cybersecurity Crossword Puzzles

Cybersecurity Unit 1 Lesson 1 2022-12-02

Cybersecurity Unit 1 Lesson 1 crossword puzzle
Across
  1. Changes your directory
  2. A set of steps to accomplish a task.
  3. A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
  4. Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
  5. Guidelines that team members develop in order to be followed when working together.
  6. A system that can distinguish between a human and an automated program.
  7. Shows the contents of your directory
  8. A process that converts human-readable text or data into a coded form.
Down
  1. A team of individuals working together to investigate cyber events and anomalies.
  2. A collection of rules detailing appropriate student behavior.
  3. Software that is intended to do harm or damage.
  4. The trail that you leave behind when you engage in online experiences.
  5. To guess or discover, especially a password.
  6. Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
  7. To confirm your identity using knowledge know only to you or information interpreted by you.
  8. An attempt to discover information, especially passwords, through trial and error.
  9. Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.

17 Clues: Changes your directoryA set of steps to accomplish a task.Shows the contents of your directoryTo guess or discover, especially a password.Software that is intended to do harm or damage.A collection of rules detailing appropriate student behavior.The trail that you leave behind when you engage in online experiences....

Eldorado Anniversary 2023-09-23

Eldorado Anniversary crossword puzzle
Across
  1. What is Eldorado's zip code?
  2. What percentage score is required to pass the Workplace Readiness Exam?
  3. How many wrestling state championships has Eldorado won?
  4. What is the magnet coordinator's telephone extension?
  5. How many free CTE college credits can a student earn for completing the Cybersecurity program of study?
  6. What was the last year Eldorado had a second campus?
  7. What year did Mrs. Brockett graduate from Eldorado?
  8. What year was Eldorado Magnet launched?
  9. What year did Eldorado open a second campus?
Down
  1. What year did the first class graduate?
  2. What year did Eldorado open
  3. What are the last four digits of the schools telephone number?
  4. How many principals have served Eldorado
  5. How many classes of seniors have graduated from EHS?
  6. What is the street address of EHS?
  7. At its largest capacity, EHS housed over how many students?
  8. How many students was Eldorado designed to accommodate
  9. What year did Eldorado receive the MSA School of Distinction Award?
  10. How old is Eldorado

19 Clues: How old is EldoradoWhat year did Eldorado openWhat is Eldorado's zip code?What is the street address of EHS?What year did the first class graduate?What year was Eldorado Magnet launched?How many principals have served EldoradoWhat year did Eldorado open a second campus?What year did Mrs. Brockett graduate from Eldorado?...

TEKNOLOGI 2024-11-19

TEKNOLOGI crossword puzzle
Across
  1. Teknologi elektronik yang dapat dipakai seperti jam pintar
  2. Teknologi dan praktik untuk melindungi sistem dan data dari ancaman
  3. OPTIC Teknologi transmisi data menggunakan kabel serat kaca
  4. Teknologi yang menghubungkan perangkat fisik ke internet
  5. Teknologi identifikasi berdasarkan ciri fisik manusia
  6. Mata uang digital yang menggunakan teknologi kriptografi untuk keamanan
  7. Teknologi untuk mengelola dan menganalisis data berukuran sangat besar
  8. Teknologi komputasi yang menggunakan prinsip mekanika kuantum
  9. Teknologi yang menciptakan versi virtual dari perangkat keras atau sistem operasi
  10. Serangkaian langkah yang digunakan untuk menyelesaikan masalah dalam teknologi
Down
  1. Teknologi basis data terdesentralisasi yang digunakan untuk menyimpan transaksi
  2. Teknologi yang menggabungkan dunia nyata dengan elemen virtual
  3. Kendaraan udara tanpa awak yang dikendalikan dari jarak jauh
  4. Layanan penyimpanan dan pemrosesan data melalui internet
  5. Ilmu yang mempelajari desain dan aplikasi robot
  6. Teknologi yang bekerja pada skala atom dan molekul
  7. Teknologi jaringan seluler generasi kelima yang sangat cepat
  8. Proses pengamanan data dengan mengubahnya menjadi kode
  9. HOME Sistem rumah pintar yang terhubung dengan teknologi otomatisasi

19 Clues: Ilmu yang mempelajari desain dan aplikasi robotTeknologi yang bekerja pada skala atom dan molekulTeknologi identifikasi berdasarkan ciri fisik manusiaProses pengamanan data dengan mengubahnya menjadi kodeLayanan penyimpanan dan pemrosesan data melalui internetTeknologi yang menghubungkan perangkat fisik ke internet...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
  2. The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  3. The diplomas offered in the School of Design & Environment focuses on ________.
  4. The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
  5. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  6. Ngee Ann Polytechnic is an award-winning smart and ______campus.
  7. Located at the Atrium, there is a 24/7 unmanned ______.
  8. If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
  9. Common _____ Programme is a new programme offered in the School of Film & Media Studies.
  10. Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
  11. Students are able to pursue a minor via the ______Learning Pathway Programme.
  12. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
  1. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
  2. Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
  3. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  4. Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
  5. Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
  8. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.

20 Clues: Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic is an award-winning smart and ______campus.Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.Students are able to pursue a minor via the ______Learning Pathway Programme.The diplomas offered in the School of Design & Environment focuses on ________....

TEst 2025-02-19

TEst crossword puzzle
Across
  1. Giant central identity database behind Aadhaar
  2. National-level portal that provides e-documents to citizens
  3. An attack where hackers overwhelm a system’s resources, causing service denial
  4. The process of scrambling data so only authorized parties can read it
  5. India’s nodal agency for responding to computer security incident
  6. The repeated attempt to guess a password by systematically trying possibilities
  7. India’s initiative to raise awareness and help clean infected devices
Down
  1. Indian police initiative or facility for cybercrime investigations (seen in Kerala)
  2. Common type of malicious software demanding money
  3. Deceptive online technique used to trick users into revealing personal info
  4. India’s leading digital payment infrastructure operator
  5. Central cybersecurity body protecting critical information infrastructure
  6. Practice of keeping systems updated to vulnerabilities
  7. Malevolent software that hides within legitimate programs
  8. A harmful program that self-replicates and spreads to other computers

15 Clues: Giant central identity database behind AadhaarCommon type of malicious software demanding moneyPractice of keeping systems updated to vulnerabilitiesIndia’s leading digital payment infrastructure operatorMalevolent software that hides within legitimate programsNational-level portal that provides e-documents to citizens...

Computer languages and browsing safely 2025-06-05

Computer languages and browsing safely crossword puzzle
Across
  1. act of stealing and misusing someone's personal information
  2. It can do addition, subtraction, multiplication, division, etc.
  3. an illegal entry into a computer system or network
  4. use of illegal methods to get money or other things that belong to a bank
  5. process of 'befriending' children on social media
  6. it is vital information resources
  7. It has based 2
  8. Act to believe the email has been sent from a trusted person or organisation
  9. the number system consists of 16 digits
  10. it means hoaxing or misleading
Down
  1. the number system consists of 10 digits
  2. it consists of 8 digits
  3. Collection of technologies, processes, and practices design to protect networks, computers, programs, and data
  4. Any criminal activity intended to harm anyone using a computer and an internet connection
  5. Extract confident information from users and use this information to execute fraudulent tasks online

15 Clues: It has based 2it consists of 8 digitsit means hoaxing or misleadingit is vital information resourcesthe number system consists of 10 digitsthe number system consists of 16 digitsprocess of 'befriending' children on social mediaan illegal entry into a computer system or networkact of stealing and misusing someone's personal information...

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  2. use one key to encrypt data and a different key to decrypt data.
  3. to encrypt and decrypt messages.
  4. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
  5. science of making and breaking secret codes.
  6. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
  1. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  2. has a fixed block size of 128, 192 or 256 bits.
  3. implementing cryptography into a web browser.
  4. a protocol that provides a secure remote access connection to network devices.
  5. way to store and transmit data so only the intended recipient can read or process it.
  6. fundamental component of ipsec virtual private networks (vpn).

12 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).use one key to encrypt data and a different key to decrypt data....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Istilah untuk volume data besar yang diproses untuk informasi.
  2. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Istilah untuk volume data besar yang diproses untuk informasi.Program perangkat lunak yang dirancang untuk melakukan tugas tertentu....

Vocabulary revision 1 2024-10-30

Vocabulary revision 1 crossword puzzle
Across
  1. a small device or tool that has a specific use
  2. money given to a student to help pay for their education
  3. the act of leaving to start a journey
  4. having strong feelings or enthusiasm for something you love
  5. information that is stored in computers
  6. the protection of computers and networks from being attacked
Down
  1. the money you pay for education at a college or university
  2. to revise one day before an exam
  3. the flight that takes place within your country
  4. free time used for relaxation
  5. the place you are travelling to
  6. to complete studies at a school, college, or university
  7. a person who does something for fun; not a professional
  8. a talk given by a professor to a group of students about a subject
  9. a place where people go for vacations and fun, for example, for skiing
  10. to love something or someone very much
  11. a person who uses computers to find or change information, without permission
  12. strong and lasting a long time without breaking

18 Clues: free time used for relaxationthe place you are travelling toto revise one day before an examthe act of leaving to start a journeyto love something or someone very muchinformation that is stored in computersa small device or tool that has a specific usethe flight that takes place within your countrystrong and lasting a long time without breaking...

Kelompokk 5 2025-04-19

Kelompokk 5 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  9. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
Down
  1. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  2. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  3. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Ahli dalam menulis kode untuk membuat perangkat lunak.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  9. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  10. Profesi yang menjaga keamanan sistem komputer.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 5 2025-04-19

Kelompok 5 crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  3. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  4. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  5. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  6. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
Down
  1. Orang yang menciptakan software berbagai jenis permainan.
  2. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  3. Proses penggunaan teknologi digital untuk melestarikan budaya.
  4. Ahli dalam menulis kode untuk membuat perangkat lunak.
  5. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  8. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  9. Profesi yang menjaga keamanan sistem komputer.
  10. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  12. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  13. Perlindungan hukum atas hak merek, desain industri, paten, dll.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

LOGIC LATTICE 2024-02-16

LOGIC LATTICE crossword puzzle
Across
  1. Measures taken to protect computer systems and networks from unauthorized access or attacks.
  2. Software used to access and view websites on the internet.
  3. The manipulation of matter on an atomic or molecular scale.
Down
  1. Digital or virtual currency that uses cryptography for security.
  2. A structured set of data stored electronically.
  3. Software that is embedded into hardware devices.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. Programs and applications that run on computers and other devices.
  6. The process of converting data into a code to prevent unauthorized access.
  7. A step-by-step procedure for solving a problem.

10 Clues: A structured set of data stored electronically.A step-by-step procedure for solving a problem.Software that is embedded into hardware devices.Software used to access and view websites on the internet.The manipulation of matter on an atomic or molecular scale.Digital or virtual currency that uses cryptography for security....

