cybersecurity Crossword Puzzles
kelompok 2 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Profesi yang menjaga keamanan sistem komputer.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Orang yang menciptakan software berbagai jenis permainan.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Cyber ethics terms 2021-08-25
Across
- unauthorized use or reproduction of another's work
- legal right, given to an originator
- a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
- correct or acceptable way of communicating on the internet
- moral principles
- a document stipulating constraints and practices that a user must agree to for access
- a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
- the philosophic study of ethics pertaining to computers
- all rights associated with intangible assets owned by a person or company
- criminal activities carried out by means of computers or the internet
- bullying that is cyber
- tricking someone on the web
- allows the creator protection from theft of their idea
- abusive message posted on the internet
14 Clues: moral principles • bullying that is cyber • tricking someone on the web • legal right, given to an originator • abusive message posted on the internet • unauthorized use or reproduction of another's work • allows the creator protection from theft of their idea • the philosophic study of ethics pertaining to computers • ...
Information, data and technology ESL vocabulary 2024-12-16
Across
- An organized collection of data
- Programs and other operating information used by a computer
- The process of encoding information to prevent unauthorized access
- A collection of related data
- Intelligence (AI): The simulation of human intelligence processes by machines
- Retrieval: The process of obtaining information from a database or archive
Down
- The science of collecting, analyzing, and interpreting data
- Information collected for analysis
- Mining: The practice of examining large databases to generate new information
- Computing: The practice of using a network of remote servers to store and process data
- of Things (IoT): The interconnection of computing devices embedded in everyday objects
- Measures taken to protect a computer or computer system against unauthorized access
- Data: Large and complex data sets that require advanced methods to analyze
- Data that provides information about other data
- A process or set of rules followed in problem-solving operations
15 Clues: A collection of related data • An organized collection of data • Information collected for analysis • Data that provides information about other data • The science of collecting, analyzing, and interpreting data • Programs and other operating information used by a computer • A process or set of rules followed in problem-solving operations • ...
Cybersecurity Awareness Crossword 2022-09-10
Across
- malware designed to deny a user or organization access to files on their computer
- _____ theft happens when someone impersonates people to commit fraud
- is an attack that attempts to steal your money or your identity via voice call
- provides the first line of defence against unauthorized access to your computer and personal information
Down
- security exploit in which an infected USB charging station is used to compromise connected devices
- social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
- type of malicious software or malware that is installed on a computer without the end user's knowledge.
- is an attack that attempts to steal your money or your identity via email
8 Clues: _____ theft happens when someone impersonates people to commit fraud • is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Basic Cybersecurity Terms 2025-01-27
computing 2022-02-09
Across
- software that would be most appropriate to use to send an attached document to lots of people at the same time
- wired networks send data along ------
- the law protects the control you have over the things that you create
Down
- it is an electronic communication to bully others
- it is the worldwide network of computers
- protection of information systems from unauthorized access or modification to information
- a device that connects multiple devices together
- networks send and receive messages in small units of data known as ------
8 Clues: wired networks send data along ------ • it is the worldwide network of computers • a device that connects multiple devices together • it is an electronic communication to bully others • the law protects the control you have over the things that you create • networks send and receive messages in small units of data known as ------ • ...
Digital Technology Words 1 2024-05-08
Across
- The method a digital system uses to store and manipulate data.
- Raw, unorganised facts and figures.
- performed
- Really being what it seems to be, genuine.
- The protection provided to the creators of original works that offers a legal framework for the control and reproduction or transmission of their creations.
- A method or system of computing or calculating.
Down
- Data with a high degree of organisation, such that it can easily be analysed and processed using algorithms.
- protection of internet-connected systems, including hardware, software and data, from cyberattacks.
- A step-by-step procedure required to solve a problem.
- An instruction in a computer program or algorithm that causes different actions to
- Free from errors
11 Clues: performed • Free from errors • Raw, unorganised facts and figures. • Really being what it seems to be, genuine. • A method or system of computing or calculating. • A step-by-step procedure required to solve a problem. • The method a digital system uses to store and manipulate data. • An instruction in a computer program or algorithm that causes different actions to • ...
Innovative Digital Platform 2023-05-24
Across
- “Fast changing _____” is the biggest challenge for this pillar.
- This pillar is about “_____” the way we work.
- What are the two drivers of this pillar? (3 words)
- According to the inspiration blog about business, what should be a priority when leverage innovative digital platforms? (2 words)
Down
- Where does Sebastian like spending his free time?
- Ricky ____ would play Sebastian in the film of his life.
- What would Sebastian do if he could?
- What kind of technology excites Sebastian most about this pillar?
- What do we need to drive right business decisions?
- Data _____ is becoming more and more important in maximising business value.
- What should we spend five minutes a day doing, to enable the strategy?
11 Clues: What would Sebastian do if he could? • This pillar is about “_____” the way we work. • Where does Sebastian like spending his free time? • What do we need to drive right business decisions? • What are the two drivers of this pillar? (3 words) • Ricky ____ would play Sebastian in the film of his life. • “Fast changing _____” is the biggest challenge for this pillar. • ...
Cryptography 2025-05-14
Across
- Substitution based on multiple alphabets using a system to switch between them.
- Attempting to break a cryptographic system and return the encrypted message to plaintext.
- Changing the order of items.
- Converting plaintext into ciphertext.
- Converting encrypted info back to it's regular form.
- Scrambling data so that it looks like bubble to anyone except those who know thw trick to decoding it.
- Decrypted or unencrypted data
Down
- Using knowledge about the frequency of letters and groups of letters used in a language to look for patterns.
- Replacement of a character with a different character.
- How many letters the offset should be.
- An encryption methtod in which the pre shared key is used only once.
- Tool to encrypt/decrypt shift ciphers.
- How individuals and organizations reduce the risk of a cyber attack.
- Data that has been encrypted
- You offset the alphabet either to the right (forward) or to the left (backward).
15 Clues: Changing the order of items. • Data that has been encrypted • Decrypted or unencrypted data • Converting plaintext into ciphertext. • How many letters the offset should be. • Tool to encrypt/decrypt shift ciphers. • Converting encrypted info back to it's regular form. • Replacement of a character with a different character. • ...
Machine Learning Crossword #11 2020-05-24
Across
- Bharti Airtel recently acquires 10% stake in this early-stage startup
- Accenture recently acquired this Ahmedabad based analytics company
- Intel capital invested $900M in this mobility startup
- INDIAN VOICE AI STARTUP RAISES $5.1 MN FROM EXFINITY VENTURES AND KALAARI CAPITAL
Down
- an agritech startup raises $5.9M in Series A round to further enhance its AI-based offerings
- This RPA startup RAISES $120 MILLION just last month
- Apple has purchased virtual reality startup
- Microsoft will pay $165 million for the acquisition of this Israeli cybersecurity company
8 Clues: Apple has purchased virtual reality startup • This RPA startup RAISES $120 MILLION just last month • Intel capital invested $900M in this mobility startup • Accenture recently acquired this Ahmedabad based analytics company • Bharti Airtel recently acquires 10% stake in this early-stage startup • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- How a system is secured what on who it’s being secured against
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- Another issue with biometric authentication is it what
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- the best we have right now is a process called Independent Verification and ____
Down
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
9ABD 2025-04-15
Across
- that may use quantum encryption to protect data.
- between two consecutive wave peaks.
- link between particles no matter how far apart.
- can act as both a wave and a particle.
- Spectra,Unique patterns of light produced by atoms when electrons drop energy levels.
- Principle,Heisenberg’s rule: you can’t know both position and momentum precisely.
- Effect,Electrons are ejected when light hits a surface in this quantum phenomenon.
- particle of light with no mass, just energy.
- Polarization,Describes the direction of oscillation in a transverse wave.
Down
- happens to electrons in the photoelectric effect.
- of wave cycles per second.
- Mechanics,Branch of physics that explains the behavior of particles on a small scale.
- Phenomena,General term for strange behavior at the atomic and subatomic levels.
- basic unit of matter, central to quantum studies.
- a quantum system exists in multiple states at once.
- to excite electrons or eject them from metal surfaces.
- Behaviors,Includes reflection, refraction, diffraction, and interference.
- display type that relies on polarized light.
- Wave,Electromagnetic radiation that can behave like both a wave and a particle.
19 Clues: of wave cycles per second. • between two consecutive wave peaks. • can act as both a wave and a particle. • display type that relies on polarized light. • particle of light with no mass, just energy. • link between particles no matter how far apart. • that may use quantum encryption to protect data. • happens to electrons in the photoelectric effect. • ...
it-words 2022-11-08
Across
- communication over a distance by cable, telegraph or telephone
- a person who uses or operates something, especially a computer or other machine
- WWW
- copy (data) from one computer system to another, typically over the internet
- the state of being protected against the criminal or unauthorized use of electronic data or the measures taken to achieve this
- networked computing facilities providing remote data storage and processing services via the internet
- the activity of buying and selling, especially on a large scale
Down
- program instructions
- you have to press it to turn on the computer
- the programs and other operating information used by a computer
- Excel table with one word
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- modern technology's synonym
- input device with which you can write text
- the "soul" of the computer
15 Clues: WWW • program instructions • Excel table with one word • the "soul" of the computer • modern technology's synonym • input device with which you can write text • you have to press it to turn on the computer • communication over a distance by cable, telegraph or telephone • the programs and other operating information used by a computer • ...
Browsing safely 2025-06-15
Across
- applications used to prevent the entry of virus into the computer system
- full form of virus
- acts done to protect one's computer system
- Collection of various networks in the form of a web
- providing malwares and viruses into one's computer through various links and emails
- illegal entry into one's computer through various links
- cyber crime in which money is demanded after attacking the victim
- a type of anti-virus
- befriending children on social media and causing harm through social media or physically
- full form of OTP
Down
- criminal activities intented to harm a person through online
- act of terrorism conducted through the use of internet
- full form of ICT
- sequence of characters or numbers used in any device or system to keep it protected
- act of harassing people through the use of internet
15 Clues: full form of ICT • full form of OTP • full form of virus • a type of anti-virus • acts done to protect one's computer system • Collection of various networks in the form of a web • act of harassing people through the use of internet • act of terrorism conducted through the use of internet • illegal entry into one's computer through various links • ...
BROWSING SAFELY 2025-06-05
Across
- SIMILAR TO 'ONLINE SAFETY', BUT CAN ALSO ENCOMPASS OTHER DIGITAL ACTIVITIES
- PROTECT AGAINST DAMAGE OR HARM
- A TYPE OF MALWARE THAT SPREADS BETWEEN COMPUTER AND CAUSES DAMAGE TO THE DATA
- THIS BROADER TERM CAN INCLUDE BROWSING, BUT ALSO OTHER ASECTS OF ONLINE ACTIVITY
- THE STATE OF BEING FREE FROM DANGER OR HARM
- PRESERVED FROM HARM
- MEASURES PROMOTING THE SAFE USAGE OF THE INTERNET, ESPECIALLY IN ORDER TO PROTECT AGAINST VIRUSES, FRAUD, OR OTHER FORMS OF ATTACK
- NOT HARMED BY VIRUSES OR DANGER
Down
- SIMILAR TO 'SECURE BROWSING', BUT EXPLICITLY STATES ABOUT THE WEB
- PROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURE
- THE STATE OF BEING PROTECTED AGAINST THE CRIMINAL OR UNAUTHORISED USE OF ELECTRONIC DATA OR THE MEASURES TAKEN TO ACHIVE THIS
- PROTECT FROM DANGER OR RISK OF ONLINE
- NOT DAMAGED BY HARMFUL VIRUSES
- SERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY
- CERTAIN TO REMAIN SAFE AND UNTHREATENED
15 Clues: PRESERVED FROM HARM • PROTECT AGAINST DAMAGE OR HARM • NOT DAMAGED BY HARMFUL VIRUSES • NOT HARMED BY VIRUSES OR DANGER • PROTECT FROM DANGER OR RISK OF ONLINE • CERTAIN TO REMAIN SAFE AND UNTHREATENED • THE STATE OF BEING FREE FROM DANGER OR HARM • PROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURE • SERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY • ...
IT үгийн сүлжээ 2025-09-08
Across
- Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”.
- Өгөгдлийг эмх цэгцтэй хадгалдаг "номын сан". Гэхдээ бүх ном нь тоо, текст, зураг.
