- - Government by the people.
- - A set of steps for solving a problem
- - Community of interacting organisms and their environment
- - The natural home of an organism
- - Global computer network
- - The removal of trees on a large scale
- Media - Online platforms for connecting people
- Intelligence - Simulated human intelligence in machines
- - The process of ice turning into water
25 Clues: - At risk of extinction • - Global computer network • - Government by the people. • - Engineering at an atomic scale • - A decentralized digital ledger • - The natural home of an organism • - When a species no longer exists • - Living without depleting resources • - A glass structure for growing plants • - A set of steps for solving a problem • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
Computer Science 2024-03-21
Across
- Analyse de données
- Contrôle de version
- Apprentissage profond
- Interface utilisateur (IU)
- Algorithmes
- Système d'exploitation (SE)
- Développement web
- Cryptage
- Décryptage
- Réalité augmentée (RA)
- Matériel informatique
- Vision par ordinateur
- Expérience utilisateur (UX)
- Algorithme
- Réalité virtuelle (RV)
- Langage de programmation
- Robotique
- Base de données
- Apprentissage automatique
- Intelligence artificielle (IA)
- Structure de données
- Internet des objets (IdO)
- Architecture logicielle
Down
- Informatique quantique
- Technologie de l'information (TI)
- Développement de logiciels
- Compilateur
- Cybersécurité
- Informatique en nuage
- Arrière plan
- Frontal
- development Développement d'applications mobiles
- Génie logiciel
- Graphisme informatique
- Exploration de données
- Réseaux neuronaux artificiels
- networks Réseaux neuronaux
- Débogage
- Programmation
- Réseau
40 Clues: Réseau • Frontal • Cryptage • Débogage • Robotique • Décryptage • Algorithme • Compilateur • Algorithmes • Cybersécurité • Arrière plan • Programmation • Génie logiciel • Base de données • Développement web • Analyse de données • Contrôle de version • Structure de données • Apprentissage profond • Informatique en nuage • Matériel informatique • Vision par ordinateur • Informatique quantique • Graphisme informatique • ...
All About John Paul 2024-02-09
Across
- The science of God
- What you study in astronomy
- The name of a pope
- The national language of Belize
- The skill of persuading people
- Your first step in becoming a JP student
- Place where you bathe on the OLA
- What’s big and blue at JPII
- A game where queens are stronger than kings
- The part of you that is physical
- What you sit around during the OLA
- A book you use to teach people the Catholic faith
- What God called Himself when Moses asked
Down
- The love of wisdom
- ____ Leadership Adventure
- You go on a mission trip to ____ others
- The part of you that is invisible
- The concentration where you learn finance
- The language that Spanish is based on
- Where Jesus is on campus
- The concentration with math and science
- The kind of education that makes you free
- The name of the campus dog
- How you study cybersecurity at JPII
- The current president of the student body
25 Clues: The love of wisdom • The science of God • The name of a pope • Where Jesus is on campus • ____ Leadership Adventure • The name of the campus dog • What you study in astronomy • What’s big and blue at JPII • The skill of persuading people • The national language of Belize • Place where you bathe on the OLA • The part of you that is physical • The part of you that is invisible • ...
TJ's Crossword 2024-05-29
Across
- What color is my new RIT sweatshirt?
- How many brothers do I have?
- What is my youngest brother's name?
- Who is my favorite person in the world?
- What's my favorite color?
- What is my oldest cousin's name?
- Who do I want to make out aggressively with?
- What is the name of the golf course I work at?
- What kind of car do I have?
- what day of the month is my birthday?
- What is the name of my highschool?
- The name of the resteraunt we ate at was Finch ____.
- What town is my real house in?
- What was I on when I bit a hole through my tongue?
Down
- What is my mom's name?
- What is going to be my major in college?
- What is my oldest brother's name?
- What is the name of the lake I live at during the summer?
- What is my middle name?
- What color are my eyes?
- What do I eat every Friday night?
- Who is the most attractive person in the world?
- What is my dad's name?
- What street is my real house on?
24 Clues: What is my mom's name? • What is my dad's name? • What is my middle name? • What color are my eyes? • What's my favorite color? • What kind of car do I have? • How many brothers do I have? • What town is my real house in? • What is my oldest cousin's name? • What street is my real house on? • What is my oldest brother's name? • What do I eat every Friday night? • ...
AHMAD WILDAN ARFIANTO/01/XF 2025-04-15
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
Zahra puspita_Xf_35 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
FIKO ARDIA PRATAMA , XF/13 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
M.affan.r.r/24 2025-04-29
Across
- Proses menyebarkan informasi secara digital
- Profesi yang mengelola dan merancang sistem jaringan
- Hak atas ciptaan disebut hak
- Platform untuk melaporkan konten berbahaya
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Orang yang menulis dan mengembangkan kode program
- Spesialis yang menjaga keamanan sistem informasi
- Kata kunci untuk mencari frasa secara tepat di Google
- Istilah untuk mengecualikan kata dalam pencarian Google
- Platform pencarian yang sangat populer di dunia
- Orang yang menguji kualitas perangkat lunak
- Konten yang menyesatkan dan tidak benar
- Informasi yang memprovokasi dan merugikan disebut
Down
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Proses memeriksa kebenaran informasi
- Format umum untuk gambar digital
- Budaya yang muncul dan berkembang di internet
- Profesi yang mengubah data menjadi informasi berharga
- Hak eksklusif atas merek disebut hak
- Platform berbagi video terpopuler saat ini
- Singkatan dari Hak Atas Kekayaan Intelektual
- Pelanggaran terhadap HAKI disebut
- Perlindungan hukum terhadap ide atau ciptaan
- Pihak yang berwenang mengawasi konten digital
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Proses menyebarkan informasi secara digital • ...
M.Alif Nurdiansyah/26/XF 2025-04-29
Across
- Platform pencarian yang sangat populer di dunia
- Platform berbagi video terpopuler saat ini
- Proses menyebarkan informasi secara digital
- Istilah untuk mengecualikan kata dalam pencarian Google
- Digunakan untuk mencari kata dalam situs tertentu
- Singkatan dari Hak Atas Kekayaan Intelektual
- Orang yang menulis dan mengembangkan kode program
- Pelanggaran terhadap HAKI disebut
- Hak eksklusif atas merek disebut hak
- Proses memeriksa kebenaran informasi
- Konten yang menyesatkan dan tidak benar
- Orang yang menguji kualitas perangkat lunak
- Perlindungan hukum terhadap ide atau ciptaan
Down
- Pihak yang berwenang mengawasi konten digital
- Budaya yang muncul dan berkembang di internet
- Spesialis yang menjaga keamanan sistem informasi
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Konten yang dibagikan secara luas disebut konten
- Profesi yang mengelola dan merancang sistem jaringan
- Format umum untuk gambar digital
- Hak atas ciptaan disebut hak
- Kata kunci untuk mencari frasa secara tepat di Google
- Profesi yang mengubah data menjadi informasi berharga
- Platform untuk melaporkan konten berbahaya
- Informasi yang memprovokasi dan merugikan disebut
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Hak eksklusif atas merek disebut hak • Proses memeriksa kebenaran informasi • Konten yang menyesatkan dan tidak benar • Platform berbagi video terpopuler saat ini • Platform untuk melaporkan konten berbahaya • Proses menyebarkan informasi secara digital • ...
M.Reza Aditya.S/25/X-F 2025-04-29
Across
- Proses menyebarkan informasi secara digital
- Profesi yang mengelola dan merancang sistem jaringan
- Hak atas ciptaan disebut hak
- Platform untuk melaporkan konten berbahaya
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Orang yang menulis dan mengembangkan kode program
- Spesialis yang menjaga keamanan sistem informasi
- Kata kunci untuk mencari frasa secara tepat di Google
- Istilah untuk mengecualikan kata dalam pencarian Google
- Platform pencarian yang sangat populer di dunia
- Orang yang menguji kualitas perangkat lunak
- Konten yang menyesatkan dan tidak benar
- Informasi yang memprovokasi dan merugikan disebut
Down
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Proses memeriksa kebenaran informasi
- Format umum untuk gambar digitalnya
- Budaya yang muncul dan berkembang di internet
- Profesi yang mengubah data menjadi informasi berharga
- Hak eksklusif atas merek disebut hak
- Platform berbagi video terpopuler saat ini
- Singkatan dari Hak Atas Kekayaan Intelektual
- Pelanggaran terhadap HAKI disebut
- Perlindungan hukum terhadap ide atau ciptaan
- Pihak yang berwenang mengawasi konten digital
25 Clues: Hak atas ciptaan disebut hak • Pelanggaran terhadap HAKI disebut • Format umum untuk gambar digitalnya • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Proses menyebarkan informasi secara digital • ...
gruppo 3 2025-04-04
Across
- Scrittura di codice per creare software.
- Archivio strutturato di dati.
