cybersecurity Crossword Puzzles

Chapter 3 - Countermeasure in Cybersecurity 2026-01-12

Chapter 3 - Countermeasure in Cybersecurity crossword puzzle
Across
  1. Security classification related to storage media like USB drives and disks
  2. Software layer where users interact with systems
  3. Security device that filters incoming and outgoing network traffic
  4. Infrastructure that focuses on storing and managing data
  5. A fake system designed to trap and study attackers
  6. Security system that detects suspicious activities in a network
  7. Minimum security standard that systems must follow
  8. IT infrastructure responsible for managing communication between systems
Down
  1. Type of IT infrastructure that includes servers, computers, and hardware
  2. Tool used to scan networks and discover active devices
  3. Process of strengthening an application by removing unnecessary features
  4. A secure tunnel used to protect data over public networks
  5. Security design that shows how security components are arranged in a network
  6. Tool used to capture and analyze network traffic
  7. Small update released to fix a specific security vulnerability
  8. Physical security method that uses fingerprints or facial recognition
  9. Network area that separates internal systems from the internet

17 Clues: Tool used to capture and analyze network trafficSoftware layer where users interact with systemsA fake system designed to trap and study attackersMinimum security standard that systems must followTool used to scan networks and discover active devicesInfrastructure that focuses on storing and managing data...

Friday - Server Demonstration Review 2025-11-10

Friday - Server Demonstration Review crossword puzzle
Across
  1. (5,6) is a feature in Windows that allows administrators to centrally manage and enforce settings for users and computers in an Active Directory environment
  2. (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups.
  3. (acronym) It stores the names and IP addresses of all computers and devices on the Domain and provides the necessary name resolution for clients to authenticate and for AD services to function correctly.
  4. (14,4) the function of the (OU) is to act as a container for logically grouping users, computers, and other objects to simplify management, delegate administrative authority, and apply policies or settings consistently
Down
  1. (2,7) the numerical identifier and network locator for devices and servers such as the domain controller, allowing them to be found and communicate with each other
  2. (7,6) is a centrally managed collection of interconnected devices and users, like computers and printers, that operate under a single set of security policies and rules.
  3. (5,9) is a cybersecurity concept that grants users, applications, and systems only the minimum access and permissions necessary to perform their job functions, and nothing more
  4. (acronym) primary function is to automatically assign IP addresses and other network configuration information, such as the subnet mask and default gateway, to client devices.
  5. an isolated, secure environment used in cybersecurity to safely execute and analyse projects.

9 Clues: an isolated, secure environment used in cybersecurity to safely execute and analyse projects.(6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups....

Data Privacy Crosswords 2025-01-27

Data Privacy Crosswords crossword puzzle
Across
  1. The ability to access, correct, or delete your personal data
  2. A document that explains how your data is collected and used
  3. The process of converting data into unreadable code for security
  4. The process of deleting personal identifiers from data
Down
  1. When a company keeps your data safe from hackers
  2. The right to stop a company from using your personal data
  3. The principle of collecting only the data that is needed
  4. A law or set of rules governing personal data use

8 Clues: When a company keeps your data safe from hackersA law or set of rules governing personal data useThe process of deleting personal identifiers from dataThe principle of collecting only the data that is neededThe right to stop a company from using your personal dataThe ability to access, correct, or delete your personal data...

IoT Puzzle 2025-04-01

IoT Puzzle crossword puzzle
Across
  1. The practice of protecting internet-connected systems from cyber threats.
  2. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
  3. A security system that monitors and controls incoming and outgoing network traffic.
  4. The process of converting data into a code to prevent unauthorized access.
  5. Short-range wireless technology.
  6. Devices that collect and transmit real-time data from the environment.
Down
  1. Malicious software designed to harm or exploit devices or networks.
  2. Wireless standard for IoT connectivity.
  3. Software embedded in IoT devices that controls their operations.
  4. Verifying a user’s identity before granting access to a system.
  5. Remote servers used for data storage & processing.
  6. Connects IoT devices to the internet.
  7. Wireless transmission of data.
  8. Wireless communication protocol for IoT.
  9. A type of cyber-attack where attackers trick users into providing sensitive information.
  10. A network topology where devices connect directly and relay data to each other.

16 Clues: Wireless transmission of data.Short-range wireless technology.Connects IoT devices to the internet.Wireless standard for IoT connectivity.Wireless communication protocol for IoT.Remote servers used for data storage & processing.Verifying a user’s identity before granting access to a system....

Digital Citizenship Vocabulary 2025-11-19

Digital Citizenship Vocabulary crossword puzzle
Across
  1. a person who speaks or acts in support of an individual or cause,
  2. getting sew for copying somebody work
  3. The trail of data you leave online, like breadcrumbs, from every click, post, and search.
  4. bullying online
  5. Stop, Question, Check" method
  6. A bystander is a person who witnesses an event but is not directly involved.
  7. it is your citizenship for your device
  8. your public profile with strong passwords, privacy settings
  9. security that help with crime on the internet
  10. the act or practice of converting messages into cipher or code.
Down
  1. imformation that is pesonal
  2. where somebody scam you for something
  3. Secure your accounts with strong passwords and be cautious about what you share online
  4. the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online.
  5. setting that you can help protect your imformation
  6. the ability to understand and share the feelings of another.

16 Clues: bullying onlineimformation that is pesonalStop, Question, Check" methodwhere somebody scam you for somethinggetting sew for copying somebody workit is your citizenship for your devicesecurity that help with crime on the internetsetting that you can help protect your imformationyour public profile with strong passwords, privacy settings...