- Компьютерт “энэ ажлыг тэгээд дараа нь ингэ” гэж зааж өгсөн алхам алхамтай жор.
- Компьютерийн “булчин” ба “яс”. CPU нь тархи, дэлгэц нь нүд, гар нь гараа хөдөлгөдөг гарыг орлоно.
- Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч
- Шар өрөөнд байдаг зүйл
- Компьютерийн “багахан хайрцаг”. Дотор нь зураг, текст, дуу, гээд юу ч хийж болдог.
- Дэлхий даяарх “цагаан толгойн чатаар” бүгд холбогдож буй аварга сүлжээ.
Down
- Программистын өдөр тутмын “шар айраг”-гүйгээр хийдэг хэцүү ажил. Алдаа олоход баяр, засахад бахархал.
- Утас болон компьютерийн “хобби”. Тоглоомоос эхлээд банкны апп хүртэл бүгд багтана.
- Компьютерийг хүний адил “бодолтой мэт” болгосон тархи. Заримдаа хэтэрхий ухаантай болж айлгадаг
- Нэг жолооч
- Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй.
- Интернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг.
- Компьютеруудын “найзын хүрээлэл”. Хэр их найзтай байна, төдий чинээ мэдээлэл дамжуулна.
15 Clues: Нэг жолооч • Шар өрөөнд байдаг зүйл • Интернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг. • Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”. • Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй. • Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч • ...
Brain-Box Challenge 2024-09-28
Across
- The ability to connect systems and devices for seamless communication.
- A flexible project management approach focusing on iterative progress.
- A plan of action designed to achieve long-term goals.
- A decentralized, digital ledger for recording transactions securely.
- The person whose experience is central to digital transformation.
- A significant change caused by new technologies or innovations.
- Raw information collected for analysis and decision-making.
- A system that uses algorithms to learn from data and improve.
- The use of technology to perform tasks without human intervention
- The process of creating new ideas or products that drive change.
Down
- The systematic analysis of data for insights and trends.
- Measures taken to protect systems from digital attacks.
- The ability to grow and handle increased demand efficiently.
- A platform for storing and accessing data over the internet.
- The process of using digital technologies to change business models.
15 Clues: A plan of action designed to achieve long-term goals. • Measures taken to protect systems from digital attacks. • The systematic analysis of data for insights and trends. • Raw information collected for analysis and decision-making. • The ability to grow and handle increased demand efficiently. • A platform for storing and accessing data over the internet. • ...
Computer Language 2025-05-22
Across
- act of stealing someone's personal information
- act of harming or using information technology in a deliberate manner
- collection of technologies to protect networkd
- software that helps in preventing unauthorised access to your computer
- sending an email to a user misleading him to believe that it is from a trusted person or organisation
- computer program that is designed to identify and remove virus from a computer
- Illegal entry into a computer system
Down
- befriending children on social media to facilitate online or physical sexual abuse
- method to get money that belongs to bank or its customers
- conduct terrorism through the use of computer and internet
- impression you create when you engage in various online activities
- criminal activity intended to harm anyone using a computer
- means hoaxing or misleading
- unethical hackers
- set of program that disrupts the normal functioning of a computer
15 Clues: unethical hackers • means hoaxing or misleading • Illegal entry into a computer system • act of stealing someone's personal information • collection of technologies to protect networkd • method to get money that belongs to bank or its customers • conduct terrorism through the use of computer and internet • criminal activity intended to harm anyone using a computer • ...
Welcome to CyberSecurity! 2023-01-03
Across
- ones and zeroes that make up computer code
- the kind of app or website that you might use to share photos or message friends
- a person who intentionally finds weak points in a computer system and exploits them
- a program that infects your computer and interferes with its programming
Down
- a place where information is posted on the internet; you'll want to check the source to see if the information is trustworthy
- the kind of security that depends on a person's fingerprint, face, or even the patterns on their retina
- the secret part of your login information that protects your accounts from other users
- emails that are sent by hackers to attempt to get your information with suspicious links and attachments
8 Clues: ones and zeroes that make up computer code • a program that infects your computer and interferes with its programming • the kind of app or website that you might use to share photos or message friends • a person who intentionally finds weak points in a computer system and exploits them • ...
Cybersecurity Crossword Puzzle 2025-09-25
8 Clues: Tricky email scam • Trying to guess passwords • "Two-____ Authentication" • Connecting securely online • Unique secret used to log in • Device that blocks unwanted traffic • Converts data into unreadable format • Software that steals info disguised as something useful
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- Another issue with biometric authentication is it what
- How a system is secured what on who it’s being secured against
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
Down
- the best we have right now is a process called Independent Verification and ____
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Cybersecurity Awareness Month - Week 3 2022-10-05
Across
- Cirrus' tool for endpoint security
- A memorized secret consisting of a sequence of random words that is longer than a typical password
- Cirrus' email security platform
- A password attack that uses trial-and-error by attempting every possible combination
- Malware that disables access to data until a fee is paid
- A type of virus that automatically spreads itself
Down
- software designed to detect and destroy viruses
- A network of devices infected and controlled by the same virus
- A physical device that connects to a network
- A social engineering attack delivered by SMS text message
- A phishing attack aimed at senior executives
- The process of encoding data using complex algorithms for confidentiality
- An attack that prompts an MFA approval request over and over
- Malware that is disguised as legitimate software
- A social engineering technique where an attacker creates a fake scenario
- A type of trojan spyware that records your keystrokes
16 Clues: Cirrus' email security platform • Cirrus' tool for endpoint security • A physical device that connects to a network • A phishing attack aimed at senior executives • software designed to detect and destroy viruses • Malware that is disguised as legitimate software • A type of virus that automatically spreads itself • A type of trojan spyware that records your keystrokes • ...
CSAM 2023 2023-07-10
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- How a system is secured what on who it’s being secured against
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
Down
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- the best we have right now is a process called Independent Verification and ____
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- Another issue with biometric authentication is it what
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- Another issue with biometric authentication is it what
Down
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- the best we have right now is a process called Independent Verification and ____
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- How a system is secured what on who it’s being secured against
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Crash Course Computer Science Cybersecurity 2019-02-25
Across
- Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
- What you know and what you have authentication have the nice property of being ______ either correct or incorrect
- For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
- To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
- What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
- To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
- So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
Down
- the best we have right now is a process called Independent Verification and ____
- They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
- How a system is secured what on who it’s being secured against
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
- Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
- Another issue with biometric authentication is it what
- Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
- After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
16 Clues: Another issue with biometric authentication is it what • How a system is secured what on who it’s being secured against • the best we have right now is a process called Independent Verification and ____ • Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what • ...
Cybersecurity Vocabulary Crossword 2022-03-07
Across
- transforming plaintext or cleartext into ciphertext
- planning and maintaining organization safe in cyberspace.
- used to prove one's identity, or authorize access to a resource.
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
- practice of sending fraudulent messages that appear to come from a reputable source.
- attaches itself with host file and replicates.
- unwanted or unsolicited communications typically received via e-mail
7 Clues: attaches itself with host file and replicates. • transforming plaintext or cleartext into ciphertext • planning and maintaining organization safe in cyberspace. • used to prove one's identity, or authorize access to a resource. • unwanted or unsolicited communications typically received via e-mail • ...
March 2025 Crossword Vol.51 2025-03-24
5 Clues: F5's technology of the month • which event is silicon21 a silver sponsor for F5 • newest benefit in the silicon21 partners program • Cisco FY25 EMEA H2 DCC Sales Acceleration Plan Winner • Next-generation cybersecurity cloud with AI-powered defense
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
Alexa Say Wha? 2023-10-09
5 Clues: The work that we do. • This will need to be remediated. • 22, 53, and 80 are common examples. • You can find this snack at most shopping malls. • You can find this aquatic friend on the Nemo ride at Epcot.
test 2022-07-15
Across
- Type of engineer Michael is -
- Sammis bridal shower was a ___ party -
- Basketball team michael supports -
- How they met
- Sammis favorite flowers -
- European country michael lived in -
- Month they met -
- Type of dance sammi did growing up -
- City they will live in after the wedding -
- Color of michaels bathroom before they painted it -
- Sammi’s side hustle -
- On the way to Big Sur they stopped at an ___ farm -
- Brand of sammi’s car -
- Michael proposed in ___ beach -
- Sauce michael hates -
- Attends ___ ___ community church -
Down
- Industry sammi works in -
- City sammi did her internship in -
- Amusement park they had annual passes to -
- Music festival they attended -
- Destination of first plane ride together -
- State michael was raised in -
- Location of their first post together on IG -
- City of the music festival they attended -
- Engagement ring shape -
- How we are honoring sammis dad at the wedding -
- Year they met -
- Where they ate on their first date -
- City they took their engagement photos -
- Day of the week they attend life group -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • Type of engineer Michael is - • State michael was raised in - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
technology 2024-04-11
Across
- decenteralized and transarent digital ledger
- the wider it is the fater data flows
- no need for cables or cords to connect
- computers and software processing information
- global compuer network
- the process of identifying a user or system
- used to inform you
- a system of interconnected devices
- to help with direction
- to store data
- people post
- information in didgitl form
- secure and safe connection
- used to communicate
- connecting of computers or other devices to share information
- used for research
- to protect data
Down
- protection against digital threats
- physical and organization structures needed for a society or enterprise
- invisible connection
- converting information into secret codes
- used to play games
- transmission of information over a distance
- detects physical output
- a portable device with a touchscreen used for various tasks
- a part that is used to tye for input commands
- programs or applications that run on a computer or device
- electronic device that can perform various tasks and process information
- uses physical and behavioral traits for identification
- professianal coomunication
30 Clues: people post • to store data • to protect data • used for research • used to play games • used to inform you • used to communicate • invisible connection • global compuer network • to help with direction • detects physical output • secure and safe connection • professianal coomunication • information in didgitl form • protection against digital threats • a system of interconnected devices • ...
JG informaatika 2022-12-05
Across
- Ussi nimeline programmerimiskeel
- Bolt asutaja(d) (ainult perekonnanimi)
- Inglise keeles küberturvalisus
- Internetikeskkonnas toimuv kiusamine, nt teise inimese nimele tehtud libakontod, sõimamine ja ähvardamine foorumites, võõraste piltide ülesriputamine ja moonutamine
- Rämpspost teisesõnaga
- Missuguse ülikooli kolledž asub Kohtla-Järvel (lühend)
- Inglise keeles riistvara
- Uus Jõhvis avatud tehnoloogiakool
- IT pikk nimetus
- Rakendusprogramm internetis liikumiseks ja veebilehtede kuvamiseks
- Cybernetica poolt loodud IT terminoloogia leksikon
- Veebilehtede anonüümne sirvimisrežiim, mis ei salvesta kasutaja sirvimisajalugu
- Missugune amet (lühend) korraldab küberturvalisuse ennetustegevusi Eestis
- Eesti esimese 5G sagedusloa oksjoni võitja
Down
- Interneti osa, kus toimub peamine kuritegelik tegevus
- Inglise keeles tarkvara
- Tuntuim krüptoraha
- Ruudukestest koosneva mustrina esitatud maatrikskood
- Inglise keelse IT termini AI lühendi vaste eesti keeles
- Programmikoodi koostamine, testimine ja parandamine
- Sotsiaalvõrgustik, mis loodi 2004. aastal
- Täpne samm-sammuline, kuid mitte tingimata formaalne juhend millegi tegemiseks
- Isik, kes murrab luba küsimata sisse mõnda süsteemi
- Kood, milles informatsioon on esitatud kahendsüsteemis
- E-kirjale lisatud teksti-, pildi- vm fail
- Ohtlik programm, mis võib levitada end ise ja kutsuda esile soovimatuid sündmusi või arvuti kokkujooksmist
- Eesti suurim rahvusvaheline robootika festival
27 Clues: IT pikk nimetus • Tuntuim krüptoraha • Rämpspost teisesõnaga • Inglise keeles tarkvara • Inglise keeles riistvara • Inglise keeles küberturvalisus • Ussi nimeline programmerimiskeel • Uus Jõhvis avatud tehnoloogiakool • Bolt asutaja(d) (ainult perekonnanimi) • Sotsiaalvõrgustik, mis loodi 2004. aastal • E-kirjale lisatud teksti-, pildi- vm fail • ...