Technology 2024-02-18

Technology crossword puzzle
Across
  1. I'm a thinking machine, processing data tirelessly. What device am I?
  2. Intangible, yet I control what you see. What type of program am I?
  3. I move without being alive. What field of technology am I?
  4. Following steps, I solve problems. What logical process am I?
  5. Constant change, perpetual improvement. What technological concept am I?
Down
  1. I complement reality. What technology am I?
  2. I write instructions for machines. What technological skill am I?
  3. I guard against digital threats. What specialized area am I?
  4. I connect the world. What network am I?
  5. I store information. What logical structure am I?

10 Clues: I connect the world. What network am I?I complement reality. What technology am I?I store information. What logical structure am I?I move without being alive. What field of technology am I?I guard against digital threats. What specialized area am I?Following steps, I solve problems. What logical process am I?...

TTS KONSEP MEDIA DIGITAL LISTIANA 2025-03-12

TTS KONSEP MEDIA DIGITAL LISTIANA crossword puzzle
Across
  1. Media digital dapat menampilkan informasi dalam bentuk video, audio, gambar, atau bentuk lainnya.
  2. Tindakan perundungan yang dilakukan secara disengaja melalui teknologi digital
  3. Tindakan menyalin atau mengambil konten orang lain tanpa izin di media digital
  4. Platform pendidikan yang menggunakan media digital
Down
  1. Informasi yang dibuat-buat atau direkayasa untuk menutupi informasi yang sebenarnya disebut
  2. Media digital yang fungsinya khusus untuk berbelanja
  3. Media digital disebut juga sebagai media
  4. Keamanan dalam media digital yang bertujuan melindungi data dari serangan siber
  5. Tempat di mana artikel atau blog dapat dipublikasikan secara digital
  6. Tindakan kejahatan yang dilakukan secara online menggunakan komputer atau jaringan internet disebut

10 Clues: Media digital disebut juga sebagai mediaPlatform pendidikan yang menggunakan media digitalMedia digital yang fungsinya khusus untuk berbelanjaTempat di mana artikel atau blog dapat dipublikasikan secara digitalTindakan perundungan yang dilakukan secara disengaja melalui teknologi digital...

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Security Protecting data and systems hosted on remote servers.
  3. Following rules, regulations, and standards in cybersecurity.
  4. A formal review of systems and processes to ensure security and compliance.
  5. Manipulating people into giving up confidential information.
Down
  1. The practice of protecting systems, networks, and data from digital threats.
  2. Ensuring data is accurate and has not been tampered with.
  3. Surfing A sneaky way to steal information by watching someone type their password.
  4. An unexpected event that compromises the integrity or availability of data.
  5. Software designed to detect and remove malicious programs.

10 Clues: Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Software designed to detect and remove malicious programs.
  3. A formal review of systems and processes to ensure security and compliance.
  4. Manipulating people into giving up confidential information.
Down
  1. A sneaky way to steal information by watching someone type their password.
  2. The practice of protecting systems, networks, and data from digital threats.
  3. Protecting data and systems hosted on remote servers.
  4. Following rules, regulations, and standards in cybersecurity.
  5. An unexpected event that compromises the integrity or availability of data.
  6. Ensuring data is accurate and has not been tampered with.

10 Clues: Protecting data and systems hosted on remote servers.Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

Lock & Key: An Information Security Challenge 3 2025-12-01

Lock & Key: An Information Security Challenge 3 crossword puzzle
Across
  1. Software designed to detect and remove malicious programs.
  2. Following rules, regulations, and standards in cybersecurity.
  3. Manipulating people into giving up confidential information.
  4. The practice of protecting systems, networks, and data from digital threats.
  5. Protecting data and systems hosted on remote servers.
Down
  1. A sneaky way to steal information by watching someone type their password.
  2. Ensuring data is accurate and has not been tampered with.
  3. An unexpected event that compromises the integrity or availability of data.
  4. A type of malicious software that can replicate and spread.
  5. A formal review of systems and processes to ensure security and compliance.

10 Clues: Protecting data and systems hosted on remote servers.Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

Cybersecurity decoded 1x1 2 2020-07-30

Cybersecurity decoded 1x1 2 crossword puzzle
Across
  1. code's evil twin
  2. childhood game
  3. used to fix jeans... or software
  4. the iron giant
  5. Not canned food
  6. Dr's are messy with this
  7. Distant labor
  8. sugar comes in these
Down
  1. Fake mustache, trench coat, sunglasses
  2. type of cleanliness
  3. Troy's downfall
  4. they come out after the rain

12 Clues: Distant laborchildhood gamethe iron giantTroy's downfallNot canned foodcode's evil twintype of cleanlinesssugar comes in theseDr's are messy with thisthey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglasses

8 Cybersecurity & Global Impacts 2025-09-16

8 Cybersecurity & Global Impacts crossword puzzle
Across
  1. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  2. software intended to damage a computing system or to take partial control over its operation
  3. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  4. information about an individual that identifies, links, relates, or describes them.
  5. a process that reverses encryption, taking a secret message and reproducing the original plain text.
  6. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  7. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Down
  1. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  2. protects a computing system against infection
  3. a wireless access point that gives unauthorized access to secure networks.
  4. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  5. involves one key for both encryption and decryption.

12 Clues: protects a computing system against infectioninvolves one key for both encryption and decryption.a wireless access point that gives unauthorized access to secure networks.information about an individual that identifies, links, relates, or describes them.software intended to damage a computing system or to take partial control over its operation...

11 Essential Cybersecurity Controls 2025-08-29

11 Essential Cybersecurity Controls crossword puzzle
Across
  1. maintaining list of all hardware, software and more
  2. updating software to make sure there are no gaps or vulnerabilities
  3. Method for limiting and controlling access to high-value systems, accounts, data
  4. Should be offline, segmented and tested with RTO validation as a critical last line of defense
  5. Product for detecting endpoint activity
  6. _security to protect your organization from phishing attempts
Down
  1. _classification and structured _ management. knowing where it lives and how it's protected is critical.
  2. needed to review recorded events and activities within systems, networks, applications
  3. _ segmentation, which limits blast radius, protects crown jewels, and slows down adversaries.
  4. What method of security requires users to verify their identity with multiple forms of authentication?
  5. often goes hand in hand with TTX
  6. safeguards, policies, processes, or techniques designed to protect assets

12 Clues: often goes hand in hand with TTXProduct for detecting endpoint activitymaintaining list of all hardware, software and more_security to protect your organization from phishing attemptsupdating software to make sure there are no gaps or vulnerabilitiessafeguards, policies, processes, or techniques designed to protect assets...

Data Privacy Crosswords 2025-01-27

Data Privacy Crosswords crossword puzzle
Across
  1. The ability to access, correct, or delete your personal data
  2. A document that explains how your data is collected and used
  3. The process of converting data into unreadable code for security
  4. The process of deleting personal identifiers from data
Down
  1. When a company keeps your data safe from hackers
  2. The right to stop a company from using your personal data
  3. The principle of collecting only the data that is needed
  4. A law or set of rules governing personal data use

8 Clues: When a company keeps your data safe from hackersA law or set of rules governing personal data useThe process of deleting personal identifiers from dataThe principle of collecting only the data that is neededThe right to stop a company from using your personal dataThe ability to access, correct, or delete your personal data...

Friday - Server Demonstration Review 2025-11-10

Friday - Server Demonstration Review crossword puzzle
Across
  1. (5,6) is a feature in Windows that allows administrators to centrally manage and enforce settings for users and computers in an Active Directory environment
  2. (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups.
  3. (acronym) It stores the names and IP addresses of all computers and devices on the Domain and provides the necessary name resolution for clients to authenticate and for AD services to function correctly.
  4. (14,4) the function of the (OU) is to act as a container for logically grouping users, computers, and other objects to simplify management, delegate administrative authority, and apply policies or settings consistently
Down
  1. (2,7) the numerical identifier and network locator for devices and servers such as the domain controller, allowing them to be found and communicate with each other
  2. (7,6) is a centrally managed collection of interconnected devices and users, like computers and printers, that operate under a single set of security policies and rules.
  3. (5,9) is a cybersecurity concept that grants users, applications, and systems only the minimum access and permissions necessary to perform their job functions, and nothing more
  4. (acronym) primary function is to automatically assign IP addresses and other network configuration information, such as the subnet mask and default gateway, to client devices.
  5. an isolated, secure environment used in cybersecurity to safely execute and analyse projects.

9 Clues: an isolated, secure environment used in cybersecurity to safely execute and analyse projects.(6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups....

IoT Puzzle 2025-04-01

IoT Puzzle crossword puzzle
Across
  1. The practice of protecting internet-connected systems from cyber threats.
  2. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
  3. A security system that monitors and controls incoming and outgoing network traffic.
  4. The process of converting data into a code to prevent unauthorized access.
  5. Short-range wireless technology.
  6. Devices that collect and transmit real-time data from the environment.
Down
  1. Malicious software designed to harm or exploit devices or networks.
  2. Wireless standard for IoT connectivity.
  3. Software embedded in IoT devices that controls their operations.
  4. Verifying a user’s identity before granting access to a system.
  5. Remote servers used for data storage & processing.
  6. Connects IoT devices to the internet.
  7. Wireless transmission of data.
  8. Wireless communication protocol for IoT.
  9. A type of cyber-attack where attackers trick users into providing sensitive information.
  10. A network topology where devices connect directly and relay data to each other.

16 Clues: Wireless transmission of data.Short-range wireless technology.Connects IoT devices to the internet.Wireless standard for IoT connectivity.Wireless communication protocol for IoT.Remote servers used for data storage & processing.Verifying a user’s identity before granting access to a system....

Digital Citizenship Vocabulary 2025-11-19

Digital Citizenship Vocabulary crossword puzzle
Across
  1. a person who speaks or acts in support of an individual or cause,
  2. getting sew for copying somebody work
  3. The trail of data you leave online, like breadcrumbs, from every click, post, and search.
  4. bullying online
  5. Stop, Question, Check" method
  6. A bystander is a person who witnesses an event but is not directly involved.
  7. it is your citizenship for your device
  8. your public profile with strong passwords, privacy settings
  9. security that help with crime on the internet
  10. the act or practice of converting messages into cipher or code.
Down
  1. imformation that is pesonal
  2. where somebody scam you for something
  3. Secure your accounts with strong passwords and be cautious about what you share online
  4. the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online.
  5. setting that you can help protect your imformation
  6. the ability to understand and share the feelings of another.

16 Clues: bullying onlineimformation that is pesonalStop, Question, Check" methodwhere somebody scam you for somethinggetting sew for copying somebody workit is your citizenship for your devicesecurity that help with crime on the internetsetting that you can help protect your imformationyour public profile with strong passwords, privacy settings...

