cybersecurity Crossword Puzzles
Chapter 3 - Countermeasure in Cybersecurity 2026-01-12
Across
- Security classification related to storage media like USB drives and disks
- Software layer where users interact with systems
- Security device that filters incoming and outgoing network traffic
- Infrastructure that focuses on storing and managing data
- A fake system designed to trap and study attackers
- Security system that detects suspicious activities in a network
- Minimum security standard that systems must follow
- IT infrastructure responsible for managing communication between systems
Down
- Type of IT infrastructure that includes servers, computers, and hardware
- Tool used to scan networks and discover active devices
- Process of strengthening an application by removing unnecessary features
- A secure tunnel used to protect data over public networks
- Security design that shows how security components are arranged in a network
- Tool used to capture and analyze network traffic
- Small update released to fix a specific security vulnerability
- Physical security method that uses fingerprints or facial recognition
- Network area that separates internal systems from the internet
17 Clues: Tool used to capture and analyze network traffic • Software layer where users interact with systems • A fake system designed to trap and study attackers • Minimum security standard that systems must follow • Tool used to scan networks and discover active devices • Infrastructure that focuses on storing and managing data • ...
Friday - Server Demonstration Review 2025-11-10
Across
- (5,6) is a feature in Windows that allows administrators to centrally manage and enforce settings for users and computers in an Active Directory environment
- (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups.
- (acronym) It stores the names and IP addresses of all computers and devices on the Domain and provides the necessary name resolution for clients to authenticate and for AD services to function correctly.
- (14,4) the function of the (OU) is to act as a container for logically grouping users, computers, and other objects to simplify management, delegate administrative authority, and apply policies or settings consistently
Down
- (2,7) the numerical identifier and network locator for devices and servers such as the domain controller, allowing them to be found and communicate with each other
- (7,6) is a centrally managed collection of interconnected devices and users, like computers and printers, that operate under a single set of security policies and rules.
- (5,9) is a cybersecurity concept that grants users, applications, and systems only the minimum access and permissions necessary to perform their job functions, and nothing more
- (acronym) primary function is to automatically assign IP addresses and other network configuration information, such as the subnet mask and default gateway, to client devices.
- an isolated, secure environment used in cybersecurity to safely execute and analyse projects.
9 Clues: an isolated, secure environment used in cybersecurity to safely execute and analyse projects. • (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups. • ...
Data Privacy Crosswords 2025-01-27
Across
- The ability to access, correct, or delete your personal data
- A document that explains how your data is collected and used
- The process of converting data into unreadable code for security
- The process of deleting personal identifiers from data
Down
- When a company keeps your data safe from hackers
- The right to stop a company from using your personal data
- The principle of collecting only the data that is needed
- A law or set of rules governing personal data use
8 Clues: When a company keeps your data safe from hackers • A law or set of rules governing personal data use • The process of deleting personal identifiers from data • The principle of collecting only the data that is needed • The right to stop a company from using your personal data • The ability to access, correct, or delete your personal data • ...
IoT Puzzle 2025-04-01
Across
- The practice of protecting internet-connected systems from cyber threats.
- A secret or hidden way to bypass security and gain unauthorized access to a system or network.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a code to prevent unauthorized access.
- Short-range wireless technology.
- Devices that collect and transmit real-time data from the environment.
Down
- Malicious software designed to harm or exploit devices or networks.
- Wireless standard for IoT connectivity.
- Software embedded in IoT devices that controls their operations.
- Verifying a user’s identity before granting access to a system.
- Remote servers used for data storage & processing.
- Connects IoT devices to the internet.
- Wireless transmission of data.
- Wireless communication protocol for IoT.
- A type of cyber-attack where attackers trick users into providing sensitive information.
- A network topology where devices connect directly and relay data to each other.
16 Clues: Wireless transmission of data. • Short-range wireless technology. • Connects IoT devices to the internet. • Wireless standard for IoT connectivity. • Wireless communication protocol for IoT. • Remote servers used for data storage & processing. • Verifying a user’s identity before granting access to a system. • ...
Digital Citizenship Vocabulary 2025-11-19
Across
- a person who speaks or acts in support of an individual or cause,
- getting sew for copying somebody work
- The trail of data you leave online, like breadcrumbs, from every click, post, and search.
- bullying online
- Stop, Question, Check" method
- A bystander is a person who witnesses an event but is not directly involved.
- it is your citizenship for your device
- your public profile with strong passwords, privacy settings
- security that help with crime on the internet
- the act or practice of converting messages into cipher or code.
Down
- imformation that is pesonal
- where somebody scam you for something
- Secure your accounts with strong passwords and be cautious about what you share online
- the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online.
- setting that you can help protect your imformation
- the ability to understand and share the feelings of another.
16 Clues: bullying online • imformation that is pesonal • Stop, Question, Check" method • where somebody scam you for something • getting sew for copying somebody work • it is your citizenship for your device • security that help with crime on the internet • setting that you can help protect your imformation • your public profile with strong passwords, privacy settings • ...
Cybersec A 2026-01-03
5 Clues: Aset informasi digital yang wajib dilindungi • Aspek menjaga kerahasiaan data dari akses ilegal • Aspek memastikan sistem selalu tersedia saat dibutuhkan • Aspek memastikan data asli dan tidak diubah sembarangan • Upaya perlindungan sistem dan data dari serangan digital
Cyber Security Threads 2024-10-01
Across
- An attack that floods a network with excessive traffic, disrupting services
- Ensures that data is accurate and has not been tampered with
- Falsifying data to deceive systems or users
- The ability of a system to recover quickly from disruptions or attacks
- Ensures that systems are accessible and functional when needed
Down
- Ensures that information is accessible only to those authorized to access it
- The process of converting information into a secret code
- A model that describes the stages of a cyberattack ( 2 words )
- A weakness in a system that can be exploited by attackers
- A type of malware disguised as legitimate software
- A potential danger or harmful event in cybersecurity
- A security system that monitors and controls network traffic
- An attempt to exploit a system or network
13 Clues: An attempt to exploit a system or network • Falsifying data to deceive systems or users • A type of malware disguised as legitimate software • A potential danger or harmful event in cybersecurity • The process of converting information into a secret code • A weakness in a system that can be exploited by attackers • ...
azure-data-oro-idc-day-of-learning-november 2022-11-24
Across
- Meaning of ORO?
- India's most attractive employer brand by Randstad
- Microsoft had announced a Metaverse partnership with which organization
- In which year, ORO team is formed - Two Thousand….?
- A lightweight markup language used to create Azure's public documentation
- Who wrote ORO team song?
- Internal portal used for joining various distribution and security groups
- Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
- Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
- Number of years since IDC was established
- - FIFA world cup 2022 is played in which country?
- Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
- Tool used in Microsoft to manage livesite incidents
13 Clues: Meaning of ORO? • Who wrote ORO team song? • Number of years since IDC was established • - FIFA world cup 2022 is played in which country? • India's most attractive employer brand by Randstad • In which year, ORO team is formed - Two Thousand….? • Tool used in Microsoft to manage livesite incidents • ...
CYBERCONQUEST 2025-10-18
Across
- A program that detects and removes malicious software.
- Turning words into secrets that only the right decoder can read.
- Digital kidnapping: your files are the hostages!
- Online impersonation so convincing it fools your eyes — and inbox.
- The hero hacker — breaks systems to protect them.
Down
- When a website gets so many fake visitors it forgets how to work.
- A person skilled at breaking into computer systems.
- The digital gatekeeper that says, “You shall not pass!”
- A gift that brings trouble, not joy — just ask the Greeks!
- The practice of protecting systems and data from digital attacks.
- The “key” everyone forgets right when they need it most.
- It clogs your inbox like unwanted guests at a party.
- When someone goes “fishing” for your passwords — but with emails.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
Technology in Supply Chain Management 2023-05-01
Across
- Highly skilled IT professionals, process engineers,and the appropriate technologies.
- technologies combine data management, communications, decision support, and processing capabilities.
- technologies create greater connectivity and speed flow.
- support systems provide computing power to make higher-quality decisions faster.
- Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
- technologies provide 24/7 resource availability.
- Protection against online threats.
7 Clues: Protection against online threats. • technologies provide 24/7 resource availability. • technologies create greater connectivity and speed flow. • support systems provide computing power to make higher-quality decisions faster. • Highly skilled IT professionals, process engineers,and the appropriate technologies. • ...
Cybersecurity Fundamental Chapter 1 2023-10-03
Across
- who rally and protest against different political and social ideas.
- unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- collection of technologies that enable the connection of various devices to the Internet.
- break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
- Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
- great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
- who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- Their targets are foreign governments, terrorist groups, and corporations.
- hackers who are either self-employed or working for large cybercrime organizations.
- may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- result of data sets that are large and complex, making traditional data processing applications inadequate.
12 Clues: who rally and protest against different political and social ideas. • Their targets are foreign governments, terrorist groups, and corporations. • hackers who are either self-employed or working for large cybercrime organizations. • collection of technologies that enable the connection of various devices to the Internet. • ...
Cybersecurity Lesson 1-3 2023-09-21
Across
- automatically tags any pictures you take with the location of where you took it
- the freedom to be left alone
- formal ways of giving credit to people for their work
- everything you do online
- a detailed report
- untrue, defamatory statements that are written.
- short for internet etiquette
- the exclusive right to make copies
Down
- includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
- stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
- someone who intentionally targets people for harm using online chat rooms or social media
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody
12 Clues: a detailed report • everything you do online • the freedom to be left alone • short for internet etiquette • the exclusive right to make copies • untrue, defamatory statements that are written. • formal ways of giving credit to people for their work • automatically tags any pictures you take with the location of where you took it • ...
Benefits and Challenges 2024-12-30
Across
- Improving the productivity and output of business operations.
- The system of rules and procedures to ensure compliance.