Cybersec A 2026-01-03

Cybersec A crossword puzzle
Across
  1. Upaya perlindungan sistem dan data dari serangan digital
  2. Aspek menjaga kerahasiaan data dari akses ilegal
Down
  1. Aspek memastikan sistem selalu tersedia saat dibutuhkan
  2. Aset informasi digital yang wajib dilindungi
  3. Aspek memastikan data asli dan tidak diubah sembarangan

5 Clues: Aset informasi digital yang wajib dilindungiAspek menjaga kerahasiaan data dari akses ilegalAspek memastikan sistem selalu tersedia saat dibutuhkanAspek memastikan data asli dan tidak diubah sembaranganUpaya perlindungan sistem dan data dari serangan digital

Cyber Security Threads 2024-10-01

Cyber Security Threads crossword puzzle
Across
  1. An attack that floods a network with excessive traffic, disrupting services
  2. Ensures that data is accurate and has not been tampered with
  3. Falsifying data to deceive systems or users
  4. The ability of a system to recover quickly from disruptions or attacks
  5. Ensures that systems are accessible and functional when needed
Down
  1. Ensures that information is accessible only to those authorized to access it
  2. The process of converting information into a secret code
  3. A model that describes the stages of a cyberattack ( 2 words )
  4. A weakness in a system that can be exploited by attackers
  5. A type of malware disguised as legitimate software
  6. A potential danger or harmful event in cybersecurity
  7. A security system that monitors and controls network traffic
  8. An attempt to exploit a system or network

13 Clues: An attempt to exploit a system or networkFalsifying data to deceive systems or usersA type of malware disguised as legitimate softwareA potential danger or harmful event in cybersecurityThe process of converting information into a secret codeA weakness in a system that can be exploited by attackers...

azure-data-oro-idc-day-of-learning-november 2022-11-24

azure-data-oro-idc-day-of-learning-november crossword puzzle
Across
  1. Meaning of ORO?
  2. India's most attractive employer brand by Randstad
  3. Microsoft had announced a Metaverse partnership with which organization
  4. In which year, ORO team is formed - Two Thousand….?
  5. A lightweight markup language used to create Azure's public documentation
  6. Who wrote ORO team song?
  7. Internal portal used for joining various distribution and security groups
  8. Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
  1. Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
  2. Number of years since IDC was established
  3. - FIFA world cup 2022 is played in which country?
  4. Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
  5. Tool used in Microsoft to manage livesite incidents

13 Clues: Meaning of ORO?Who wrote ORO team song?Number of years since IDC was established- FIFA world cup 2022 is played in which country?India's most attractive employer brand by RandstadIn which year, ORO team is formed - Two Thousand….?Tool used in Microsoft to manage livesite incidents...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. A program that detects and removes malicious software.
  2. Turning words into secrets that only the right decoder can read.
  3. Digital kidnapping: your files are the hostages!
  4. Online impersonation so convincing it fools your eyes — and inbox.
  5. The hero hacker — breaks systems to protect them.
Down
  1. When a website gets so many fake visitors it forgets how to work.
  2. A person skilled at breaking into computer systems.
  3. The digital gatekeeper that says, “You shall not pass!”
  4. A gift that brings trouble, not joy — just ask the Greeks!
  5. The practice of protecting systems and data from digital attacks.
  6. The “key” everyone forgets right when they need it most.
  7. It clogs your inbox like unwanted guests at a party.
  8. When someone goes “fishing” for your passwords — but with emails.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

Technology in Supply Chain Management 2023-05-01

Technology in Supply Chain Management crossword puzzle
Across
  1. Highly skilled IT professionals, process engineers,and the appropriate technologies.
  2. technologies combine data management, communications, decision support, and processing capabilities.
  3. technologies create greater connectivity and speed flow.
  4. support systems provide computing power to make higher-quality decisions faster.
  5. Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
  1. technologies provide 24/7 resource availability.
  2. Protection against online threats.

7 Clues: Protection against online threats.technologies provide 24/7 resource availability.technologies create greater connectivity and speed flow.support systems provide computing power to make higher-quality decisions faster.Highly skilled IT professionals, process engineers,and the appropriate technologies....

Cybersecurity Fundamental Chapter 1 2023-10-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. who rally and protest against different political and social ideas.
  2. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. collection of technologies that enable the connection of various devices to the Internet.
  4. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. Their targets are foreign governments, terrorist groups, and corporations.
  4. hackers who are either self-employed or working for large cybercrime organizations.
  5. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. result of data sets that are large and complex, making traditional data processing applications inadequate.

12 Clues: who rally and protest against different political and social ideas.Their targets are foreign governments, terrorist groups, and corporations.hackers who are either self-employed or working for large cybercrime organizations.collection of technologies that enable the connection of various devices to the Internet....

Cybersecurity Lesson 1-3 2023-09-21

Cybersecurity Lesson 1-3 crossword puzzle
Across
  1. automatically tags any pictures you take with the location of where you took it
  2. the freedom to be left alone
  3. formal ways of giving credit to people for their work
  4. everything you do online
  5. a detailed report
  6. untrue, defamatory statements that are written.
  7. short for internet etiquette
  8. the exclusive right to make copies
Down
  1. includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
  2. stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
  3. someone who intentionally targets people for harm using online chat rooms or social media
  4. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody

12 Clues: a detailed reporteverything you do onlinethe freedom to be left aloneshort for internet etiquettethe exclusive right to make copiesuntrue, defamatory statements that are written.formal ways of giving credit to people for their workautomatically tags any pictures you take with the location of where you took it...