Vocabulary 2024-11-26

Vocabulary crossword puzzle
Across
  1. A paid position
  2. The practice of protecting digital systems
  3. A systematic error in AI systems that leads to unfair or discriminatory outcomes.
  4. A person that engaged and qualified in a profession
Down
  1. The rate at which goods or services are produced
  2. The ability to direct or influence others
  3. A branch of computer science that deals with creating machines capable of performing tasks that typically require human intelligence

7 Clues: A paid positionThe ability to direct or influence othersThe practice of protecting digital systemsThe rate at which goods or services are producedA person that engaged and qualified in a professionA systematic error in AI systems that leads to unfair or discriminatory outcomes....

Technology in Supply Chain Management 2023-05-01

Technology in Supply Chain Management crossword puzzle
Across
  1. Highly skilled IT professionals, process engineers,and the appropriate technologies.
  2. technologies combine data management, communications, decision support, and processing capabilities.
  3. technologies create greater connectivity and speed flow.
  4. support systems provide computing power to make higher-quality decisions faster.
  5. Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
  1. technologies provide 24/7 resource availability.
  2. Protection against online threats.

7 Clues: Protection against online threats.technologies provide 24/7 resource availability.technologies create greater connectivity and speed flow.support systems provide computing power to make higher-quality decisions faster.Highly skilled IT professionals, process engineers,and the appropriate technologies....

Benefits and Challenges 2024-12-30

Benefits and Challenges crossword puzzle
Across
  1. Improving the productivity and output of business operations.
  2. The system of rules and procedures to ensure compliance.
  3. Saving both time and money by using no-code platforms.
  4. Empowering non-technical individuals to build and enhance solutions, individuals and businesses can stay agile, adapting quick
Down
  1. Giving employees the ability to create applications and solutions.
  2. Protecting apps and data from potential threats.
  3. Ensuring different applications work together smoothly.

7 Clues: Protecting apps and data from potential threats.Saving both time and money by using no-code platforms.Ensuring different applications work together smoothly.The system of rules and procedures to ensure compliance.Improving the productivity and output of business operations.Giving employees the ability to create applications and solutions....

Cyber Security Threads 2024-10-01

Cyber Security Threads crossword puzzle
Across
  1. An attack that floods a network with excessive traffic, disrupting services
  2. Ensures that data is accurate and has not been tampered with
  3. Falsifying data to deceive systems or users
  4. The ability of a system to recover quickly from disruptions or attacks
  5. Ensures that systems are accessible and functional when needed
Down
  1. Ensures that information is accessible only to those authorized to access it
  2. The process of converting information into a secret code
  3. A model that describes the stages of a cyberattack ( 2 words )
  4. A weakness in a system that can be exploited by attackers
  5. A type of malware disguised as legitimate software
  6. A potential danger or harmful event in cybersecurity
  7. A security system that monitors and controls network traffic
  8. An attempt to exploit a system or network

13 Clues: An attempt to exploit a system or networkFalsifying data to deceive systems or usersA type of malware disguised as legitimate softwareA potential danger or harmful event in cybersecurityThe process of converting information into a secret codeA weakness in a system that can be exploited by attackers...

azure-data-oro-idc-day-of-learning-november 2022-11-24

azure-data-oro-idc-day-of-learning-november crossword puzzle
Across
  1. Meaning of ORO?
  2. India's most attractive employer brand by Randstad
  3. Microsoft had announced a Metaverse partnership with which organization
  4. In which year, ORO team is formed - Two Thousand….?
  5. A lightweight markup language used to create Azure's public documentation
  6. Who wrote ORO team song?
  7. Internal portal used for joining various distribution and security groups
  8. Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
  1. Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
  2. Number of years since IDC was established
  3. - FIFA world cup 2022 is played in which country?
  4. Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
  5. Tool used in Microsoft to manage livesite incidents

13 Clues: Meaning of ORO?Who wrote ORO team song?Number of years since IDC was established- FIFA world cup 2022 is played in which country?India's most attractive employer brand by RandstadIn which year, ORO team is formed - Two Thousand….?Tool used in Microsoft to manage livesite incidents...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. A program that detects and removes malicious software.
  2. Turning words into secrets that only the right decoder can read.
  3. Digital kidnapping: your files are the hostages!
  4. Online impersonation so convincing it fools your eyes — and inbox.
  5. The hero hacker — breaks systems to protect them.
Down
  1. When a website gets so many fake visitors it forgets how to work.
  2. A person skilled at breaking into computer systems.
  3. The digital gatekeeper that says, “You shall not pass!”
  4. A gift that brings trouble, not joy — just ask the Greeks!
  5. The practice of protecting systems and data from digital attacks.
  6. The “key” everyone forgets right when they need it most.
  7. It clogs your inbox like unwanted guests at a party.
  8. When someone goes “fishing” for your passwords — but with emails.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

TA6 - The Internet of Everything 2025-11-09

TA6 - The Internet of Everything crossword puzzle
Across
  1. The part of the IoE model that focuses on how actions are carried out.
  2. Devices connected and able to share data without human input.
  3. The use of technology to perform tasks without human intervention.
  4. Communication where devices exchange information directly.
  5. Turning raw data into meaningful information.
  6. The raw facts and figures collected by sensors or systems.
Down
  1. Information derived from data that has been processed and organised.
  2. The concept linking people, data, processes and things through networked connections.
  3. A technology that measures real-world conditions, such as temperature or movement.
  4. A smart system that adjusts traffic flow based on real-time conditions.
  5. Protecting data and systems from unauthorised access or attacks.
  6. The global network that allows computers and devices to exchange data.

12 Clues: Turning raw data into meaningful information.Communication where devices exchange information directly.The raw facts and figures collected by sensors or systems.Devices connected and able to share data without human input.Protecting data and systems from unauthorised access or attacks....

12 Days of Christmas ITHD Puzzle 2024-12-09

12 Days of Christmas ITHD Puzzle crossword puzzle
Across
  1. a link to something in a website.
  2. Collection of professional creative software made by Adobe.
  3. a secret word or phrase that must be used to gain admission to something.
  4. Prevents unauthorized access to a disk's contents, even if the disk is offline.
  5. Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
  1. The practice of protecting devices, networks and programs from digital attacks.
  2. Creates a private connection between your computer and a remote server.
  3. The programs and other operating information used by a computer.
  4. Person who breaches computer security
  5. Group of devices connected within a limited area, such as a home, office or building.
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
  7. Programming error
  8. Unsolicited email
  9. Temporary data storage

14 Clues: Programming errorUnsolicited emailTemporary data storagea link to something in a website.Person who breaches computer securityCollection of professional creative software made by Adobe.The programs and other operating information used by a computer.Creates a private connection between your computer and a remote server....

Unit 1: Intro to IT 2023-12-20

Unit 1:  Intro to IT crossword puzzle
Across
  1. Two-dimensional bar code that contains an encoded web or e-mail address.
  2. Working for a company from home using IT.
  3. Software that resides in the cloud that is accessed by users without downloading or installing.
  4. Gap between those with access to technology and those who do not.
  5. Storage that is cloud-based.
  6. Type of computer found inside of other devices.
  7. Involves storing and retrieving data from Internet-based spaces.
Down
  1. How efficiently and quickly a person completes tasks.
  2. Branch of IT that protects computer systems.
  3. Method of searching through huge amounts of data to find patterns.
  4. Amount of data that can travel on a communication system.
  5. Includes all the work done with computers.
  6. View of the live world that has been enhanced with graphics, sounds, or other outputs.
  7. Type of e-book that contains integrated multimedia features.

14 Clues: Storage that is cloud-based.Working for a company from home using IT.Includes all the work done with computers.Branch of IT that protects computer systems.Type of computer found inside of other devices.How efficiently and quickly a person completes tasks.Amount of data that can travel on a communication system....

IT_Tóth Dániel Károly 2023-12-24

IT_Tóth Dániel Károly crossword puzzle
Across
  1. The field concerned with protecting computer systems and data.
  2. Software application designed for use on mobile devices.
  3. The process of determining the structure and functionality of a program.
  4. The activity of writing or designing a computer program.
  5. (!Internet of Things!) The network of physical devices capable of communicating over the internet.
  6. services provided electronically, such as online banking or e-commerce.
  7. A structured storage system that allows efficient data management.
  8. Designing the user interface and user experience for software.
  9. A computer providing specialized services to other computers or devices.
Down
  1. Large volumes of data used for analytical purposes.
  2. Computing resources and services accessible over the internet.
  3. Language A set of rules and instructions interpreted by a computer.
  4. A sequence of steps to perform a computer task.
  5. An iterative and incremental development method in software design.
  6. A system of interconnected computers or devices.

15 Clues: A sequence of steps to perform a computer task.A system of interconnected computers or devices.Large volumes of data used for analytical purposes.Software application designed for use on mobile devices.The activity of writing or designing a computer program.The field concerned with protecting computer systems and data....

Puzzle OSHEC 2023-08-31

Puzzle OSHEC crossword puzzle
Across
  1. Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
  2. Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
  3. Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)
Down
  1. Last word of the first point of ‘Key Takeaways’ - Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
  2. Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
  3. Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.

6 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)...

kelompok 3 2025-04-19

kelompok 3 crossword puzzle
Across
  1. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  2. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Ahli dalam menulis kode untuk membuat perangkat lunak.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 7 2025-04-19

Kelompok 7 crossword puzzle
Across
  1. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  2. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  5. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  6. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  7. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  3. Ahli dalam menulis kode untuk membuat perangkat lunak.
  4. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  5. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  6. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  7. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  8. Platform untuk memperkenalkan budaya Indonesia secara global.
  9. Orang yang menciptakan software berbagai jenis permainan.
  10. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 8 2025-04-19

Kelompok 8 crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Ahli dalam menulis kode untuk membuat perangkat lunak.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Profesi yang menjaga keamanan sistem komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  3. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  10. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  11. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Informatika masa kini 2025-08-28

Informatika masa kini crossword puzzle
Across
  1. Teknologi keuangan berbasis digital, contohnya e-wallet.
  2. OTONOM Istilah lain untuk robot cerdas yang dapat bekerja secara otomatis.
  3. AWAN Penyimpanan data yang berbentuk terpusat di server internet.
  4. Sistem keamanan digital untuk melindungi data dan informasi.
  5. COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata).
  6. DATA Data dalam jumlah sangat besar, kompleks, dan beragam.
  7. Jaringan global yang menghubungkan jutaan komputer di seluruh dunia.
  8. Teknologi simulasi yang memungkinkan pertemuan jarak jauh dalam bentuk avatar 3D.
  9. TERTAMBAH Teknologi yang menggabungkan dunia nyata dan digital (Augmented …).
  10. Singkatan dari Artificial Intelligence (2 kata).
Down
  1. Istilah untuk uang digital terdesentralisasi, misalnya Bitcoin.
  2. BUATAN Sistem yang dapat meniru kemampuan berpikir manusia.
  3. Mesin pencari populer buatan Amerika Serikat.
  4. 4.0 Generasi revolusi industri yang identik dengan otomatisasi dan internet of things.
  5. STORAGE Teknologi penyimpanan data berbasis internet.
  6. OF THINGS Teknologi yang menghubungkan perangkat sehari-hari ke internet.
  7. SARAF TIRUAN Sistem komputasi yang meniru jaringan saraf otak manusia.
  8. Ilmu yang mempelajari pemrosesan informasi dengan komputer.
  9. BAHASA ALAMI Kemampuan komputer untuk memahami bahasa manusia.
  10. Singkatan dari Virtual Reality.