TTS INFORMATIKA BANYU ALFIRDAUSI (22/XG) 2025-04-10
Across
- profesi yang mengembangkan aplikasi atau software
- mencari salah satu dari beberapa kata kunci
- profesi yang melindungi sistem dari ancaman siber
- konten eksplisit yang tidak sesuai dengan kebijakan
- menampilkan versi simpanan halaman web
- dokumentasi tarian tradisional yang bisa dijadikan video digital
- alat musik tradisional yang dapat dibuat dalam format interaktif
- pesan berulang yang tidak relevan atau mengganggu
- wildcard untuk menggantikan kata yang tidak diketahui
- profesi yang mengembangkan solusi berbasis kecerdasan buatan
- izin untuk menggunakan karya atau penemuan orang lain
- perlindungan hukum terhadap karya kreatif
Down
- profesi yang mengelola infrastruktur data
- perselisihan terkait pelanggaran hak kekayaan intelektual
- profesi yang menganalisis pengalaman pengguna
- upaya untuk mencuri data pribadi dengan penipuan
- teks tradisional yang dapat diubah menjadi e-book
- seni boneka tradisional untuk konten animasi digital
- mengecualikan kata tertentu dari hasil pencarian
- informasi salah yang disebarkan tanpa niat buruk
- mencari kata kunci persis seperti yang diketik
- motif kain tradisional yang dapat diadaptasi secara visual
- kebencian konten yang menghasut atau menyebarkan kebencian
- geografis perlindungan produk khas daerah tertentu
- perjanjian resmi terkait penggunaan hak kekayaan intelektual
25 Clues: menampilkan versi simpanan halaman web • profesi yang mengelola infrastruktur data • perlindungan hukum terhadap karya kreatif • mencari salah satu dari beberapa kata kunci • profesi yang menganalisis pengalaman pengguna • mencari kata kunci persis seperti yang diketik • upaya untuk mencuri data pribadi dengan penipuan • mengecualikan kata tertentu dari hasil pencarian • ...
TTS INFORMATIKA 2025-04-10
Across
- Nama lain dari mesin pencari
- Organisasi dunia yang mengatur HAKI
- Situs milik Google yang khusus menampilkan gambar
- Sikap kritis saat menerima informasi
- professional istilah umum untuk orang yang bekerja di bidang teknologi informasi
- merek Hak atas lambang dagang atau logo produk
- Proses membuat gambar, video, atau teks digital
- Lembaga di Indonesia yang sering memeriksa hoaks
- Tindakan menyebarkan informasi bohong secara sengaja
- admin Orang yang bertanggung jawab atas basis data dalam suatu sistem
- Lembaga di Indonesia yang mengurusi pendaftaran HAKI
- Syntax untuk mencari kata pada judul halaman
Down
- Proses memeriksa kebenaran dan keaslian informasi
- Orang yang merancang dan membuat program komputer
- Proses penyebaran konten digital ke masyarakat
- Tradisi lokal yang bisa diangkat dalam konten digital
- designer Orang yang bertanggung jawab atas basis data dalam suatu sistem
- Mesin pencari paling populer di dunia
- Pencarian yang menghasilkan data spesifik disebut
- Profesi yang mengelola keamanan jaringan dan data
- Konten visual yang sering dipakai dalam promosi budaya
- Platform video yang banyak dipakai untuk promosi budaya
- Platform media sosial tempat konten negatif sering tersebar
- paten Hak atas penemuan di bidang teknologi
- cipta Hak atas ciptaan di bidang seni, sastra, dan ilmu pengetahuan
25 Clues: Nama lain dari mesin pencari • Organisasi dunia yang mengatur HAKI • Sikap kritis saat menerima informasi • Mesin pencari paling populer di dunia • Syntax untuk mencari kata pada judul halaman • Proses penyebaran konten digital ke masyarakat • Proses membuat gambar, video, atau teks digital • Lembaga di Indonesia yang sering memeriksa hoaks • ...
RiyangRaisyaAndara_30_XE 2025-04-15
Across
- Perlindungan ide kreatif disebut
- Simbol yang biasa digunakan untuk menunjukkan hak cipta.
- Analis yang mengelola data dan memvisualisasikannya.
- Kata kunci untuk menghilangkan hasil yang mengandung kata tertentu.
- Hak paten biasanya diberikan untuk penemuan ....
- Upaya mengecek kebenaran informasi disebut
- Konten negatif di internet disebut juga konten
- Orang yang membuat perangkat lunak disebut
- Simbol yang digunakan untuk pencarian wildcard.
- aplikasi untuk membuat desain konten visual.
- Profesi yang bekerja menjaga keamanan sistem komputer.
Down
- Mesin pencari paling populer di dunia.
- Orang yang mendesain tampilan aplikasi disebut
- Simbol atau lambang budaya daerah disebut juga
- aplikasi untuk mengupload konten video singkat
- Informasi bohong yang disebar disebut
- Singkatan dari Hak Atas Kekayaan Intelektual.
- Media digital yang sering dipakai untuk menyampaikan budaya lewat video.
- Aplikasi untuk memeriksa kebenaran berita.
- Platform media sosial yang sering menjadi sumber hoaks.
- Proses menyebarkan konten digital ke publik.
- Unsur lokal yang disisipkan dalam konten disebut unsur
- Sintaks untuk mencari frasa persis dalam tanda kutip.
- Pengembang aplikasi Android disebut juga .... developer.
- Operator untuk mencari di situs tertentu
- Hak eksklusif untuk pencipta lagu termasuk dalam hak
26 Clues: Perlindungan ide kreatif disebut • Informasi bohong yang disebar disebut • Mesin pencari paling populer di dunia. • Operator untuk mencari di situs tertentu • Aplikasi untuk memeriksa kebenaran berita. • Upaya mengecek kebenaran informasi disebut • Orang yang membuat perangkat lunak disebut • Proses menyebarkan konten digital ke publik. • ...
Cello X-E 22 2025-04-15
Across
- Organisasi yang mengurusi pendaftaran paten di Indonesia
- Simbol yang digunakan untuk mengecualikan kata dalam pencarian
- Sumber informasi yang dapat dipercaya
- Hak untuk mengontrol penggunaan konten digital
- Tindakan melaporkan konten negatif
- Orang yang ahli dalam pengembangan perangkat lunak
- Profesi yang fokus pada pemeliharaan dan perbaikan sistem komputer
- Ahli dalam kecerdasan buatan)
- ENGINEER Profesi yang membangun dan memelihara jaringan komputer
- Istilah lain untuk sintaks dalam pencarian
- Perlindungan hukum untuk penemuan baru
Down
- Target audiens dari konten digital
- Platform untuk menyebarkan video secara online
- Profesi yang merencanakan dan melaksanakan strategi pemasaran digital
- Profesi yang bertanggung jawab atas keamanan sistem komputer
- Proses memastikan kebenaran suatu konten
- PULUH Masa berlaku hak paten biasanya selama ... tahun
- Jenis HAKI untuk nama dagang dan logo
- Perintah untuk mencari file dengan tipe tertentu
- Jenis konten yang bersifat merugikan atau berbahaya
- Mesin pencari paling populer saat ini
- Karya cipta dalam bentuk digital
- Cara menyampaikan pesan budaya melalui media digital
- Simbol untuk hak cipta
- Penggunaan tanda kutip ganda untuk mencari frasa yang ....
25 Clues: Simbol untuk hak cipta • Ahli dalam kecerdasan buatan) • Karya cipta dalam bentuk digital • Target audiens dari konten digital • Tindakan melaporkan konten negatif • Sumber informasi yang dapat dipercaya • Jenis HAKI untuk nama dagang dan logo • Mesin pencari paling populer saat ini • Perlindungan hukum untuk penemuan baru • Proses memastikan kebenaran suatu konten • ...
Browsing Safely 2025-05-24
Across
- illegal entry into a computer system or network
- act of harassing using Information technology in a deliberate manner
- our daily lives now rely on information and communication technology
- type of malicious software
- popular anti-virus software
- use to conduct terrorism through computers and internet.
- stands for one-time password
- stands for Vital Information Resources Under Seize
- malicious software
- computer program designed to remove Virus from a computer
- the receiver of a message is fooled by sending bogus messages
Down
- collection of technologies,processes and practices designed to protect networks,computers etc.
- impression you create when you engage in various online activities
- criminal activity intended to harm someone using computer and internet connection
- stands for Denial of Service attack
- process of befriending children on social media to facilitate online or physical abuse
- also known as unethical hackers
- act of sending an email to a user misleading him to believe that it is a trusted person or organization
- crime in which the victim is attacked first
- software that helps in preventing unauthorized access to your computer
20 Clues: malicious software • type of malicious software • popular anti-virus software • stands for one-time password • also known as unethical hackers • stands for Denial of Service attack • crime in which the victim is attacked first • illegal entry into a computer system or network • stands for Vital Information Resources Under Seize • ...
Computer Vocabulary 2025-01-24
Across
- The "brain" of the computer.
- A common interface for connecting devices.
- Data entered into a computer.
- Temporary memory for active processes.
- A structured collection of data.
- System: Software managing computer hardware and software.
- A unit of digital information.
- Data produced by a computer.
- The smallest unit of a digital image.
- A collection of data stored on a computer.
- Programs that tell the computer what to do.
- Software for accessing websites.
- Physical parts of a computer.
- Malicious software.
- A quick way to access a file or program.
- Online storage for data.
- Device that creates physical copies of documents.
Down
- Used to input text into a computer.
- Displays the visual output from a computer.
- A program to organize data in rows and columns.
- Fixing errors in code.
- Security system for computers.
- A set of instructions for solving a problem.
- Converting data into a secure format.
- Used to organize files.
- The address of a website.
- Protecting computer systems and networks.
- Electronic communication.
- A group of connected computers.
- Writing instructions for a computer.
30 Clues: Malicious software. • Fixing errors in code. • Used to organize files. • Online storage for data. • The address of a website. • Electronic communication. • The "brain" of the computer. • Data produced by a computer. • Data entered into a computer. • Physical parts of a computer. • Security system for computers. • A unit of digital information. • A group of connected computers. • ...
CTF-CW4 2025-11-14
Across
- The before-pic of your cybersecurity fitness journey
- The grown-ups table for company decisions
- The “ctrl+z” for disasters
- The set of powers (like access, erase) given to a person under privacy laws
- “Don’t do this” in formal writing
- The cyber-beehive buzzing with clues
- Fortune-teller’s favorite word
- The “red flags” in the cyber crime scene
- AI method: models train locally so raw data stays put
- At Tekion, say “LUMOS!” to light up your software requests.
- The fire drill script for hackers
- Every Tekion deploy “leaps” through this pond!
Down
- To strip removed details linking data back to real people
- Digital “pinkie promise” you can’t break
- Making secrets so secret even you forget them
- When your diary writes in code
- Keeping receipts for your servers
- The goal algorithms treat people equally, not favoring some over others
- At Tekion, if you need software access, this smart gatekeeper lights the way—no magic wand required!
- Ethical hackers playing hide-and-seek in your network
20 Clues: The “ctrl+z” for disasters • When your diary writes in code • Fortune-teller’s favorite word • Keeping receipts for your servers • “Don’t do this” in formal writing • The fire drill script for hackers • The cyber-beehive buzzing with clues • Digital “pinkie promise” you can’t break • The “red flags” in the cyber crime scene • The grown-ups table for company decisions • ...
4424 2024-04-05
Across
- New K-State guard from Michigan.
- K-State requires all students to complete _____ training by April 30.
- The College of Modern Language is encouraging _____ to its students.
- _____ Songs of Spring to listen to this season.
Down
- The Aggieville _____ brings in hundreds of cattle to Manhattan this weekend.
- A new _____ light master plan will make Manhattan roads safer.
- Had four RBI against Missouri State.
- Carla Bernat skyrocketed to tied-23rd to make the Saturday _____ at Augusta National Women’s Amateur.
- K-State baseball faces off against No. 25 ____, starting Friday.
- Campus Compass: _____ Counseling and Psychological Services offers therapists, therapy programs and more to support students.
10 Clues: New K-State guard from Michigan. • Had four RBI against Missouri State. • _____ Songs of Spring to listen to this season. • A new _____ light master plan will make Manhattan roads safer. • K-State baseball faces off against No. 25 ____, starting Friday. • The College of Modern Language is encouraging _____ to its students. • ...