Benefits and Challenges 2024-12-30

Benefits and Challenges crossword puzzle
Across
  1. Improving the productivity and output of business operations.
  2. The system of rules and procedures to ensure compliance.
  3. Saving both time and money by using no-code platforms.
  4. Empowering non-technical individuals to build and enhance solutions, individuals and businesses can stay agile, adapting quick
Down
  1. Giving employees the ability to create applications and solutions.
  2. Protecting apps and data from potential threats.
  3. Ensuring different applications work together smoothly.

7 Clues: Protecting apps and data from potential threats.Saving both time and money by using no-code platforms.Ensuring different applications work together smoothly.The system of rules and procedures to ensure compliance.Improving the productivity and output of business operations.Giving employees the ability to create applications and solutions....

TA6 - The Internet of Everything 2025-11-09

TA6 - The Internet of Everything crossword puzzle
Across
  1. The part of the IoE model that focuses on how actions are carried out.
  2. Devices connected and able to share data without human input.
  3. The use of technology to perform tasks without human intervention.
  4. Communication where devices exchange information directly.
  5. Turning raw data into meaningful information.
  6. The raw facts and figures collected by sensors or systems.
Down
  1. Information derived from data that has been processed and organised.
  2. The concept linking people, data, processes and things through networked connections.
  3. A technology that measures real-world conditions, such as temperature or movement.
  4. A smart system that adjusts traffic flow based on real-time conditions.
  5. Protecting data and systems from unauthorised access or attacks.
  6. The global network that allows computers and devices to exchange data.

12 Clues: Turning raw data into meaningful information.Communication where devices exchange information directly.The raw facts and figures collected by sensors or systems.Devices connected and able to share data without human input.Protecting data and systems from unauthorised access or attacks....

Vocabulary 2024-11-26

Vocabulary crossword puzzle
Across
  1. A paid position
  2. The practice of protecting digital systems
  3. A systematic error in AI systems that leads to unfair or discriminatory outcomes.
  4. A person that engaged and qualified in a profession
Down
  1. The rate at which goods or services are produced
  2. The ability to direct or influence others
  3. A branch of computer science that deals with creating machines capable of performing tasks that typically require human intelligence

7 Clues: A paid positionThe ability to direct or influence othersThe practice of protecting digital systemsThe rate at which goods or services are producedA person that engaged and qualified in a professionA systematic error in AI systems that leads to unfair or discriminatory outcomes....

12 Days of Christmas ITHD Puzzle 2024-12-09

12 Days of Christmas ITHD Puzzle crossword puzzle
Across
  1. a link to something in a website.
  2. Collection of professional creative software made by Adobe.
  3. a secret word or phrase that must be used to gain admission to something.
  4. Prevents unauthorized access to a disk's contents, even if the disk is offline.
  5. Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
  1. The practice of protecting devices, networks and programs from digital attacks.
  2. Creates a private connection between your computer and a remote server.
  3. The programs and other operating information used by a computer.
  4. Person who breaches computer security
  5. Group of devices connected within a limited area, such as a home, office or building.
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
  7. Programming error
  8. Unsolicited email
  9. Temporary data storage

14 Clues: Programming errorUnsolicited emailTemporary data storagea link to something in a website.Person who breaches computer securityCollection of professional creative software made by Adobe.The programs and other operating information used by a computer.Creates a private connection between your computer and a remote server....

Unit 1: Intro to IT 2023-12-20

Unit 1:  Intro to IT crossword puzzle
Across
  1. Two-dimensional bar code that contains an encoded web or e-mail address.
  2. Working for a company from home using IT.
  3. Software that resides in the cloud that is accessed by users without downloading or installing.
  4. Gap between those with access to technology and those who do not.
  5. Storage that is cloud-based.
  6. Type of computer found inside of other devices.
  7. Involves storing and retrieving data from Internet-based spaces.
Down
  1. How efficiently and quickly a person completes tasks.
  2. Branch of IT that protects computer systems.
  3. Method of searching through huge amounts of data to find patterns.
  4. Amount of data that can travel on a communication system.
  5. Includes all the work done with computers.
  6. View of the live world that has been enhanced with graphics, sounds, or other outputs.
  7. Type of e-book that contains integrated multimedia features.

14 Clues: Storage that is cloud-based.Working for a company from home using IT.Includes all the work done with computers.Branch of IT that protects computer systems.Type of computer found inside of other devices.How efficiently and quickly a person completes tasks.Amount of data that can travel on a communication system....

IT_Tóth Dániel Károly 2023-12-24

IT_Tóth Dániel Károly crossword puzzle
Across
  1. The field concerned with protecting computer systems and data.
  2. Software application designed for use on mobile devices.
  3. The process of determining the structure and functionality of a program.
  4. The activity of writing or designing a computer program.
  5. (!Internet of Things!) The network of physical devices capable of communicating over the internet.
  6. services provided electronically, such as online banking or e-commerce.
  7. A structured storage system that allows efficient data management.
  8. Designing the user interface and user experience for software.
  9. A computer providing specialized services to other computers or devices.
Down
  1. Large volumes of data used for analytical purposes.
  2. Computing resources and services accessible over the internet.
  3. Language A set of rules and instructions interpreted by a computer.
  4. A sequence of steps to perform a computer task.
  5. An iterative and incremental development method in software design.
  6. A system of interconnected computers or devices.