20 Clues: Singkatan dari Virtual Reality.Mesin pencari populer buatan Amerika Serikat.Singkatan dari Artificial Intelligence (2 kata).STORAGE Teknologi penyimpanan data berbasis internet.Teknologi keuangan berbasis digital, contohnya e-wallet.COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata).Ilmu yang mempelajari pemrosesan informasi dengan komputer....

crossword 2025-08-28

crossword crossword puzzle
Across
  1. profession that involves study of drugs
  2. profession that involves protecting computers and networks from hackers
  3. a place where Indian laws are made
Down
  1. Green music festival celebrated in Portugual
  2. symptoms of shortness of breath,fatigue,headaches

5 Clues: a place where Indian laws are madeprofession that involves study of drugsGreen music festival celebrated in Portugualsymptoms of shortness of breath,fatigue,headachesprofession that involves protecting computers and networks from hackers

Cybersecurity Fundamental Chapter 1 2023-10-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. who rally and protest against different political and social ideas.
  2. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. collection of technologies that enable the connection of various devices to the Internet.
  4. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. Their targets are foreign governments, terrorist groups, and corporations.
  4. hackers who are either self-employed or working for large cybercrime organizations.
  5. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. result of data sets that are large and complex, making traditional data processing applications inadequate.

12 Clues: who rally and protest against different political and social ideas.Their targets are foreign governments, terrorist groups, and corporations.hackers who are either self-employed or working for large cybercrime organizations.collection of technologies that enable the connection of various devices to the Internet....

Cybersecurity Lesson 1-3 2023-09-21

Cybersecurity Lesson 1-3 crossword puzzle
Across
  1. automatically tags any pictures you take with the location of where you took it
  2. the freedom to be left alone
  3. formal ways of giving credit to people for their work
  4. everything you do online
  5. a detailed report
  6. untrue, defamatory statements that are written.
  7. short for internet etiquette
  8. the exclusive right to make copies
Down
  1. includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
  2. stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
  3. someone who intentionally targets people for harm using online chat rooms or social media
  4. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody

12 Clues: a detailed reporteverything you do onlinethe freedom to be left aloneshort for internet etiquettethe exclusive right to make copiesuntrue, defamatory statements that are written.formal ways of giving credit to people for their workautomatically tags any pictures you take with the location of where you took it...

Strategic Planning 2023-06-19

Strategic Planning crossword puzzle
Across
  1. An obstacle excutives face the team does not agree with proposed strategy
  2. Businesses may need to address market volatility, cybersecurity, legal and regulatory compliance, and supply chain disruptions
  3. When the blame game starts and people become defensive
  4. Businesses struggle with uncertanties such as market volatility, technological advancements, and regulatory shifts.
Down
  1. Businesses may face due financial, human, and technological limits
  2. Lost in translation
  3. New strategies often face ______ from employees
  4. When businesses get lost in the sematics of defining their vision, missions, and values

8 Clues: Lost in translationNew strategies often face ______ from employeesWhen the blame game starts and people become defensiveBusinesses may face due financial, human, and technological limitsAn obstacle excutives face the team does not agree with proposed strategyWhen businesses get lost in the sematics of defining their vision, missions, and values...

latihan 2025-04-18

latihan crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  3. Orang yang menciptakan software berbagai jenis permainan.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Proses penggunaan teknologi digital untuk melestarikan budaya.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  4. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  5. Profesi yang menjaga keamanan sistem komputer.
  6. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  7. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  8. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  9. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  10. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  11. Ahli dalam menulis kode untuk membuat perangkat lunak.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 3 2025-04-19

kelompok 3 crossword puzzle
Across
  1. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  2. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Ahli dalam menulis kode untuk membuat perangkat lunak.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 8 2025-04-19

Kelompok 8 crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Ahli dalam menulis kode untuk membuat perangkat lunak.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Profesi yang menjaga keamanan sistem komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  3. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  10. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  11. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 6 2025-04-19

Kelompok 6 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  3. Orang yang menciptakan software berbagai jenis permainan.
  4. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  5. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Platform untuk memperkenalkan budaya Indonesia secara global.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Ahli dalam menulis kode untuk membuat perangkat lunak.
  10. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  11. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
Down
  1. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  2. Proses penggunaan teknologi digital untuk melestarikan budaya.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Profesi yang menjaga keamanan sistem komputer.
  8. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  9. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 2 2025-04-19

Kelompok 2 crossword puzzle
Across
  1. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  4. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  9. Ahli dalam menulis kode untuk membuat perangkat lunak.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses penggunaan teknologi digital untuk melestarikan budaya.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  7. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  8. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  9. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 4 2025-04-19

Kelompok 4 crossword puzzle
Across
  1. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  2. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  3. Ahli dalam menulis kode untuk membuat perangkat lunak.
  4. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  5. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  6. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  7. Profesi yang menjaga keamanan sistem komputer.
  8. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  7. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Platform untuk memperkenalkan budaya Indonesia secara global.
  10. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  11. Perlindungan hukum atas hak merek, desain industri, paten, dll.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 9 2025-04-19

Kelompok 9 crossword puzzle
Across
  1. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Platform untuk memperkenalkan budaya Indonesia secara global.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  8. Profesi yang menjaga keamanan sistem komputer.
  9. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  10. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  11. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
Down
  1. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  4. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Ahli dalam menulis kode untuk membuat perangkat lunak.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  8. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  9. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 9 new 2025-04-19

kelompok 9 new crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Proses penggunaan teknologi digital untuk melestarikan budaya.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Profesi yang menjaga keamanan sistem komputer.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Orang yang menciptakan software berbagai jenis permainan.
  7. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  5. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  6. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  7. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  8. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  9. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  10. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  11. Ahli dalam menulis kode untuk membuat perangkat lunak.
  12. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Success 101 2024-10-04

Success 101 crossword puzzle
Across
  1. You should go to this school if you want to be a YouTuber
  2. This career is supported at academies at both Hampton and Kecoughtan
  3. Academy of ___and Public Safety supports future fire fighters
  4. A short speech that you should give when networking
  5. The school with the academy for future teachers
  6. If you want to be an actor, join this academy
  7. Perfect shirt for a job interview
  8. Attend this academy if you want to be a chef
  9. My Future, My ______
Down
  1. Perfect pants for a job interview
  2. This academy is like a private school within a school
  3. This high school has an academy that supports nursing
  4. This academy is for future lawyers
  5. The academy that all 9th graders are in
  6. Academy of Cybersecurity, Engineering, and _____
  7. A future welder in the shipyard should attend this school
  8. A group project focused on changing the community
  9. It is possible to graduate high school with this type of college degree

18 Clues: My Future, My ______Perfect pants for a job interviewPerfect shirt for a job interviewThis academy is for future lawyersThe academy that all 9th graders are inAttend this academy if you want to be a chefIf you want to be an actor, join this academyThe school with the academy for future teachersAcademy of Cybersecurity, Engineering, and _____...

Jenis Profesi 2024-08-08

Jenis Profesi crossword puzzle
Across
  1. menguasai bahasa pemrograman dan terampil menggunakannya
  2. seseorang pembuat konten kreatif
  3. orang yang mengajar dan menyediakan pendidikan untuk orang lain
  4. seseorang yang meneliti informasi menggunakan alat analisis data
  5. berkaitan erat dengan penemuan-penemuan baru
  6. orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
  7. mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
  8. pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
  1. menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
  2. bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
  3. melindungi sistem, jaringan, serta data dari serangan cyber
  4. profesional di bidang kuliner
  5. membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
  6. ndividu yang mempunyai pengaruh besar di media sosial
  7. bertugas mengendalikan pesawat
  8. maha guru
  9. seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
  10. berkaitan erat dengan keamanan dan ketertiban negaranya

18 Clues: maha guruprofesional di bidang kulinerbertugas mengendalikan pesawatseseorang pembuat konten kreatifberkaitan erat dengan penemuan-penemuan barundividu yang mempunyai pengaruh besar di media sosialmenguasai bahasa pemrograman dan terampil menggunakannyaberkaitan erat dengan keamanan dan ketertiban negaranya...

Technology 2023-06-29

Technology crossword puzzle
Across
  1. Using technology to simulate a three-dimensional environment
  2. Protecting computers, networks, and data from unauthorized access
  3. A portable device with a touch screen for browsing and entertainment
  4. Watching or listening to media content over the internet in real-time
  5. Online platforms for connecting and sharing content with others
  6. A global network that connects computers and allows information sharing
Down
  1. A machine that can perform various tasks and run different programs
  2. Electronic mail used for sending messages and files online
  3. Designing, building, and programming robots for various purposes
  4. A collection of web pages accessible through the internet
  5. Electronic games played on a computer or gaming console
  6. Creating three-dimensional objects by layering materials
  7. Writing instructions for computers to create software and websites
  8. A portable computer that you can use for writing, doing homework, or watching movies
  9. A mobile device that can make calls, send messages, and run apps

15 Clues: Electronic games played on a computer or gaming consoleCreating three-dimensional objects by layering materialsA collection of web pages accessible through the internetElectronic mail used for sending messages and files onlineUsing technology to simulate a three-dimensional environmentOnline platforms for connecting and sharing content with others...

ROUND 2 2025-05-10

ROUND 2 crossword puzzle
Across
  1. - The process of introducing new ideas, products, or methods to improve technology
  2. - A programmable machine capable of performing tasks automatically
  3. - Facts or information that can be processed or stored by a computer
  4. - A method of converting information into a secure format to prevent unauthorized access
  5. - A system that represents data using numerical values
  6. - A set of instructions that tells a computer what to do
Down
  1. - Protection against unauthorized access to or damage of computer systems
  2. - A mobile phone with advanced computing capabilities
  3. - A system of interconnected computers that share resources and information
  4. - Existing in a digital or simulated environment, not physically present
  5. - A global network that links computers and devices for communication
  6. - A device used for performing calculations and tasks through programs
  7. - A virtual space for storing and managing data on remote servers
  8. - The tangible physical components that make up a computer or device
  9. - Machines designed to simulate human intelligence

15 Clues: - Machines designed to simulate human intelligence- A mobile phone with advanced computing capabilities- A system that represents data using numerical values- A set of instructions that tells a computer what to do- A virtual space for storing and managing data on remote servers- A programmable machine capable of performing tasks automatically...