- Parola che unisce frasi o parole.
- Sequenza di istruzioni per risolvere un problema.
- Parola che indica un'azione o uno stato.
- Protezione di dati e sistemi informatici.
- Componenti fisici di un computer.
- Uso di server online per archiviare ed elaborare dati.
- Connessione tra computer per scambio di dati.
- Chi compie l'azione o di cui si parla nella frase.
- Parte della frase che aggiunge informazioni al verbo o al nome.
- Software che gestisce il computer (es. Windows, Linux).
Down
- Simulazione dell’intelligenza umana nei computer.
- Parola che collega un sostantivo ad altri elementi della frase.
- Parola che indica una persona, un oggetto o un concetto.
- Parola che sostituisce un sostantivo.
- Parola che precede il sostantivo, determinandone il genere e il numero.
- Parola che descrive un sostantivo.
- Programmi che fanno funzionare un computer.
- Parola che modifica un verbo, un aggettivo o un altro avverbio.
20 Clues: Archivio strutturato di dati. • Parola che unisce frasi o parole. • Componenti fisici di un computer. • Parola che descrive un sostantivo. • Parola che sostituisce un sostantivo. • Scrittura di codice per creare software. • Parola che indica un'azione o uno stato. • Protezione di dati e sistemi informatici. • Programmi che fanno funzionare un computer. • ...
Tugas Daring Informatika Gadis Edycia X-I/12 2025-04-16
Across
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Profesi bidang keamanan data dan jaringan
- Operator untuk mengecualikan istilah dari pencarian (simbol)
- Singkatan dari Hak atas Kekayaan Intelektual
- Perlindungan atas penemuan teknologi
- Lembaga negara pengawas konten digital
- Jenis HAKI yang melindungi nama dagang
- Alat untuk menyaring konten tidak pantas
- Konten berisi kebencian atau diskriminasi
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Proses membuat media seperti video atau gambar digital
- Jenis tarian daerah yang bisa dijadikan konten
Down
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Operator untuk alternatif kata
- Istilah untuk penyebaran konten ke publik
- Tindakan menyalin karya tanpa izin
- Proses mengecek kebenaran sebuah informasi
- Istilah singkat untuk pengembang situs web
- Berita palsu yang menyesatkan publik
- Syntax untuk mencari dokumen tertentu seperti PDF
- Platform media sosial populer untuk video pendek
- Simbol untuk mencari frasa tepat
- Orang yang menulis dan mengembangkan kode
- Profesi yang fokus ke tampilan dan pengalaman pengguna
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Perlindungan atas penemuan teknologi • Berita palsu yang menyesatkan publik • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Istilah untuk penyebaran konten ke publik • ...
Facets of Public Safety 2024-08-09
Across
- political process that focuses on the design of the land.
- practice of safeguarding buyers of goods and services.
- not guilty of a crime or offense.
- specialized state agencies.
- way in which safety in a workplace is managed.
- All government-owned, operated, and maintained infrastructure.
- organizations that ensure public safety, security, and health
- improving the health of people
Down
- culpable of or responsible for a specified wrongdoing.
- criminal law system
- is the managerial function charged with creating the framework.
- protect life and property through transporting.
- handling, preparation, and storage of food in ways that prevent foodborne illness.
- prevention of and protection from events
- field of health care concerned about well-beings.
- being protected against the criminal or unauthorized use of electronic data.
- federal law enforcement agency.
- the action of interrogating or the process of being interrogated.
- the aggregate of people living together in a more or less ordered community.
- organizations that deal with accidents and urgent problems.
- the policy or action of using vigorous campaigning to bring about political or social change.
21 Clues: criminal law system • specialized state agencies. • improving the health of people • federal law enforcement agency. • not guilty of a crime or offense. • prevention of and protection from events • way in which safety in a workplace is managed. • protect life and property through transporting. • field of health care concerned about well-beings. • ...
militer 2024-08-25
Across
- / A marksman who specializes in shooting targets from a distance.
- / A soldier who operates armored fighting vehicles.
- / A language expert in the military.
- / A religious leader who provides spiritual support.
- / Foot soldiers who engage in combat.
- / A soldier who gathers information about the enemy.
- / A person who serves in the army.
- / A person who repairs vehicles and machinery.
- / A person who plots the course for a vehicle or aircraft.
- / A specialist in protecting military computer systems.
Down
- / A pilot who flies military aircraft.
- / A soldier who operates large-caliber guns.
- / A person who works on a ship in the navy.
- / A soldier trained to parachute into operations.
- / A specialist in construction and repair in the military.
- / A military personnel trained to provide first aid.
- / A person who manages military supplies and transportation.
- / Military personnel who gather and analyze information.
- / A person who operates aircraft in the military.
- / A member of the U.S. Marine Corps.
20 Clues: / A person who serves in the army. • / A language expert in the military. • / A member of the U.S. Marine Corps. • / Foot soldiers who engage in combat. • / A pilot who flies military aircraft. • / A person who works on a ship in the navy. • / A soldier who operates large-caliber guns. • / A person who repairs vehicles and machinery. • ...
Information Technology 2025-11-12
Across
- hardware that shows or sends information OUT of the computer
- physical parts of a computer-you can touch
- finding and fixing tech problems
- career in IT that protects from hackers and threats
- information stored on a computer
- name you use to sign into a computer or website
- hardware that puts information into the computer
- trick to steal personal information
- using technology responsibly, safely, and respectfully
- programs or apps that tell the computer what to do
Down
- protecting information from attacks
- main software that runs a computer and manages everything else
- group of computers that are connected to share information
- secret word or phrase used to protect your information
- your username and password that allow you to access a computer or website
- harmful program
- wireless way to connect to the internet
- worldwide network that connects millions of computers to share informtion
- programs or apps that tell the computer what to do
- using computers and technology to store, send, and protect information
- saving files on the internet instead of on one device
21 Clues: harmful program • finding and fixing tech problems • information stored on a computer • protecting information from attacks • trick to steal personal information • wireless way to connect to the internet • physical parts of a computer-you can touch • name you use to sign into a computer or website • hardware that puts information into the computer • ...
BMSS BBL Puzzle 06.17.25 2025-06-17
Across
- Information that must be accurate and structured to enable AI and audits
- Official document filed to report withheld taxes
- Type of platform often used for secure, accessible data storage
- A collection of investments held by an individual or fund
- Protecting information from unauthorized access
- Measures that manage how data is handled and protected
- Permission or ability to retrieve and use data
- BMSS company providing IT and cybersecurity services
- Alabama city where BMSS opened a new office
- A consistent, standardized format for storing information
- BMSS wealth management company
- BMSS company specializing in payroll and HR solutions
Down
- Correctness and reliability of information
- Examination of records to ensure correctness and compliance
- Policies and processes ensuring proper management of information
- Measures used to evaluate how data and systems perform
- Pay for hours worked beyond the standard workweek
- Principles that guide personal and investment decisions
- Expenses associated with managing an investment
- An incomplete or inaccurate data structure can increase this
20 Clues: BMSS wealth management company • Correctness and reliability of information • Alabama city where BMSS opened a new office • Permission or ability to retrieve and use data • Expenses associated with managing an investment • Official document filed to report withheld taxes • Protecting information from unauthorized access • ...
TEMA 2 2025-10-24
Across
- Jaringan pengiriman barang dari gudang ke konsumen.
- Antarmuka yang menghubungkan sistem perangkat lunak (singkatan tiga huruf).
- Program otomatis yang mengeksekusi kontrak saat kondisi terpenuhi.
- Model jualan tanpa menyetok barang sendiri (perantara supplier ke pembeli).
- Nilai atau bintang yang diberikan pembeli ke penjual.
- Analisis data besar untuk insight bisnis.
- Upaya melindungi sistem dan transaksi digital dari serangan.
- Faktur elektronik yang dipakai untuk transaksi bisnis.
- Layanan penyimpanan dan komputasi via internet.
Down
- Bentuk kegiatan ekonomi lewat toko dan layanan di internet.
- Sistem pembayaran tanpa uang fisik.
- Proses awal memasukkan penjual/pegawai ke platform digital.
- Penilaian dari pengguna yang membantu reputasi penjual.
- Tahap pengiriman terakhir menuju alamat pembeli.
- Layanan yang memproses pembayaran online antara pembeli dan penjual.
- Strategi penjualan yang menggabungkan online dan offline.
- Istilah lain untuk toko yang beroperasi di internet.
- Bentuk ekonomi dengan pekerjaan fleksibel/pekerja lepas digital.
- Platform yang mempertemukan penjual dan pembeli (kata umum).
- Identitas digital pengguna untuk transaksi dan verifikasi.
20 Clues: Sistem pembayaran tanpa uang fisik. • Analisis data besar untuk insight bisnis. • Layanan penyimpanan dan komputasi via internet. • Tahap pengiriman terakhir menuju alamat pembeli. • Jaringan pengiriman barang dari gudang ke konsumen. • Istilah lain untuk toko yang beroperasi di internet. • Nilai atau bintang yang diberikan pembeli ke penjual. • ...