15 Clues: A sequence of steps to perform a computer task.A system of interconnected computers or devices.Large volumes of data used for analytical purposes.Software application designed for use on mobile devices.The activity of writing or designing a computer program.The field concerned with protecting computer systems and data....

Puzzle OSHEC 2023-08-31

Puzzle OSHEC crossword puzzle
Across
  1. Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
  2. Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
  3. Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)
Down
  1. Last word of the first point of ‘Key Takeaways’ - Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
  2. Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
  3. Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.

6 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)...

Strategic Planning 2023-06-19

Strategic Planning crossword puzzle
Across
  1. An obstacle excutives face the team does not agree with proposed strategy
  2. Businesses may need to address market volatility, cybersecurity, legal and regulatory compliance, and supply chain disruptions
  3. When the blame game starts and people become defensive
  4. Businesses struggle with uncertanties such as market volatility, technological advancements, and regulatory shifts.
Down
  1. Businesses may face due financial, human, and technological limits
  2. Lost in translation
  3. New strategies often face ______ from employees
  4. When businesses get lost in the sematics of defining their vision, missions, and values

8 Clues: Lost in translationNew strategies often face ______ from employeesWhen the blame game starts and people become defensiveBusinesses may face due financial, human, and technological limitsAn obstacle excutives face the team does not agree with proposed strategyWhen businesses get lost in the sematics of defining their vision, missions, and values...

crossword 2025-08-28

crossword crossword puzzle
Across
  1. profession that involves study of drugs
  2. profession that involves protecting computers and networks from hackers
  3. a place where Indian laws are made
Down
  1. Green music festival celebrated in Portugual
  2. symptoms of shortness of breath,fatigue,headaches

5 Clues: a place where Indian laws are madeprofession that involves study of drugsGreen music festival celebrated in Portugualsymptoms of shortness of breath,fatigue,headachesprofession that involves protecting computers and networks from hackers

latihan 2025-04-18

latihan crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  3. Orang yang menciptakan software berbagai jenis permainan.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Proses penggunaan teknologi digital untuk melestarikan budaya.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  4. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  5. Profesi yang menjaga keamanan sistem komputer.
  6. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  7. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  8. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  9. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  10. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  11. Ahli dalam menulis kode untuk membuat perangkat lunak.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 3 2025-04-19

kelompok 3 crossword puzzle
Across
  1. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  2. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Ahli dalam menulis kode untuk membuat perangkat lunak.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 8 2025-04-19

Kelompok 8 crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Ahli dalam menulis kode untuk membuat perangkat lunak.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Profesi yang menjaga keamanan sistem komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  3. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  10. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  11. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 6 2025-04-19

Kelompok 6 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  3. Orang yang menciptakan software berbagai jenis permainan.
  4. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  5. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Platform untuk memperkenalkan budaya Indonesia secara global.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Ahli dalam menulis kode untuk membuat perangkat lunak.
  10. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  11. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
Down
  1. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  2. Proses penggunaan teknologi digital untuk melestarikan budaya.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Profesi yang menjaga keamanan sistem komputer.
  8. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  9. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Technology 2023-06-29

Technology crossword puzzle
Across
  1. Using technology to simulate a three-dimensional environment
  2. Protecting computers, networks, and data from unauthorized access
  3. A portable device with a touch screen for browsing and entertainment
  4. Watching or listening to media content over the internet in real-time
  5. Online platforms for connecting and sharing content with others
  6. A global network that connects computers and allows information sharing
Down
  1. A machine that can perform various tasks and run different programs
  2. Electronic mail used for sending messages and files online
  3. Designing, building, and programming robots for various purposes
  4. A collection of web pages accessible through the internet
  5. Electronic games played on a computer or gaming console
  6. Creating three-dimensional objects by layering materials
  7. Writing instructions for computers to create software and websites
  8. A portable computer that you can use for writing, doing homework, or watching movies
  9. A mobile device that can make calls, send messages, and run apps

15 Clues: Electronic games played on a computer or gaming consoleCreating three-dimensional objects by layering materialsA collection of web pages accessible through the internetElectronic mail used for sending messages and files onlineUsing technology to simulate a three-dimensional environmentOnline platforms for connecting and sharing content with others...

ROUND 2 2025-05-10

ROUND 2 crossword puzzle
Across
  1. - The process of introducing new ideas, products, or methods to improve technology
  2. - A programmable machine capable of performing tasks automatically
  3. - Facts or information that can be processed or stored by a computer
  4. - A method of converting information into a secure format to prevent unauthorized access
  5. - A system that represents data using numerical values
  6. - A set of instructions that tells a computer what to do
Down
  1. - Protection against unauthorized access to or damage of computer systems
  2. - A mobile phone with advanced computing capabilities
  3. - A system of interconnected computers that share resources and information
  4. - Existing in a digital or simulated environment, not physically present
  5. - A global network that links computers and devices for communication
  6. - A device used for performing calculations and tasks through programs
  7. - A virtual space for storing and managing data on remote servers
  8. - The tangible physical components that make up a computer or device
  9. - Machines designed to simulate human intelligence

15 Clues: - Machines designed to simulate human intelligence- A mobile phone with advanced computing capabilities- A system that represents data using numerical values- A set of instructions that tells a computer what to do- A virtual space for storing and managing data on remote servers- A programmable machine capable of performing tasks automatically...