- Saving both time and money by using no-code platforms.
- Empowering non-technical individuals to build and enhance solutions, individuals and businesses can stay agile, adapting quick
Down
- Giving employees the ability to create applications and solutions.
- Protecting apps and data from potential threats.
- Ensuring different applications work together smoothly.
7 Clues: Protecting apps and data from potential threats. • Saving both time and money by using no-code platforms. • Ensuring different applications work together smoothly. • The system of rules and procedures to ensure compliance. • Improving the productivity and output of business operations. • Giving employees the ability to create applications and solutions. • ...
TA6 - The Internet of Everything 2025-11-09
Across
- The part of the IoE model that focuses on how actions are carried out.
- Devices connected and able to share data without human input.
- The use of technology to perform tasks without human intervention.
- Communication where devices exchange information directly.
- Turning raw data into meaningful information.
- The raw facts and figures collected by sensors or systems.
Down
- Information derived from data that has been processed and organised.
- The concept linking people, data, processes and things through networked connections.
- A technology that measures real-world conditions, such as temperature or movement.
- A smart system that adjusts traffic flow based on real-time conditions.
- Protecting data and systems from unauthorised access or attacks.
- The global network that allows computers and devices to exchange data.
12 Clues: Turning raw data into meaningful information. • Communication where devices exchange information directly. • The raw facts and figures collected by sensors or systems. • Devices connected and able to share data without human input. • Protecting data and systems from unauthorised access or attacks. • ...
Vocabulary 2024-11-26
Across
- A paid position
- The practice of protecting digital systems
- A systematic error in AI systems that leads to unfair or discriminatory outcomes.
- A person that engaged and qualified in a profession
Down
- The rate at which goods or services are produced
- The ability to direct or influence others
- A branch of computer science that deals with creating machines capable of performing tasks that typically require human intelligence
7 Clues: A paid position • The ability to direct or influence others • The practice of protecting digital systems • The rate at which goods or services are produced • A person that engaged and qualified in a profession • A systematic error in AI systems that leads to unfair or discriminatory outcomes. • ...
12 Days of Christmas ITHD Puzzle 2024-12-09
Across
- a link to something in a website.
- Collection of professional creative software made by Adobe.
- a secret word or phrase that must be used to gain admission to something.
- Prevents unauthorized access to a disk's contents, even if the disk is offline.
- Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
- The practice of protecting devices, networks and programs from digital attacks.
- Creates a private connection between your computer and a remote server.
- The programs and other operating information used by a computer.
- Person who breaches computer security
- Group of devices connected within a limited area, such as a home, office or building.
- A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
- Programming error
- Unsolicited email
- Temporary data storage
14 Clues: Programming error • Unsolicited email • Temporary data storage • a link to something in a website. • Person who breaches computer security • Collection of professional creative software made by Adobe. • The programs and other operating information used by a computer. • Creates a private connection between your computer and a remote server. • ...
Unit 1: Intro to IT 2023-12-20
Across
- Two-dimensional bar code that contains an encoded web or e-mail address.
- Working for a company from home using IT.
- Software that resides in the cloud that is accessed by users without downloading or installing.
- Gap between those with access to technology and those who do not.
- Storage that is cloud-based.
- Type of computer found inside of other devices.
- Involves storing and retrieving data from Internet-based spaces.
Down
- How efficiently and quickly a person completes tasks.
- Branch of IT that protects computer systems.
- Method of searching through huge amounts of data to find patterns.
- Amount of data that can travel on a communication system.
- Includes all the work done with computers.
- View of the live world that has been enhanced with graphics, sounds, or other outputs.
- Type of e-book that contains integrated multimedia features.
14 Clues: Storage that is cloud-based. • Working for a company from home using IT. • Includes all the work done with computers. • Branch of IT that protects computer systems. • Type of computer found inside of other devices. • How efficiently and quickly a person completes tasks. • Amount of data that can travel on a communication system. • ...
IT_Tóth Dániel Károly 2023-12-24
Across
- The field concerned with protecting computer systems and data.
- Software application designed for use on mobile devices.
- The process of determining the structure and functionality of a program.
- The activity of writing or designing a computer program.
- (!Internet of Things!) The network of physical devices capable of communicating over the internet.
- services provided electronically, such as online banking or e-commerce.
- A structured storage system that allows efficient data management.
- Designing the user interface and user experience for software.
- A computer providing specialized services to other computers or devices.
Down
- Large volumes of data used for analytical purposes.
- Computing resources and services accessible over the internet.
- Language A set of rules and instructions interpreted by a computer.
- A sequence of steps to perform a computer task.
- An iterative and incremental development method in software design.
- A system of interconnected computers or devices.
15 Clues: A sequence of steps to perform a computer task. • A system of interconnected computers or devices. • Large volumes of data used for analytical purposes. • Software application designed for use on mobile devices. • The activity of writing or designing a computer program. • The field concerned with protecting computer systems and data. • ...
Puzzle OSHEC 2023-08-31
Across
- Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
- Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
- Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)
Down
- Last word of the first point of ‘Key Takeaways’ - Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
- Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
- Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
6 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs. • Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP) • ...
Strategic Planning 2023-06-19
Across
- An obstacle excutives face the team does not agree with proposed strategy
- Businesses may need to address market volatility, cybersecurity, legal and regulatory compliance, and supply chain disruptions
- When the blame game starts and people become defensive
- Businesses struggle with uncertanties such as market volatility, technological advancements, and regulatory shifts.
Down
- Businesses may face due financial, human, and technological limits
- Lost in translation
- New strategies often face ______ from employees
- When businesses get lost in the sematics of defining their vision, missions, and values
8 Clues: Lost in translation • New strategies often face ______ from employees • When the blame game starts and people become defensive • Businesses may face due financial, human, and technological limits • An obstacle excutives face the team does not agree with proposed strategy • When businesses get lost in the sematics of defining their vision, missions, and values • ...
crossword 2025-08-28
5 Clues: a place where Indian laws are made • profession that involves study of drugs • Green music festival celebrated in Portugual • symptoms of shortness of breath,fatigue,headaches • profession that involves protecting computers and networks from hackers
latihan 2025-04-18
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menciptakan software berbagai jenis permainan.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Profesi yang menjaga keamanan sistem komputer.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
kelompok 3 2025-04-19
Across
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menciptakan software berbagai jenis permainan.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Profesi yang menjaga keamanan sistem komputer.
Down
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 8 2025-04-19
Across
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Profesi yang menjaga keamanan sistem komputer.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Orang yang menciptakan software berbagai jenis permainan.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 6 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Orang yang menciptakan software berbagai jenis permainan.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
Down
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Profesi yang menjaga keamanan sistem komputer.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Technology 2023-06-29
Across
- Using technology to simulate a three-dimensional environment
- Protecting computers, networks, and data from unauthorized access
- A portable device with a touch screen for browsing and entertainment
- Watching or listening to media content over the internet in real-time
- Online platforms for connecting and sharing content with others
- A global network that connects computers and allows information sharing
Down
- A machine that can perform various tasks and run different programs
- Electronic mail used for sending messages and files online
- Designing, building, and programming robots for various purposes
- A collection of web pages accessible through the internet
- Electronic games played on a computer or gaming console
- Creating three-dimensional objects by layering materials
- Writing instructions for computers to create software and websites
- A portable computer that you can use for writing, doing homework, or watching movies
- A mobile device that can make calls, send messages, and run apps
15 Clues: Electronic games played on a computer or gaming console • Creating three-dimensional objects by layering materials • A collection of web pages accessible through the internet • Electronic mail used for sending messages and files online • Using technology to simulate a three-dimensional environment • Online platforms for connecting and sharing content with others • ...
ROUND 2 2025-05-10
Across
- - The process of introducing new ideas, products, or methods to improve technology
- - A programmable machine capable of performing tasks automatically
- - Facts or information that can be processed or stored by a computer
- - A method of converting information into a secure format to prevent unauthorized access
- - A system that represents data using numerical values
- - A set of instructions that tells a computer what to do
Down
- - Protection against unauthorized access to or damage of computer systems
- - A mobile phone with advanced computing capabilities
- - A system of interconnected computers that share resources and information
- - Existing in a digital or simulated environment, not physically present
- - A global network that links computers and devices for communication
- - A device used for performing calculations and tasks through programs
- - A virtual space for storing and managing data on remote servers
- - The tangible physical components that make up a computer or device
- - Machines designed to simulate human intelligence
15 Clues: - Machines designed to simulate human intelligence • - A mobile phone with advanced computing capabilities • - A system that represents data using numerical values • - A set of instructions that tells a computer what to do • - A virtual space for storing and managing data on remote servers • - A programmable machine capable of performing tasks automatically • ...
App Rationalisation Crossword 2024-02-14
Across
- Phase 1 of EXO apps is called ______ Win.
- What is Work Order 1.0 for the process of apps' decommissioning?
- The site to raise tickets for decommissioning.
- Apps Optimisation could help to reduce _________ cost (Maintenance, subscriptio & hardware cost) at OPU.
- One of the EXO apps focus is to ________ on - premise applications to PETRONAS cloud.
- What is the name of the new apps optimization project initiated by GD?
Down
- Phase 2 of EXO apps is called __________ Enhancement.
- ____ decommissioning involves the removal of both infra and application components.
- Main data source for app rationalization.
- ______________ functions is when 2 or more apps share similar functionality.
- Apps that are not in the scope of the PDSB decommission team.
- Idle applications & servers increase the likelihood of __________________________ attack.
- Consists of the decommissioning of server, database, storage, and network components.
- How many work orders are in the process of decommissioning apps?
- Dashboard to view Downstream Application
15 Clues: Dashboard to view Downstream Application • Phase 1 of EXO apps is called ______ Win. • Main data source for app rationalization. • The site to raise tickets for decommissioning. • Phase 2 of EXO apps is called __________ Enhancement. • Apps that are not in the scope of the PDSB decommission team. • What is Work Order 1.0 for the process of apps' decommissioning? • ...