RU ITEC411 - Crime and Security 2023-10-17
Across
- A concealed entry point in communication systems
- Enhanced account security using multiple steps(acronym)
- This law places restrictive measures on information.
- Covert software that gathers user data
- Retail corporation affected by a major data breach in 2007.
- Legislation protecting intellectual property.
- Proving one's identity
- A United States federal law that governs unauthorized access to computer systems and data
- Deceptive cybersecurity trap for hackers.
- Activist use of hacking for social or political causes
- This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- False statements harming one's reputation.
- False spoken statements harming reputation.
- This process transforms information into a coded form to protect it from unauthorized access
- Using unique physical features for identification
- Malicious software that replicates and infects
- system is used in retail to process transactions, record sales, and manage inventory(acronym.
- Ethical hacking for security assessment.
- Deceptive online tactic to steal personal information
- U.S. law for wiretaps and law enforcement access
20 Clues: Proving one's identity • Covert software that gathers user data • Ethical hacking for security assessment. • Deceptive cybersecurity trap for hackers. • False statements harming one's reputation. • False spoken statements harming reputation. • Legislation protecting intellectual property. • Malicious software that replicates and infects • ...
Technology 2024-02-29
Across
- Temporary storage of frequently accessed data for faster retrieval.
- Open-source machine learning framework developed by Google.
- Security barrier preventing unauthorized access to a network.
- Protection against digital threats and unauthorized access.
- UI toolkit for building natively compiled applications for mobile, web, and desktop.
- Securing data by converting it into a coded format.
- Modern programming language for Android app development.
- Agile framework for managing and developing products.
- Framework for distributed storage and processing of big data.
- Open-source automation server for building, testing, and deploying software.
Down
- Versatile, object-oriented programming language.
- Identification using unique biological traits like fingerprints.
- Platform for automating application deployment and scaling.
- Collaboration between development and operations teams for efficient software delivery.
- High-level programming language known for readability and versatility.
- Remote storage and computing services accessed over the internet.
- Flexible and iterative approach to project management.
- JavaScript library for building user interfaces.
- Open-source operating system kernel.
- Software intermediary enabling communication between different applications.
20 Clues: Open-source operating system kernel. • Versatile, object-oriented programming language. • JavaScript library for building user interfaces. • Securing data by converting it into a coded format. • Agile framework for managing and developing products. • Flexible and iterative approach to project management. • Modern programming language for Android app development. • ...
Crossword puzzle 2024-04-30
Across
- Online moral principles.
- Tech-enabled capability.
- Online harassment.
- Tech proficiency.
- Digital image.
- Tech competency.
- Personal info fraud.
- Network security barrier.
- Online self-representation.
- Digital illegal activities.
- Personal recognition.
- Digital data secrecy.
- Data protection.
- Personal info protection.
- Malicious program blocker.
- Protection measures.
- Access authentication code.
- Data transfer to web.
- Harmful software.
- Global web network.
- Responsible online behavior.
- Fraudulent schemes.
- Effective digital info use.
- Online conduct regulations.
- Secure data encoding.
- Digital threat knowledge.
Down
- Personal online journals.
- Analytical reasoning.
- Secure web browsing.
- Malicious digital assault.
- Digital threat protection.
- Digital education.
- Identity verification.
- Digital threat potential.
- Digital security measures.
- Online activity traces.
- Web navigation software.
- Digital education platform.
- Info safeguarding measures.
- Tech access gap.
- Unauthorized info access.
- thinking: Logical analysis.
- Malicious intrusion.
- Personal info protection.
- Internet precaution.
- Defense against digital threats.
- Online data secrecy.
- Digital safety practices.
- Deceptive data theft tactics.
- Digital communication.
50 Clues: Digital image. • Tech competency. • Tech access gap. • Data protection. • Tech proficiency. • Harmful software. • Online harassment. • Digital education. • Global web network. • Fraudulent schemes. • Secure web browsing. • Personal info fraud. • Malicious intrusion. • Protection measures. • Internet precaution. • Online data secrecy. • Analytical reasoning. • Personal recognition. • ...
TUGAS DARING SALSABILA RAMADHANI X–E /32 2025-04-14
Across
- Singkatan dari Hak Atas Kekayaan Intelektual?
- Upaya menghapus konten berbahaya disebut?
- Orang yang membuat program komputer disebut?
- Konten digital yang mengangkat nilai budaya?
- Kata atau frasa yang diketik untuk mencari informasi?
- Hak cipta termasuk jenis...?
- Proses membuat gambar, video, atau tulisan disebut
- Mesin pencari buatan Microsoft?
- Informasi palsu yang disebarkan di internet?
- Lembaga yang mengatur HAKI di Indonesia?
- Spesialis keamanan sistem disebut?
- Mesin pencari populer buatan Google?
Down
- Menyebarkan konten ke banyak orang secara digital
- Profesi yang menganalisis data digital?
- Perlindungan terhadap merek dagang disebut...?
- Musik, tari, dan cerita rakyat termasuk dalam?
- Lembaga pemerintah yang mengawasi konten internet?
- Platform populer untuk menyebarkan video budaya?
- Simbol "©" menyatakan...?
- Ahli jaringan komputer disebut?
- operator untuk cari file tertentu
- Istilah untuk hasil yang muncul setelah pencarian?
- Desainer tampilan antarmuka aplikasi?
- Tempat mengetikkan kata kunci pada search engine?
- Pemeriksaan kebenaran suatu informasi?
- Konten yang mengandung kebencian disebut?
26 Clues: Simbol "©" menyatakan...? • Hak cipta termasuk jenis...? • Ahli jaringan komputer disebut? • Mesin pencari buatan Microsoft? • operator untuk cari file tertentu • Spesialis keamanan sistem disebut? • Mesin pencari populer buatan Google? • Desainer tampilan antarmuka aplikasi? • Pemeriksaan kebenaran suatu informasi? • Profesi yang menganalisis data digital? • ...
SOLVE ME 2025-04-22
Across
- – Writing instructions for computers using programming languages.
- – The use of science to solve problems or make life easier.
- – A new method, idea, or product.
- – The physical components of a computer system.
- – A secret word used to access something securely.
- – Converting data into a secret code to protect it.
- – Sending data or files from your device to the internet.
- – A device that detects changes in the environment.
- – Programs and other operating information used by a computer.
- – A group of interconnected computers.
- – A digital ledger used to securely record transactions.
Down
- – A machine capable of carrying out tasks automatically.
- – To transfer files from the internet to your device.
- – An unmanned flying vehicle controlled remotely.
- – Using machines or software to perform tasks without human intervention.
- – Protecting systems and data from digital attacks.
- – A global network connecting millions of computers.
- – A set of instructions for solving a problem or performing a task.
- – Facts or information stored digitally.
- – A path in which electricity flows.
20 Clues: – A new method, idea, or product. • – A path in which electricity flows. • – A group of interconnected computers. • – Facts or information stored digitally. • – The physical components of a computer system. • – An unmanned flying vehicle controlled remotely. • – A secret word used to access something securely. • – Protecting systems and data from digital attacks. • ...
TTS_NABILA_XH_26 2025-04-22
Across
- des Desainer tampilan antarmuka aplikasi
- Perlindungan untuk karya tulis atau seni
- Kantor yang menangani pendaftaran HAKI di Indonesia.
- Proses membuat suatu media atau karya
- Kata untuk mencari dalam satu situs saja.
- Hak atas logo atau simbol bisnis
- IT Orang yang mengelola server dan jaringan
- Proses menyaring konten buruk
- Warisan leluhur yang dijadikan identitas
- Proses mengecek fakta
- Proses menilai kebenaran informasi
- Orang yang menulis dan membuat program komputer
Down
- Operator pencarian untuk menghilangkan kata tertentu.
- Singkatan dari hak yang melindungi karya
- Tanda yang digunakan untuk pencarian tepat di search engine
- Platform berbagi video populer
- Profesi yang menjaga keamanan data
- Hak untuk menggunakan karya secara eksklusif.
- Penyebaran konten digital secara luas
- Lembaga pengawas media digital
- Kata yang digunakan untuk menyambung dua kata kunci dalam pencarian.
- Konten tidak layak yang harus dicegah
- Orang yang menganalisis kebutuhan sistem.
- Konten yang menyatukan unsur modern dan tradisional.
- Mesin pencari milik Google
25 Clues: Proses mengecek fakta • Mesin pencari milik Google • Proses menyaring konten buruk • Platform berbagi video populer • Lembaga pengawas media digital • Hak atas logo atau simbol bisnis • Profesi yang menjaga keamanan data • Proses menilai kebenaran informasi • Penyebaran konten digital secara luas • Proses membuat suatu media atau karya • Konten tidak layak yang harus dicegah • ...