App Rationalisation Crossword 2024-02-14

App Rationalisation Crossword crossword puzzle
Across
  1. Phase 1 of EXO apps is called ______ Win.
  2. What is Work Order 1.0 for the process of apps' decommissioning?
  3. The site to raise tickets for decommissioning.
  4. Apps Optimisation could help to reduce _________ cost (Maintenance, subscriptio & hardware cost) at OPU.
  5. One of the EXO apps focus is to ________ on - premise applications to PETRONAS cloud.
  6. What is the name of the new apps optimization project initiated by GD?
Down
  1. Phase 2 of EXO apps is called __________ Enhancement.
  2. ____ decommissioning involves the removal of both infra and application components.
  3. Main data source for app rationalization.
  4. ______________ functions is when 2 or more apps share similar functionality.
  5. Apps that are not in the scope of the PDSB decommission team.
  6. Idle applications & servers increase the likelihood of __________________________ attack.
  7. Consists of the decommissioning of server, database, storage, and network components.
  8. How many work orders are in the process of decommissioning apps?
  9. Dashboard to view Downstream Application

15 Clues: Dashboard to view Downstream ApplicationPhase 1 of EXO apps is called ______ Win.Main data source for app rationalization.The site to raise tickets for decommissioning.Phase 2 of EXO apps is called __________ Enhancement.Apps that are not in the scope of the PDSB decommission team.What is Work Order 1.0 for the process of apps' decommissioning?...

Browsing safely 2025-06-15

Browsing safely crossword puzzle
Across
  1. applications used to prevent the entry of virus into the computer system
  2. full form of virus
  3. acts done to protect one's computer system
  4. Collection of various networks in the form of a web
  5. providing malwares and viruses into one's computer through various links and emails
  6. illegal entry into one's computer through various links
  7. cyber crime in which money is demanded after attacking the victim
  8. a type of anti-virus
  9. befriending children on social media and causing harm through social media or physically
  10. full form of OTP
Down
  1. criminal activities intented to harm a person through online
  2. act of terrorism conducted through the use of internet
  3. full form of ICT
  4. sequence of characters or numbers used in any device or system to keep it protected
  5. act of harassing people through the use of internet

15 Clues: full form of ICTfull form of OTPfull form of virusa type of anti-virusacts done to protect one's computer systemCollection of various networks in the form of a webact of harassing people through the use of internetact of terrorism conducted through the use of internetillegal entry into one's computer through various links...

Kelompok 2 2025-04-19

Kelompok 2 crossword puzzle
Across
  1. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  4. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  9. Ahli dalam menulis kode untuk membuat perangkat lunak.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses penggunaan teknologi digital untuk melestarikan budaya.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  7. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  8. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  9. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 4 2025-04-19

Kelompok 4 crossword puzzle
Across
  1. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  2. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  3. Ahli dalam menulis kode untuk membuat perangkat lunak.
  4. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  5. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  6. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  7. Profesi yang menjaga keamanan sistem komputer.
  8. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  7. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Platform untuk memperkenalkan budaya Indonesia secara global.
  10. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  11. Perlindungan hukum atas hak merek, desain industri, paten, dll.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 9 2025-04-19

Kelompok 9 crossword puzzle
Across
  1. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Platform untuk memperkenalkan budaya Indonesia secara global.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  8. Profesi yang menjaga keamanan sistem komputer.
  9. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  10. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  11. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
Down
  1. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  2. Orang yang menciptakan software berbagai jenis permainan.
  3. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  4. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Ahli dalam menulis kode untuk membuat perangkat lunak.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  8. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  9. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 9 new 2025-04-19

kelompok 9 new crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Proses penggunaan teknologi digital untuk melestarikan budaya.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Profesi yang menjaga keamanan sistem komputer.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Orang yang menciptakan software berbagai jenis permainan.
  7. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  5. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  6. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  7. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  8. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  9. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  10. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  11. Ahli dalam menulis kode untuk membuat perangkat lunak.
  12. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Success 101 2024-10-04

Success 101 crossword puzzle
Across
  1. You should go to this school if you want to be a YouTuber
  2. This career is supported at academies at both Hampton and Kecoughtan
  3. Academy of ___and Public Safety supports future fire fighters
  4. A short speech that you should give when networking
  5. The school with the academy for future teachers
  6. If you want to be an actor, join this academy
  7. Perfect shirt for a job interview
  8. Attend this academy if you want to be a chef
  9. My Future, My ______
Down
  1. Perfect pants for a job interview
  2. This academy is like a private school within a school
  3. This high school has an academy that supports nursing
  4. This academy is for future lawyers
  5. The academy that all 9th graders are in
  6. Academy of Cybersecurity, Engineering, and _____
  7. A future welder in the shipyard should attend this school
  8. A group project focused on changing the community
  9. It is possible to graduate high school with this type of college degree

18 Clues: My Future, My ______Perfect pants for a job interviewPerfect shirt for a job interviewThis academy is for future lawyersThe academy that all 9th graders are inAttend this academy if you want to be a chefIf you want to be an actor, join this academyThe school with the academy for future teachersAcademy of Cybersecurity, Engineering, and _____...