App Rationalisation Crossword 2024-02-14

App Rationalisation Crossword crossword puzzle
Across
  1. Phase 1 of EXO apps is called ______ Win.
  2. What is Work Order 1.0 for the process of apps' decommissioning?
  3. The site to raise tickets for decommissioning.
  4. Apps Optimisation could help to reduce _________ cost (Maintenance, subscriptio & hardware cost) at OPU.
  5. One of the EXO apps focus is to ________ on - premise applications to PETRONAS cloud.
  6. What is the name of the new apps optimization project initiated by GD?
Down
  1. Phase 2 of EXO apps is called __________ Enhancement.
  2. ____ decommissioning involves the removal of both infra and application components.
  3. Main data source for app rationalization.
  4. ______________ functions is when 2 or more apps share similar functionality.
  5. Apps that are not in the scope of the PDSB decommission team.
  6. Idle applications & servers increase the likelihood of __________________________ attack.
  7. Consists of the decommissioning of server, database, storage, and network components.
  8. How many work orders are in the process of decommissioning apps?
  9. Dashboard to view Downstream Application

15 Clues: Dashboard to view Downstream ApplicationPhase 1 of EXO apps is called ______ Win.Main data source for app rationalization.The site to raise tickets for decommissioning.Phase 2 of EXO apps is called __________ Enhancement.Apps that are not in the scope of the PDSB decommission team.What is Work Order 1.0 for the process of apps' decommissioning?...

Browsing safely 2025-06-15

Browsing safely crossword puzzle
Across
  1. applications used to prevent the entry of virus into the computer system
  2. full form of virus
  3. acts done to protect one's computer system
  4. Collection of various networks in the form of a web
  5. providing malwares and viruses into one's computer through various links and emails
  6. illegal entry into one's computer through various links
  7. cyber crime in which money is demanded after attacking the victim
  8. a type of anti-virus
  9. befriending children on social media and causing harm through social media or physically
  10. full form of OTP
Down
  1. criminal activities intented to harm a person through online
  2. act of terrorism conducted through the use of internet
  3. full form of ICT
  4. sequence of characters or numbers used in any device or system to keep it protected
  5. act of harassing people through the use of internet

15 Clues: full form of ICTfull form of OTPfull form of virusa type of anti-virusacts done to protect one's computer systemCollection of various networks in the form of a webact of harassing people through the use of internetact of terrorism conducted through the use of internetillegal entry into one's computer through various links...

Get Secure 2019-08-26

Get Secure crossword puzzle
Across
  1. protection of information systems from damage or crime
  2. bad connection during online calls
  3. create a password
  4. a device that consists of a part that fits over a person's ears and a part into which the person can speak, used for communicating without using the hands
  5. connection to a network from a place that is far away
Down
  1. get into a network
  2. a package of software products sold together, usually having a similar look and common installation
  3. rules that help to protect a system
  4. the applications that a company uses for work

9 Clues: create a passwordget into a networkbad connection during online callsrules that help to protect a systemthe applications that a company uses for workconnection to a network from a place that is far awayprotection of information systems from damage or crime...

Security Awareness Week - Shrewsbury 2013-08-29

Security Awareness Week - Shrewsbury crossword puzzle
Across
  1. A more secure form of password
  2. The term used to describe IT Security
Down
  1. Caterpillar's method of classifying confidential data
  2. A computer virus designed to spread itself to other computers
  3. The act of manipulating people into divulging confidential information

5 Clues: A more secure form of passwordThe term used to describe IT SecurityCaterpillar's method of classifying confidential dataA computer virus designed to spread itself to other computersThe act of manipulating people into divulging confidential information

Racheal Tan Kai Luo - 8 Gamma 2023-01-19

Racheal Tan Kai Luo - 8 Gamma crossword puzzle
Across
  1. a personal data that social media will collect from you
  2. raw facts and figures
  3. Cyberattacks are usually aimed at _____ normal business processes
Down
  1. practice of protecting systems , network and program from digital attacks
  2. you have the right to ______ your data
  3. ____ must be used for specific and stated reason

6 Clues: raw facts and figuresyou have the right to ______ your data____ must be used for specific and stated reasona personal data that social media will collect from youCyberattacks are usually aimed at _____ normal business processespractice of protecting systems , network and program from digital attacks

Technology 2021-10-28

Technology crossword puzzle
Across
  1. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  2. video adapter
  3. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
  4. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  5. measures to protect of computer
  6. not eliminate the servers
  7. a saved link to a particular web page
Down
  1. the heart of operating system
  2. conventional method of transmitting data
  3. part of application that performs a task not known to a user
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. collection of physical part of comp system

12 Clues: video adapternot eliminate the serversthe heart of operating systemmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

Cyber Security Crossword 2024-01-16

Cyber Security Crossword crossword puzzle
Across
  1. A malicious program that infects computers without user knowledge or permission.
  2. Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
  3. Malicious party attacking a company.
  4. A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
  5. attack that affects availability of a resource.
  6. A botnet is a network of private computers infected with malicious software.
Down
  1. Secret expression required to gain access to a computing system.
  2. Attack type.
  3. Excessive push notifications leading to unwanted response.
  4. authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
  5. Data Leakage due to well-crafted AI prompt.
  6. Firewall type that protects Web-based Applications.

12 Clues: Attack type.Malicious party attacking a company.Data Leakage due to well-crafted AI prompt.attack that affects availability of a resource.Firewall type that protects Web-based Applications.Excessive push notifications leading to unwanted response.Secret expression required to gain access to a computing system....

TECHNO CROSSWORD 2024-11-12

TECHNO CROSSWORD crossword puzzle
Across
  1. People use this to connect, share photos, and send messages online.
  2. Devices that measure body temperature.
  3. The process of protecting devices from online attacks.
  4. Used to watch movies, shows, and news.
  5. A device that helps people take clear pictures or videos.
  6. Used for making calls and sending texts.
  7. A machine that can be programmed to do tasks by itself.
Down
  1. Portable devices used by students to access learning material.
  2. A flying device controlled by remote, often used to take pictures from above.
  3. Games played on consoles, computers, or mobile devices.
  4. An assistant on phones that talks back and helps with tasks.
  5. This device lets you see and hear people far away in real time.
  6. A place where you can find a lot of information on any topic.

13 Clues: Devices that measure body temperature.Used to watch movies, shows, and news.Used for making calls and sending texts.The process of protecting devices from online attacks.Games played on consoles, computers, or mobile devices.A machine that can be programmed to do tasks by itself.A device that helps people take clear pictures or videos....

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. The hero hacker — breaks systems to protect them.
  2. The “key” everyone forgets right when they need it most.
  3. It clogs your inbox like unwanted guests at a party.
  4. The practice of protecting systems and data from digital attacks.
  5. A person skilled at breaking into computer systems.
  6. When a website gets so many fake visitors it forgets how to work.
Down
  1. Digital kidnapping: your files are the hostages!
  2. A gift that brings trouble, not joy — just ask the Greeks!
  3. A program that detects and removes malicious software.
  4. Online impersonation so convincing it fools your eyes — and inbox.
  5. The digital gatekeeper that says, “You shall not pass!”
  6. When someone goes “fishing” for your passwords — but with emails.
  7. Turning words into secrets that only the right decoder can read.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. The “key” everyone forgets right when they need it most.
  2. When a website gets so many fake visitors it forgets how to work.
  3. A gift that brings trouble, not joy — just ask the Greeks!
  4. The digital gatekeeper that says, “You shall not pass!”
  5. Turning words into secrets that only the right decoder can read.
Down
  1. A program that detects and removes malicious software.
  2. The practice of protecting systems and data from digital attacks.
  3. Digital kidnapping: your files are the hostages!
  4. The hero hacker — breaks systems to protect them.
  5. When someone goes “fishing” for your passwords — but with emails.
  6. Online impersonation so convincing it fools your eyes — and inbox.
  7. A person skilled at breaking into computer systems.
  8. It clogs your inbox like unwanted guests at a party.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

CyberQuest 2025-10-18

CyberQuest crossword puzzle
Across
  1. It clogs your inbox like unwanted guests at a party.
  2. The “key” everyone forgets right when they need it most.
  3. The digital gatekeeper that says, “You shall not pass!”
  4. The practice of protecting systems and data from digital attacks.
  5. When someone goes “fishing” for your passwords — but with emails.
  6. The hero hacker — breaks systems to protect them.
  7. A gift that brings trouble, not joy — just ask the Greeks!
Down
  1. Digital kidnapping: your files are the hostages!
  2. When a website gets so many fake visitors it forgets how to work.
  3. Online impersonation so convincing it fools your eyes — and inbox.
  4. A program that detects and removes malicious software.
  5. A person skilled at breaking into computer systems.
  6. Turning words into secrets that only the right decoder can read.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. When someone goes “fishing” for your passwords — but with emails.
  2. A gift that brings trouble, not joy — just ask the Greeks!
  3. It clogs your inbox like unwanted guests at a party.
  4. A program that detects and removes malicious software.
  5. The hero hacker — breaks systems to protect them.
  6. The digital gatekeeper that says, “You shall not pass!”
Down
  1. When a website gets so many fake visitors it forgets how to work.
  2. Digital kidnapping: your files are the hostages!
  3. The “key” everyone forgets right when they need it most.
  4. The practice of protecting systems and data from digital attacks.
  5. Online impersonation so convincing it fools your eyes — and inbox.
  6. Turning words into secrets that only the right decoder can read.
  7. A person skilled at breaking into computer systems.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

GoGoByte Halloween English Quest 2025-10-29

GoGoByte Halloween English Quest crossword puzzle
Across
  1. A sweet food made from sugar and often flavored with chocolate or fruit.
  2. The structure of bones in a human or animal body.
  3. A violent physical attack
  4. A system or device that has been broken into or corrupted
  5. A machine that can carry out tasks automatically.
  6. A technology company specializing in cybersecurity.
  7. The complete absence of sound; a situation with no noise or talking.
Down
  1. A file or object sent with an email or message, or a strong emotional bond to something or someone.
  2. Twelve o'clock at night; the middle of the night.
  3. To break free from a dangerous or confining situation.
  4. To speak very quietly, using one's breath rather than one's throat.
  5. Extreme fear, often associated with horror.
  6. A place where you work, often with computers and desks.

13 Clues: A violent physical attackExtreme fear, often associated with horror.Twelve o'clock at night; the middle of the night.The structure of bones in a human or animal body.A machine that can carry out tasks automatically.A technology company specializing in cybersecurity.To break free from a dangerous or confining situation....