Crucigrama: Estándares de Auditoría 2024-08-17
Across
- Estándar de seguridad de datos para proteger las transacciones con tarjetas de pago.
- Ley de EE. UU. que establece estándares para la contabilidad y la auditoría.
- Marco para la gestión del riesgo y el control interno.
- Norma para la gestión de la continuidad del negocio.
- Publica el Cybersecurity Framework, un marco para mejorar la ciberseguridad.
- Ley de EE. UU. para la protección de la información médica.
Down
- Reglamento europeo para la protección de datos personales.
- Un estándar internacional para la gestión de la seguridad de la información.
- Marco de referencia para la gobernanza y gestión de TI.
- Conjunto de prácticas para la gestión de servicios de TI.
10 Clues: Norma para la gestión de la continuidad del negocio. • Marco para la gestión del riesgo y el control interno. • Marco de referencia para la gobernanza y gestión de TI. • Conjunto de prácticas para la gestión de servicios de TI. • Reglamento europeo para la protección de datos personales. • Ley de EE. UU. para la protección de la información médica. • ...
PROS AND CONS OF “INTEGRATING AI INTO INDUSTRIAL S AFETY” 2025-03-15
Across
- A structured approach for managing cybersecurity risks is provided by which institute? (4)
- AI-driven training method that mimics emergency situations (10)
- Employees leaving jobs due to frustration is called ______ quitting (7)
- AI may reduce human capacity to retain information, impacting human _____ (6)
Down
- Type of analytics that can foresee equipment issues (10)
- AI can predict this type of equipment failure reducing downtime (11)
- AI's continuous monitoring helps in adherence to safety _______. (9)
- Type of inspections conducted systematically to follow up on known issues and identify new ones (7)
- Acronym for Personal Protective Equipment (3)
- Acronym for the process for proactively identifying potential workplace hazards
10 Clues: Acronym for Personal Protective Equipment (3) • Type of analytics that can foresee equipment issues (10) • AI-driven training method that mimics emergency situations (10) • AI can predict this type of equipment failure reducing downtime (11) • AI's continuous monitoring helps in adherence to safety _______. (9) • ...
PROFESI TKJ 2025-02-21
Across
- Komputer Profesional yang bertugas memperbaiki dan merawat perangkat keras komputer
- Pakar yang bertugas menjaga keamanan data dan sistem dari serangan siber
- Orang yang mengelola dan mengamankan basis data dalam suatu sistem komputer
- Profesional yang membuat dan mengembangkan situs web
Down
- Orang yang bertanggung jawab mengelola dan mengamankan jaringan komputer
- Pengusaha di bidang teknologi yang mengembangkan produk atau layanan berbasis digital
- Profesi yang menulis dan mengembangkan perangkat lunak menggunakan berbagai bahasa pemrograman
- Ahli yang bekerja dengan teknologi komputasi awan untuk menyimpan dan mengelola data
- Pekerjaan yang membantu pengguna dalam mengatasi masalah teknis pada perangkat komputer
- Profesional yang menggabungkan pengembangan perangkat lunak dan operasional IT untuk efisiensi sistem
10 Clues: Profesional yang membuat dan mengembangkan situs web • Orang yang bertanggung jawab mengelola dan mengamankan jaringan komputer • Pakar yang bertugas menjaga keamanan data dan sistem dari serangan siber • Orang yang mengelola dan mengamankan basis data dalam suatu sistem komputer • ...
GRID-GENIUS 3 2024-11-26
Across
- An error that occurs when a calculation exceeds the storage capacity.
- A condition where excessive paging reduces system performance.
- A step-by-step procedure for solving a problem or performing a task.
- The practice of protecting systems, networks, and programs from digital attacks.
- A linear data structure that follows the First-In-First-Out (FIFO) principle.
- A device or software that distributes network traffic across multiple servers.
Down
- The study of meaning in programming languages.
- A network security device that monitors and controls incoming and outgoing traffic.
- Non-volatile memory used to store firmware.
- A sequence of characters used as a unit in parsing.
10 Clues: Non-volatile memory used to store firmware. • The study of meaning in programming languages. • A sequence of characters used as a unit in parsing. • A condition where excessive paging reduces system performance. • A step-by-step procedure for solving a problem or performing a task. • An error that occurs when a calculation exceeds the storage capacity. • ...
cyb 2024-12-05
Across
- A network that encrypts your internet connection
- This type of Wi-Fi should be used cautiously
- An extra layer of security requiring two or more verification methods
- The practice of protecting systems, networks, and programs from digital attacks
- A program that detects and removes malicious software
Down
- A malicious software designed to harm or exploit any programmable device
- The process of converting information or data into a code to prevent unauthorized access
- Software updates often include these to fix security vulnerabilities
- A mix of letters, numbers, and special characters makes a strong one
- A type of cyber attack that tricks individuals into providing sensitive information
10 Clues: This type of Wi-Fi should be used cautiously • A network that encrypts your internet connection • A program that detects and removes malicious software • Software updates often include these to fix security vulnerabilities • A mix of letters, numbers, and special characters makes a strong one • An extra layer of security requiring two or more verification methods • ...
FITAVocab.ss 2013-05-15
Across
- blank work space
- ex: Angry Birds
- credit
- uses 1s and 0s to transmit info
- optical, mechanical, touch pad
- ex: Comcast
- internet
- behavior online
- accessible on any computer
- pamphlet
- a saying or group of words representing a business, store, etc.
- circuit board
- ex: Dogpile and Mamma
- a promise new presidents take
- an arrangement, how it looks
Down
- 1000 megabytes
- CPU, how fast it is
- flash drive plugin
- ex: Google and Bing
- the arrangement of data
- 1000 bytes
- similar to powerpoint
- gaming ports
- an image representing a business, store, etc.
- security/protection online
- to make sure no one takes/copies your work
- a character
- 1000 gigabytes
- ex: phone
- a formal introduction into office
- RAM
- safety online
- headphone plugin
- flash drive
- DSL, Cable
- who, what, why
- a port to plug in an internet cable
- ex: mouse and keyboard
- mobile storage
- 1000 kilobytes
- online
- 3G and 4G are options
- pre-made document to fill in
- ex: printer
- 8 bits
45 Clues: RAM • credit • online • 8 bits • internet • pamphlet • ex: phone • 1000 bytes • DSL, Cable • a character • ex: Comcast • flash drive • ex: printer • gaming ports • safety online • circuit board • 1000 megabytes • 1000 gigabytes • who, what, why • mobile storage • 1000 kilobytes • ex: Angry Birds • behavior online • blank work space • headphone plugin • flash drive plugin • CPU, how fast it is • ex: Google and Bing • ...
ADSI Laura Pinzon 2022-05-05
Across
- A person who will use the information system.
- The varchar, int, float and are called.
- It is the protection of information on a computer.
- An object or thing.
- It is a set of organized data, whose function is to convey a message.
- The physical parts of an information system.
- A set of elements with relationships with each other.
- Uniquely identifies each row in a table.
Down
- These are relationships between tables that match data.
- It is in charge of having relationships between tables by means of a key.
- Is used to delete a database.
- The characteristics of an object.
- It is a set of activities that are carried out to reach an objective.
- It is realized in tables with their keys and relationships.
- It is performed to know the characteristics or the current state of something.
- It is responsible for storing information.
- A set of programs and routines that allow the computer to perform certain tasks.
- It is the graphic part of web design.
- Used to create a database.
- A symbolic representation of an attribute or variable.
20 Clues: An object or thing. • Used to create a database. • Is used to delete a database. • The characteristics of an object. • It is the graphic part of web design. • The varchar, int, float and are called. • Uniquely identifies each row in a table. • It is responsible for storing information. • The physical parts of an information system. • ...
TTS INFORMATIKA 2025-04-10
Across
- Operator pencarian untuk hasil yang mengandung kedua kata
- Mesin pencari paling populer saat ini
- Kata kunci untuk mencari informasi di internet
- Proses memeriksa fakta untuk melawan hoaks
- Proses memastikan kebenaran suatu informasi
- Orang yang membuat program komputer
- Salah satu bentuk konten negatif yang menyerang pribadi
- Unsur khas yang mencerminkan identitas suatu daerah
- Ahli jaringan komputer
- Fitur pencarian untuk menemukan situs dengan kata di dalam judul
- Penyebaran informasi palsu di internet
- Profesi yang menganalisis dan mengolah data
- Hak eksklusif untuk menggunakan ciptaan secara komersial
- File berisi teks, gambar, atau video yang dibuat untuk dibagikan
Down
- Pengembang aplikasi untuk perangkat seluler
- Konten yang dibuat dan disebarluaskan melalui media digital
- Perlindungan hukum atas karya cipta seseorang
- Profesi yang fokus pada keamanan sistem komputer
- Platform berbagi video populer untuk menyebarkan konten
- Simbol yang biasa dipakai untuk hak cipta
- Konten yang mengandung ujaran kebencian atau hoaks
- Simbol yang digunakan untuk mencocokkan banyak karakter
- Singkatan dari Hak Atas Kekayaan Intelektual
- Proses penyebaran informasi ke publik
- Salah satu jenis HAKI untuk produk industri
25 Clues: Ahli jaringan komputer • Orang yang membuat program komputer • Proses penyebaran informasi ke publik • Penyebaran informasi palsu di internet • Mesin pencari paling populer saat ini • Simbol yang biasa dipakai untuk hak cipta • Proses memeriksa fakta untuk melawan hoaks • Pengembang aplikasi untuk perangkat seluler • Proses memastikan kebenaran suatu informasi • ...
TTS INFORMATIKA 2025-04-10
Across
- Orang yang menulis kode program.
- Contoh mesin pencari paling terkenal.
- Kutip Tanda yang digunakan untuk mencari frasa persis.
- Hak melindungi ciptaan dari penyalinan.
- Operator untuk mengecualikan kata dalam hasil pencarian.
- dengan Tanda yang digunakan untuk mengawali rumus.
- Program untuk mengolah angka.
- Informasi palsu yang menyesatkan.
- Designer Ahli yang membuat desain antarmuka aplikasi.
- Proses menyebarluaskan konten digital.
- Orang yang mengelola jaringan komputer.
- Unsur budaya dalam konten digital.
- Fungsi untuk menjumlahkan di Excel.
- Lembaga yang mengurus HAKI di Indonesia.
- Lembaga pemerintah pengawas konten digital.
Down
- Upaya untuk menyaring informasi berbahaya.
- Sel tempat pertemuan kolom dan baris.
- Konten yang mengandung unsur kekerasan atau pornografi.
- Analyst Orang yang menganalisis dan mengolah data.
- Platform populer berbagi video.
- Pelanggaran dengan menyalin karya orang lain.
- Operator untuk pencarian kata yang wajib ada dalam hasil pencarian.
- Hak eksklusif untuk sebuah merek.
- Ahli yang menjaga keamanan sistem.
- Simbol untuk mencari variasi dari sebuah kata.
- Media visual untuk menyampaikan informasi.
- File Excel disimpan dengan ekstensi.
- Proses memeriksa kebenaran informasi.
- Hak khusus atas penemuan teknologi baru.
- Proses pembuatan konten disebut.
30 Clues: Program untuk mengolah angka. • Platform populer berbagi video. • Orang yang menulis kode program. • Proses pembuatan konten disebut. • Hak eksklusif untuk sebuah merek. • Informasi palsu yang menyesatkan. • Ahli yang menjaga keamanan sistem. • Unsur budaya dalam konten digital. • Fungsi untuk menjumlahkan di Excel. • File Excel disimpan dengan ekstensi. • ...
TTS INFORMATIKA 2025-04-10
Across
- Apa kepanjangan dari HAKI?
- Apa yang dimaksud dengan hak cipta?
- Apa fungsi operator "OR" dalam pencarian?
- Apa peran seorang administrator jaringan?
- Bagaimana cara mempromosikan konten digital budaya secara efektif?
- Apa dampak dari penyebaran konten negatif?
- Bagaimana cara mengecualikan kata tertentu dalam pencarian?
- Apa keahlian yang dibutuhkan seorang "cybersecurity specialist"?
- Sebutkan salah satu profesi di bidang informatika.
- Apa tugas seorang analis sistem?