Jenis Profesi 2024-08-08

Jenis Profesi crossword puzzle
Across
  1. menguasai bahasa pemrograman dan terampil menggunakannya
  2. seseorang pembuat konten kreatif
  3. orang yang mengajar dan menyediakan pendidikan untuk orang lain
  4. seseorang yang meneliti informasi menggunakan alat analisis data
  5. berkaitan erat dengan penemuan-penemuan baru
  6. orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
  7. mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
  8. pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
  1. menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
  2. bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
  3. melindungi sistem, jaringan, serta data dari serangan cyber
  4. profesional di bidang kuliner
  5. membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
  6. ndividu yang mempunyai pengaruh besar di media sosial
  7. bertugas mengendalikan pesawat
  8. maha guru
  9. seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
  10. berkaitan erat dengan keamanan dan ketertiban negaranya

18 Clues: maha guruprofesional di bidang kulinerbertugas mengendalikan pesawatseseorang pembuat konten kreatifberkaitan erat dengan penemuan-penemuan barundividu yang mempunyai pengaruh besar di media sosialmenguasai bahasa pemrograman dan terampil menggunakannyaberkaitan erat dengan keamanan dan ketertiban negaranya...

kelompok 3 2025-04-19

kelompok 3 crossword puzzle
Across
  1. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  2. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Ahli dalam menulis kode untuk membuat perangkat lunak.
  5. Platform untuk memperkenalkan budaya Indonesia secara global.
  6. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  2. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  3. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  4. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  5. Proses penggunaan teknologi digital untuk melestarikan budaya.
  6. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  7. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  8. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  9. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  10. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 7 2025-04-19

Kelompok 7 crossword puzzle
Across
  1. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  2. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  3. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  4. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  5. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  6. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  7. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Profesi yang menjaga keamanan sistem komputer.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  3. Ahli dalam menulis kode untuk membuat perangkat lunak.
  4. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  5. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  6. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  7. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  8. Platform untuk memperkenalkan budaya Indonesia secara global.
  9. Orang yang menciptakan software berbagai jenis permainan.
  10. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  11. Lembaga pemerintah yang mengatur HAKI di Indonesia.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Kelompok 8 2025-04-19

Kelompok 8 crossword puzzle
Across
  1. Platform untuk memperkenalkan budaya Indonesia secara global.
  2. Ahli dalam menulis kode untuk membuat perangkat lunak.
  3. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  6. Profesi yang menjaga keamanan sistem komputer.
  7. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
Down
  1. Proses penggunaan teknologi digital untuk melestarikan budaya.
  2. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
  3. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  4. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  5. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  6. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  7. Orang yang menciptakan software berbagai jenis permainan.
  8. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  9. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  10. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  11. Singkatan dari bidang pekerjaan di bidang teknologi informasi.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Informatika masa kini 2025-08-28

Informatika masa kini crossword puzzle
Across
  1. Teknologi keuangan berbasis digital, contohnya e-wallet.
  2. OTONOM Istilah lain untuk robot cerdas yang dapat bekerja secara otomatis.
  3. AWAN Penyimpanan data yang berbentuk terpusat di server internet.
  4. Sistem keamanan digital untuk melindungi data dan informasi.
  5. COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata).
  6. DATA Data dalam jumlah sangat besar, kompleks, dan beragam.
  7. Jaringan global yang menghubungkan jutaan komputer di seluruh dunia.
  8. Teknologi simulasi yang memungkinkan pertemuan jarak jauh dalam bentuk avatar 3D.
  9. TERTAMBAH Teknologi yang menggabungkan dunia nyata dan digital (Augmented …).
  10. Singkatan dari Artificial Intelligence (2 kata).
Down
  1. Istilah untuk uang digital terdesentralisasi, misalnya Bitcoin.
  2. BUATAN Sistem yang dapat meniru kemampuan berpikir manusia.
  3. Mesin pencari populer buatan Amerika Serikat.
  4. 4.0 Generasi revolusi industri yang identik dengan otomatisasi dan internet of things.
  5. STORAGE Teknologi penyimpanan data berbasis internet.
  6. OF THINGS Teknologi yang menghubungkan perangkat sehari-hari ke internet.
  7. SARAF TIRUAN Sistem komputasi yang meniru jaringan saraf otak manusia.
  8. Ilmu yang mempelajari pemrosesan informasi dengan komputer.
  9. BAHASA ALAMI Kemampuan komputer untuk memahami bahasa manusia.
  10. Singkatan dari Virtual Reality.

20 Clues: Singkatan dari Virtual Reality.Mesin pencari populer buatan Amerika Serikat.Singkatan dari Artificial Intelligence (2 kata).STORAGE Teknologi penyimpanan data berbasis internet.Teknologi keuangan berbasis digital, contohnya e-wallet.COMMUNICATION TECHNOLOGY Kepanjangan dari ICT (3 kata).Ilmu yang mempelajari pemrosesan informasi dengan komputer....

Banzai Internet Safety Crossword 2026 2026-01-12

Banzai Internet Safety Crossword 2026 crossword puzzle
Across
  1. A dishonest scheme to get information or money
  2. A self-replicating software program that attacks a computer system
  3. Harm inflicted through emails, texts or online websites.
  4. Software designed to damage a computer or phone
  5. Unwanted email or junk mail
  6. A secret combination of words or numbers to allows access to an online service
  7. The name you use to log into a website or service.
  8. Start of most website addresses and stands for World Wide Web
  9. A nickname for the Internet
  10. Leaving untrue or offensive messages on the internet
  11. An internet related crime
Down
  1. An action that's taken to protect computers and prevent online crimes.
  2. When someone tracks, lures, or harasses people online
  3. Someone who gains unauthorized access to people's computers
  4. The act of searching through websites
  5. A security system designed to block malicious threats to your computer
  6. An attempt to trick a person into giving away money or information by pretending to be a well-known company
  7. Computer equipment, machines and parts.
  8. Software that displays unwanted advertising on your computer

19 Clues: An internet related crimeUnwanted email or junk mailA nickname for the InternetThe act of searching through websitesComputer equipment, machines and parts.A dishonest scheme to get information or moneySoftware designed to damage a computer or phoneThe name you use to log into a website or service.Leaving untrue or offensive messages on the internet...