Crossword Puzzle: Redefining Possible 2025-01-30

Crossword Puzzle: Redefining Possible crossword puzzle
Across
  1. Storage and processing of data over the internet
  2. The time to come
  3. Tech allowing machines to learn from data
  4. Tech that creates simulated experiences
  5. Analyzes data to find insights
  6. Hidden prejudice
  7. Celebrated on March 8th
  8. First computer programmer
  9. Variety in a group
  10. Bringing new ideas to life
  11. A set of instructions for a computer
  12. Person who manages the development of a product
  13. Small-scale technology
  14. Protection of digital information
Down
  1. Creates and maintains software
  2. "Mother of COBOL"
  3. A difficult task
  4. A person who plans and builds computer networks
  5. "The Mother of the Internet"
  6. The act of combining things into a whole
  7. Lead software engineer for the Apollo program
  8. Including everyone
  9. Mathematician who helped Apollo land on the moon
  10. Key to unlocking potential
  11. Machines that perform tasks automatically
  12. What we work towards for women in tech
  13. Field combining biology and tech
  14. The world of connected computers
  15. Designs user interfaces
  16. "Redefining ___"
  17. Tech focused on creating intelligent machines
  18. Inventor of frequency hopping spread spectrum

32 Clues: The time to comeA difficult taskHidden prejudice"Redefining ___""Mother of COBOL"Including everyoneVariety in a groupSmall-scale technologyDesigns user interfacesCelebrated on March 8thFirst computer programmerKey to unlocking potentialBringing new ideas to life"The Mother of the Internet"Creates and maintains softwareAnalyzes data to find insights...

tugas 2025-02-02

tugas crossword puzzle
Across
  1. istilah keamanan informasi di interne?
  2. pasukan terkoordinasi dari perangkat yang telah disusupi oleh virus pengertian dari?
  3. Virus yang menghancurkan file gambar, musik, sistem operasi dan kata sandi yaitu?
  4. Pembobol sistem komputer dan mencuri data?
  5. Yang digunakan peretas untuk melakukan aksinya?
  6. peretas yang menggunakan topi hitam disebut dengan?
  7. rekayasa pada awal munculnya internet cukup berhasil contoh nyata inilah kemunculan virus?
  8. era berapa ketika penetasan memiliki arti negatif?
  9. pharming dilakukan dengan menanamkan alamat internet palsu pada tabel apa?
  10. horse malware yang tampak seperti aplikasi perangkat lunak jinak tetapi membawa komponen jahat didalamnya yaitu?
Down
  1. malware yang dapat memantau dan merekam aktifitas pengguna yaitu?
  2. Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data yaitu?
  3. malware yang mampu mengenkripsi beberapa atau semua file yaitu?
  4. Perangkat lunak yang sering menempel pada perangkat lainya?
  5. Awal munculnya informatika peretas disebut dengan?
  6. phising adalah kejahatan biasanya target dihubungi melalui?
  7. Perilaku peretas berbentuk vandalisme digital yang mengganti halaman muka situs web dengan?
  8. perangkat lunak yang mendapat akses melewati lapisan security pengertian dari
  9. yang bersemangat menemukan hal hal baru?
  10. Dirancang untuk mengekploitasi kelemahan sistem tertentu?

20 Clues: istilah keamanan informasi di interne?yang bersemangat menemukan hal hal baru?Pembobol sistem komputer dan mencuri data?Yang digunakan peretas untuk melakukan aksinya?Awal munculnya informatika peretas disebut dengan?era berapa ketika penetasan memiliki arti negatif?peretas yang menggunakan topi hitam disebut dengan?...

Computer Virus 2024-09-09

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

Unit III Crossword II 2024-10-15

Unit III Crossword II crossword puzzle
Across
  1. Act of creating fraudulent digital signatures under the IT Act.
  2. Technique for securing data as per IT Act guidelines.
  3. Area where the IT Act has the power to enforce laws.
  4. Illegal content covered under Section 67.
  5. Term for records, documents, or data as defined in the IT Act.
  6. Legal action taken for offenses under the IT Act.
  7. Crime involving computers or networks under the IT Act.
  8. Authority to decide penalties for cyber offenses.
  9. Access without permission, covered under multiple sections.
Down
  1. Protection of information infrastructure under Section 70.
  2. Authority responsible for issuing digital signatures.
  3. Cybercrime involving fraudulent emails for personal data theft.
  4. Entity facilitating online services regulated under the Act.
  5. Changes or updates made to the IT Act, such as in 2008.
  6. Manipulation of computer source code, Section 65.
  7. Violation or illegal activity defined under the IT Act.
  8. Duty to protect sensitive data, highlighted in Section 72.
  9. Unauthorized access to computer systems as per Section 66.
  10. Type of signature recognized by the IT Act for authentication.
  11. Legal consequences for violating the IT Act.

20 Clues: Illegal content covered under Section 67.Legal consequences for violating the IT Act.Manipulation of computer source code, Section 65.Legal action taken for offenses under the IT Act.Authority to decide penalties for cyber offenses.Area where the IT Act has the power to enforce laws.Authority responsible for issuing digital signatures....

TTS INFORMATIKA X.G 2025-04-10

TTS INFORMATIKA X.G crossword puzzle
Across
  1. Operator pencarian untuk hasil yang persis sama
  2. Profesi yang membuat aplikasi atau software
  3. Hak yang melindungi karya tulis atau lagu
  4. Profesi yang merancang tampilan antarmuka
  5. Profesi yang merancang struktur sistem informasi
  6. Informasi bohong yang menyebar di internet
  7. Proses menyebarkan konten ke banyak orang
  8. Konten digital yang mengangkat cerita rakyat
  9. Profesi yang menjaga keamanan jaringan
  10. Profesi yang menganalisis data besar
  11. Lembaga yang mengatur konten digital di Indonesia
Down
  1. Media untuk berbagi video berisi kebudayaan lokal
  2. Situs untuk mengecek fakta
  3. Fitur Google untuk membandingkan dua hal
  4. Simbol untuk pengecualian kata dalam hasil pencarian
  5. Operator untuk mencari hasil dari situs tertentu
  6. Operator untuk mencari dalam rentang angka
  7. Surat resmi yang menyatakan hak atas ciptaan
  8. Singkatan dari Hak Atas Kekayaan Intelektual
  9. Unsur yang harus dijaga saat memproduksi konten budaya
  10. Proses memeriksa kebenaran suatu informasi
  11. Proses untuk memastikan informasi yang tersebar tidak palsu atau menyesatkan
  12. Seni tradisional yang bisa diangkat dalam konten digital
  13. HAKI yang melindungi logo perusahaan
  14. Institusi pemerintah yang mengurus HAKI di Indonesia

25 Clues: Situs untuk mengecek faktaHAKI yang melindungi logo perusahaanProfesi yang menganalisis data besarProfesi yang menjaga keamanan jaringanFitur Google untuk membandingkan dua halHak yang melindungi karya tulis atau laguProfesi yang merancang tampilan antarmukaProses menyebarkan konten ke banyak orangOperator untuk mencari dalam rentang angka...

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Profesi yang bertugas untuk mengelola data
  2. Orang yang mengedit konten
  3. Proses mencari informasi di internet
  4. Proses menilai kebenaran konten
  5. Profesi yang membuat perangkat lunak
  6. Lembaga yang mengurus HAKI di Indonesia
  7. Hak ekslusif atas suatu merek dagang
  8. Bentuk perlindungan HAKI untuk karya seni.
  9. Hasil pencarian yang ditampilkan
  10. Proses penyebaran konten di internet
  11. Alamat untuk mengakses situs web
  12. Organisasi yang bertugas memvalidasi konten negatif di Indonesia
  13. Mesin pencari yang fokus pada privasi pengguna
  14. Profesi yang mengelola jaringan komputer
  15. Mesin pencari bawaan Microsoft
Down
  1. Hak ekslusif atas suatu penemuan
  2. Konten yang berisi ujaran kebencian
  3. Profesi yang merancang dan membangun situs web
  4. Platform untuk video berdurasi panjang
  5. Proses pembuatan konten digital
  6. Mesin pencari populer di dunia
  7. Profesi yang membuat konten digital
  8. Platform medsos berbasis foto dan video
  9. Konten digital yang berupa tulisan
  10. Bertugas menjaga keamanan sistem komputer
  11. Konten yang mengandung tindakan kekerasan
  12. Profesi yang mendesain antarmuka pengguna
  13. Mesin pencari dari Tiongkok
  14. Konten yang berisi informasi palsu
  15. Platform untuk menyebarkan tulisan dan artikel

30 Clues: Orang yang mengedit kontenMesin pencari dari TiongkokMesin pencari populer di duniaMesin pencari bawaan MicrosoftProses pembuatan konten digitalProses menilai kebenaran kontenHak ekslusif atas suatu penemuanHasil pencarian yang ditampilkanAlamat untuk mengakses situs webKonten digital yang berupa tulisanKonten yang berisi informasi palsu...

Tugas Daring Informatika Nur Keisya R. P. A 25/X-I 2025-04-11

Tugas Daring Informatika Nur Keisya R. P. A 25/X-I crossword puzzle
Across
  1. Unsur tradisional Indonesia yang bisa dimasukkan dalam konten digital
  2. Media yang sering dipakai menyebar hoaks dengan cepat
  3. Proses membuat dan menyebarluaskan konten di media digital
  4. Profesi pembuat perangkat lunak
  5. Penemuan baru di bidang teknologi dilindungi dengan
  6. Platform populer berbagi video pendek
  7. Kata kunci untuk membatasi pencarian di satu situs saja
  8. Profesi yang menganalisis data untuk menemukan pola
  9. Lembaga yang mengurus HAKI di Indonesia
  10. Tindakan mengecek kebenaran informasi sebelum disebarkan
  11. Jenis HAKI untuk merek dagang atau simbol bisnis
  12. Singkatan dari Hak atas Kekayaan Intelektual
  13. Profesi yang membuat tampilan visual aplikasi/web
  14. Situs untuk mengecek kebenaran hoaks di Indonesia
Down
  1. Simbol yang digunakan untuk mencari exact match dalam mesin pencari
  2. Platform pencarian milik Google
  3. Istilah untuk berita bohong di internet
  4. Profesi yang mengatur jaringan komputer
  5. Operator pencarian untuk mengecualikan kata tertentu dari hasil pencarian
  6. Konten digital yang menggabungkan gambar, suara, dan teks
  7. Operator pencarian untuk menampilkan dua kata sekaligus
  8. Tujuan menyisipkan budaya dalam konten digital
  9. Tindakan untuk memastikan suatu informasi bukan hoaks
  10. Hak atas hasil ciptaan seperti lagu, film, tulisan
  11. Profesi yang menjaga keamanan sistem digital

25 Clues: Platform pencarian milik GoogleProfesi pembuat perangkat lunakPlatform populer berbagi video pendekIstilah untuk berita bohong di internetProfesi yang mengatur jaringan komputerLembaga yang mengurus HAKI di IndonesiaProfesi yang menjaga keamanan sistem digitalSingkatan dari Hak atas Kekayaan IntelektualTujuan menyisipkan budaya dalam konten digital...