- Sebutkan salah satu jenis HAKI.
- Apa pentingnya memasukkan unsur budaya dalam konten digital?
- Bagaimana cara melaporkan konten negatif di media sosial?
- Apa yang dimaksud dengan konten negatif?
- Apa yang dimaksud dengan "data scientist"?
Down
- Sebutkan salah satu contoh konten digital yang memasukkan unsur budaya.
- Apa tantangan dalam memproduksi konten digital budaya?
- Bagaimana cara mendaftarkan hak paten?
- Apa fungsi operator "site:" dalam pencarian?
- Bagaimana cara melestarikan budaya melalui konten digital?
- Bagaimana cara mencari file dengan jenis tertentu, misalnya PDF?
- Apa operator pencarian yang digunakan untuk mencari frasa yang tepat?
- Apa tujuan dari perlindungan HAKI?
- Bagaimana cara memvalidasi kebenaran konten di internet?
- Sebutkan salah satu contoh konten negatif.
25 Clues: Apa kepanjangan dari HAKI? • Sebutkan salah satu jenis HAKI. • Apa tugas seorang analis sistem? • Apa tujuan dari perlindungan HAKI? • Apa yang dimaksud dengan hak cipta? • Bagaimana cara mendaftarkan hak paten? • Apa yang dimaksud dengan konten negatif? • Apa fungsi operator "OR" dalam pencarian? • Apa peran seorang administrator jaringan? • ...
RU ITEC411: Crime and Security. 2024-11-25
Across
- Traveling to sue under strict libel laws in certain countries.
- Malicious software designed to gather user information without consent.
- The process of encoding information to prevent unauthorized access.
- Denial-of-service attack that disrupts online services.
- The use of someone else's personal information for fraud
- A security tool used to filter and monitor network traffic.
- Using hacking to promote a political cause.
- Phishing attacks carried out via voice calls.
- Fraudulent attempts to obtain sensitive information via email.
- Hackers who improve system security by identifying vulnerabilities.
- A security tool to lure and study hackers.
Down
- Security measures using unique biological characteristics
- Measures taken to protect computer systems from cyber attacks.
- A sophisticated worm that targeted Iranian nuclear facilities
- Manipulating individuals to divulge confidential information.
- An organization that addresses trade agreements, including cross-border digital issues.
- Phishing attacks carried out via SMS.
- The Computer Fraud and Abuse Act that criminalizes unauthorized computer access.
- Unauthorized access to or manipulation of computer systems.
- Redirecting users to fraudulent websites to steal personal data.
20 Clues: Phishing attacks carried out via SMS. • A security tool to lure and study hackers. • Using hacking to promote a political cause. • Phishing attacks carried out via voice calls. • Denial-of-service attack that disrupts online services. • The use of someone else's personal information for fraud • Security measures using unique biological characteristics • ...
GS December 2024 2024-11-25
Across
- A relaxing practice to improve sleep and physical health.
- Essential for maintaining physical health in retirement.
- An activity that keeps the mind sharp in retirement.
- A phase of life after ending full-time work.
- A common sleep issue involving difficulty falling or staying asleep.
- Measures like two-factor authentication to stay safe online.
- A critical aspect of managing pensions and avoiding scams.
- A tool that enhances connectivity, convenience, and health.
- A way for retirees to share knowledge and give back.
- Activities like painting or gardening that retirees can explore.
Down
- Platforms like Facebook that help retirees stay connected.
- Fraudulent schemes that retirees need to watch out for.
- What retirees maintain through communication apps and social media.
- An online service to manage finances securely in retirement.
- The type of learning that keeps retirees engaged and curious.
- A financial tool that supports a dignified retirement.
- Holistic health, including mental and physical well-being.
- An area supported by apps like fitness trackers or telemedicine.
- Something to safeguard while using social media.
- Essential for energy and well-being during retirement.
20 Clues: A phase of life after ending full-time work. • Something to safeguard while using social media. • An activity that keeps the mind sharp in retirement. • A way for retirees to share knowledge and give back. • A financial tool that supports a dignified retirement. • Essential for energy and well-being during retirement. • ...
PC. 2025-09-03
Across
- Malicious software designed to harm or exploit any device.
- A wireless networking technology.
- The physical components of a computer.
- A person who uses computers to gain unauthorized access to data.
- A device that forwards data packets between computer networks.
- A device that displays visual output from a computer.
- The practice of protecting systems, networks, and programs from digital attacks.
- A small piece of data sent from a website and stored on the user's computer.
- A machine that performs tasks according to a set of instructions.
- A global network connecting millions of computers.
Down
- A security system that controls incoming and outgoing network traffic.
- A storage medium that uses flash memory.
- A portable computer.
- A collection of data stored in a structured way.
- Temporary memory that a computer uses to store data for quick access.
- An input device used to type text and commands.
- The process of converting data into a code to prevent unauthorized access.
- The brain of the computer that processes instructions.
- A set of instructions that tells the hardware what to do.
- The process of starting a computer.
20 Clues: A portable computer. • A wireless networking technology. • The process of starting a computer. • The physical components of a computer. • A storage medium that uses flash memory. • An input device used to type text and commands. • A collection of data stored in a structured way. • A global network connecting millions of computers. • ...
Career Awareness Crossword puzzle – Session Activity 2025-09-14
Across
- Protects national security and gathers intelligence
- Designing buildings or urban spaces
- Study of planets, stars, and galaxies
- Design and use of machines to automate tasks
- Promoting products online using social media and analytics
- Elected leader of a state or country
- Field that overlaps with AI & ML, involving programming
- Helps patients through diagnosis and treatment
- Performs in theatre, television, or films
- Telling stories in newspapers, magazines, or online
- Guides and educates students in schools or colleges
Down
- Creates movies, documentaries, or videos
- Application of biology and technology to improve life (Biotechnology)
- Someone who starts a business, taking risks for profit
- Oversees visual style in media, advertising, or film
- Designs and codes interactive entertainment
- Career in helping patients through mental health guidance
- Study and practice of law and justice
- Protecting computers and networks from attacks
- Using technology in financial services
- Officer who maintains law and order
- Discovers new knowledge by experiments and investigation
- Using numbers to uncover insights from information
- (AI & ML) Creating intelligent systems that learn from data
- Creates music or soundtracks professionally
25 Clues: Designing buildings or urban spaces • Officer who maintains law and order • Elected leader of a state or country • Study and practice of law and justice • Study of planets, stars, and galaxies • Using technology in financial services • Creates movies, documentaries, or videos • Performs in theatre, television, or films • Designs and codes interactive entertainment • ...
Can you do this crossword? 2025-10-17
Across
- The moral principles guiding responsible AI use
- The branch of technology that deals with the design, construction, operation, and application of robots
- OpenAI's language model capable of generating human-like text
- The organ AI is often compared to
Down
- The name used for the set of instructions that tells a computer how to execute certain tasks
- Protection against unauthorized access to AI systems and data
- Information used by AI to learn and make decisions
- Instruction given to an AI model to generate a response
8 Clues: The organ AI is often compared to • The moral principles guiding responsible AI use • Information used by AI to learn and make decisions • Instruction given to an AI model to generate a response • Protection against unauthorized access to AI systems and data • OpenAI's language model capable of generating human-like text • ...
test 2022-07-15
Across
- Year they met -
- On the way to Big Sur they stopped at an ___ farm -
- European country michael lived in -
- City they will live in after the wedding -
- City of the music festival they attended -
- Sammi’s side hustle -
- City they took their engagement photos -
- Destination of first plane ride together -
- Amusement park they had annual passes to -
- How they met
- Sammis bridal shower was a ___ party -
- Location of their first post together on IG -
- Industry sammi works in -
Down
- Music festival they attended -
- Michael proposed in ___ beach -
- Color of michaels bathroom before they painted it -
- Type of engineer Michael is -
- City sammi did her internship in -
- How we are honoring sammis dad at the wedding -
- Type of dance sammi did growing up -
- State michael was raised in -
- Basketball team michael supports -
- Attends ___ ___ community church -
- Where they ate on their first date -
- Sauce michael hates -
- Brand of sammi’s car -
- Engagement ring shape -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Month they met -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Sammis favorite flowers - • Industry sammi works in - • Type of engineer Michael is - • State michael was raised in - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
test 2022-07-15
Across
- How we are honoring sammis dad at the wedding -
- Sammis bridal shower was a ___ party -
- Engagement ring shape -
- Music festival they attended -
- Sauce michael hates -
- City sammi did her internship in -
- Day of the week they attend life group -
- Sammi’s side hustle -
- Basketball team michael supports -
- Location of their first post together on IG -
- Type of engineer Michael is -
- Brand of sammi’s car -
- Where they ate on their first date -
- Year they met -
- Michael proposed in ___ beach -
- Month they met -
Down
- Amusement park they had annual passes to -
- European country michael lived in -
- Destination of first plane ride together -
- On the way to Big Sur they stopped at an ___ farm -
- Color of michaels bathroom before they painted it -
- State michael was raised in -
- Industry sammi works in -
- City they will live in after the wedding -
- City they took their engagement photos -
- Type of dance sammi did growing up -
- How they met
- Attends ___ ___ community church -
- Sammis favorite flowers -
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sauce michael hates - • Sammi’s side hustle - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Ryan & Allison 2023-01-01
Across
- Ryan's age
- You could bribe Ryan with (state)
- High School Ryan graduated from
- Where they got engaged
- City Allison grew up in
- Where they met
- College Ryan & Allison attended
- Years they've been together
- Allison's favorite dessert
- Ryan's Middle Name
- Allison's profession
- Ryan's Zodiac Sign
- Number of nephews
- Allison's Mother's name
- Allison's first job
- First concert they went to together
- Number of Neices
- City Ryan grew up in
- Allison's eye color
- Allison's Dad's name
Down
- Ryan's profession
- Ryan's favorite color
- Month they got engaged
- Furthest state they have visited together
- Allison's biggest fear
- Job they worked together
- Highschool Allison graduated from
- Allison's Zodiac Sign
- You could bribe Allison with
- Ryan's favorite genre of movies or books
- They each have ____ sister(s)
- Ryan's Dad's name
- Ryan's Mother's Name
- Allison's age
- Brand of car Ryan has
- Ryan's favorite outdoor activity
- Ryan's eye color
- Ryan's favorite Indian dish
- Ryan & Allison Dog
- First out-of-state trip together
- Allison's Middle Name
41 Clues: Ryan's age • Allison's age • Where they met • Ryan's eye color • Number of Neices • Ryan's profession • Ryan's Dad's name • Number of nephews • Ryan's Middle Name • Ryan's Zodiac Sign • Ryan & Allison Dog • Allison's first job • Allison's eye color • Allison's profession • Ryan's Mother's Name • City Ryan grew up in • Allison's Dad's name • Ryan's favorite color • Allison's Zodiac Sign • ...
FIT E: A Lot O Words 2013-05-16
Across
- 1,000 petabytes
- 1,000 zetabytes
- catchy phrase for a business
- cpu
- 1,000 yottabytes
- lcd
- 1,000 megabytes
- the heart of the computer
- search engine that uses other search engines for their results
- place where the mother board is
- mouse or flashdrive
- your protection from hackers online
- isp
- printer or monitor
- smallest unit data
- portable storage for files and documents
- port where you connect the ethernet cable
- screen
- 1,000 bytes
Down
- angry birds or temple run
- behavior online
- 1,000 gigabytes
- 1,000 brontobytes
- ncsa
- to start up
- 1,000 exabytes
- 3g and 4g
- zoomable online presentation
- 1,000 kilobytes
- 8 bits
- led
- word
- 1,000 terabytes
- ram
- phone
- three types: optical, mechanical, and touch pad
- used to improve or add on to a game played on computers
- who what why
- the system that operates the computer
- dsl and cable
- port where you connect your flashdrive
- google or yahoo
- your privacy online
- wireless internet access
- nike swoosh
45 Clues: cpu • led • lcd • ram • isp • ncsa • word • phone • 8 bits • screen • 3g and 4g • to start up • nike swoosh • 1,000 bytes • who what why • dsl and cable • 1,000 exabytes • behavior online • 1,000 gigabytes • 1,000 petabytes • 1,000 zetabytes • 1,000 kilobytes • 1,000 terabytes • 1,000 megabytes • google or yahoo • 1,000 yottabytes • 1,000 brontobytes • printer or monitor • smallest unit data • mouse or flashdrive • your privacy online • ...