Browsing safely 2025-06-15
Across
- applications used to prevent the entry of virus into the computer system
- full form of virus
- acts done to protect one's computer system
- Collection of various networks in the form of a web
- providing malwares and viruses into one's computer through various links and emails
- illegal entry into one's computer through various links
- cyber crime in which money is demanded after attacking the victim
- a type of anti-virus
- befriending children on social media and causing harm through social media or physically
- full form of OTP
Down
- criminal activities intented to harm a person through online
- act of terrorism conducted through the use of internet
- full form of ICT
- sequence of characters or numbers used in any device or system to keep it protected
- act of harassing people through the use of internet
15 Clues: full form of ICT • full form of OTP • full form of virus • a type of anti-virus • acts done to protect one's computer system • Collection of various networks in the form of a web • act of harassing people through the use of internet • act of terrorism conducted through the use of internet • illegal entry into one's computer through various links • ...
Kelompok 2 2025-04-19
Across
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Orang yang menciptakan software berbagai jenis permainan.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Profesi yang menjaga keamanan sistem komputer.
Down
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 4 2025-04-19
Across
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Profesi yang menjaga keamanan sistem komputer.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 9 2025-04-19
Across
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Profesi yang menjaga keamanan sistem komputer.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
Down
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Orang yang menciptakan software berbagai jenis permainan.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
kelompok 2 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Profesi yang menjaga keamanan sistem komputer.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
kelompok 2 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Profesi yang menjaga keamanan sistem komputer.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
kelompok 9 new 2025-04-19
Across
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Profesi yang menjaga keamanan sistem komputer.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menciptakan software berbagai jenis permainan.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
Down
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Success 101 2024-10-04
Across
- You should go to this school if you want to be a YouTuber
- This career is supported at academies at both Hampton and Kecoughtan
- Academy of ___and Public Safety supports future fire fighters
- A short speech that you should give when networking
- The school with the academy for future teachers
- If you want to be an actor, join this academy
- Perfect shirt for a job interview
- Attend this academy if you want to be a chef
- My Future, My ______
Down
- Perfect pants for a job interview
- This academy is like a private school within a school
- This high school has an academy that supports nursing
- This academy is for future lawyers
- The academy that all 9th graders are in
- Academy of Cybersecurity, Engineering, and _____
- A future welder in the shipyard should attend this school
- A group project focused on changing the community
- It is possible to graduate high school with this type of college degree
18 Clues: My Future, My ______ • Perfect pants for a job interview • Perfect shirt for a job interview • This academy is for future lawyers • The academy that all 9th graders are in • Attend this academy if you want to be a chef • If you want to be an actor, join this academy • The school with the academy for future teachers • Academy of Cybersecurity, Engineering, and _____ • ...
Jenis Profesi 2024-08-08
Across
- menguasai bahasa pemrograman dan terampil menggunakannya
- seseorang pembuat konten kreatif
- orang yang mengajar dan menyediakan pendidikan untuk orang lain
- seseorang yang meneliti informasi menggunakan alat analisis data
- berkaitan erat dengan penemuan-penemuan baru
- orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
- mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
- pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
- menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
- bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
- melindungi sistem, jaringan, serta data dari serangan cyber
- profesional di bidang kuliner
- membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
- ndividu yang mempunyai pengaruh besar di media sosial
- bertugas mengendalikan pesawat
- maha guru
- seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
- berkaitan erat dengan keamanan dan ketertiban negaranya
18 Clues: maha guru • profesional di bidang kuliner • bertugas mengendalikan pesawat • seseorang pembuat konten kreatif • berkaitan erat dengan penemuan-penemuan baru • ndividu yang mempunyai pengaruh besar di media sosial • menguasai bahasa pemrograman dan terampil menggunakannya • berkaitan erat dengan keamanan dan ketertiban negaranya • ...
kelompok 3 2025-04-19
Across
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Orang yang menciptakan software berbagai jenis permainan.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Profesi yang menjaga keamanan sistem komputer.
Down
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 7 2025-04-19
Across
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Profesi yang menjaga keamanan sistem komputer.
Down
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Orang yang menciptakan software berbagai jenis permainan.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 8 2025-04-19
Across
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Profesi yang menjaga keamanan sistem komputer.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Orang yang menciptakan software berbagai jenis permainan.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
kelompok 2 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Profesi yang menjaga keamanan sistem komputer.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Informatika masa kini 2025-08-28
Across
- Teknologi keuangan berbasis digital, contohnya e-wallet.
- OTONOM Istilah lain untuk robot cerdas yang dapat bekerja secara otomatis.
- AWAN Penyimpanan data yang berbentuk terpusat di server internet.
- Sistem keamanan digital untuk melindungi data dan informasi.
- COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata).
- DATA Data dalam jumlah sangat besar, kompleks, dan beragam.
- Jaringan global yang menghubungkan jutaan komputer di seluruh dunia.
- Teknologi simulasi yang memungkinkan pertemuan jarak jauh dalam bentuk avatar 3D.
- TERTAMBAH Teknologi yang menggabungkan dunia nyata dan digital (Augmented …).
- Singkatan dari Artificial Intelligence (2 kata).
Down
- Istilah untuk uang digital terdesentralisasi, misalnya Bitcoin.
- BUATAN Sistem yang dapat meniru kemampuan berpikir manusia.
- Mesin pencari populer buatan Amerika Serikat.
- 4.0 Generasi revolusi industri yang identik dengan otomatisasi dan internet of things.
- STORAGE Teknologi penyimpanan data berbasis internet.
- OF THINGS Teknologi yang menghubungkan perangkat sehari-hari ke internet.
- SARAF TIRUAN Sistem komputasi yang meniru jaringan saraf otak manusia.
- Ilmu yang mempelajari pemrosesan informasi dengan komputer.
- BAHASA ALAMI Kemampuan komputer untuk memahami bahasa manusia.
- Singkatan dari Virtual Reality.
20 Clues: Singkatan dari Virtual Reality. • Mesin pencari populer buatan Amerika Serikat. • Singkatan dari Artificial Intelligence (2 kata). • STORAGE Teknologi penyimpanan data berbasis internet. • Teknologi keuangan berbasis digital, contohnya e-wallet. • COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata). • Ilmu yang mempelajari pemrosesan informasi dengan komputer. • ...
Banzai Internet Safety Crossword 2026 2026-01-12
Across
- A dishonest scheme to get information or money
- A self-replicating software program that attacks a computer system
- Harm inflicted through emails, texts or online websites.
- Software designed to damage a computer or phone
- Unwanted email or junk mail
- A secret combination of words or numbers to allows access to an online service
- The name you use to log into a website or service.
- Start of most website addresses and stands for World Wide Web
- A nickname for the Internet
- Leaving untrue or offensive messages on the internet
- An internet related crime
Down
- An action that's taken to protect computers and prevent online crimes.
- When someone tracks, lures, or harasses people online
- Someone who gains unauthorized access to people's computers
- The act of searching through websites
- A security system designed to block malicious threats to your computer
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- Computer equipment, machines and parts.
- Software that displays unwanted advertising on your computer
19 Clues: An internet related crime • Unwanted email or junk mail • A nickname for the Internet • The act of searching through websites • Computer equipment, machines and parts. • A dishonest scheme to get information or money • Software designed to damage a computer or phone • The name you use to log into a website or service. • Leaving untrue or offensive messages on the internet • ...
Get Secure 2019-08-26
Across
- protection of information systems from damage or crime
- bad connection during online calls
- create a password
- a device that consists of a part that fits over a person's ears and a part into which the person can speak, used for communicating without using the hands
- connection to a network from a place that is far away
Down
- get into a network
- a package of software products sold together, usually having a similar look and common installation
- rules that help to protect a system
- the applications that a company uses for work
9 Clues: create a password • get into a network • bad connection during online calls • rules that help to protect a system • the applications that a company uses for work • connection to a network from a place that is far away • protection of information systems from damage or crime • ...
Security Awareness Week - Shrewsbury 2013-08-29
5 Clues: A more secure form of password • The term used to describe IT Security • Caterpillar's method of classifying confidential data • A computer virus designed to spread itself to other computers • The act of manipulating people into divulging confidential information
Racheal Tan Kai Luo - 8 Gamma 2023-01-19
Across
- a personal data that social media will collect from you
- raw facts and figures
- Cyberattacks are usually aimed at _____ normal business processes
Down
- practice of protecting systems , network and program from digital attacks
- you have the right to ______ your data
- ____ must be used for specific and stated reason
6 Clues: raw facts and figures • you have the right to ______ your data • ____ must be used for specific and stated reason • a personal data that social media will collect from you • Cyberattacks are usually aimed at _____ normal business processes • practice of protecting systems , network and program from digital attacks
TECHNO CROSSWORD 2024-11-12
Across
- People use this to connect, share photos, and send messages online.
- Devices that measure body temperature.
- The process of protecting devices from online attacks.
- Used to watch movies, shows, and news.
- A device that helps people take clear pictures or videos.
- Used for making calls and sending texts.
- A machine that can be programmed to do tasks by itself.
Down
- Portable devices used by students to access learning material.
- A flying device controlled by remote, often used to take pictures from above.
- Games played on consoles, computers, or mobile devices.
- An assistant on phones that talks back and helps with tasks.
- This device lets you see and hear people far away in real time.
- A place where you can find a lot of information on any topic.
13 Clues: Devices that measure body temperature. • Used to watch movies, shows, and news. • Used for making calls and sending texts. • The process of protecting devices from online attacks. • Games played on consoles, computers, or mobile devices. • A machine that can be programmed to do tasks by itself. • A device that helps people take clear pictures or videos. • ...
CYBERCONQUEST 2025-10-18
Across
- The hero hacker — breaks systems to protect them.