Internet vocabulary 2025-02-27
Across
- pretending to be companies to get someone's persona information
- editing a photo online to get desired results
- software used to block use of computer soft ware for a sum of monry
- place to communicate online
- being protected against online cyber attacks
- proper way to communicate on the internet
- using the internet to exploit people usually minors
- data left behind on the internet
- Speaking in All Caps to convey shouting
Down
- someone post or comment to purposely invoke anger
- a frequently updated webpage for business purposes
- recording and posting videos of assault
- a packet of data used to track their user anytime they use a site
- criminal activities committed using electrics
- using the internet to illegally copy software and give it to others
- bullying that occurs over the internet
- website setting allowing to control who see the information of the user
- someone who exploits others
- using someone else's identity for financial gain
- using electronics to harass someone
20 Clues: someone who exploits others • place to communicate online • data left behind on the internet • using electronics to harass someone • bullying that occurs over the internet • recording and posting videos of assault • Speaking in All Caps to convey shouting • proper way to communicate on the internet • being protected against online cyber attacks • ...
Raqamli Iqtsodiyot 2025-12-20
Across
- Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
- Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
- Beshinchi avlod mobil aloqa texnologiyasi qaysi?
- Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
- Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
- Sun'iy intellektning inglizcha qisqartmasi nima?
- Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
- Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
- Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
- Shaxsiy virtual tarmoqning qisqartmasi nima?
- Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
- Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
- Raqamli tafovut nima?
- Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
- Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
- Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
- Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
- Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
- Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
- Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?
20 Clues: Raqamli tafovut nima? • Shaxsiy virtual tarmoqning qisqartmasi nima? • Beshinchi avlod mobil aloqa texnologiyasi qaysi? • Sun'iy intellektning inglizcha qisqartmasi nima? • Aqlli telefonlarni birlashtiruvchi umumiy atama nima? • Narsalar interneti qanday qurilmalarni o'z ichiga oladi? • Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima? • ...
Raqamli Iqtsodiyot 2025-12-20
Across
- Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
- Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
- Beshinchi avlod mobil aloqa texnologiyasi qaysi?
- Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
- Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
- Sun'iy intellektning inglizcha qisqartmasi nima?
- Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
- Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
- Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
- Shaxsiy virtual tarmoqning qisqartmasi nima?
- Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
- Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
- Raqamli tafovut nima?
- Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
- Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
- Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
- Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
- Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
- Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
- Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?
20 Clues: Raqamli tafovut nima? • Shaxsiy virtual tarmoqning qisqartmasi nima? • Beshinchi avlod mobil aloqa texnologiyasi qaysi? • Sun'iy intellektning inglizcha qisqartmasi nima? • Aqlli telefonlarni birlashtiruvchi umumiy atama nima? • Narsalar interneti qanday qurilmalarni o'z ichiga oladi? • Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima? • ...
Tech Talk 2024-03-23
Across
- Computer systems that can mimick human's brain
- An organized set of data that is stored in a computer and can be looked at and used in various ways
- Machines that can perform certain tasks automatically
- A machine with appearance and behaviors resembling a human
- Malicious code that is hidden in a computer software
- Graphics processing unit
- Physical parts of a computer
- A field related to protecting computers from online attacks
- Can be plug in many devices
Down
- A place you can visit without leaving your chair
- Math behind problem-solving
- Protects your computer from attacks
- Getting a file from the internet
- An AI-made video, image or recording that represents fake events, fake appearance or fake voices of a person
- Global network of computers
- The brain of a computer
16 Clues: The brain of a computer • Graphics processing unit • Math behind problem-solving • Global network of computers • Can be plug in many devices • Physical parts of a computer • Getting a file from the internet • Protects your computer from attacks • Computer systems that can mimick human's brain • A place you can visit without leaving your chair • ...
Second 2025-08-13
Across
- Force Attempting every possible password combination
- Person or group harassing others online
- Software designed to secretly monitor your activity
- Malicious code hidden inside another program
- Engineering Technique to trick people into revealing confidential information
- Security technique that converts data into unreadable form
- Hygiene Set of online habits to maintain security and privacy
Down
- Copy of important files kept separately for safety
- Horse Malicious program disguised as legitimate software
- Program that records every keystroke you type
- Fraud tactic to make a site look like another
- Official Indian body responding to cybersecurity incidents
- Injection Data theft by manipulating a website’s database queries
- Act 2000 Law in India dealing with cyber crimes
- Cyber attack exploiting a vulnerability before it’s fixed
- Device or software used to secure online privacy by masking IP
16 Clues: Person or group harassing others online • Malicious code hidden inside another program • Program that records every keystroke you type • Fraud tactic to make a site look like another • Act 2000 Law in India dealing with cyber crimes • Copy of important files kept separately for safety • Software designed to secretly monitor your activity • ...
Careers in Cybersecurity 2025-01-30
Across
- Advises organizations on best practices for securing their systems and data.
- Develops and oversees the implementation of complex security structures.
- Handles and mitigates the impact of security breaches and cyber incidents.
- Monitors and protects an organization's network from cyber threats and vulnerabilities.
Down
- Simulates cyberattacks to identify and fix security weaknesses.
- Investigates cybercrimes and analyzes digital evidence.
- Ensures that an organization adheres to cybersecurity laws and regulations.
- Designs and implements secure network solutions to defend against hackers and cyberattacks.
- Develops algorithms and encryption techniques to secure sensitive information.
9 Clues: Investigates cybercrimes and analyzes digital evidence. • Simulates cyberattacks to identify and fix security weaknesses. • Develops and oversees the implementation of complex security structures. • Handles and mitigates the impact of security breaches and cyber incidents. • Ensures that an organization adheres to cybersecurity laws and regulations. • ...
Cybersecurity: Attacks & Prevention 2025-03-18
Across
- - A type of attack where the attacker sends fraudulent messages to trick the recipient into revealing sensitive information.
- - A type of malicious software designed to block access to a computer system until a sum of money is paid.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - The act of attempting to gain unauthorized access to a computer system.
Down
- - A secret word or phrase that must be used to gain admission to something.
- - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A type of malware that replicates itself in order to spread to other computers.
- - A software application that runs automated tasks over the internet.
9 Clues: - A software application that runs automated tasks over the internet. • - The act of attempting to gain unauthorized access to a computer system. • - A secret word or phrase that must be used to gain admission to something. • - A type of malware that replicates itself in order to spread to other computers. • ...
Cybersecurity For Seniors 2025-10-06
Across
- When making an account set good ____
- Be _____ when sharing credit card information over the phone
- Means keeping information unchanged and trustworthy
- _____ calls/texts/links from strangers
Down
- _____ software when available
- Do not ____ passwords with anyone
- Do not _____ the same password
- Turn off _____ on all applications
- ______ applications you don't use anymore
9 Clues: _____ software when available • Do not _____ the same password • Do not ____ passwords with anyone • Turn off _____ on all applications • When making an account set good ____ • _____ calls/texts/links from strangers • ______ applications you don't use anymore • Means keeping information unchanged and trustworthy • ...
MP 2 Exam Review 2023-12-07
Across
- provides power to the main internal parts of a computer
- connects all the inside components of a computer
- Controls who or what can enter a space
- temporary form of memory which holds data whilst the computer is switched on
Down
- stores data when somebody saves their work
- security measures that protect people and property from harm
- a machine that works with information
- Protecting computer systems from digital and physical attack
- small files used by web servers to save browsing information
9 Clues: a machine that works with information • Controls who or what can enter a space • stores data when somebody saves their work • connects all the inside components of a computer • provides power to the main internal parts of a computer • security measures that protect people and property from harm • Protecting computer systems from digital and physical attack • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Cyber Ethics 2025-06-15
Across
- using another's work without proper credit.
- illegal intrusion into a computer system
- the act of bullying or harassing individuals online.
- fake news or misleading information online
- unauthorized copying or distribution of digital content.
- the process of verifying someone's identity online.
- manipulating digital media to spread false information.
Down
- software designed to detect, prevent and remove malicious programs from a computer system.
- fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- the practice of protecting networks and systems from cyber threats.
- unwanted or unsolicited digital messages.
- encryption method ensuring data security during transmission.
- the set of polite and respectful behavior expected in online communication.
- software designed to harm or exploit computer systems.
- the right to control access personal information online.
- someone who hacks into one's computer system illegally.
- computer virus that disguises itself as a harmless program.
17 Clues: illegal intrusion into a computer system • unwanted or unsolicited digital messages. • fake news or misleading information online • using another's work without proper credit. • the process of verifying someone's identity online. • the act of bullying or harassing individuals online. • software designed to harm or exploit computer systems. • ...