Computer Apps Review 2022-05-02
Across
- what google app would you use to make a survey
- What are the google doc margins
- The main part of an email is called the ___.
- When you steal someone else's work it is called _____
- What is mrs.brughorns favorite font?
- what google app would you use to make a website
- A google app that gives you directions to a location
- How do you sight your sources in a google doc?
- You use this to use google
Down
- We use cybersecurity to protect us from___
- what google app would you use to make a presentation
- _____ docs
- The school issues you this at the beginning of the year
- An app to make videos
- what google app would you use to write an essay
- Where does all the work you do on a google app go?
- When wringing an email you need to have ______ etiquette
- _______ is a type of essay format
- This google app can help with math.
- When sending an email the ___ line tells the receiver what the email is about
20 Clues: _____ docs • An app to make videos • You use this to use google • What are the google doc margins • _______ is a type of essay format • This google app can help with math. • What is mrs.brughorns favorite font? • We use cybersecurity to protect us from___ • The main part of an email is called the ___. • what google app would you use to make a survey • ...
RASYA ADELIA PUTRI 2025-04-10
Across
- Pelanggaran haki yang sering terjadi di internet
- Contoh konten budaya berupa cerita rakyat
- Bentuk perlindungan karya seperti musik dan film
- Lembaga yang menangani konten negatif di internet
- Seni tradisional indonesia yang bisa di jadikan konten digital
- Nilai yang harus di jaga saat membuat konten budaya
- Profesi yang menganalisis data digital
- Mesin pencari paling populer.
- Profesi yang menjaga keamanan sistem komputer
- Sintaks untuk mencari di situs tertentu.
- Orang yang membuat program komputer
- Informasi yang tidak benar dan menyesatkan
- Proses memeriksa kebenaran informasi digital
Down
- Pekerjaan yang fokus pada jaringan komputer
- Hak untuk menggunakan simbol, logo, atau nama dagang
- Konten yang mengandung kekerasan atau kebencian
- Perlindungan terhadap temuan atau inovasi teknologi
- Simbol untuk mengecualikan kata saat pencarian.
- Hak untuk melindungi hasil ciptaan digital
- Kata kunci dalam tanda kutip digunakan untuk hasil lebih.
- Orang yang merancang tampilan web atau aplikasi
- Sintaks untuk mencari jenis file tertentu.
- Platform untuk menyebarkan video budaya
- Proses membuat dan menyebarluaskan informasi melalui media digital
- Cara mencegah informasi palsu
25 Clues: Mesin pencari paling populer. • Cara mencegah informasi palsu • Orang yang membuat program komputer • Profesi yang menganalisis data digital • Platform untuk menyebarkan video budaya • Sintaks untuk mencari di situs tertentu. • Contoh konten budaya berupa cerita rakyat • Hak untuk melindungi hasil ciptaan digital • Informasi yang tidak benar dan menyesatkan • ...
Computer Virus 2024-07-01
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
Compliance 2021-10-29
Across
- Intimidation of an individual after reporting an allegation of misconduct.
- A situation in which a person is in a position to derive personal benefit from actions or decisions made in their official capacity
- Wrongful or criminal deception intended to result in financial or personal gain
- A direct telephone line set up for a specific purpose.
- Unacceptable or improper behavior.
Down
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
- Computer security.
- An official inspection of an individual's or organization's accounts.
- A situation that poses an immediate risk to health, life, property, or environment.
- A situation involving exposure to danger.
10 Clues: Computer security. • Unacceptable or improper behavior. • A situation involving exposure to danger. • A direct telephone line set up for a specific purpose. • An official inspection of an individual's or organization's accounts. • Intimidation of an individual after reporting an allegation of misconduct. • ...
Risk Culture Awareness 2022-01-18
Across
- your ability and willingness to stomach a decline in the value of your investments.
- chance of something happening
- the elimination of hazards, activities and exposures that can negatively affect an organization and its assets
- represents the third line
- you are part of this line
Down
- risk of loss resulting from ineffective or failed internal processes, people, systems
- not part of operational risk
- there are three lines of them
- reputational harm stemming from a cyberattack or breach within an organization's network
- level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
10 Clues: represents the third line • you are part of this line • not part of operational risk • chance of something happening • there are three lines of them • your ability and willingness to stomach a decline in the value of your investments. • risk of loss resulting from ineffective or failed internal processes, people, systems • ...
Jaringan komputer dan internet 2024-01-12
Across
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya .
- perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumberdaya satusama lain.
- berkaitan dengan aspek yang menentukan kualitas dari sistem informasi
- berasal dari dua kata dalam bahasa Inggris yakni cyber yang artinya dunia maya (internet) dan security yang artinya keamanan
- transmisi data terstruktur antar organisasi secara elektronis.
Down
- metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis.
- ada 7 lapisan
- memungkinkan aplikasi menyesuaikan setelan keamanan jaringannya dalam file konfigurasi deklaratif yang aman tanpa memodifikasi kode aplikasi.
- Open Systems Interconnection
- salah satu Perangkat Koneksi
10 Clues: ada 7 lapisan • Open Systems Interconnection • salah satu Perangkat Koneksi • transmisi data terstruktur antar organisasi secara elektronis. • berkaitan dengan aspek yang menentukan kualitas dari sistem informasi • metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya . • ...
IT 2025-01-12
Across
- – Technology that allows machines to think and learn like humans.
- – A computer-generated world you can experience, often with special glasses.
- – Fixing errors or bugs in code to make programs work correctly.
- – Protecting computers, networks, and data from unauthorized access.
Down
- – The software that manages a computer’s hardware and applications.
- – The amount of data that can be sent or received in a network at one time.
- – Software designed to harm or steal information from your computer.
- – A powerful computer that provides data or resources to other computers.
- – Writing instructions for computers to create software or apps.
- – A way to protect information by turning it into a secret code.
10 Clues: – Fixing errors or bugs in code to make programs work correctly. • – Writing instructions for computers to create software or apps. • – A way to protect information by turning it into a secret code. • – Technology that allows machines to think and learn like humans. • – The software that manages a computer’s hardware and applications. • ...
Resolving Conflict and Building Peace 2021-04-19
Across
- The building of strong and positive relationships between countries in order to maintain peace and prevent conflicts from occurring
- The practice of protecting computers, mobile devices, electronic systems, networks and data from attacks
- The power or authority to rule
- to keep a careful watch for possible danger or difficulties
- The protection of something from harm
- In a pleasant and friendly way
Down
- To be able to understand how someone feels
- Discussing an issue in order to find a solution that is acceptable to all
- The intentional use of force or violence by individuals or groups to cause fear and intimidate others
- A disagreement between two or more parties
- To find a solution to a problem or disagreement
11 Clues: The power or authority to rule • In a pleasant and friendly way • The protection of something from harm • To be able to understand how someone feels • A disagreement between two or more parties • To find a solution to a problem or disagreement • to keep a careful watch for possible danger or difficulties • ...
Digital system & Computer science 2022 2022-10-18
Across
- software that collectes information on a computer without the user knowing about it
- protection of systems and datas on computer sciences
- web language used to build web pages and executed client side
- measure of the amount of data that can be transfered on a network
- the default or front page of a web site
- site like ecosia or google used to find information on the internet
Down
- said of the network used at home or in a small company
- a group or system of interconnected devices or people
- to put programs or inforamtion from a computer to the internet
- a connection without cables
10 Clues: a connection without cables • the default or front page of a web site • protection of systems and datas on computer sciences • a group or system of interconnected devices or people • said of the network used at home or in a small company • web language used to build web pages and executed client side • to put programs or inforamtion from a computer to the internet • ...
Social media scams! Identify! 2021-08-11
Across
- pretending to be someone else online.
- social media app, red, orange, yellow and purple background with a camera as its icon
- protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- examples are phishing, impersonation.
Down
- the name of this project!
- information or an opinion about an identified individual.
- online impersonators use these.
- a current medium of exchange in the form of coins and banknotes.
- goods to be bought and sold dont forget to get some on the way out!
- an app with the synonym of "Fraud" prevention. Please support our cause by downloading it thanks!
10 Clues: the name of this project! • online impersonators use these. • pretending to be someone else online. • examples are phishing, impersonation. • information or an opinion about an identified individual. • a current medium of exchange in the form of coins and banknotes. • goods to be bought and sold dont forget to get some on the way out! • ...
tentang ai runway gen 3 alpha 2024-10-30
Across
- Secara garis besar apa yang dapat di lakukan oleh Runway Gen-3 Alpha AI?
- Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna?
- Apakah Runway Gen-3 Alpha ramah?
- Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut?
- Apa yang membedakan Runway Gen-3 Alpha dari software editing video tradisional?
- Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film?
Down
- batasan atau tantangan yang dihadapi pengguna saat menggunakan Runway Gen-3 Alpha?
- Apa yang Runway Gen-3 Alpha tawarkan agar bisa disesuaikan dengan kebutuhan spesifik mereka?
- Apa itu Runway Gen-3 Alpha?
- apa perbedaan utamanya dibandingkan dengan versi sebelumnya?
10 Clues: Apa itu Runway Gen-3 Alpha? • Apakah Runway Gen-3 Alpha ramah? • apa perbedaan utamanya dibandingkan dengan versi sebelumnya? • Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna? • Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut? • Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film? • ...
Hillside Open House 2025-10-22
Across
- a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization
- Computers short term memory
- Cemetery and Mortuary Software we use at Hillside
- The first line of defense to protect our network and data
- form of social engineering and a scam where attackers deceive people into revealing sensitive information
Down
- the practice of protecting systems, networks, and data from digital attacks, damage, or unauthorized access
- CMOS Battery protects both the Bios and the
- Computers long term memory
- impersonating a legitimate source to to steal information, commit fraud, or spread malware
- The Brain of the computer
10 Clues: The Brain of the computer • Computers long term memory • Computers short term memory • CMOS Battery protects both the Bios and the • Cemetery and Mortuary Software we use at Hillside • The first line of defense to protect our network and data • impersonating a legitimate source to to steal information, commit fraud, or spread malware • ...
LMS 4 2023-02-28
Across
- Measures taken to prevent accidents and injuries in the workplace.
- The measure of how much work is accomplished in a specific amount of time.
- Measures taken to protect computer systems and networks from unauthorized access, theft, and damage.
Down
- The ability to accomplish a job with a minimum expenditure of time and effort.
- The process of creating software programs, applications, and scripts.
- The degree of excellence of something.
- A series of steps taken to achieve a particular end.
- The use of technology to perform tasks automatically or with minimal human intervention.
- An organized collection of data that can be accessed, managed, and updated.