- The “key” everyone forgets right when they need it most.
- It clogs your inbox like unwanted guests at a party.
- The practice of protecting systems and data from digital attacks.
- A person skilled at breaking into computer systems.
- When a website gets so many fake visitors it forgets how to work.
Down
- Digital kidnapping: your files are the hostages!
- A gift that brings trouble, not joy — just ask the Greeks!
- A program that detects and removes malicious software.
- Online impersonation so convincing it fools your eyes — and inbox.
- The digital gatekeeper that says, “You shall not pass!”
- When someone goes “fishing” for your passwords — but with emails.
- Turning words into secrets that only the right decoder can read.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
CYBERCONQUEST 2025-10-18
Across
- The “key” everyone forgets right when they need it most.
- When a website gets so many fake visitors it forgets how to work.
- A gift that brings trouble, not joy — just ask the Greeks!
- The digital gatekeeper that says, “You shall not pass!”
- Turning words into secrets that only the right decoder can read.
Down
- A program that detects and removes malicious software.
- The practice of protecting systems and data from digital attacks.
- Digital kidnapping: your files are the hostages!
- The hero hacker — breaks systems to protect them.
- When someone goes “fishing” for your passwords — but with emails.
- Online impersonation so convincing it fools your eyes — and inbox.
- A person skilled at breaking into computer systems.
- It clogs your inbox like unwanted guests at a party.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
Crossword Puzzle: Redefining Possible 2025-01-30
Across
- Storage and processing of data over the internet
- The time to come
- Tech allowing machines to learn from data
- Tech that creates simulated experiences
- Analyzes data to find insights
- Hidden prejudice
- Celebrated on March 8th
- First computer programmer
- Variety in a group
- Bringing new ideas to life
- A set of instructions for a computer
- Person who manages the development of a product
- Small-scale technology
- Protection of digital information
Down
- Creates and maintains software
- "Mother of COBOL"
- A difficult task
- A person who plans and builds computer networks
- "The Mother of the Internet"
- The act of combining things into a whole
- Lead software engineer for the Apollo program
- Including everyone
- Mathematician who helped Apollo land on the moon
- Key to unlocking potential
- Machines that perform tasks automatically
- What we work towards for women in tech
- Field combining biology and tech
- The world of connected computers
- Designs user interfaces
- "Redefining ___"
- Tech focused on creating intelligent machines
- Inventor of frequency hopping spread spectrum
32 Clues: The time to come • A difficult task • Hidden prejudice • "Redefining ___" • "Mother of COBOL" • Including everyone • Variety in a group • Small-scale technology • Designs user interfaces • Celebrated on March 8th • First computer programmer • Key to unlocking potential • Bringing new ideas to life • "The Mother of the Internet" • Creates and maintains software • Analyzes data to find insights • ...
tugas 2025-02-02
Across
- istilah keamanan informasi di interne?
- pasukan terkoordinasi dari perangkat yang telah disusupi oleh virus pengertian dari?
- Virus yang menghancurkan file gambar, musik, sistem operasi dan kata sandi yaitu?
- Pembobol sistem komputer dan mencuri data?
- Yang digunakan peretas untuk melakukan aksinya?
- peretas yang menggunakan topi hitam disebut dengan?
- rekayasa pada awal munculnya internet cukup berhasil contoh nyata inilah kemunculan virus?
- era berapa ketika penetasan memiliki arti negatif?
- pharming dilakukan dengan menanamkan alamat internet palsu pada tabel apa?
- horse malware yang tampak seperti aplikasi perangkat lunak jinak tetapi membawa komponen jahat didalamnya yaitu?
Down
- malware yang dapat memantau dan merekam aktifitas pengguna yaitu?
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data yaitu?
- malware yang mampu mengenkripsi beberapa atau semua file yaitu?
- Perangkat lunak yang sering menempel pada perangkat lainya?
- Awal munculnya informatika peretas disebut dengan?
- phising adalah kejahatan biasanya target dihubungi melalui?
- Perilaku peretas berbentuk vandalisme digital yang mengganti halaman muka situs web dengan?
- perangkat lunak yang mendapat akses melewati lapisan security pengertian dari
- yang bersemangat menemukan hal hal baru?
- Dirancang untuk mengekploitasi kelemahan sistem tertentu?
20 Clues: istilah keamanan informasi di interne? • yang bersemangat menemukan hal hal baru? • Pembobol sistem komputer dan mencuri data? • Yang digunakan peretas untuk melakukan aksinya? • Awal munculnya informatika peretas disebut dengan? • era berapa ketika penetasan memiliki arti negatif? • peretas yang menggunakan topi hitam disebut dengan? • ...
Computer Virus 2024-09-09
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
Unit III Crossword II 2024-10-15
Across
- Act of creating fraudulent digital signatures under the IT Act.
- Technique for securing data as per IT Act guidelines.
- Area where the IT Act has the power to enforce laws.
- Illegal content covered under Section 67.
- Term for records, documents, or data as defined in the IT Act.
- Legal action taken for offenses under the IT Act.
- Crime involving computers or networks under the IT Act.
- Authority to decide penalties for cyber offenses.
- Access without permission, covered under multiple sections.
Down
- Protection of information infrastructure under Section 70.
- Authority responsible for issuing digital signatures.
- Cybercrime involving fraudulent emails for personal data theft.
- Entity facilitating online services regulated under the Act.
- Changes or updates made to the IT Act, such as in 2008.
- Manipulation of computer source code, Section 65.
- Violation or illegal activity defined under the IT Act.
- Duty to protect sensitive data, highlighted in Section 72.
- Unauthorized access to computer systems as per Section 66.
- Type of signature recognized by the IT Act for authentication.
- Legal consequences for violating the IT Act.
20 Clues: Illegal content covered under Section 67. • Legal consequences for violating the IT Act. • Manipulation of computer source code, Section 65. • Legal action taken for offenses under the IT Act. • Authority to decide penalties for cyber offenses. • Area where the IT Act has the power to enforce laws. • Authority responsible for issuing digital signatures. • ...
TTS INFORMATIKA X.G 2025-04-10
Across
- Operator pencarian untuk hasil yang persis sama
- Profesi yang membuat aplikasi atau software
- Hak yang melindungi karya tulis atau lagu
- Profesi yang merancang tampilan antarmuka
- Profesi yang merancang struktur sistem informasi
- Informasi bohong yang menyebar di internet
- Proses menyebarkan konten ke banyak orang
- Konten digital yang mengangkat cerita rakyat
- Profesi yang menjaga keamanan jaringan
- Profesi yang menganalisis data besar
- Lembaga yang mengatur konten digital di Indonesia
Down
- Media untuk berbagi video berisi kebudayaan lokal
- Situs untuk mengecek fakta
- Fitur Google untuk membandingkan dua hal
- Simbol untuk pengecualian kata dalam hasil pencarian
- Operator untuk mencari hasil dari situs tertentu
- Operator untuk mencari dalam rentang angka
- Surat resmi yang menyatakan hak atas ciptaan
- Singkatan dari Hak Atas Kekayaan Intelektual
- Unsur yang harus dijaga saat memproduksi konten budaya
- Proses memeriksa kebenaran suatu informasi
- Proses untuk memastikan informasi yang tersebar tidak palsu atau menyesatkan
- Seni tradisional yang bisa diangkat dalam konten digital
- HAKI yang melindungi logo perusahaan
- Institusi pemerintah yang mengurus HAKI di Indonesia
25 Clues: Situs untuk mengecek fakta • HAKI yang melindungi logo perusahaan • Profesi yang menganalisis data besar • Profesi yang menjaga keamanan jaringan • Fitur Google untuk membandingkan dua hal • Hak yang melindungi karya tulis atau lagu • Profesi yang merancang tampilan antarmuka • Proses menyebarkan konten ke banyak orang • Operator untuk mencari dalam rentang angka • ...
TTS INFORMATIKA 2025-04-10
Across
- Profesi yang bertugas untuk mengelola data
- Orang yang mengedit konten
- Proses mencari informasi di internet
- Proses menilai kebenaran konten
- Profesi yang membuat perangkat lunak
- Lembaga yang mengurus HAKI di Indonesia
- Hak ekslusif atas suatu merek dagang
- Bentuk perlindungan HAKI untuk karya seni.
- Hasil pencarian yang ditampilkan
- Proses penyebaran konten di internet
- Alamat untuk mengakses situs web
- Organisasi yang bertugas memvalidasi konten negatif di Indonesia
- Mesin pencari yang fokus pada privasi pengguna
- Profesi yang mengelola jaringan komputer
- Mesin pencari bawaan Microsoft
Down
- Hak ekslusif atas suatu penemuan
- Konten yang berisi ujaran kebencian
- Profesi yang merancang dan membangun situs web
- Platform untuk video berdurasi panjang
- Proses pembuatan konten digital
- Mesin pencari populer di dunia
- Profesi yang membuat konten digital
- Platform medsos berbasis foto dan video
- Konten digital yang berupa tulisan
- Bertugas menjaga keamanan sistem komputer
- Konten yang mengandung tindakan kekerasan
- Profesi yang mendesain antarmuka pengguna
- Mesin pencari dari Tiongkok
- Konten yang berisi informasi palsu
- Platform untuk menyebarkan tulisan dan artikel
30 Clues: Orang yang mengedit konten • Mesin pencari dari Tiongkok • Mesin pencari populer di dunia • Mesin pencari bawaan Microsoft • Proses pembuatan konten digital • Proses menilai kebenaran konten • Hak ekslusif atas suatu penemuan • Hasil pencarian yang ditampilkan • Alamat untuk mengakses situs web • Konten digital yang berupa tulisan • Konten yang berisi informasi palsu • ...