Get Secure 2019-08-26

Get Secure crossword puzzle
Across
  1. protection of information systems from damage or crime
  2. bad connection during online calls
  3. create a password
  4. a device that consists of a part that fits over a person's ears and a part into which the person can speak, used for communicating without using the hands
  5. connection to a network from a place that is far away
Down
  1. get into a network
  2. a package of software products sold together, usually having a similar look and common installation
  3. rules that help to protect a system
  4. the applications that a company uses for work

9 Clues: create a passwordget into a networkbad connection during online callsrules that help to protect a systemthe applications that a company uses for workconnection to a network from a place that is far awayprotection of information systems from damage or crime...

Security Awareness Week - Shrewsbury 2013-08-29

Security Awareness Week - Shrewsbury crossword puzzle
Across
  1. A more secure form of password
  2. The term used to describe IT Security
Down
  1. Caterpillar's method of classifying confidential data
  2. A computer virus designed to spread itself to other computers
  3. The act of manipulating people into divulging confidential information

5 Clues: A more secure form of passwordThe term used to describe IT SecurityCaterpillar's method of classifying confidential dataA computer virus designed to spread itself to other computersThe act of manipulating people into divulging confidential information

Racheal Tan Kai Luo - 8 Gamma 2023-01-19

Racheal Tan Kai Luo - 8 Gamma crossword puzzle
Across
  1. a personal data that social media will collect from you
  2. raw facts and figures
  3. Cyberattacks are usually aimed at _____ normal business processes
Down
  1. practice of protecting systems , network and program from digital attacks
  2. you have the right to ______ your data
  3. ____ must be used for specific and stated reason

6 Clues: raw facts and figuresyou have the right to ______ your data____ must be used for specific and stated reasona personal data that social media will collect from youCyberattacks are usually aimed at _____ normal business processespractice of protecting systems , network and program from digital attacks

TECHNO CROSSWORD 2024-11-12

TECHNO CROSSWORD crossword puzzle
Across
  1. People use this to connect, share photos, and send messages online.
  2. Devices that measure body temperature.
  3. The process of protecting devices from online attacks.
  4. Used to watch movies, shows, and news.
  5. A device that helps people take clear pictures or videos.
  6. Used for making calls and sending texts.
  7. A machine that can be programmed to do tasks by itself.
Down
  1. Portable devices used by students to access learning material.
  2. A flying device controlled by remote, often used to take pictures from above.
  3. Games played on consoles, computers, or mobile devices.
  4. An assistant on phones that talks back and helps with tasks.
  5. This device lets you see and hear people far away in real time.
  6. A place where you can find a lot of information on any topic.

13 Clues: Devices that measure body temperature.Used to watch movies, shows, and news.Used for making calls and sending texts.The process of protecting devices from online attacks.Games played on consoles, computers, or mobile devices.A machine that can be programmed to do tasks by itself.A device that helps people take clear pictures or videos....

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. The hero hacker — breaks systems to protect them.
  2. The “key” everyone forgets right when they need it most.
  3. It clogs your inbox like unwanted guests at a party.
  4. The practice of protecting systems and data from digital attacks.
  5. A person skilled at breaking into computer systems.
  6. When a website gets so many fake visitors it forgets how to work.
Down
  1. Digital kidnapping: your files are the hostages!
  2. A gift that brings trouble, not joy — just ask the Greeks!
  3. A program that detects and removes malicious software.
  4. Online impersonation so convincing it fools your eyes — and inbox.
  5. The digital gatekeeper that says, “You shall not pass!”
  6. When someone goes “fishing” for your passwords — but with emails.
  7. Turning words into secrets that only the right decoder can read.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. The “key” everyone forgets right when they need it most.
  2. When a website gets so many fake visitors it forgets how to work.
  3. A gift that brings trouble, not joy — just ask the Greeks!
  4. The digital gatekeeper that says, “You shall not pass!”
  5. Turning words into secrets that only the right decoder can read.
Down
  1. A program that detects and removes malicious software.
  2. The practice of protecting systems and data from digital attacks.
  3. Digital kidnapping: your files are the hostages!
  4. The hero hacker — breaks systems to protect them.
  5. When someone goes “fishing” for your passwords — but with emails.
  6. Online impersonation so convincing it fools your eyes — and inbox.
  7. A person skilled at breaking into computer systems.
  8. It clogs your inbox like unwanted guests at a party.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