9 Clues: The degree of excellence of something. • A series of steps taken to achieve a particular end. • Measures taken to prevent accidents and injuries in the workplace. • The process of creating software programs, applications, and scripts. • The measure of how much work is accomplished in a specific amount of time. • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Cybersecurity Crossword Puzzle 2023-10-02
8 Clues: Dark web browser. • Covert and discreet. • Malicious intrusion attempt • Adherence to laws and regulations • Potential for harm, loss, or breach. • Ability to withstand & recover from cyberattacks. • Authentication keys, often a security weak point. • Risk management strategy for financial protection
Online Safety & Cybersecurity 2025-08-08
Across
- A dishonest trick to cheat someone
- Crime using the internet or computers
- To inform about a suspicious activity online
Down
- Keeping personal info safe and confidential
- A secret word or phrase used to log in securely
- Protected from danger or harm
- Entering username and password to access something
- One-time code for secure login
8 Clues: Protected from danger or harm • One-time code for secure login • A dishonest trick to cheat someone • Crime using the internet or computers • Keeping personal info safe and confidential • To inform about a suspicious activity online • A secret word or phrase used to log in securely • Entering username and password to access something
TECHNOLOGY 2020-11-24
Across
- METHOD BY WHICH USERS ACCESS AND SAVE SOFTWARE OR OTHER FILES TO THEIR OWN COMPUTERS
- MEASURES DESIGNED TO PROTECT YOUR COMPUTER
- A CONVENTIONAL METHOD OF TRANSMITTING DATA
- A WIRELESS COMMUNICATION TECHNOLOGY INTENDED TO REPLACE CABLES
- A SOFTWARE PROGRAM THAT ALLOWS YOU TO SURF THE WEB
- A DOCUMENT SENT WITH AN EMAIL MESSAGE
- CARD A VIDEO ADAPTER
- ELECTRONIC MAIL IS A WAY OF SENDING MESSAGES OVER THE INTERNET
Down
- A SMALL PROGRAM THAT ALLOWS A PERIPHERAL DEVICE SUCH AS PRINTER OR SCANNER TO CONNECT TO YOUR PC
- TO LOAD AND INITIALISE THE OPERATING SYSTEM ON A COMPUTER
- A WEBSITE'S TEXT AND INFORMATION, AS OPPOSED TO ITS DESIGN AND STRUCTURE
- ACROBAT READER SOFTWARE THAT ALLOWS YOU TO VIEW A PDF DOCUMENT
- A SAVED LINK TO A PARTICULAR WEBPAGE
- TEMPORARILY STORED ON YOUR COMPUTER
- REALITY THE INTEGRATION OF DIGITAL INFORMATION WITH LIVE VIDEO
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS AND CALCULATIONS THAT MAKE YOUR COMPUTER RUN
- SMALLEST UNIT OF MEASUREMENT IN COMPUTING
17 Clues: CARD A VIDEO ADAPTER • TEMPORARILY STORED ON YOUR COMPUTER • A SAVED LINK TO A PARTICULAR WEBPAGE • A DOCUMENT SENT WITH AN EMAIL MESSAGE • SMALLEST UNIT OF MEASUREMENT IN COMPUTING • MEASURES DESIGNED TO PROTECT YOUR COMPUTER • A CONVENTIONAL METHOD OF TRANSMITTING DATA • A SOFTWARE PROGRAM THAT ALLOWS YOU TO SURF THE WEB • ...
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
Cyber Society Final 2025-05-16
Across
- In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
- The IT Team's critical tasks include keeping all software and systems ______.
- Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
- _____ is about protecting your digital information and systems.
- The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
- A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
- ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
- Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
- According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
- Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
- Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
- Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
- Technology can either _____ or undermine friendships.
- Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
- MFA stands for ______ Authentication: Your data shield
- AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
- Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
- Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
- Worm GPT: An AI chat bot that was created for ________ activities.
- Data transfer is ____ data from one computer to another.
- ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
- _____ networks amplify voices for social change; Online platforms mobilize support for causes.
- Aristotle's claim is that companion friendships are ______ to a good life.
- A networked society connects _____, organizations, and devices through digital networks.
24 Clues: Technology can either _____ or undermine friendships. • MFA stands for ______ Authentication: Your data shield • Data transfer is ____ data from one computer to another. • _____ is about protecting your digital information and systems. • Worm GPT: An AI chat bot that was created for ________ activities. • ...
Cybersecurity Last Test Vocab Review 2022-12-16
Across
- A cipher in which an encryption key, such as a word or phrase, is chosen and used to index to a row in the table. Each letter of the key indicates which row to use. To encrypt a message, you find the original letter in the appropriate row and use the letter at the top of the table as the encrypted character.
- ____ key encryption. A type of private key encryption is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm.
- The original message that needs to be encrypted
- The science and art of delivering a message securely and confidentially.
- ____ key encryption Also known as public key encryption; an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. The keys are combined mathematically to create one key used in the encryption/decryption algorithm
- this part of the CIA triad involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people.
- the practice of concealing messages within other data, such as text or images.
- The encrypted message generated by a cipher
- A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
Down
- ____ Watermarking. Authors or creators of works may embed some code or a signature to be used to verify where the work came from and who the owner is.
- ____ Steganography replaces redundant or insignificant data with covert data. LSB substitution is an example of this, where that last bit in a byte is used to encode information. An example of this would be reserving the last bit in each byte that represents a 24-bit pixel of an image to encode 3 bits worth of information.
- this part of the CIA triad is roughly equivalent to privacy. This measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
- In hash functions, the same message always results in the same hash.
- this part of the CIA triad means information should be consistently and readily accessible for authorized parties.
- ____ function A computational process that converts data of varying size to a fixed-size. The data is converted using a one-way function so the process cannot be reversed.
- an algorithm used for encryption or decryption
16 Clues: The encrypted message generated by a cipher • an algorithm used for encryption or decryption • The original message that needs to be encrypted • In hash functions, the same message always results in the same hash. • The science and art of delivering a message securely and confidentially. • ...
First Call Cybersecurity Challenge 2023-10-23
Across
- Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
- Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
- A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
- A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
- Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
- A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
- Malware that encrypts a victim's data and demands a ransom for the decryption key.
- Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
- The process of converting data into a code to prevent unauthorized access or data theft.
- A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.
11 Clues: Malware that encrypts a victim's data and demands a ransom for the decryption key. • The process of converting data into a code to prevent unauthorized access or data theft. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. • ...
Crossword puzzle- Gaby Perez 2023-03-22
Across
- the second word in anglo pride.
- synonym of generous.
- an electronic device for storing and processing data.
- a global computer network providing a variety of information.
- Something you read.
- a person who takes care of things and is independent.
- the fifth word in anglo pride.
- a flat panel or area on an electronic device such as a television.
- movie about a boy whos a wizard.
- the machines, wiring, and other physical components of a computer or other electronic system.
- a person who sleeps a lot.
- the main means of mass communication.
Down
- the third word in anglo pride.
- the state of being protected against the criminal or unauthorized use of electronic data.
- a system for transmitting voices over a distance.
- the first word in anglo pride.
- the forth word in anglo pride.
- a small, movable device that lets you control a range of things on a computer.
- the programs and other operating information used by a computer.
- the transmission and reception of electromagnetic waves of radio frequency.
20 Clues: Something you read. • synonym of generous. • a person who sleeps a lot. • the third word in anglo pride. • the first word in anglo pride. • the forth word in anglo pride. • the fifth word in anglo pride. • the second word in anglo pride. • movie about a boy whos a wizard. • the main means of mass communication. • a system for transmitting voices over a distance. • ...
test 2022-07-15
Across
- City sammi did her internship in -
- Engagement ring shape -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Where they ate on their first date -
- Sauce michael hates -
- Type of dance sammi did growing up -
- Industry sammi works in -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Attends ___ ___ community church -
- Location of their first post together on IG -
- Year they met -
- Month they met -
- City they will live in after the wedding -
Down
- Amusement park they had annual passes to -
- City they took their engagement photos -
- Music festival they attended -
- Destination of first plane ride together -
- Color of michaels bathroom before they painted it -
- Basketball team michael supports -
- Brand of sammi’s car -
- State michael was raised in -
- European country michael lived in -
- Type of engineer Michael is -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
- On the way to Big Sur they stopped at an ___ farm -
- How they met
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Cyber Security 2023-09-09
Across
- the protection of data and systems.
- insurance that provides liability.
- training to help educate about possible cyber threats.
- software designed with malicious intent to steal/destroy data.
- a type of malware used to encrypt files and obtain data.
- protecting connected devices and networks from unauthorized access.
- the conversion of readable data to encoded data.
- protects data from physical actions.
- insurance that covers losses money.
- a group of steps that show how to execute a test.
- an organization to help businesses manage cybersecurity risks.
- a set of requirements to help create strong passwords.
Down
- when someone pretends to be something to steal data.
- changes made to a software to improve it.
- helps cover a business's losses from a cyber attack.
- saving data in a different secure and safe place in case data is lost.
- encrypted security used to protect Wi-Fi networks.
- stealing information from an unaware person through the internet.
- a strategy made to protect businesses from threats.
- an attack used to obtain sensitive data by acting as a trusted source.
20 Clues: insurance that provides liability. • the protection of data and systems. • insurance that covers losses money. • protects data from physical actions. • changes made to a software to improve it. • the conversion of readable data to encoded data. • a group of steps that show how to execute a test. • encrypted security used to protect Wi-Fi networks. • ...
TTS Evolusi Teknologi 2024-08-30
Across
- Kendaraan udara tanpa awak yang dikendalikan secara remote atau otomatis
- Teknologi pencatatan informasi yang sulit untuk diubah atau dihack
- Algoritma yang memungkinkan mesin untuk belajar dari data
- Pengalaman yang mensimulasikan lingkungan melalui komputer
- Jaringan global yang menghubungkan komputer di seluruh dunia
- Mobil yang bisa beroperasi tanpa pengemudi manusia
- Mata uang digital yang menggunakan kriptografi untuk keamanan
- Penyimpanan dan pengolahan data yang dilakukan di server jarak jauh
- Komponen dasar dalam elektronik yang memungkinkan kontrol arus listrik
- Kumpulan data sangat besar yang tidak bisa diolah menggunakan metode tradisional
- Bahan dasar pembuatan transistor yang memiliki konduktivitas di antara konduktor dan isolator
- Perlindungan untuk sistem informasi dari serangan cyber
Down
- Sistem yang terinspirasi dari otak manusia untuk mengolah informasi
- Media transmisi cahaya yang digunakan untuk komunikasi data berkecepatan tinggi
- Teknologi nirkabel untuk mentransfer data antar perangkat dalam jarak dekat
- Program komputer yang dirancang untuk mensimulasikan percakapan dengan pengguna manusia
- Teknologi nirkabel yang memungkinkan koneksi internet tanpa kabel
- Kecil namun sangat penting, jantung dari semua perangkat modern
- Sistem yang memungkinkan penentuan posisi di permukaan bumi dengan presisi
- Perangkat yang menggabungkan telepon dengan komputer pribadi
20 Clues: Mobil yang bisa beroperasi tanpa pengemudi manusia • Perlindungan untuk sistem informasi dari serangan cyber • Algoritma yang memungkinkan mesin untuk belajar dari data • Pengalaman yang mensimulasikan lingkungan melalui komputer • Jaringan global yang menghubungkan komputer di seluruh dunia • Perangkat yang menggabungkan telepon dengan komputer pribadi • ...
Cyber Physical Systems 2025-03-20
Across
- The process of making systems operate without human intervention.
- Using models to replicate real-world behaviors.
- A decentralized and secure digital ledger technology.
- Internet-based computing providing storage and processing power.
- Related to manufacturing and production systems.
- A network of connected devices that communicate over the internet.
- Study of control and communication in machines and living beings.
- The ability of different systems to work together.
- A virtual replica of a physical system for monitoring and analysis.
- Devices that detect and respond to physical changes.
Down
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- The capability of a system to function independently.
- A computing system integrated into a larger system.
- Devices that convert electrical signals into mechanical motion.
- A highly automated, connected, and intelligent manufacturing system.
- Machine-based intelligence that enables decision-making.
- Combining different subsystems into a unified system.
- Large volumes of data used for analytics and decision-making.
- Processing data closer to the source rather than a central server.
20 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Fisika: Teknologi Digital 2025-02-19
Across
- Teknologi yang menirukan pemikiran dan logika manusia.
- Teknologi untuk mencatat transaksi digital dengan cara terdesentralisasi dan aman.
- Komponen fisik dari sebuah sistem komputer.
- Generasi kelima dari jaringan seluler ya
- Mesin dimana rancangan algoritmik dapat berjalan.
- Jaringan perangkat fisik yang terhubung ke internet untuk pertukaran data.
- Sistem penyimpanan data terkumpul secara teratur.
- Perangkat lunak yang mengatur bejalannya program perangkat komputer.
- Teknologi yang menggabungkan dunia nyata dengan objek virtual.
- Pengalaman simulasi digital yang menggantikan dunia nyata.
- penyimpanan data secara daring melalui server yang dapat diakses dimanapun dengan koneksi internet.
Down
- Metode pembelajaran mesin yang memungkinkan algoritma untuk belajar dari data.
- Teknologi yang memungkinkan pembuatan versi virtual dari suatu hal di dunia nyata.
- Praktik melindungi sistem komputer dan jaringan dari ancaman digital.
- Penghubungan berbagai perangkat digital untuk membagi informasi.
- Serangkaian langkah-langkah sistematis yang memiliki tujuan tertentu.
- Pengolahan dan analisis volume data yang sangat besar dan kompleks.
- Informasi yang diproses atau disimpan dalam sistem digital.
- Proses mengubah data menjadi format yang tidak dapat dibaca tanpa kunci tertentu.
- Program lunak yang menjalani fungsi tertentu pada perangkat digital.