Cybercrime Crossword 2025-10-22
Across
- a popular cryptocurrency of a dog that has become a meme
- A section of the internet that is used for illegal intent
- A digital aid that protects
- An email scam trying to steal login credentials, starts with "PH"
- completely digital currency
- a network security system that monitors tragic, often referred to as a wall
- the first and most well known crypto currency
- general term for malicious software
Down
- deliberate deception to make personal gain
- when sensitive information is accessed or disclosed without authorization when someone gets through your data.
- an unauthorized person who gains access to a system
- scrambling data to protect from unauthorized access
- software or code that takes advantage
- a deceptive scheme used to trick someone out of money
- malware that encrypts and demands money
- software that secretly monitors a user's data.
- the target of a cyber attack.
17 Clues: A digital aid that protects • completely digital currency • the target of a cyber attack. • general term for malicious software • software or code that takes advantage • malware that encrypts and demands money • deliberate deception to make personal gain • the first and most well known crypto currency • software that secretly monitors a user's data. • ...
Programs of Study 2023-08-08
5 Clues: Digital protection under STEM. • A Program of study under Regional. • How many programs of study in CTE? • Nursing is under which Program of Study? • What Program of study is Culinay Arts under?
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2024-08-09
Cybersecurity Threats 2024-03-21
Across
- Games Some games might encourage to make in-app purchases
- in the Middle Attacker intercepts or manipulates the communication between two parties without their knowledge or consent.
- Websites avoid clicking on pop-up ads or links from unknown sources.
- Unauthorized individuals trying to gain access to computer systems
Down
- Disrupt the normal functioning of a targeted system
- Engineering Tricks the users into providing an entry point for malware.
6 Clues: Disrupt the normal functioning of a targeted system • Games Some games might encourage to make in-app purchases • Unauthorized individuals trying to gain access to computer systems • Websites avoid clicking on pop-up ads or links from unknown sources. • Engineering Tricks the users into providing an entry point for malware. • ...
TTS INFORMATIKA 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
Startaplar uchun raqamli talim platformasi data analis qansepsiyasi 2025-10-08
Across
- Learning — Onlayn ta’limda darslarni avtomatik tahlil qilishda ishlatiladigan sun’iy intellekt sohasi nima?
- — Ma’lumotlar bazasini boshqarish uchun ishlatiladigan tizim nomi nima?
- (User Interface) — Ta’lim platformasining foydalanuvchi interfeysi qisqacha qanday ataladi?
- — Foydalanuvchilarning o‘quv jarayonini yaxshilash uchun o‘rganilgan ma’lumotlardan foydalanish nima deyiladi?
- Data — Katta hajmdagi ma’lumotlarni saqlash texnologiyasi qanday ataladi?
- Analysis — Ma’lumotlarni to‘plash, tahlil qilish va ulardan xulosa chiqarish jarayoni nima deyiladi?
- Analytics — O‘quvchilarning xatti-harakatlarini oldindan taxmin qilish texnologiyasi nima?
- Content — O‘quv platformasida darslar, videolar va testlar jamlanmasi qanday ataladi?
Down
- — Startapda foydalanuvchilarning ma’lumotlarini himoyalovchi tizim nima?
- — O‘quvchilarning onlayn darsdagi faolligini o‘lchash jarayoni nima deyiladi?
- — Tahlil natijalarini jadval, grafik yoki diagramma shaklida chiqaruvchi vosita nima?
- — Ma’lumotlarni ko‘rgazmali tarzda ifodalash jarayoni nima deyiladi?
- Cleaning — Data analysisda “tozalash” jarayoni nimani anglatadi?
- Making — Ma’lumotlar asosida qaror qabul qilish jarayoni nima deyiladi?
- — Data analyst ishlashda eng ko‘p foydalanadigan dasturlash tili nomi nima?
15 Clues: Cleaning — Data analysisda “tozalash” jarayoni nimani anglatadi? • — Ma’lumotlarni ko‘rgazmali tarzda ifodalash jarayoni nima deyiladi? • — Ma’lumotlar bazasini boshqarish uchun ishlatiladigan tizim nomi nima? • Making — Ma’lumotlar asosida qaror qabul qilish jarayoni nima deyiladi? • — Startapda foydalanuvchilarning ma’lumotlarini himoyalovchi tizim nima? • ...
Net work componets 2022-10-27
Across
- What is an ISDN adapter?
- In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital.
- A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
- Description A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- A firewall is defined as a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- A bridge is a network device that connects multiple LANs
- Services Digital Network (ISDN) provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
- A network switch connects devices (such as computers, printers, wireless access points) in a network to each other, and allows them to 'talk' by exchanging data packets
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
9 Clues: What is an ISDN adapter? • A bridge is a network device that connects multiple LANs • A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together. • In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital. • ...
CROSSWORD 2025-10-30
6 Clues: The money a company earns from sales • The physical components of a computer • Type of business done over the internet • Online retail giant founded by Jeff Bezos • Protecting computers, networks, and data from digital attacks • A young company with a new business idea, often seeking investors
Cybersecurity Vocab 2022-03-10
Cybersecurity Concepts 2023-10-11
Across
- assets of the computer system should be accessible only by authorized parties
- A set of circumstances that has the potential to cause loss or harm
- A weakness in the system
Down
- assets can be modified only by authorized parties or in authorized ways
- authorized parties should not be prevented from accessing objects to which they have legitimate access
- An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats
6 Clues: A weakness in the system • A set of circumstances that has the potential to cause loss or harm • assets can be modified only by authorized parties or in authorized ways • assets of the computer system should be accessible only by authorized parties • authorized parties should not be prevented from accessing objects to which they have legitimate access • ...
Cybersecurity crosswords 2024-10-18
Across
- A person who uses technical skills to gain unauthorized access to systems.
- Protecting information from unauthorized access or harm.
- Facts and statistics collected for analysis or reference.
Down
- A group of connected computers that can share data and resources.
- To make something more current or improve it, often related to software.
- The ability to enter or use a system, network, or resource.
6 Clues: Protecting information from unauthorized access or harm. • Facts and statistics collected for analysis or reference. • The ability to enter or use a system, network, or resource. • A group of connected computers that can share data and resources. • To make something more current or improve it, often related to software. • ...
chin kai er-8Gamma 2023-01-19
Across
- information you have in your account
- raw fact and figures
- is the practice systems network and program from digital-attacks
Down
- usually aimed at accessing ,changing , or destroying sensitive information
- are created when that data has been processed and become meaningful.
- the social media company owned by mark Zuckerberg
6 Clues: raw fact and figures • information you have in your account • the social media company owned by mark Zuckerberg • is the practice systems network and program from digital-attacks • are created when that data has been processed and become meaningful. • usually aimed at accessing ,changing , or destroying sensitive information
Cybersecurity Crossword 2023-06-08
Across
- a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- a type of malicious software designed to disrupt a victim’s computer, server, or network.
- A chain of Internet-connected devices centrally controlled by a hacker
Down
- the process of disguising data so it’s impossible to decipher without authorization
- a type of email that you’ve technically solicited but may serve little to no purpose to you.
- tools that ask people to verify they are human and not robots
6 Clues: tools that ask people to verify they are human and not robots • A chain of Internet-connected devices centrally controlled by a hacker • the process of disguising data so it’s impossible to decipher without authorization • a type of malicious software designed to disrupt a victim’s computer, server, or network. • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Cybersecurity Terminology Puzzle (participation 3) 2023-01-27
Across
- software that is harmful
- software that checks for malware
- internet access at starbucks
- scrambling data in unreadable
- attacks seeking out personal info
- software that tracks you
- shield for data
- tech savy criminals stealing private information
- improving security tools for cloud infrastructure
- multiple attackers preventing legitimate users
Down
- tricking users to click an image
- altered image creating false reality
- malware that makes you pay
- malware pretending to be useful
- designs, builds, and tests security systems
- malware that displays adverts
- network pro learning hacking techniques
- online harassment that intimidates victims
18 Clues: shield for data • software that is harmful • software that tracks you • malware that makes you pay • internet access at starbucks • scrambling data in unreadable • malware that displays adverts • malware pretending to be useful • tricking users to click an image • software that checks for malware • attacks seeking out personal info • altered image creating false reality • ...
Wedding Sip & Solve Crossword 2022-09-27
Across
- Favorite planet?
- What sport did Patrick play in high school?
- Where was Sasha born?
- What does Patrick actually do?
- What were S&P doing when Patrick proposed?
- First American town where Sasha lived after moving from Russia?
- What state did Patrick grow up in?
- What is the name of the black dog running around this party?
- How many states have S&P lived in together?
- What brand of the van did S&P Drive across the country?
- Favorite National Park?
- Sasha’s favorite organ in the human body?
- Elopement Location?
- Town in Oregon where S&P lived?
- Patrick’s Spirit Animal?
Down
- What did Sasha study in college?
- S&P’s favorite musician currently?
- Patrick’s major in college?
- First friend that Sasha made in the US? (hint: guest of the wedding party)
- Where did Sasha & Patrick meet?