Tugas Daring Informatika Nur Keisya R. P. A 25/X-I 2025-04-11
Across
- Unsur tradisional Indonesia yang bisa dimasukkan dalam konten digital
- Media yang sering dipakai menyebar hoaks dengan cepat
- Proses membuat dan menyebarluaskan konten di media digital
- Profesi pembuat perangkat lunak
- Penemuan baru di bidang teknologi dilindungi dengan
- Platform populer berbagi video pendek
- Kata kunci untuk membatasi pencarian di satu situs saja
- Profesi yang menganalisis data untuk menemukan pola
- Lembaga yang mengurus HAKI di Indonesia
- Tindakan mengecek kebenaran informasi sebelum disebarkan
- Jenis HAKI untuk merek dagang atau simbol bisnis
- Singkatan dari Hak atas Kekayaan Intelektual
- Profesi yang membuat tampilan visual aplikasi/web
- Situs untuk mengecek kebenaran hoaks di Indonesia
Down
- Simbol yang digunakan untuk mencari exact match dalam mesin pencari
- Platform pencarian milik Google
- Istilah untuk berita bohong di internet
- Profesi yang mengatur jaringan komputer
- Operator pencarian untuk mengecualikan kata tertentu dari hasil pencarian
- Konten digital yang menggabungkan gambar, suara, dan teks
- Operator pencarian untuk menampilkan dua kata sekaligus
- Tujuan menyisipkan budaya dalam konten digital
- Tindakan untuk memastikan suatu informasi bukan hoaks
- Hak atas hasil ciptaan seperti lagu, film, tulisan
- Profesi yang menjaga keamanan sistem digital
25 Clues: Platform pencarian milik Google • Profesi pembuat perangkat lunak • Platform populer berbagi video pendek • Istilah untuk berita bohong di internet • Profesi yang mengatur jaringan komputer • Lembaga yang mengurus HAKI di Indonesia • Profesi yang menjaga keamanan sistem digital • Singkatan dari Hak atas Kekayaan Intelektual • Tujuan menyisipkan budaya dalam konten digital • ...
Harley's Computer Apps. Crossword 2022-04-29
Across
- a review game website that allows you to earn cash and buy upgrades
- Making sure your safe on the internet
- First thing we learned about
- Application that allows you to organize your information on a spreadsheet
- You can make your own website using this
- A citation Machine
- allows you to make a picture or text move or spin, etc.
- You can gather data from people who you share this with
- The brand of computers students use in PCM schools
- Company that owns sheets, docs, slides, etc.
Down
- the illegal act of using someone else's content without properly citing it
- Not letting people know about your personal life
- Application that allows you to make and share slides with people
- Application that allows you to create and edit videos for class
- what you always end your sentences in
- What gives slides their overall color and font
- Shortest unit of the school year
- what shape are the blocks from blooket
- How to do math using sheets
- The most commonly used game website for reviewing
20 Clues: A citation Machine • How to do math using sheets • First thing we learned about • Shortest unit of the school year • what you always end your sentences in • Making sure your safe on the internet • what shape are the blocks from blooket • You can make your own website using this • Company that owns sheets, docs, slides, etc. • What gives slides their overall color and font • ...
test 2022-07-15
Across
- Brand of sammi’s car -
- Basketball team michael supports -
- City they will live in after the wedding -
- How they met
- Location of their first post together on IG -
- Industry sammi works in -
- Color of michaels bathroom before they painted it -
- Sammi’s side hustle -
- State michael was raised in -
- Sauce michael hates -
- Music festival they attended -
- Month they met -
- Destination of first plane ride together -
- Engagement ring shape -
- Type of dance sammi did growing up -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
Down
- Sammis favorite flowers -
- Year they met -
- Attends ___ ___ community church -
- Type of engineer Michael is -
- European country michael lived in -
- Amusement park they had annual passes to -
- On the way to Big Sur they stopped at an ___ farm -
- City sammi did her internship in -
- City they took their engagement photos -
- Where they ate on their first date -
- Day of the week they attend life group -
- How we are honoring sammis dad at the wedding -
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Sammis favorite flowers - • Industry sammi works in - • Type of engineer Michael is - • State michael was raised in - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
test 2022-07-15
Across
- City sammi did her internship in -
- Engagement ring shape -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Where they ate on their first date -
- Sauce michael hates -
- Type of dance sammi did growing up -
- Industry sammi works in -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Attends ___ ___ community church -
- Location of their first post together on IG -
- Year they met -
- Month they met -
- City they will live in after the wedding -
Down
- Amusement park they had annual passes to -
- City they took their engagement photos -
- Music festival they attended -
- Destination of first plane ride together -
- Color of michaels bathroom before they painted it -
- Basketball team michael supports -
- Brand of sammi’s car -
- State michael was raised in -
- European country michael lived in -
- Type of engineer Michael is -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
- On the way to Big Sur they stopped at an ___ farm -
- How they met
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Wedding 2026-02-06
Across
- Where can you usually find the groom?
- Where was the couple's first date?
- What is the bride's cat's name?
- What country did the couple visit in June 2025?
- what is the bride's middle name?
- Where did the groom go to high school?
- Where was couple's first trip together?
- Where is Marcus' hometown?
- What is Marcus' nickname?
- What does the Alexis do as a career?
- What unit does the bride work in?
Down
- What is the bride's favorite cocktail?
- What is the groom's line name?
- What is the groom's cat's name?
- What month did the groom propose?
- What is the groom's favorite cocktail?
- What is the couple's goddaughter's name?
- What college did the bride earn her FIRST degree from?
- what is the Marcus' career?
- Where is the Lexi's hometown?
- Where did the groom go to college?
- Where did the bride go to high school?
- Who is the bride's favorite musical artist?
- How many years have the couple been together
- What is the nickname Lexi's family calls her?
25 Clues: What is Marcus' nickname? • Where is Marcus' hometown? • what is the Marcus' career? • Where is the Lexi's hometown? • What is the groom's line name? • What is the groom's cat's name? • What is the bride's cat's name? • what is the bride's middle name? • What month did the groom propose? • What unit does the bride work in? • Where was the couple's first date? • ...
complete_rmt_22 2022-02-09
Across
- The role responsible for maintaining product roadmap
- The abbreviation for Innovation management.
- The meaning of RTE
- Creator of the Software Design plan
- The process of setting up an information pool, market segmentation, market sizing, customer analysis, competitor analysis, trend & technology analysis, internal analysis.
- The experience distilled from a project that should be actively taken into account in future projects in the context of KM.
- Role responsible for qualification of software
- Abbreviation for product management process
- Abbreviation for Scaled Agile Framenwork
- The time needed from creation of the problem to the resolution of the problem, i.e. rejection or the implementation and acceptance of a change.(2 words)
- Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
- Software Requirements Analysis process in ASPICE
- The meaning of swc
- Short name for workshops where a team reflects the way it works and identifies potentials for improvement.(plural)
- Abbreviation of Software Detailed Designs
- Abbreviation used for Cybersecurity Engineering process.
- Standard for road vehicles functional safety
- The prerequisite identified as necessary for a user, or a user group, to achieve a goal, within a specific context of use.
- Object oriented programming language lunched in 1995
- The abbreviation of Automotive Software Performance Improvement and Capability dEtermination
- The abbreviation of the business development process.
- The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
- The document that defines the safety strategy in the project
- The IEEE-STD-610 defines it as “An activity that ensures that an end product stakeholder’s true needs and expectations are met.”
- The abbreviation for the work result "Software Quality Assurance Plan", defined by IEEE 730.
- Record of the an exact result of a performed integration step.
- Abbreviation for a requirement management plan
- Role responsible for identification and analysis of market-specific trends & technologies.
- The inspection of selected processes in selected instances (projects, products, locations, …) and that identifies weaknesses in terms of compliance and risk
- The highest-level backlog in SAFe
- The process of identifying (current and future) business critical knowledge areas as well as capturing, developing, sharing, and effectively using organizational knowledge.
- The coordinator that helps the program achieve the program goals.
- Attribute of a change request derived from risk, impact, affected customers, upcoming release schedules, etc.
- The workresult work result defining the pricing in line with the market, in responsibility of the business development manager.
- Any potential failure identified in internal reviews, testing, etc.
- The infrastructure used by the project defined in the configuration management plan.
- Problem resolution management process in ASPICE
- Type of testing performed to expose defects in the interfaces and in the interactions between integrated components or systems.
- The task that tracks the program progress against the program goals and to identify potential deviations in time.
- Role responsible to create the cybersecurity concept.
Down
- Work result with the purpose to provide basic information about the expected outcome of the incubator project.
- Important event in the history or development of something or someone
- Abbreviation of Software integration and integration test process.
- An individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations. (ISO12207)
- The abbreviation for the features and high-level requirements
- Software integration and integration test process in ASPICE.
- The set of five criteria that a product name must fulfill in order to become a product brand.
- Abbreviation of User Experience Engineering process.
- Work result that is treated as a single entity in the configuration management process.
- The abbreviation of system test process
- Role responsible for evaluating the received new product ideas and giving feedback to the Employee (accept for further development, or reject).
- Task in portfolio management with the purpose to mitigate risks of double work in research and development and to use the scarce resources optimally.
- A software component, that contains one or more software components (units and/or other compositions)that makes hierarchical structures in the architectural design possible.
- A series of actions taken in order to achieve a certain result
- The abbreviation of software test process
- The role responsible to drive new business ideas, identify its business potential, and create new business models
- Standard used as reference for defining the User Experience Engineering process
- The abbreviation used for Problem Resolution Management process
- Work results that triggers the change management activities according to the change request management plan
- The name of the qualified set of frozen configuration items is
- The process established to maintain the integrity of all work results of a process or project and make them available to parties concerned.
- Role with skills that is independent of the project and performs process audits and assessments.
- Role responsible for deciding whether a change is to be applied.
- Smallest piece of software
- The strategy that provides the work result is to provide guidance for innovation activities in the next 5 years.