Harley's Computer Apps. Crossword 2022-04-29

Harley's Computer Apps. Crossword crossword puzzle
Across
  1. a review game website that allows you to earn cash and buy upgrades
  2. Making sure your safe on the internet
  3. First thing we learned about
  4. Application that allows you to organize your information on a spreadsheet
  5. You can make your own website using this
  6. A citation Machine
  7. allows you to make a picture or text move or spin, etc.
  8. You can gather data from people who you share this with
  9. The brand of computers students use in PCM schools
  10. Company that owns sheets, docs, slides, etc.
Down
  1. the illegal act of using someone else's content without properly citing it
  2. Not letting people know about your personal life
  3. Application that allows you to make and share slides with people
  4. Application that allows you to create and edit videos for class
  5. what you always end your sentences in
  6. What gives slides their overall color and font
  7. Shortest unit of the school year
  8. what shape are the blocks from blooket
  9. How to do math using sheets
  10. The most commonly used game website for reviewing

20 Clues: A citation MachineHow to do math using sheetsFirst thing we learned aboutShortest unit of the school yearwhat you always end your sentences inMaking sure your safe on the internetwhat shape are the blocks from blooketYou can make your own website using thisCompany that owns sheets, docs, slides, etc.What gives slides their overall color and font...

test 2022-07-15

test crossword puzzle
Across
  1. Brand of sammi’s car -
  2. Basketball team michael supports -
  3. City they will live in after the wedding -
  4. How they met
  5. Location of their first post together on IG -
  6. Industry sammi works in -
  7. Color of michaels bathroom before they painted it -
  8. Sammi’s side hustle -
  9. State michael was raised in -
  10. Sauce michael hates -
  11. Music festival they attended -
  12. Month they met -
  13. Destination of first plane ride together -
  14. Engagement ring shape -
  15. Type of dance sammi did growing up -
  16. Sammis bridal shower was a ___ party -
  17. Michael proposed in ___ beach -
Down
  1. Sammis favorite flowers -
  2. Year they met -
  3. Attends ___ ___ community church -
  4. Type of engineer Michael is -
  5. European country michael lived in -
  6. Amusement park they had annual passes to -
  7. On the way to Big Sur they stopped at an ___ farm -
  8. City sammi did her internship in -
  9. City they took their engagement photos -
  10. Where they ate on their first date -
  11. Day of the week they attend life group -
  12. How we are honoring sammis dad at the wedding -
  13. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Sammis favorite flowers -Industry sammi works in -Type of engineer Michael is -State michael was raised in -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

test 2022-07-15

test crossword puzzle
Across
  1. City sammi did her internship in -
  2. Engagement ring shape -
  3. Sammi’s side hustle -
  4. How we are honoring sammis dad at the wedding -
  5. Where they ate on their first date -
  6. Sauce michael hates -
  7. Type of dance sammi did growing up -
  8. Industry sammi works in -
  9. Day of the week they attend life group -
  10. Sammis favorite flowers -
  11. Attends ___ ___ community church -
  12. Location of their first post together on IG -
  13. Year they met -
  14. Month they met -
  15. City they will live in after the wedding -
Down
  1. Amusement park they had annual passes to -
  2. City they took their engagement photos -
  3. Music festival they attended -
  4. Destination of first plane ride together -
  5. Color of michaels bathroom before they painted it -
  6. Basketball team michael supports -
  7. Brand of sammi’s car -
  8. State michael was raised in -
  9. European country michael lived in -
  10. Type of engineer Michael is -
  11. Sammis bridal shower was a ___ party -
  12. Michael proposed in ___ beach -
  13. On the way to Big Sur they stopped at an ___ farm -
  14. How they met
  15. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -City sammi did her internship in -...

complete_rmt_22 2022-02-09

complete_rmt_22 crossword puzzle
Across
  1. The role responsible for maintaining product roadmap
  2. The abbreviation for Innovation management.
  3. The meaning of RTE
  4. Creator of the Software Design plan
  5. The process of setting up an information pool, market segmentation, market sizing, customer analysis, competitor analysis, trend & technology analysis, internal analysis.
  6. The experience distilled from a project that should be actively taken into account in future projects in the context of KM.
  7. Role responsible for qualification of software
  8. Abbreviation for product management process
  9. Abbreviation for Scaled Agile Framenwork
  10. The time needed from creation of the problem to the resolution of the problem, i.e. rejection or the implementation and acceptance of a change.(2 words)
  11. Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
  12. Software Requirements Analysis process in ASPICE
  13. The meaning of swc
  14. Short name for workshops where a team reflects the way it works and identifies potentials for improvement.(plural)
  15. Abbreviation of Software Detailed Designs
  16. Abbreviation used for Cybersecurity Engineering process.
  17. Standard for road vehicles functional safety
  18. The prerequisite identified as necessary for a user, or a user group, to achieve a goal, within a specific context of use.
  19. Object oriented programming language lunched in 1995
  20. The abbreviation of Automotive Software Performance Improvement and Capability dEtermination
  21. The abbreviation of the business development process.
  22. The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
  23. The document that defines the safety strategy in the project
  24. The IEEE-STD-610 defines it as “An activity that ensures that an end product stakeholder’s true needs and expectations are met.”
  25. The abbreviation for the work result "Software Quality Assurance Plan", defined by IEEE 730.
  26. Record of the an exact result of a performed integration step.
  27. Abbreviation for a requirement management plan
  28. Role responsible for identification and analysis of market-specific trends & technologies.
  29. The inspection of selected processes in selected instances (projects, products, locations, …) and that identifies weaknesses in terms of compliance and risk
  30. The highest-level backlog in SAFe
  31. The process of identifying (current and future) business critical knowledge areas as well as capturing, developing, sharing, and effectively using organizational knowledge.
  32. The coordinator that helps the program achieve the program goals.
  33. Attribute of a change request derived from risk, impact, affected customers, upcoming release schedules, etc.
  34. The workresult work result defining the pricing in line with the market, in responsibility of the business development manager.
  35. Any potential failure identified in internal reviews, testing, etc.
  36. The infrastructure used by the project defined in the configuration management plan.
  37. Problem resolution management process in ASPICE
  38. Type of testing performed to expose defects in the interfaces and in the interactions between integrated components or systems.
  39. The task that tracks the program progress against the program goals and to identify potential deviations in time.
  40. Role responsible to create the cybersecurity concept.
Down
  1. Work result with the purpose to provide basic information about the expected outcome of the incubator project.
  2. Important event in the history or development of something or someone
  3. Abbreviation of Software integration and integration test process.
  4. An individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations. (ISO12207)
  5. The abbreviation for the features and high-level requirements
  6. Software integration and integration test process in ASPICE.
  7. The set of five criteria that a product name must fulfill in order to become a product brand.
  8. Abbreviation of User Experience Engineering process.
  9. Work result that is treated as a single entity in the configuration management process.
  10. The abbreviation of system test process
  11. Role responsible for evaluating the received new product ideas and giving feedback to the Employee (accept for further development, or reject).
  12. Task in portfolio management with the purpose to mitigate risks of double work in research and development and to use the scarce resources optimally.
  13. A software component, that contains one or more software components (units and/or other compositions)that makes hierarchical structures in the architectural design possible.
  14. A series of actions taken in order to achieve a certain result
  15. The abbreviation of software test process
  16. The role responsible to drive new business ideas, identify its business potential, and create new business models
  17. Standard used as reference for defining the User Experience Engineering process
  18. The abbreviation used for Problem Resolution Management process
  19. Work results that triggers the change management activities according to the change request management plan
  20. The name of the qualified set of frozen configuration items is
  21. The process established to maintain the integrity of all work results of a process or project and make them available to parties concerned.
  22. Role with skills that is independent of the project and performs process audits and assessments.
  23. Role responsible for deciding whether a change is to be applied.
  24. Smallest piece of software
  25. The strategy that provides the work result is to provide guidance for innovation activities in the next 5 years.
  26. The IEEE-STD-610 defines it as “A test of a system to prove that it meets all its specified requirements at a particular stage of its development.”
  27. Abbreviation of program management process
  28. A cross-functional group of 5-11 individuals who define, build, test, and deliver an increment of value in a short time box.
  29. Role responsible to plan, measure, act on and report the project.
  30. The abbreviation of Portfolio management process
  31. Implemented by planned activities, or divided into sub-goals
  32. The ordered list of features or enablers on a high level (e.g. epics), part of a program.
  33. A collection of projects which are connected by joint goals to obtain benefits not available from managing the projects individually.
  34. Abbreviation of Software Architectural Design
  35. Prioritization of software units to provide the information what is to be done in which order
  36. The fictitious yet realistic representations of users of a system, including details like their mental models, limitations in cognition or physical mobility.
  37. The list of the available product lines, products and product items with the corresponding license types and prices.
  38. The abbreviation for the work result "software project management plan", which is also defined by IEEE 1058
  39. Abbreviation for Subject Matter Expert.
  40. Abbreviation used for change request management process

80 Clues: The meaning of RTEThe meaning of swcSmallest piece of softwareThe highest-level backlog in SAFeCreator of the Software Design planThe abbreviation of system test processAbbreviation for Subject Matter Expert.Abbreviation for Scaled Agile FramenworkThe abbreviation of software test processAbbreviation of Software Detailed Designs...

26. Technology 2023-09-09

26. Technology crossword puzzle
Across
  1. A handheld device that combines a phone with computing functions.
  2. A machine designed to carry out tasks autonomously or under human control.
  3. A machine that processes information and performs tasks.
  4. A simulated environment created by computer technology.
  5. Global Positioning System, used for location and navigation.
  6. The process of encoding information to secure it from unauthorized access.
  7. A global network that connects computers and devices worldwide.
  8. Information that can be stored, processed, and analyzed.
Down
  1. Machines and software that can think and learn like humans.
  2. The measurement and analysis of unique physical or behavioral characteristics for identification.
  3. The physical components of computers and electronic devices.
  4. Programs and applications that run on computers and devices.
  5. Measures taken to protect computer systems and data from cyber threats.
  6. The creation of three-dimensional objects from digital designs.

14 Clues: A simulated environment created by computer technology.A machine that processes information and performs tasks.Information that can be stored, processed, and analyzed.Machines and software that can think and learn like humans.The physical components of computers and electronic devices.Programs and applications that run on computers and devices....

vocab 2025-03-13

vocab crossword puzzle
Across
  1. An institution that holds historical artifacts
  2. the branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules at nanoscale
  3. Structure made of sand
  4. what families do when they cook outside in the summer
  5. what families do when they prepare food for an outdoor mean
  6. The ability of computers to do tasks traditionally done by humans
  7. An event that hosts musical performances
Down
  1. Protecting networks, devices, and date from criminal use
  2. the use of automatic equipment in manufacturing
  3. sport of using a board on the water
  4. the ability to maintain at a certain rate
  5. the creation of new ideas or methods
  6. An activity that you do while swimming that allows you to see underwater
  7. the flame you make while on a nature excursion

14 Clues: Structure made of sandsport of using a board on the waterthe creation of new ideas or methodsAn event that hosts musical performancesthe ability to maintain at a certain rateAn institution that holds historical artifactsthe flame you make while on a nature excursionthe use of automatic equipment in manufacturing...