- Sasha’s spirit animal?
- Who was adopted first?
- How many years have S&P been together?
- What is the name of the goldendoodle running around here?
- Patrick’s favorite tree?
- Sasha’s favorite tree?
- Favorite hobby to do together?
27 Clues: Favorite planet? • Elopement Location? • Where was Sasha born? • Sasha’s spirit animal? • Who was adopted first? • Sasha’s favorite tree? • Favorite National Park? • Patrick’s favorite tree? • Patrick’s Spirit Animal? • Patrick’s major in college? • What does Patrick actually do? • Favorite hobby to do together? • Where did Sasha & Patrick meet? • Town in Oregon where S&P lived? • ...
Cyber Security 2020-11-07
Across
- A code to send a secret message
- Short for “Sending Particularly Annoying Messages.”
- protecting digital devices against attacks
- smaller pieces of info sent through the internet
- Copying a file from one computer to another
- software that secretly collects info about you
- info about you cause of online activity
- A name you type so you can use a computer
Down
- an attacker uses a list of words as potential passwords
- A secret word that allows you access
- software made to damage your computer or network
- cyberattack from hacker w/ bad links
- when an attacker tries many
- a place where data stops along the way
- A person who secretly gets access to a computer Network A system of computers that are connected
- data that describe another piece of data
- cyberattack where hacker pretends to know you
- A system of symbols used to create a secret message
- passwords in hopes of guessing correctly
- A system of rules and correct steps to follow
20 Clues: when an attacker tries many • A code to send a secret message • A secret word that allows you access • cyberattack from hacker w/ bad links • a place where data stops along the way • info about you cause of online activity • data that describe another piece of data • passwords in hopes of guessing correctly • A name you type so you can use a computer • ...
Mileidy & Elliot 2023-05-19
Across
- Mileidy's birthday month
- What did Elliot study in college?
- The state Elliot grew up in
- The new family name
- The wedding dessert
- The state Elliot was born in
- Their first big adventure together
- Wedding dinner
- What is the Man of Honor's name?
- The gemstone in both Mileidy's and Elliot's rings
- Mileidy's favorite drink
- The wedding is hosted at the _____ Castle
- What town are we in, right now?
- Mileidy's favorite season
- Mileidy's favorite flower
Down
- The town they met in
- How many brothers does Mileidy have?
- Their favorite holiday
- Elliot's favorite drink
- College they met at
- The town they live in
- What is the Best Man's name?
- Elliot's favorite color
- The month they began dating
- Elliot's middle name
- Mileidy's childhood dog
- Month of the wedding
- Color of Elliot's suit
- How many tattoos does Elliot have?
- What month did they get engaged?
30 Clues: Wedding dinner • The new family name • The wedding dessert • College they met at • The town they met in • Elliot's middle name • Month of the wedding • The town they live in • Their favorite holiday • Color of Elliot's suit • Elliot's favorite drink • Elliot's favorite color • Mileidy's childhood dog • Mileidy's birthday month • Mileidy's favorite drink • Mileidy's favorite season • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
cybercrime 2024-11-09
Across
- Testing Breaking into a system to test its defenses legally
- Attacks aimed at disrupting or disabling a network
- Financial theft through hacking or scams
- Protecting data and systems from cyber attacks
- Virus or worm code hidden within a seemingly harmless program
- Common scam emails that trick people into sharing private info
- Passwords, PINs, and fingerprints used for digital security
- Illegal access to systems without permission
- Fake sites mimicking real ones to steal information
Down
- Software designed to harm or exploit computers
- Law-breaking activities online
- Tracking software that monitors user activity without consent
- Protecting children from inappropriate online content
- Method of verifying identity online, often in two steps
- Theft Stealing another person’s identity to impersonate them online
- The backbone of online communications targeted by cybercriminals
- Program that spreads across computers, copying itself
- Fake messages asking for sensitive information
- Act of unauthorized copying or using someone's content
- Criminals who exploit security weaknesses online
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Software designed to harm or exploit computers • Protecting data and systems from cyber attacks • Fake messages asking for sensitive information • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
Fairuz Ijlal/11 Membuat TTS materi seperti tabel masing masing 5 soal 2025-04-15
Across
- Platform pencarian yang sangat populer di dunia
- Platform berbagi video terpopuler saat ini
- Proses menyebarkan informasi secara digital
- Istilah untuk mengecualikan kata dalam pencarian Google
- Digunakan untuk mencari kata dalam situs tertentu
- Singkatan dari Hak Atas Kekayaan Intelektual
- Orang yang menulis dan mengembangkan kode program
- Pelanggaran terhadap HAKI disebut
- Hak eksklusif atas merek disebut hak
- Proses memeriksa kebenaran informasi
- Konten yang menyesatkan dan tidak benar
- Orang yang menguji kualitas perangkat lunak
- Perlindungan hukum terhadap ide atau ciptaan
Down
- Pihak yang berwenang mengawasi konten digital
- Budaya yang muncul dan berkembang di internet
- Spesialis yang menjaga keamanan sistem informasi
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Konten yang dibagikan secara luas disebut konten
- Profesi yang mengelola dan merancang sistem jaringan
- Format umum untuk gambar digital
- Hak atas ciptaan disebut hak
- Kata kunci untuk mencari frasa secara tepat di Google
- Profesi yang mengubah data menjadi informasi berharga
- Platform untuk melaporkan konten berbahaya
- Informasi yang memprovokasi dan merugikan disebut
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Hak eksklusif atas merek disebut hak • Proses memeriksa kebenaran informasi • Konten yang menyesatkan dan tidak benar • Platform berbagi video terpopuler saat ini • Platform untuk melaporkan konten berbahaya • Proses menyebarkan informasi secara digital • ...
TTSINFORMATIKA-MARGARETH-TIARA-DEWI-XE 2025-04-15
Across
- Langkah awal sebelum membuat konten digital?
- nama lain hak merk
- Platform berbagi video terbesar?
- Pelindung hasil cipta seseorang agar tidak disalahgunakan?
- Proses menyebarluaskan informasi digital?
- Konten yang tidak sesuai norma disebut?
- Profesi yang menjaga keamanan data di jaringan?
- Search engine buatan Microsoft?
- Teknik mengoptimalkan situs agar muncul di hasil pencarian teratas?
- Pihak yang berwenang memblokir konten negatif
- Istilah untuk kata yang diketik saat mencari informasi?
- Hak atas karya cipta disebut juga ...?
Down
- mencari informasi di internet menggunakan mesin pencari disebut
- Orang yang membuat program komputer disebut?
- Jenis HAKI untuk perlindungan merek dagang?
- upaya memastikan informasi benar
- produksi dan Diseminasi Konten DigitaMedia berbentuk digital
- Pekerjaan yang fokus menganalisis data?
- profesi yang mengelola sistem jaringan komputer?
- Singkatan dari Hak Atas Kekayaan Intelektual?
- Pemeriksaan ulang konten disebut proses
- Nama search engine paling populer di dunia?
- Konten digital harus ... agar mudah dipahami pengguna.
- Validasi Konten Negatif Informasi palsu yang menyebar disebut?
- Pekerja yang merancang tampilan website?
25 Clues: nama lain hak merk • Search engine buatan Microsoft? • upaya memastikan informasi benar • Platform berbagi video terbesar? • Hak atas karya cipta disebut juga ...? • Pekerjaan yang fokus menganalisis data? • Pemeriksaan ulang konten disebut proses • Konten yang tidak sesuai norma disebut? • Pekerja yang merancang tampilan website? • Proses menyebarluaskan informasi digital? • ...
Tugas daring Irdina Batrisyia Bilqis Azizah 2025-04-17
Across
- Orang yang memeriksa kebenaran
- Informasi yang sudah diperiksa disebut informasi
- Proses mengecek keaslian suatu informasi
- Profesi yang menguji dan memperbaiki bug aplikasi
- Orang yang membuat dan merancang perangkat lunak
- Konten yang terbukti palsu disebut
- proses menjadwalkan konten untuk terbit otomatis
- Undang-undang yang melindungi karya digital
- Ahli yang menjaga keamanan jaringan
- Proses membandingkan fakta dan sumber informasi
- simbol yang sering digunakan untuk memulai pencarian
- kata atau frasa yang diketik untuk mencari informasi
- Orang yang merancang tampilan antarmuka aplikasi
Down
- kepanjangan dari HAKI
- platform untuk berbagi video milik google
- proses membuat konten digital seperti video,teks, atau gambar
- bentuk konten digital berupa suara
- Profesi yang menganalisis data dalam jumlah besar
- penyebaran konten digital ke publik
- Search engine yang berasal dari Rusia
- Search engine yang mengutamakan privasi pengguna
- Mesin pencari paling populer buatan Google
- atau konten
- cipta Hak hukum atas hasil karya disebut
- Pihak yang memiliki hak atas suatu karya
25 Clues: atau konten • kepanjangan dari HAKI • Orang yang memeriksa kebenaran • bentuk konten digital berupa suara • Konten yang terbukti palsu disebut • penyebaran konten digital ke publik • Ahli yang menjaga keamanan jaringan • Search engine yang berasal dari Rusia • Proses mengecek keaslian suatu informasi • cipta Hak hukum atas hasil karya disebut • ...