- The IEEE-STD-610 defines it as “A test of a system to prove that it meets all its specified requirements at a particular stage of its development.”
- Abbreviation of program management process
- A cross-functional group of 5-11 individuals who define, build, test, and deliver an increment of value in a short time box.
- Role responsible to plan, measure, act on and report the project.
- The abbreviation of Portfolio management process
- Implemented by planned activities, or divided into sub-goals
- The ordered list of features or enablers on a high level (e.g. epics), part of a program.
- A collection of projects which are connected by joint goals to obtain benefits not available from managing the projects individually.
- Abbreviation of Software Architectural Design
- Prioritization of software units to provide the information what is to be done in which order
- The fictitious yet realistic representations of users of a system, including details like their mental models, limitations in cognition or physical mobility.
- The list of the available product lines, products and product items with the corresponding license types and prices.
- The abbreviation for the work result "software project management plan", which is also defined by IEEE 1058
- Abbreviation for Subject Matter Expert.
- Abbreviation used for change request management process
80 Clues: The meaning of RTE • The meaning of swc • Smallest piece of software • The highest-level backlog in SAFe • Creator of the Software Design plan • The abbreviation of system test process • Abbreviation for Subject Matter Expert. • Abbreviation for Scaled Agile Framenwork • The abbreviation of software test process • Abbreviation of Software Detailed Designs • ...
GoGoByte Halloween English Quest 2025-10-29
Across
- A sweet food made from sugar and often flavored with chocolate or fruit.
- The structure of bones in a human or animal body.
- A violent physical attack
- A system or device that has been broken into or corrupted
- A machine that can carry out tasks automatically.
- A technology company specializing in cybersecurity.
- The complete absence of sound; a situation with no noise or talking.
Down
- A file or object sent with an email or message, or a strong emotional bond to something or someone.
- Twelve o'clock at night; the middle of the night.
- To break free from a dangerous or confining situation.
- To speak very quietly, using one's breath rather than one's throat.
- Extreme fear, often associated with horror.
- A place where you work, often with computers and desks.
13 Clues: A violent physical attack • Extreme fear, often associated with horror. • Twelve o'clock at night; the middle of the night. • The structure of bones in a human or animal body. • A machine that can carry out tasks automatically. • A technology company specializing in cybersecurity. • To break free from a dangerous or confining situation. • ...
CyberQuest 2025-10-18
Across
- It clogs your inbox like unwanted guests at a party.
- The “key” everyone forgets right when they need it most.
- The digital gatekeeper that says, “You shall not pass!”
- The practice of protecting systems and data from digital attacks.
- When someone goes “fishing” for your passwords — but with emails.
- The hero hacker — breaks systems to protect them.
- A gift that brings trouble, not joy — just ask the Greeks!
Down
- Digital kidnapping: your files are the hostages!
- When a website gets so many fake visitors it forgets how to work.
- Online impersonation so convincing it fools your eyes — and inbox.
- A program that detects and removes malicious software.
- A person skilled at breaking into computer systems.
- Turning words into secrets that only the right decoder can read.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
CYBERCONQUEST 2025-10-18
Across
- When someone goes “fishing” for your passwords — but with emails.
- A gift that brings trouble, not joy — just ask the Greeks!
- It clogs your inbox like unwanted guests at a party.
- A program that detects and removes malicious software.
- The hero hacker — breaks systems to protect them.
- The digital gatekeeper that says, “You shall not pass!”
Down
- When a website gets so many fake visitors it forgets how to work.
- Digital kidnapping: your files are the hostages!
- The “key” everyone forgets right when they need it most.
- The practice of protecting systems and data from digital attacks.
- Online impersonation so convincing it fools your eyes — and inbox.
- Turning words into secrets that only the right decoder can read.
- A person skilled at breaking into computer systems.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
Technology 2021-10-28
Across
- a saved link to a particular web page
- the heart of operating system
- measures to protect of computer
- does not eliminate the servers
- collection of physical part of comp system
Down
- exclusive right as recognized in each country to publish and sell artistic and literacy materials
- video adapter
- conventional method of transmitting data
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- part of application that performs a task not known to a user
- part of computer system or network that is designed to block unauthorized access by permitting outward communication
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
12 Clues: video adapter • the heart of operating system • does not eliminate the servers • measures to protect of computer • a saved link to a particular web page • conventional method of transmitting data • collection of physical part of comp system • part of application that performs a task not known to a user • ...
IT Crossword 2021-10-28
Across
- a saved link to a particular web page.
- the heart of operating system.
- measures to protect of computer.
- does not eliminate the servers.
- collection of physical part of comp system.
Down
- exclusive right as recognized in each country to publish and sell artistic and literacy materials.
- video adapter.
- conventional method of transmitting data.
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- part of application that performs a task not known to a user.
- part of computer system or network that is designed to block unauthorized access by permitting outward communication.
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result
12 Clues: video adapter. • the heart of operating system. • does not eliminate the servers. • measures to protect of computer. • a saved link to a particular web page. • conventional method of transmitting data. • collection of physical part of comp system. • part of application that performs a task not known to a user. • ...
Cyberpuzzle 2023-08-08
Across
- Substitute_ with numbers, punctuation marks or symbols when creating your password
- Phishing attempt directed at specific individuals or companies
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Kind of software used to prevent, scan, detect and delete viruses from a computer
- Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
- Cybersecurity Awareness Month
- Mandatory to wear inside the organisation and to remove outside
Down
- Action to do when I receive a suspicious email
- When available, use stronger_for an added layer of security
- Type of malware that disrupts computers, servers, and other devices
- Phishing attack deployed via SMS message
- Defensive technology designed to keep the bad guys out
12 Clues: Cybersecurity Awareness Month • Phishing attack deployed via SMS message • Action to do when I receive a suspicious email • Defensive technology designed to keep the bad guys out • When available, use stronger_for an added layer of security • Phishing attempt directed at specific individuals or companies • ...
The Wedding Crossword 2021-03-28
Across
- What is Liam's favourite game?
- Where did Liam and Ais go on their first date?
- What did Ais want to be when she grew up?
- Liam and Ais went to the Six Nations in Dublin to see Ireland play what team?
- What is Ais's Godmother's surname?
- Where did Liam and Ais meet for the very first time?
- What TV computer nerd inspired Ais to consider studying cybersecurity and forensics?
- An Irish fairy known for being talkative and mischievous
- Liam and Ais share their favourite cake - what is it?
- Where did Liam and Ais live in Cork?
Down
- One of the destinations on the honeymoon
- Liam and Ais's favourite place to visit in Koln.
- Where did Liam go to the Gaelteacht?
- What is Ais's favourite game?
- Ais and Liam got back into Formula One last year - what's their favourite team?
- What is Liam's Godmother's surname?
- Ais's childhood cat is famous at the local vet for what?
- What is the name of Liam's personal pandemic hairdresser?
18 Clues: What is Ais's favourite game? • What is Liam's favourite game? • What is Ais's Godmother's surname? • What is Liam's Godmother's surname? • Where did Liam go to the Gaelteacht? • Where did Liam and Ais live in Cork? • One of the destinations on the honeymoon • What did Ais want to be when she grew up? • Where did Liam and Ais go on their first date? • ...
Technology CW 2023-06-07
Across
- a proprietary audio/video interface for transmitting uncompressed video data
- the protection of computer systems and networks
- a method of transmitting and receiving messages using electronic devices.
- a file format developed by Adobe in 1992 to present documents
- a hardware or software component that stores data
- data using a two-symbol system.
- a file format developed by Adobe in 1992 to present documents
- a coding format for digital audio
- a mapping from some domain (for example, a range of integers)
- a humanoid robot or synthetic organism designed to imitate a human
Down
- blocks of data created by a web server
- a file format developed by Adobe in 1992 to present documents
- a bitmap image format that was developed by a team at the online services provider
- a collection of discrete values that convey information
- the most important processor in a given computer.
- a commonly used method of lossy compression for digital images
- an American multinational technology company
- a digital multimedia container format most commonly used to store video and audio
- a method of representing data
- any software intentionally designed to cause disruption to a computer
20 Clues: a method of representing data • data using a two-symbol system. • a coding format for digital audio • blocks of data created by a web server • an American multinational technology company • the protection of computer systems and networks • the most important processor in a given computer. • a hardware or software component that stores data • ...
kelompok 2 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Profesi yang menjaga keamanan sistem komputer.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Embracing the Digital Tapestry 2024-02-11
Across
- The act of introducing new ideas, devices, or methods.
- Digital or virtual currency secured by cryptography.
- The ability to understand and share the feelings of another in the context of digital interactions.
- The state or condition of being free from public attention in the digital realm.
- A global system of interconnected computer networks.
Down
- Simulation of human intelligence in machines for performing complex tasks.
- Online platforms that enable users to create, share content, or participate in social networking.
- A decentralized ledger of all transactions across a network.
- The era marked by rapid technological advancements and global connectivity.
- Protective measures and technologies used to safeguard information and systems.
10 Clues: Digital or virtual currency secured by cryptography. • A global system of interconnected computer networks. • The act of introducing new ideas, devices, or methods. • A decentralized ledger of all transactions across a network. • Simulation of human intelligence in machines for performing complex tasks. • ...
technical 2024-07-29
Across
- This language is known for its simplicity and is named after a type of snake.
- The practice of protecting systems and networks from digital attacks.
- A widely used operating system developed by Microsoft.
- Management This acronym refers to a type of database that organizes data into tables.
- The method used to connect multiple devices in a network.
- A diagram used to visually represent the flow of a program.
Down
- A common tool used to prevent unauthorized access to a network.
- The physical components of a computer system.
- This term refers to a device that stores data using magnetic disks.
- The process of writing and maintaining the source code of software.