20 Clues: Generasi kelima dari jaringan seluler ya • Komponen fisik dari sebuah sistem komputer. • Mesin dimana rancangan algoritmik dapat berjalan. • Sistem penyimpanan data terkumpul secara teratur. • Teknologi yang menirukan pemikiran dan logika manusia. • Pengalaman simulasi digital yang menggantikan dunia nyata. • ...
TTS INFORMATIKA 2025-04-10
Across
- salah satu bentuk konten digital berupa gambar
- profesi yang menganalisis data untuk pengambilan keputusan
- orang yang merancang tampilan dan interaksi pengguna
- simbol dalam pencarian untuk mengecualikan data
- domain khusus untuk organisasi
- platform media sosial sering menjadi tempat penyebaran konten
- tindakan menggunakan karya cipta tanpa izin
- orang yang membangun dan memelihara jaringan komputer
- tanda yang digunakan untuk mencari frasa
- profesi yang bertanggung jawab atas keamanan sistem komputer
- hak eksklusif pencipta atas karya intelektualnya
- perintah untuk mengakses data dalam database
- pengecekan fakta oleh pihak yang kompeten
Down
- salah satu tujuan HAKI adalah mendorong
- Hasil karya dalam bentuk digital
- proses memastikan kebenaran suatu informasi
- platform berbagi video populer
- salah satu cara memvalidasi konten adalah dengan memeriksa
- perlindungan hukum untuk invensi baru
- orang yang ahli dalam mengembangkan perangkat lunak
- elemen khas suatu kelompok masyarakat yang dimasukkan dalam konten
- mesin untuk mencari informasi di internet
- proses menyebarkan konten digital ke berbagai platform
- kegiatan membuat dan menyebarkan konten digital
- masa berlaku perlindungan hak cipta umumnya ... tahun setelah pencipta meninggal
- informasi palsu yang disebarkan untuk menipu
26 Clues: platform berbagi video populer • domain khusus untuk organisasi • Hasil karya dalam bentuk digital • perlindungan hukum untuk invensi baru • salah satu tujuan HAKI adalah mendorong • tanda yang digunakan untuk mencari frasa • mesin untuk mencari informasi di internet • pengecekan fakta oleh pihak yang kompeten • proses memastikan kebenaran suatu informasi • ...
tts informatika jasmine ivanov xg 19 2025-04-10
Across
- Orang yang mengedit konten
- Proses mencari informasi di internet
- Bentuk perlindungan HAKI untuk karya seni.
- Hak ekslusif atas suatu penemuan
- Mesin pencari bawaan Microsoft
- Mesin pencari populer di dunia
- Konten digital yang berupa tulisan
- Mesin pencari yang fokus pada privasi pengguna
- Hak ekslusif atas suatu merek dagang
- Platform medsos berbasis foto dan video
- Profesi yang mengelola jaringan komputer
- Konten yang berisi ujaran kebencian
- Alamat untuk mengakses situs web
- Proses pembuatan konten digital
- Proses penyebaran konten di internet
- Konten yang berisi informasi palsu
Down
- Bertugas menjaga keamanan sistem komputer
- Proses menilai kebenaran konten
- Hasil pencarian yang ditampilkan
- Profesi yang mendesain antarmuka pengguna
- Profesi yang merancang dan membangun situs web
- Profesi yang membuat perangkat lunak
- Platform untuk video berdurasi panjang
- Platform untuk menyebarkan tulisan dan artikel
- Profesi yang membuat konten digital
- Konten yang mengandung tindakan kekerasan
- Profesi yang bertugas untuk mengelola data
- Mesin pencari dari Tiongkok
- Organisasi yang bertugas memvalidasi konten negatif di Indonesia
- Lembaga yang mengurus HAKI di Indonesia
30 Clues: Orang yang mengedit konten • Mesin pencari dari Tiongkok • Mesin pencari bawaan Microsoft • Mesin pencari populer di dunia • Proses menilai kebenaran konten • Proses pembuatan konten digital • Hasil pencarian yang ditampilkan • Hak ekslusif atas suatu penemuan • Alamat untuk mengakses situs web • Konten digital yang berupa tulisan • Konten yang berisi informasi palsu • ...
Giulia 2025-05-13
Across
- A wearable device that tracks fitness and shows notifications
- Storage of data on remote servers accessed via the internet
- A handheld device that combines a phone with a computer
- Measures taken to protect digital systems from attacks
- A software program designed for mobile devices
- An unmanned flying device often controlled remotely
- Wireless technology used to connect devices to the internet
- A secret word or phrase used for authentication
- A display that responds to touch input
- The name used to identify a user in a system
- A program designed to simulate conversation with humans
- A global network that connects millions of computers
- A machine that creates three-dimensional objects from digital files
Down
- A digital ledger used to record transactions securely
- The simulation of human intelligence by machines
- Buying and selling goods or services online
- A system used to determine location via satellite signals
- Watching or listening to media in real time over the internet
- A machine capable of carrying out complex actions automatically
- A portable personal computer
20 Clues: A portable personal computer • A display that responds to touch input • Buying and selling goods or services online • The name used to identify a user in a system • A software program designed for mobile devices • A secret word or phrase used for authentication • The simulation of human intelligence by machines • An unmanned flying device often controlled remotely • ...
Cybersecurity Awareness Month Crossword 2021-08-30
Across
- Converting plain data into a secret code, which later decoded by a user with a 'key'.
- VPN stands for _________ Private Network, Pulse Secure is an example of this.
- Dangerous code hidden in online ads to tricker users into visiting unsafe sites or downloading malware.
- Using text messages to attempt to gain access to sensitive information
- Something that occurs before any new program is used at NLH is a risk _______.
- Criminals pose as bank staff or other employees on the phone to try to trick you into sharing information.
Down
- The name of the email manager NLH uses to reduce the amount of Spam delivered to your inbox.
- Using the human tendency to trust to manipulate people to gain sensitive information.
- Another word for unsolicited emails, NLH has a dedicated email address for monitoring this.
- Using software to appear to be someone else, either by email address or caller ID.
- Harmful software meant to disable, infect, or allow hackers remote control of a device.
11 Clues: Using text messages to attempt to gain access to sensitive information • VPN stands for _________ Private Network, Pulse Secure is an example of this. • Something that occurs before any new program is used at NLH is a risk _______. • Using software to appear to be someone else, either by email address or caller ID. • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Crossword- Day 5 2023-07-20
Across
- A flexible approach to IT project management.
- The process of converting information into a code to prevent unauthorized access.
- The capacity to be maintained or continued without depleting resources.
- The capability of a system to handle an increasing amount of work or its potential to be enlarged.
Down
- The quality of being trustworthy and dependable.
- Protection of computer systems and data from digital threats and attacks.
- The ability to accomplish a task with the least amount of wasted time and effort.
- The potential for negative outcomes in IT operations.
- The degree of excellence of IT services.
- - An examination of IT processes for compliance and efficiency.
10 Clues: The degree of excellence of IT services. • A flexible approach to IT project management. • The quality of being trustworthy and dependable. • The potential for negative outcomes in IT operations. • - An examination of IT processes for compliance and efficiency. • The capacity to be maintained or continued without depleting resources. • ...
CyberCross 2023-09-10
Across
- is like a set of locks and guards that keep it safe from bad guys
- when someone pretends to be someone else
- viruses, worms, and trojan horses
- Names, Social Security numbers, birth dates, addresses, and other stuff that are targeted by hackers
Down
- A good one uses a mix of upper and lowercase letters, numbers, and symbols
- type of authentication that is like having 2 locks on your chest/safe (no space)
- locks your device or files until a ransom is paid
- something that puts your computer or information in danger
- breaking into computer systems or accounts that they're not supposed to
- don't ___ random links
10 Clues: don't ___ random links • viruses, worms, and trojan horses • when someone pretends to be someone else • locks your device or files until a ransom is paid • something that puts your computer or information in danger • is like a set of locks and guards that keep it safe from bad guys • breaking into computer systems or accounts that they're not supposed to • ...
IELTS WORKSHOP Technology 2024-05-06
Across
- digital currency
- (adj.) look like human
- When a person or a thing is on ______, they are or it is ready to be used if necessary
- made by people
- the use of machines without human control
- involving user in information exchange
- to move text or pictures up/down on a computer screen
- the ability to learn, understand, and make judgements based on reason
- very important change
Down
- (adj.) made in a complicated way
- a change to something, usually to improve it
- the scientific study of machines and electronic devices
- the protection of crimes on the internet
- a person who dislikes the use of technology
- use or study of computer systems that have some of the qualities that the human brain has
- a machine controlled by a computer that is used to perform jobs automatically
- large system of connected computers globally
- a material, such as silicon, that allows some electricity to move through it more easily when its temperature increases
- (v.) to notice something that is partly hidden/not clear
19 Clues: made by people • digital currency • very important change • (adj.) look like human • (adj.) made in a complicated way • involving user in information exchange • the protection of crimes on the internet • the use of machines without human control • a person who dislikes the use of technology • a change to something, usually to improve it • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- You can help fight cybercrime by becoming a
- This attack occurs when someone sneaks into a secured area behind someone else
- What should you do when a workstation or device is no longer in use
- Failure to run these equals failures to patch vulnerabilities
- These are designed to maintain the security of everyone associated with an organization
- The future of security is ___,not machines
- Stealing money is the main goal of this type of malware
Down
- This attack occurs when cybercriminals research and track which sites employees visit the most
- The security tool identifies and removes malicious programs
- The individuals who control access to people, data and systems
- Kwiktrip's password policy requires co workers change their passwords every__days
- ____are the last line of defense
12 Clues: ____are the last line of defense • The future of security is ___,not machines • You can help fight cybercrime by becoming a • Stealing money is the main goal of this type of malware • The security tool identifies and removes malicious programs • Failure to run these equals failures to patch vulnerabilities • ...
EQUATE Cybersecurity - Email edition 2023-05-18
Across
- Network security barrier against unauthorized access.
- Deceptive emails aiming to extract personal data.
- Identity verification for authorized access.
- Deceptive act of assuming someone's identity.
- Unwanted bulk emails.
- Data security through secret code conversion.
Down
- Malicious assault on computer systems or networks.
- Malicious software demanding payment for data release.
- Protective software against malware and viruses.
- Deceptive technique involving voice calls for extracting sensitive data.
- Website or email address identifier.
11 Clues: Unwanted bulk emails. • Website or email address identifier. • Identity verification for authorized access. • Deceptive act of assuming someone's identity. • Data security through secret code conversion. • Protective software against malware and viruses. • Deceptive emails aiming to extract personal data. • Malicious assault on computer systems or networks. • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- hygiene The routine practices and steps taken to maintain good digital security.
- Software designed to detect and remove malicious programs from your computer.
- Malicious software designed to damage or gain unauthorized access to systems.
- breach An incident where sensitive information is accessed or disclosed without autorization.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
Down
- A type of malware that locks your data and demands payment to unlock it.
- Engineering Manipulating people into giving up confidential information.
- A security system that monitors and controls incoming and outgoing network traffic
- A method of converting data into a secret code to prevent unauthorized access.
- A software update that fixes security vulnerabilities or bugs.
11 Clues: A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • Engineering Manipulating people into giving up confidential information. • Software designed to detect and remove malicious programs from your computer. • ...
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
FRM 2024-07-15
Across
- What measures should XYZ implement to enhance its liquidity risk management?
- How did the cyber-attack affect XYZ's working capital and liquidity?
- How can XYZ strengthen its regulatory compliance framework?
- What are the potential legal and financial consequences for the company?
- Were there any gaps in the company's credit risk assessment processes?
- What were the root causes of the cyber-attack on XYZ Corporation?
Down
- Were there any limitations in the company's liquidity contingency planning?
- What steps should XYZ take to strengthen its operational resilience?
- How well did the company's cybersecurity framework respond to the incident?
- Which data protection regulations did XYZ fail to comply with?
- How did the operational disruption impact XYZ's credit relationships?
- What actions should XYZ take to improve its credit risk management?
12 Clues: How can XYZ strengthen its regulatory compliance framework? • Which data protection regulations did XYZ fail to comply with? • What were the root causes of the cyber-attack on XYZ Corporation? • What actions should XYZ take to improve its credit risk management? • What steps should XYZ take to strengthen its operational resilience? • ...