Informatica-italiano marcello e Piergiorgio 2025-03-28
Across
- Parola che unisce frasi o parole.
- Chi compie l'azione o di cui si parla nella frase.
- Parola che descrive un sostantivo.
- – Componenti fisici di un computer.
- – Sequenza di istruzioni per risolvere un problema.
- Parola che collega un sostantivo ad altri elementi della frase.
- computing – Uso di server online per archiviare ed elaborare dati.
- Parola che modifica un verbo, un aggettivo o un altro avverbio.
- Parola che indica una persona, un oggetto o un concetto.
- – Archivio strutturato di dati.
Down
- – Protezione di dati e sistemi informatici.
- operativo – Software che gestisce il computer (es. Windows, Linux).
- – Programmi che fanno funzionare un computer.
- informatica – Connessione tra computer per scambio di dati.
- Parola che sostituisce un sostantivo.
- Parola che precede il sostantivo, determinandone il genere e il numero.
- Parte della frase che aggiunge informazioni al verbo o al nome.
- Parola che indica un'azione o uno stato.
- – Scrittura di codice per creare software.
- artificiale – Simulazione dell’intelligenza umana nei computer.
20 Clues: – Archivio strutturato di dati. • Parola che unisce frasi o parole. • Parola che descrive un sostantivo. • – Componenti fisici di un computer. • Parola che sostituisce un sostantivo. • Parola che indica un'azione o uno stato. • – Scrittura di codice per creare software. • – Protezione di dati e sistemi informatici. • – Programmi che fanno funzionare un computer. • ...
Kozhyhar's Crossword 2025-06-07
Across
- Reaching mutual terms
- Scrambling data for safety
- Fixing software errors
- Barrier against hackers
- Larger touchscreen device
- Instructions for computers
- Virtual boundary for alerts
- Tech enhancing shopping
- Ease of use in design
- Monitoring for security
- Pocket-sized computer
- Hiring external providers
- Delay in data transmission
- Legal service agreement
- Observing systems or people
- Early version for testing
- Combined effort for greater results
- User interaction metric
- Blocks unauthorized access
- Health-tracking devices
Down
- Shaking up traditional industries
- Real-time media delivery
- Protecting digital systems
- Data transfer capacity
- Remote data storage
- Meeting regulations
- Authentication via body traits
- Operational availability
- Acceptance of new tech
- Consistent performance
- Driving force behind change
- On-demand audio shows
- Reducing human intervention
- Team collaboration framework
- Signals for location tracking
- Blending of tech and business
- Hosts data and services
- User interaction design
- Flexible project methodology
- Remote healthcare services
40 Clues: Remote data storage • Meeting regulations • Reaching mutual terms • On-demand audio shows • Ease of use in design • Pocket-sized computer • Data transfer capacity • Fixing software errors • Acceptance of new tech • Consistent performance • Barrier against hackers • Tech enhancing shopping • Monitoring for security • Hosts data and services • Legal service agreement • User interaction design • ...
CTF-CW7 2025-11-14
Across
- Logbook tracking all the data-handling jobs run by a company
- Strangers checking under the rug
- Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
- Sewing up another digital rip
- Hacking your way up the office ladder
- Hide-and-seek champ, cybersecurity edition
- Hiding credit card details with asterisks in statements
- Swaggers in so every Tekion API gets its time to shine!
- Give it a spin before you buy—or face the judge!
- Security’s version of duct-taping a leak
- The recipe card for fixing cyber messes
Down
- Data from your system’s fitbit
- Mixing up data to make it hard to interpret
- The “no free hugs” approach to access
- New European law aiming to make AI safe, fair, and compliant
- Company’s treasure map
- At Tekion, even buying office supplies is a breeze with this zippy tool!
- Class time for grownups
- Turning secret code into plain gossip
- Letting the bots handle the boring stuff
20 Clues: Company’s treasure map • Class time for grownups • Sewing up another digital rip • Data from your system’s fitbit • Strangers checking under the rug • The “no free hugs” approach to access • Hacking your way up the office ladder • Turning secret code into plain gossip • The recipe card for fixing cyber messes • Letting the bots handle the boring stuff • ...
Cybersecurity 2023-03-26
Cybersecurity 2023-09-13
Across
- A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker.
Down
- Sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
- A 4 step method used for checking suspicious emails to make sure they are not a phishing email.
4 Clues: A 4 step method used for checking suspicious emails to make sure they are not a phishing email. • A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker. • ...
Cybersecurity 2025-08-19
GRC 2024-10-14
5 Clues: things you must follow (GRC) • data in the form of digits (Data Department) • something risky or harmful (Risk Department) • protects your online accounts (Cybersecurity) • keeping people safe (Health and Safety Department)
Cyber Physical Systems - 1 2025-03-20
Across
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- Processing data closer to the source rather than a central server.
- Study of control and communication in machines and living beings.
- A highly automated, connected, and intelligent manufacturing system.
- Internet-based computing providing storage and processing power.
- A network of connected devices that communicate over the internet.
- Using models to replicate real-world behaviors.
- Devices that detect and respond to physical changes.
- The ability of different systems to work together.
- Large volumes of data used for analytics and decision-making.
Down
- A decentralized and secure digital ledger technology.
- Combining different subsystems into a unified system.
- A virtual replica of a physical system for monitoring and analysis.
- A computing system integrated into a larger system.
- The capability of a system to function independently.
- Devices that convert electrical signals into mechanical motion.
- Related to manufacturing and production systems.
- The process of making systems operate without human intervention.
19 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Cyber Safety 2024-04-15
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
Cybersecurity 2021-02-12
4 Clues: a code used to keep information safe • a kind of virus that is also a animal • a person trying to get your private information • a way people get money from you by sending you a scam email
Cybersecurity 2024-10-07
Across
- A 4 step method used for checking suspicious emails before taking any action.
- Occurs when someone accidentally causes harm, such as by clicking on a malicious link.
Down
- Software intentionally designed to cause disruption to a computer, server, client, or network.
- Highly personalized and targets a specific individual, often using details like their name, position, or projects they're involved in to appear more legitimate.
4 Clues: A 4 step method used for checking suspicious emails before taking any action. • Occurs when someone accidentally causes harm, such as by clicking on a malicious link. • Software intentionally designed to cause disruption to a computer, server, client, or network. • ...
brainriddle 2025-02-09
Across
- A cyberattack where fake QR codes trick users into visiting malicious sites.
- A cyberattack that tricks users into clicking hidden elements.
- A tool that protects a network by blocking suspicious traffic.
- A method used to avoid security restrictions.
- When private data is exposed to unauthorized people.
- An attack where a hacker takes control of an active user session.
- A weakness in software that hackers can exploit.
Down
- A method of guessing passwords by trying many combinations.
- A small software update that fixes security flaws.
- A cybersecurity event that may cause harm to systems.
- A physical or digital device used for secure authentication.
- Files that store records of activity on a system.
- A username and password used for authentication.
- A type of malware that bombards users with unwanted ads.
- A security method that requires two types of authentication.
15 Clues: A method used to avoid security restrictions. • A username and password used for authentication. • A weakness in software that hackers can exploit. • Files that store records of activity on a system. • A small software update that fixes security flaws. • When private data is exposed to unauthorized people. • A cybersecurity event that may cause harm to systems. • ...
Claims Board Friday Fun 9/13 2024-09-13
Across
- Movie name referred by Google CEO during his meetings
- Attaches itself to clean files and spreads to other files
- 14 year old scientist created specialized soap to treat cancer
- Publishes latest tech news and Tech CEOs start their day going through this site
- Use phone calls to trick individuals to reveal personal details
- Urgency of a work item to be worked upon
- Cybersecurity form with major outage impacting Microsoft apps
Down
- Bug not directly related to the code
- Effective way of writing User stories
- Company which will bring 2 astronauts who are stuck in International Space Station
- Every action has an outcome and none other than you are responsible for it
- Deceives via emails
- Level of Impact
- Caused by Solar Storms
- Text messages to trick individuals to reveal personal information
15 Clues: Level of Impact • Deceives via emails • Caused by Solar Storms • Bug not directly related to the code • Effective way of writing User stories • Urgency of a work item to be worked upon • Movie name referred by Google CEO during his meetings • Attaches itself to clean files and spreads to other files • Cybersecurity form with major outage impacting Microsoft apps • ...