10 Clues: The physical components of a computer system. • A widely used operating system developed by Microsoft. • The method used to connect multiple devices in a network. • A diagram used to visually represent the flow of a program. • A common tool used to prevent unauthorized access to a network. • This term refers to a device that stores data using magnetic disks. • ...
Internet Safety 2025-03-07
Across
- video-taping the assault of someone for social media attention
- A loud call of cry used when expressing strong emotions
- Committing illegal acts on computers or the internet
Down
- A type of software designed to block access to something until an amount of money is paid
- The act of insulting or using verbal hostility towards someone
- unauthorized reproduction of someone's intellectual property without their consent
- The protection of crime and unauthorized access from data, network, and devices
- Files of data made to track your activities and information online
- The act of using social media to watch, monitor what someone is doing and harass them
- How people talk online
10 Clues: How people talk online • Committing illegal acts on computers or the internet • A loud call of cry used when expressing strong emotions • The act of insulting or using verbal hostility towards someone • video-taping the assault of someone for social media attention • Files of data made to track your activities and information online • ...
Risk Culture Awareness 2022-01-18
Across
- your ability and willingness to stomach a decline in the value of your investments.
- risk of loss resulting from ineffective or failed internal processes, people, systems
- not part of operational risk
- chance of something happening
- level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
- there are three lines of them
Down
- reputational harm stemming from a cyberattack or breach within an organization's network
- you are part of this line
- represents the third line
- the elimination of hazards, activities and exposures that can negatively affect an organization and its assets
10 Clues: you are part of this line • represents the third line • not part of operational risk • chance of something happening • there are three lines of them • your ability and willingness to stomach a decline in the value of your investments. • risk of loss resulting from ineffective or failed internal processes, people, systems • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms including AI for automation
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Cyber Security Awareness Month 2022-09-22
Across
- Always hover over these in emails before you click them.
- You can send all suspicious emails to this email address so the security team can review them for you.
- These emails entice you to click an unsafe link or attachment.
- This is cybersecurity awareness month.
- Always tell this person if an incident occurs
Down
- Never leave you company computer or phone like this
- This is a password that contains a long string of words that are easy to remember but hard to guess
- Never share this with anyone
- This can infect your computer when you download unsafe software
- Always get approval from this department before downloading any software
10 Clues: Never share this with anyone • This is cybersecurity awareness month. • Always tell this person if an incident occurs • Never leave you company computer or phone like this • Always hover over these in emails before you click them. • These emails entice you to click an unsafe link or attachment. • This can infect your computer when you download unsafe software • ...
Science and technology C1 2024-03-01
Across
- the development and use of a new idea or method
- becoming very popular very quickly on the internet
- protecttive measures taken against the criminal access of electronic data
- very modern
- to obtain a more powerful or feature-rich computer or electronic device
- a person who is enthusiastic about new technology
- involving or causing a complete or dramatic change and improvement
Down
- a person who fears or dislikes new technology, especially computers, and does not want to use it
- a small mechanical or electronic device or too
- not in use any more, having been replaced by something better
- a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology
- to suddenly stop working
12 Clues: very modern • to suddenly stop working • a small mechanical or electronic device or too • the development and use of a new idea or method • a person who is enthusiastic about new technology • becoming very popular very quickly on the internet • not in use any more, having been replaced by something better • ...
Impact of computing 2025-03-25
Across
- It verifies the identity of websites, individuals, organizations, or devices.
- A type of license that allows sharing and reuse of copyrighted material
- The protection of information systems from theft or damage
- The ability of a system to keep running without failure
- Loss of jobs due to automation
Down
- The unauthorized access to or use of computer systems
- The use of technology to collect and analyze large amounts of data
- A type of bias found in algorithms due to unrepresentative data
- The gap between those with and without access to technology
- It is essentially public participation in scientific research.
- The practice of obtaining information from a large group online
- A cyber crime where people are tricked into revealing sensitive information.
12 Clues: Loss of jobs due to automation • The unauthorized access to or use of computer systems • The ability of a system to keep running without failure • The protection of information systems from theft or damage • The gap between those with and without access to technology • It is essentially public participation in scientific research. • ...
Cybersecurity Awareness Crossword 2022-09-10
Across
- malware designed to deny a user or organization access to files on their computer
- _____ theft happens when someone impersonates people to commit fraud
- is an attack that attempts to steal your money or your identity via voice call
- provides the first line of defence against unauthorized access to your computer and personal information
Down
- security exploit in which an infected USB charging station is used to compromise connected devices
- social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
- type of malicious software or malware that is installed on a computer without the end user's knowledge.
- is an attack that attempts to steal your money or your identity via email
8 Clues: _____ theft happens when someone impersonates people to commit fraud • is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Basic Cybersecurity Terms 2025-01-27
Cyber ethics terms 2021-08-25
Across
- unauthorized use or reproduction of another's work
- legal right, given to an originator
- a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
- correct or acceptable way of communicating on the internet
- moral principles
- a document stipulating constraints and practices that a user must agree to for access
- a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
- the philosophic study of ethics pertaining to computers
- all rights associated with intangible assets owned by a person or company
- criminal activities carried out by means of computers or the internet
- bullying that is cyber
- tricking someone on the web
- allows the creator protection from theft of their idea
- abusive message posted on the internet
14 Clues: moral principles • bullying that is cyber • tricking someone on the web • legal right, given to an originator • abusive message posted on the internet • unauthorized use or reproduction of another's work • allows the creator protection from theft of their idea • the philosophic study of ethics pertaining to computers • ...
CIS 178 Participation 3 Security crossword 2023-04-21
Technology 2021-10-28
Across
- part of computer system or network that is designed to block unauthorized access by permitting outward communication
- video adapter
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
- exclusive right as recognized in each country to publish and sell artistic and literacy materials
- measures to protect of computer
- not eliminate the servers
- a saved link to a particular web page
Down
- the heart of operating system
- conventional method of transmitting data
- part of application that performs a task not known to a user
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- collection of physical part of comp system
12 Clues: video adapter • not eliminate the servers • the heart of operating system • measures to protect of computer • a saved link to a particular web page • conventional method of transmitting data • collection of physical part of comp system • part of application that performs a task not known to a user • ...
Cyber Security Crossword 2024-01-16
Across
- A malicious program that infects computers without user knowledge or permission.
- Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
- Malicious party attacking a company.
- A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
- attack that affects availability of a resource.
- A botnet is a network of private computers infected with malicious software.
Down
- Secret expression required to gain access to a computing system.
- Attack type.
- Excessive push notifications leading to unwanted response.
- authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
- Data Leakage due to well-crafted AI prompt.
- Firewall type that protects Web-based Applications.
12 Clues: Attack type. • Malicious party attacking a company. • Data Leakage due to well-crafted AI prompt. • attack that affects availability of a resource. • Firewall type that protects Web-based Applications. • Excessive push notifications leading to unwanted response. • Secret expression required to gain access to a computing system. • ...
Information, data and technology ESL vocabulary 2024-12-16
Across
- An organized collection of data
- Programs and other operating information used by a computer
- The process of encoding information to prevent unauthorized access
- A collection of related data
- Intelligence (AI): The simulation of human intelligence processes by machines
- Retrieval: The process of obtaining information from a database or archive
Down
- The science of collecting, analyzing, and interpreting data
- Information collected for analysis
- Mining: The practice of examining large databases to generate new information
- Computing: The practice of using a network of remote servers to store and process data
- of Things (IoT): The interconnection of computing devices embedded in everyday objects
- Measures taken to protect a computer or computer system against unauthorized access
- Data: Large and complex data sets that require advanced methods to analyze
- Data that provides information about other data
- A process or set of rules followed in problem-solving operations
15 Clues: A collection of related data • An organized collection of data • Information collected for analysis • Data that provides information about other data • The science of collecting, analyzing, and interpreting data • Programs and other operating information used by a computer • A process or set of rules followed in problem-solving operations • ...
26. Technology 2023-09-09
Across
- A handheld device that combines a phone with computing functions.
- A machine designed to carry out tasks autonomously or under human control.
- A machine that processes information and performs tasks.
- A simulated environment created by computer technology.
- Global Positioning System, used for location and navigation.
- The process of encoding information to secure it from unauthorized access.
- A global network that connects computers and devices worldwide.
- Information that can be stored, processed, and analyzed.
Down
- Machines and software that can think and learn like humans.
- The measurement and analysis of unique physical or behavioral characteristics for identification.
- The physical components of computers and electronic devices.
- Programs and applications that run on computers and devices.
- Measures taken to protect computer systems and data from cyber threats.
- The creation of three-dimensional objects from digital designs.
14 Clues: A simulated environment created by computer technology. • A machine that processes information and performs tasks. • Information that can be stored, processed, and analyzed. • Machines and software that can think and learn like humans. • The physical components of computers and electronic devices. • Programs and applications that run on computers and devices. • ...
vocab 2025-03-13
Across
- An institution that holds historical artifacts
- the branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules at nanoscale
- Structure made of sand
- what families do when they cook outside in the summer
- what families do when they prepare food for an outdoor mean
- The ability of computers to do tasks traditionally done by humans
- An event that hosts musical performances
Down
- Protecting networks, devices, and date from criminal use
- the use of automatic equipment in manufacturing
- sport of using a board on the water
- the ability to maintain at a certain rate
- the creation of new ideas or methods
- An activity that you do while swimming that allows you to see underwater
- the flame you make while on a nature excursion
14 Clues: Structure made of sand • sport of using a board on the water • the creation of new ideas or methods • An event that hosts musical performances • the ability to maintain at a certain rate • An institution that holds historical artifacts • the flame you make while on a nature excursion • the use of automatic equipment in manufacturing • ...
Impact of computing 2025-03-25
Across
- A cyber crime where people are tricked into revealing sensitive information.
- The unauthorized access to or use of computer systems
- The use of technology to collect and analyze large amounts of data
- The ability of a system to keep running without failure
- The spread of false or misleading information online
- It is essentially public participation in scientific research.