Impact of computing 2025-03-25

Impact of computing crossword puzzle
Across
  1. A cyber crime where people are tricked into revealing sensitive information.
  2. The unauthorized access to or use of computer systems
  3. The use of technology to collect and analyze large amounts of data
  4. The ability of a system to keep running without failure
  5. The spread of false or misleading information online
  6. It is essentially public participation in scientific research.
  7. The protection of information systems from theft or damage
Down
  1. The gap between those with and without access to technology
  2. Loss of jobs due to automation
  3. A type of bias found in algorithms due to unrepresentative data
  4. The ability to use digital technology effectively
  5. It verifies the identity of websites, individuals, organizations, or devices.
  6. A type of license that allows sharing and reuse of copyrighted material
  7. The practice of obtaining information from a large group online

14 Clues: Loss of jobs due to automationThe ability to use digital technology effectivelyThe spread of false or misleading information onlineThe unauthorized access to or use of computer systemsThe ability of a system to keep running without failureThe protection of information systems from theft or damage...

Technology 2021-10-28

Technology crossword puzzle
Across
  1. a saved link to a particular web page
  2. the heart of operating system
  3. measures to protect of computer
  4. does not eliminate the servers
  5. collection of physical part of comp system
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  2. video adapter
  3. conventional method of transmitting data
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.

12 Clues: video adapterthe heart of operating systemdoes not eliminate the serversmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

IT Crossword 2021-10-28

IT Crossword crossword puzzle
Across
  1. a saved link to a particular web page.
  2. the heart of operating system.
  3. measures to protect of computer.
  4. does not eliminate the servers.
  5. collection of physical part of comp system.
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials.
  2. video adapter.
  3. conventional method of transmitting data.
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user.
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication.
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result

12 Clues: video adapter.the heart of operating system.does not eliminate the servers.measures to protect of computer.a saved link to a particular web page.conventional method of transmitting data.collection of physical part of comp system.part of application that performs a task not known to a user....

Cyberpuzzle 2023-08-08

Cyberpuzzle crossword puzzle
Across
  1. Substitute_ with numbers, punctuation marks or symbols when creating your password
  2. Phishing attempt directed at specific individuals or companies
  3. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  4. Kind of software used to prevent, scan, detect and delete viruses from a computer
  5. Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
  6. Cybersecurity Awareness Month
  7. Mandatory to wear inside the organisation and to remove outside
Down
  1. Action to do when I receive a suspicious email
  2. When available, use stronger_for an added layer of security
  3. Type of malware that disrupts computers, servers, and other devices
  4. Phishing attack deployed via SMS message
  5. Defensive technology designed to keep the bad guys out

12 Clues: Cybersecurity Awareness MonthPhishing attack deployed via SMS messageAction to do when I receive a suspicious emailDefensive technology designed to keep the bad guys outWhen available, use stronger_for an added layer of securityPhishing attempt directed at specific individuals or companies...

Science and technology C1 2024-03-01

Science and technology C1 crossword puzzle
Across
  1. the development and use of a new idea or method
  2. becoming very popular very quickly on the internet
  3. protecttive measures taken against the criminal access of electronic data
  4. very modern
  5. to obtain a more powerful or feature-rich computer or electronic device
  6. a person who is enthusiastic about new technology
  7. involving or causing a complete or dramatic change and improvement
Down
  1. a person who fears or dislikes new technology, especially computers, and does not want to use it
  2. a small mechanical or electronic device or too
  3. not in use any more, having been replaced by something better
  4. a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology
  5. to suddenly stop working

12 Clues: very modernto suddenly stop workinga small mechanical or electronic device or toothe development and use of a new idea or methoda person who is enthusiastic about new technologybecoming very popular very quickly on the internetnot in use any more, having been replaced by something better...

Impact of computing 2025-03-25

Impact of computing crossword puzzle
Across
  1. It verifies the identity of websites, individuals, organizations, or devices.
  2. A type of license that allows sharing and reuse of copyrighted material
  3. The protection of information systems from theft or damage
  4. The ability of a system to keep running without failure
  5. Loss of jobs due to automation
Down
  1. The unauthorized access to or use of computer systems
  2. The use of technology to collect and analyze large amounts of data
  3. A type of bias found in algorithms due to unrepresentative data
  4. The gap between those with and without access to technology
  5. It is essentially public participation in scientific research.
  6. The practice of obtaining information from a large group online
  7. A cyber crime where people are tricked into revealing sensitive information.

12 Clues: Loss of jobs due to automationThe unauthorized access to or use of computer systemsThe ability of a system to keep running without failureThe protection of information systems from theft or damageThe gap between those with and without access to technologyIt is essentially public participation in scientific research....

Embracing the Digital Tapestry 2024-02-11

Embracing the Digital Tapestry crossword puzzle
Across
  1. The act of introducing new ideas, devices, or methods.
  2. Digital or virtual currency secured by cryptography.
  3. The ability to understand and share the feelings of another in the context of digital interactions.
  4. The state or condition of being free from public attention in the digital realm.
  5. A global system of interconnected computer networks.
Down
  1. Simulation of human intelligence in machines for performing complex tasks.
  2. Online platforms that enable users to create, share content, or participate in social networking.
  3. A decentralized ledger of all transactions across a network.
  4. The era marked by rapid technological advancements and global connectivity.
  5. Protective measures and technologies used to safeguard information and systems.

10 Clues: Digital or virtual currency secured by cryptography.A global system of interconnected computer networks.The act of introducing new ideas, devices, or methods.A decentralized ledger of all transactions across a network.Simulation of human intelligence in machines for performing complex tasks....

technical 2024-07-29

technical crossword puzzle
Across
  1. This language is known for its simplicity and is named after a type of snake.
  2. The practice of protecting systems and networks from digital attacks.
  3. A widely used operating system developed by Microsoft.
  4. Management This acronym refers to a type of database that organizes data into tables.
  5. The method used to connect multiple devices in a network.
  6. A diagram used to visually represent the flow of a program.
Down
  1. A common tool used to prevent unauthorized access to a network.
  2. The physical components of a computer system.
  3. This term refers to a device that stores data using magnetic disks.
  4. The process of writing and maintaining the source code of software.

10 Clues: The physical components of a computer system.A widely used operating system developed by Microsoft.The method used to connect multiple devices in a network.A diagram used to visually represent the flow of a program.A common tool used to prevent unauthorized access to a network.This term refers to a device that stores data using magnetic disks....

Internet Safety 2025-03-07

Internet Safety crossword puzzle
Across
  1. video-taping the assault of someone for social media attention
  2. A loud call of cry used when expressing strong emotions
  3. Committing illegal acts on computers or the internet
Down
  1. A type of software designed to block access to something until an amount of money is paid
  2. The act of insulting or using verbal hostility towards someone
  3. unauthorized reproduction of someone's intellectual property without their consent
  4. The protection of crime and unauthorized access from data, network, and devices
  5. Files of data made to track your activities and information online
  6. The act of using social media to watch, monitor what someone is doing and harass them
  7. How people talk online

10 Clues: How people talk onlineCommitting illegal acts on computers or the internetA loud call of cry used when expressing strong emotionsThe act of insulting or using verbal hostility towards someonevideo-taping the assault of someone for social media attentionFiles of data made to track your activities and information online...

Risk Culture Awareness 2022-01-18

Risk Culture Awareness crossword puzzle
Across
  1. your ability and willingness to stomach a decline in the value of your investments.
  2. risk of loss resulting from ineffective or failed internal processes, people, systems
  3. not part of operational risk
  4. chance of something happening
  5. level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
  6. there are three lines of them
Down
  1. reputational harm stemming from a cyberattack or breach within an organization's network
  2. you are part of this line
  3. represents the third line
  4. the elimination of hazards, activities and exposures that can negatively affect an organization and its assets

10 Clues: you are part of this linerepresents the third linenot part of operational riskchance of something happeningthere are three lines of themyour ability and willingness to stomach a decline in the value of your investments.risk of loss resulting from ineffective or failed internal processes, people, systems...

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms including AI for automation
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

CIS 178 Participation 3 Security crossword 2023-04-21

CIS 178 Participation 3 Security crossword crossword puzzle
Across
  1. information for users online activity
Down
  1. Protects devices services and netwoks
  2. two components to verify users
  3. designed to stop remove viruses

4 Clues: two components to verify usersdesigned to stop remove virusesProtects devices services and netwoksinformation for users online activity

The Wedding Crossword 2021-03-28

The Wedding Crossword crossword puzzle
Across
  1. What is Liam's favourite game?
  2. Where did Liam and Ais go on their first date?
  3. What did Ais want to be when she grew up?
  4. Liam and Ais went to the Six Nations in Dublin to see Ireland play what team?
  5. What is Ais's Godmother's surname?
  6. Where did Liam and Ais meet for the very first time?
  7. What TV computer nerd inspired Ais to consider studying cybersecurity and forensics?
  8. An Irish fairy known for being talkative and mischievous
  9. Liam and Ais share their favourite cake - what is it?
  10. Where did Liam and Ais live in Cork?
Down
  1. One of the destinations on the honeymoon
  2. Liam and Ais's favourite place to visit in Koln.
  3. Where did Liam go to the Gaelteacht?
  4. What is Ais's favourite game?
  5. Ais and Liam got back into Formula One last year - what's their favourite team?
  6. What is Liam's Godmother's surname?
  7. Ais's childhood cat is famous at the local vet for what?
  8. What is the name of Liam's personal pandemic hairdresser?

18 Clues: What is Ais's favourite game?What is Liam's favourite game?What is Ais's Godmother's surname?What is Liam's Godmother's surname?Where did Liam go to the Gaelteacht?Where did Liam and Ais live in Cork?One of the destinations on the honeymoonWhat did Ais want to be when she grew up?Where did Liam and Ais go on their first date?...

Technology CW 2023-06-07

Technology CW crossword puzzle
Across
  1. a proprietary audio/video interface for transmitting uncompressed video data
  2. the protection of computer systems and networks
  3. a method of transmitting and receiving messages using electronic devices.
  4. a file format developed by Adobe in 1992 to present documents
  5. a hardware or software component that stores data
  6. data using a two-symbol system.
  7. a file format developed by Adobe in 1992 to present documents
  8. a coding format for digital audio
  9. a mapping from some domain (for example, a range of integers)
  10. a humanoid robot or synthetic organism designed to imitate a human
Down
  1. blocks of data created by a web server
  2. a file format developed by Adobe in 1992 to present documents
  3. a bitmap image format that was developed by a team at the online services provider
  4. a collection of discrete values that convey information
  5. the most important processor in a given computer.
  6. a commonly used method of lossy compression for digital images
  7. an American multinational technology company
  8. a digital multimedia container format most commonly used to store video and audio
  9. a method of representing data
  10. any software intentionally designed to cause disruption to a computer

20 Clues: a method of representing datadata using a two-symbol system.a coding format for digital audioblocks of data created by a web serveran American multinational technology companythe protection of computer systems and networksthe most important processor in a given computer.a hardware or software component that stores data...