Responsible AI In Practice 2025-05-07
Across
- Use of technology to perform tasks without human intervention
- General Data Protection Regulation governing data privacy in the EU
- Assessment Evaluation of potential negative outcomes of AI applications
- Openness about how AI systems operate and make decisions
- Responsibility for the outcomes produced by AI systems
Down
- Ensuring individuals' personal information is protected in AI processes
- Minimisation Collecting only the data necessary for a specific purpose
- Systems that simulate human intelligence
- Human supervision of AI outputs to ensure accuracy and fairness
- Adherence to laws and regulations related to AI usage
- Systematic error introduced into AI models due to prejudiced data
- Process of removing personally identifiable information from data
- Moral principles guiding the responsible use of AI
- Protection of systems and data from digital attacks
- AI Act European Union legislation regulating artificial intelligence
15 Clues: Systems that simulate human intelligence • Moral principles guiding the responsible use of AI • Protection of systems and data from digital attacks • Adherence to laws and regulations related to AI usage • Responsibility for the outcomes produced by AI systems • Openness about how AI systems operate and make decisions • ...
Technology crossword 2025-06-26
Across
- Programs you use on your phone or tablet.
- (Virtual Reality) A headset that lets you enter a 3D digital world.
- Protection of computers and data from attacks.
- A machine that can think or learn like a human.
- Software you can download and use for free.
- Provide The company that gives you internet access.
- Device A phone, watch, or TV that can connect to the internet.
- Technology Devices like smartwatches or fitness bands you wear.
Down
- Engine A website like Google to find information.
- A small electronic tool or device.
- A place where you can connect to wireless internet.
- Media Platforms like Instagram, TikTok, or Twitter.
- A picture taken of your screen.
- A big computer that stores data and websites.
- Browser An app like Chrome or Safari to explore websites.
- Network A site where people connect and share, like Facebook.
16 Clues: A picture taken of your screen. • A small electronic tool or device. • Programs you use on your phone or tablet. • Software you can download and use for free. • A big computer that stores data and websites. • Protection of computers and data from attacks. • A machine that can think or learn like a human. • Engine A website like Google to find information. • ...
Safe Browsing 2025-05-27
Across
- unethical hacker
- software program or piece of hardware to screen out hackers, viruses, worms that try to reach computer over internet
- Vital Information Resources Under Seize.
- Information and Communication Technology
- threatening over internet
- application of technologies to protect programs, data, users from cyber attacks and the risk of using internet
- software for identifying, deleting and fixing malicious software.
- misleading people by sending email or link pretending its from a trusted organisation or person for stealing their personal details.
- a file stores information about visiting of websites in the browser.
- malicious software for damaging computer
Down
- person hacks information with permission
- act of breaking security code of digital devices.
- people gain by accessing data remotely in an unauthorized manner.
- protect original works of authorship including text, image, music etc
- Crime through internet
15 Clues: unethical hacker • Crime through internet • threatening over internet • person hacks information with permission • Vital Information Resources Under Seize. • Information and Communication Technology • malicious software for damaging computer • act of breaking security code of digital devices. • people gain by accessing data remotely in an unauthorized manner. • ...
Sicurezza informatica 2026-02-18
Across
- Autenticazione a due fattori per aumentare la sicurezza
- Malware che si autoreplica attraverso reti o file
- Software che individua e rimuove virus e malware
- Metodo di attacco che prova tutte le password possibili
- Copia dei dati per proteggerli da perdite o guasti
- Tutte le pratiche per proteggere dati, reti e sistemi
- Qualsiasi software progettato per danneggiare o spiare
Down
- Overflow Situazione in cui un programma scrive oltre la memoria prevista
- Chiave segreta usata per entrare in account o sistemi
- Malware che blocca i file e richiede un pagamento per sbloccarli
- Autenticazione che richiede più passaggi per verificare l’identità
- Protezione dei dati personali e delle informazioni sensibili
- Protezione di rete che blocca accessi non autorizzati
- Software pericoloso nascosto dentro programmi legittimi
- Truffa online che usa email o siti falsi per rubare dati
15 Clues: Software che individua e rimuove virus e malware • Malware che si autoreplica attraverso reti o file • Copia dei dati per proteggerli da perdite o guasti • Chiave segreta usata per entrare in account o sistemi • Protezione di rete che blocca accessi non autorizzati • Tutte le pratiche per proteggere dati, reti e sistemi • ...
Computing Practice Tutorial Worksheet #3 2024-09-16
5 Clues: A person who builds websites • The language computers understand • Someone who analyzes data for a living • A job that involves protecting information • An important attribute for catching mistakes
Cybersecurity 2023-08-23
Online Safety 2020-10-16
Across
- used to protect your data on the internet.
- someone who gains unauthorized access to data
- slang for Facebook sabotage.
- a way to exchange messages over the internet.
- information stored on computers.
Down
- sending emails impersonating a company to get personal information and bank details.
- someone who uses the internet to bully people.
- something that keeps your account protected that only you know, they be in the form of bio metrics, letters and numbers.
8 Clues: slang for Facebook sabotage. • information stored on computers. • used to protect your data on the internet. • someone who gains unauthorized access to data • a way to exchange messages over the internet. • someone who uses the internet to bully people. • sending emails impersonating a company to get personal information and bank details. • ...
Information and Network Security 2023-09-08
Across
- coded message
- Cause loss of message confidentiality
- A security principle that ensures data is accessible only to those authorized to view or modify it.
- A secret combination of characters used to authenticate a user's identity
- A type of malware that spreads by duplicating itself and infecting other programs
- This Ciphers these hide the message by rearranging the letter order
- The practice of protecting computer systems and networks from digital attacks.
Down
- Causes loss of message integrity
- Plain text message may be hidden in image or sound It is not encryption
- Is most difficult attack to find out
10 Clues: coded message • Causes loss of message integrity • Is most difficult attack to find out • Cause loss of message confidentiality • This Ciphers these hide the message by rearranging the letter order • Plain text message may be hidden in image or sound It is not encryption • A secret combination of characters used to authenticate a user's identity • ...
Crossword#10 2023-07-11
Across
- - Storing and accessing data and applications remotely over the internet.
- - technology to manage business processes and operations.
- - Conducting business transactions online.
- - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
- - Working remotely using technology to communicate and collaborate.
- - Using technology to automate routine tasks and processes.
Down
- - Protecting computer systems and networks from unauthorized access or attacks.
- - technology to manage interactions with customers.
- - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
- - Using data and statistical analysis to inform decision-making.
10 Clues: - Conducting business transactions online. • - technology to manage interactions with customers. • - technology to manage business processes and operations. • - Using technology to automate routine tasks and processes. • - Using data and statistical analysis to inform decision-making. • - Working remotely using technology to communicate and collaborate. • ...
Techy Word Search Challenge 2024-04-16
Across
- Information stored and processed by computers, like numbers, text, or images.
- Writing instructions for a computer using a programming language.
- Machines that can move, sense, and interact with their environment.
- The physical parts of a computer that you can touch and see.
- A global network that connects computers worldwide.
Down
- Protecting computers, networks, and data from cyberattacks.
- Instructions for a computer's next move in a game.
- Intelligence: Computers that can learn, reason, and make decisions like humans.
- Programs that make computers work, like games, word processors, or music players.
- Turning information into a secret code to keep it safe from hackers.
10 Clues: Instructions for a computer's next move in a game. • A global network that connects computers worldwide. • Protecting computers, networks, and data from cyberattacks. • The physical parts of a computer that you can touch and see. • Writing instructions for a computer using a programming language. • ...
Get Familiar with IEEE's Technology Predictions for 2024 2024-02-10
Across
- Success Rank >10, Maturity Grade C/D (Middle word)
- Success Grade C+, Maturity Rank 18
- Maturity Grade C/D,Success Rank >20 (Last word)
- Success Grade B-, Market Adoption Rank 13 (Last word)
Down
- Commercial Adoption Horizon >3.36 years, Success Grade B (Last word)
- Commercial Adoption Horizon <2.98 years, Maturity Grade B- (Last word)
- Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10
- Market Adoption Grade B, Maturity Rank 1 (First word)
8 Clues: Success Grade C+, Maturity Rank 18 • Maturity Grade C/D,Success Rank >20 (Last word) • Success Rank >10, Maturity Grade C/D (Middle word) • Market Adoption Grade B, Maturity Rank 1 (First word) • Success Grade B-, Market Adoption Rank 13 (Last word) • Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10 • ...
Crossword2 2024-12-18
Across
- A computer that provides resources to other devices.
- The practice of protecting systems, networks, and programs from digital attacks.
- The language used to structure web pages.
- An error in a program that needs fixing.
- Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
- Secures data by converting it into a coded format.
- Protects networks from unauthorized access.
- Stores data on the internet instead of your local device.
8 Clues: An error in a program that needs fixing. • The language used to structure web pages. • Protects networks from unauthorized access. • Secures data by converting it into a coded format. • A computer that provides resources to other devices. • Stores data on the internet instead of your local device. • ...