- The protection of information systems from theft or damage
Down
- The gap between those with and without access to technology
- Loss of jobs due to automation
- A type of bias found in algorithms due to unrepresentative data
- The ability to use digital technology effectively
- It verifies the identity of websites, individuals, organizations, or devices.
- A type of license that allows sharing and reuse of copyrighted material
- The practice of obtaining information from a large group online
14 Clues: Loss of jobs due to automation • The ability to use digital technology effectively • The spread of false or misleading information online • The unauthorized access to or use of computer systems • The ability of a system to keep running without failure • The protection of information systems from theft or damage • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- Another issue with biometric authentication is it what
- How a system is secured what on who it’s being secured against
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
Down
- the best we have right now is a process called Independent Verification and ____
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Cybersecurity Awareness Month - Week 3 2022-10-05
Across
- Cirrus' tool for endpoint security
- A memorized secret consisting of a sequence of random words that is longer than a typical password
- Cirrus' email security platform
- A password attack that uses trial-and-error by attempting every possible combination
- Malware that disables access to data until a fee is paid
- A type of virus that automatically spreads itself
Down
- software designed to detect and destroy viruses
- A network of devices infected and controlled by the same virus
- A physical device that connects to a network
- A social engineering attack delivered by SMS text message
- A phishing attack aimed at senior executives
- The process of encoding data using complex algorithms for confidentiality
- An attack that prompts an MFA approval request over and over
- Malware that is disguised as legitimate software
- A social engineering technique where an attacker creates a fake scenario
- A type of trojan spyware that records your keystrokes
16 Clues: Cirrus' email security platform • Cirrus' tool for endpoint security • A physical device that connects to a network • A phishing attack aimed at senior executives • software designed to detect and destroy viruses • Malware that is disguised as legitimate software • A type of virus that automatically spreads itself • A type of trojan spyware that records your keystrokes • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- How a system is secured what on who it’s being secured against
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
Down
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- the best we have right now is a process called Independent Verification and ____
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- Another issue with biometric authentication is it what
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- Another issue with biometric authentication is it what
Down
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- the best we have right now is a process called Independent Verification and ____
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- How a system is secured what on who it’s being secured against
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
9ABD 2025-04-15
Across
- that may use quantum encryption to protect data.
- between two consecutive wave peaks.
- link between particles no matter how far apart.
- can act as both a wave and a particle.
- Spectra,Unique patterns of light produced by atoms when electrons drop energy levels.
- Principle,Heisenberg’s rule: you can’t know both position and momentum precisely.
- Effect,Electrons are ejected when light hits a surface in this quantum phenomenon.
- particle of light with no mass, just energy.
- Polarization,Describes the direction of oscillation in a transverse wave.
Down
- happens to electrons in the photoelectric effect.
- of wave cycles per second.
- Mechanics,Branch of physics that explains the behavior of particles on a small scale.
- Phenomena,General term for strange behavior at the atomic and subatomic levels.
- basic unit of matter, central to quantum studies.
- a quantum system exists in multiple states at once.
- to excite electrons or eject them from metal surfaces.
- Behaviors,Includes reflection, refraction, diffraction, and interference.
- display type that relies on polarized light.
- Wave,Electromagnetic radiation that can behave like both a wave and a particle.
19 Clues: of wave cycles per second. • between two consecutive wave peaks. • can act as both a wave and a particle. • display type that relies on polarized light. • particle of light with no mass, just energy. • link between particles no matter how far apart. • that may use quantum encryption to protect data. • happens to electrons in the photoelectric effect. • ...
it-words 2022-11-08
Across
- communication over a distance by cable, telegraph or telephone
- a person who uses or operates something, especially a computer or other machine
- WWW
- copy (data) from one computer system to another, typically over the internet
- the state of being protected against the criminal or unauthorized use of electronic data or the measures taken to achieve this
- networked computing facilities providing remote data storage and processing services via the internet
- the activity of buying and selling, especially on a large scale
Down
- program instructions
- you have to press it to turn on the computer
- the programs and other operating information used by a computer
- Excel table with one word
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- modern technology's synonym
- input device with which you can write text
- the "soul" of the computer
15 Clues: WWW • program instructions • Excel table with one word • the "soul" of the computer • modern technology's synonym • input device with which you can write text • you have to press it to turn on the computer • communication over a distance by cable, telegraph or telephone • the programs and other operating information used by a computer • ...
Browsing safely 2025-06-15
Across
- applications used to prevent the entry of virus into the computer system
- full form of virus
- acts done to protect one's computer system
- Collection of various networks in the form of a web
- providing malwares and viruses into one's computer through various links and emails
- illegal entry into one's computer through various links
- cyber crime in which money is demanded after attacking the victim
- a type of anti-virus
- befriending children on social media and causing harm through social media or physically
- full form of OTP
Down
- criminal activities intented to harm a person through online
- act of terrorism conducted through the use of internet
- full form of ICT
- sequence of characters or numbers used in any device or system to keep it protected
- act of harassing people through the use of internet
15 Clues: full form of ICT • full form of OTP • full form of virus • a type of anti-virus • acts done to protect one's computer system • Collection of various networks in the form of a web • act of harassing people through the use of internet • act of terrorism conducted through the use of internet • illegal entry into one's computer through various links • ...
BROWSING SAFELY 2025-06-05
Across
- SIMILAR TO 'ONLINE SAFETY', BUT CAN ALSO ENCOMPASS OTHER DIGITAL ACTIVITIES
- PROTECT AGAINST DAMAGE OR HARM
- A TYPE OF MALWARE THAT SPREADS BETWEEN COMPUTER AND CAUSES DAMAGE TO THE DATA
- THIS BROADER TERM CAN INCLUDE BROWSING, BUT ALSO OTHER ASECTS OF ONLINE ACTIVITY
- THE STATE OF BEING FREE FROM DANGER OR HARM
- PRESERVED FROM HARM
- MEASURES PROMOTING THE SAFE USAGE OF THE INTERNET, ESPECIALLY IN ORDER TO PROTECT AGAINST VIRUSES, FRAUD, OR OTHER FORMS OF ATTACK
- NOT HARMED BY VIRUSES OR DANGER
Down
- SIMILAR TO 'SECURE BROWSING', BUT EXPLICITLY STATES ABOUT THE WEB
- PROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURE
- THE STATE OF BEING PROTECTED AGAINST THE CRIMINAL OR UNAUTHORISED USE OF ELECTRONIC DATA OR THE MEASURES TAKEN TO ACHIVE THIS
- PROTECT FROM DANGER OR RISK OF ONLINE
- NOT DAMAGED BY HARMFUL VIRUSES
- SERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY
- CERTAIN TO REMAIN SAFE AND UNTHREATENED
15 Clues: PRESERVED FROM HARM • PROTECT AGAINST DAMAGE OR HARM • NOT DAMAGED BY HARMFUL VIRUSES • NOT HARMED BY VIRUSES OR DANGER • PROTECT FROM DANGER OR RISK OF ONLINE • CERTAIN TO REMAIN SAFE AND UNTHREATENED • THE STATE OF BEING FREE FROM DANGER OR HARM • PROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURE • SERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY • ...
IT үгийн сүлжээ 2025-09-08
Across
- Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”.
- Өгөгдлийг эмх цэгцтэй хадгалдаг "номын сан". Гэхдээ бүх ном нь тоо, текст, зураг.
- Компьютерт “энэ ажлыг тэгээд дараа нь ингэ” гэж зааж өгсөн алхам алхамтай жор.
- Компьютерийн “булчин” ба “яс”. CPU нь тархи, дэлгэц нь нүд, гар нь гараа хөдөлгөдөг гарыг орлоно.
- Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч
- Шар өрөөнд байдаг зүйл
- Компьютерийн “багахан хайрцаг”. Дотор нь зураг, текст, дуу, гээд юу ч хийж болдог.
- Дэлхий даяарх “цагаан толгойн чатаар” бүгд холбогдож буй аварга сүлжээ.
Down
- Программистын өдөр тутмын “шар айраг”-гүйгээр хийдэг хэцүү ажил. Алдаа олоход баяр, засахад бахархал.
- Утас болон компьютерийн “хобби”. Тоглоомоос эхлээд банкны апп хүртэл бүгд багтана.
- Компьютерийг хүний адил “бодолтой мэт” болгосон тархи. Заримдаа хэтэрхий ухаантай болж айлгадаг
- Нэг жолооч
- Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй.
- Интернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг.
- Компьютеруудын “найзын хүрээлэл”. Хэр их найзтай байна, төдий чинээ мэдээлэл дамжуулна.
15 Clues: Нэг жолооч • Шар өрөөнд байдаг зүйл • Интернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг. • Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”. • Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй. • Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч • ...
Welcome to CyberSecurity! 2023-01-03
Across
- ones and zeroes that make up computer code
- the kind of app or website that you might use to share photos or message friends
- a person who intentionally finds weak points in a computer system and exploits them
- a program that infects your computer and interferes with its programming
Down
- a place where information is posted on the internet; you'll want to check the source to see if the information is trustworthy
- the kind of security that depends on a person's fingerprint, face, or even the patterns on their retina
- the secret part of your login information that protects your accounts from other users
- emails that are sent by hackers to attempt to get your information with suspicious links and attachments
8 Clues: ones and zeroes that make up computer code • a program that infects your computer and interferes with its programming • the kind of app or website that you might use to share photos or message friends • a person who intentionally finds weak points in a computer system and exploits them • ...
Cybersecurity Crossword Puzzle 2025-09-25
8 Clues: Tricky email scam • Trying to guess passwords • "Two-____ Authentication" • Connecting securely online • Unique secret used to log in • Device that blocks unwanted traffic • Converts data into unreadable format • Software that steals info disguised as something useful