Crossword Puzzle: Redefining Possible 2025-01-30

Crossword Puzzle: Redefining Possible crossword puzzle
Across
  1. Storage and processing of data over the internet
  2. The time to come
  3. Tech allowing machines to learn from data
  4. Tech that creates simulated experiences
  5. Analyzes data to find insights
  6. Hidden prejudice
  7. Celebrated on March 8th
  8. First computer programmer
  9. Variety in a group
  10. Bringing new ideas to life
  11. A set of instructions for a computer
  12. Person who manages the development of a product
  13. Small-scale technology
  14. Protection of digital information
Down
  1. Creates and maintains software
  2. "Mother of COBOL"
  3. A difficult task
  4. A person who plans and builds computer networks
  5. "The Mother of the Internet"
  6. The act of combining things into a whole
  7. Lead software engineer for the Apollo program
  8. Including everyone
  9. Mathematician who helped Apollo land on the moon
  10. Key to unlocking potential
  11. Machines that perform tasks automatically
  12. What we work towards for women in tech
  13. Field combining biology and tech
  14. The world of connected computers
  15. Designs user interfaces
  16. "Redefining ___"
  17. Tech focused on creating intelligent machines
  18. Inventor of frequency hopping spread spectrum

32 Clues: The time to comeA difficult taskHidden prejudice"Redefining ___""Mother of COBOL"Including everyoneVariety in a groupSmall-scale technologyDesigns user interfacesCelebrated on March 8thFirst computer programmerKey to unlocking potentialBringing new ideas to life"The Mother of the Internet"Creates and maintains softwareAnalyzes data to find insights...

tugas 2025-02-02

tugas crossword puzzle
Across
  1. istilah keamanan informasi di interne?
  2. pasukan terkoordinasi dari perangkat yang telah disusupi oleh virus pengertian dari?
  3. Virus yang menghancurkan file gambar, musik, sistem operasi dan kata sandi yaitu?
  4. Pembobol sistem komputer dan mencuri data?
  5. Yang digunakan peretas untuk melakukan aksinya?
  6. peretas yang menggunakan topi hitam disebut dengan?
  7. rekayasa pada awal munculnya internet cukup berhasil contoh nyata inilah kemunculan virus?
  8. era berapa ketika penetasan memiliki arti negatif?
  9. pharming dilakukan dengan menanamkan alamat internet palsu pada tabel apa?
  10. horse malware yang tampak seperti aplikasi perangkat lunak jinak tetapi membawa komponen jahat didalamnya yaitu?
Down
  1. malware yang dapat memantau dan merekam aktifitas pengguna yaitu?
  2. Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data yaitu?
  3. malware yang mampu mengenkripsi beberapa atau semua file yaitu?
  4. Perangkat lunak yang sering menempel pada perangkat lainya?
  5. Awal munculnya informatika peretas disebut dengan?
  6. phising adalah kejahatan biasanya target dihubungi melalui?
  7. Perilaku peretas berbentuk vandalisme digital yang mengganti halaman muka situs web dengan?
  8. perangkat lunak yang mendapat akses melewati lapisan security pengertian dari
  9. yang bersemangat menemukan hal hal baru?
  10. Dirancang untuk mengekploitasi kelemahan sistem tertentu?

20 Clues: istilah keamanan informasi di interne?yang bersemangat menemukan hal hal baru?Pembobol sistem komputer dan mencuri data?Yang digunakan peretas untuk melakukan aksinya?Awal munculnya informatika peretas disebut dengan?era berapa ketika penetasan memiliki arti negatif?peretas yang menggunakan topi hitam disebut dengan?...

Computer Virus 2024-09-09

Computer Virus crossword puzzle
Across
  1. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. - The act of securing data by converting it into a code.
  3. - Software that collects personal information without consent.
  4. - Process of a system being affected by malware.
  5. - Software intended to harm a computer or user.
  6. - Making copies of data to prevent loss.
  7. - Place where infected files are held to prevent harm.
  8. - Type of malware that encrypts files, demanding payment for their release.
  9. - Malicious software designed to damage or disrupt systems.
Down
  1. - The state of being guarded against malware and cyber threats.
  2. - A program that detects, prevents, and removes malicious software.
  3. - Potential source of harm to a computer system.
  4. - A security system that controls incoming and outgoing network traffic.
  5. - Unauthorized intrusion into a computer or network.
  6. - Practices to defend computers from digital threats.
  7. - The process of analyzing a computer to detect malware.
  8. - Program that seems legitimate but is used to deceive users and cause harm.
  9. - Process of installing the latest security patches and software fixes.
  10. - Unwanted software designed to throw advertisements.
  11. - A self-replicating program that spreads without human intervention.

20 Clues: - Making copies of data to prevent loss.- Software intended to harm a computer or user.- Potential source of harm to a computer system.- Process of a system being affected by malware.- Unauthorized intrusion into a computer or network.- Practices to defend computers from digital threats.- Unwanted software designed to throw advertisements....

Unit III Crossword II 2024-10-15

Unit III Crossword II crossword puzzle
Across
  1. Act of creating fraudulent digital signatures under the IT Act.
  2. Technique for securing data as per IT Act guidelines.
  3. Area where the IT Act has the power to enforce laws.
  4. Illegal content covered under Section 67.
  5. Term for records, documents, or data as defined in the IT Act.
  6. Legal action taken for offenses under the IT Act.
  7. Crime involving computers or networks under the IT Act.
  8. Authority to decide penalties for cyber offenses.
  9. Access without permission, covered under multiple sections.
Down
  1. Protection of information infrastructure under Section 70.
  2. Authority responsible for issuing digital signatures.
  3. Cybercrime involving fraudulent emails for personal data theft.
  4. Entity facilitating online services regulated under the Act.
  5. Changes or updates made to the IT Act, such as in 2008.
  6. Manipulation of computer source code, Section 65.
  7. Violation or illegal activity defined under the IT Act.
  8. Duty to protect sensitive data, highlighted in Section 72.
  9. Unauthorized access to computer systems as per Section 66.
  10. Type of signature recognized by the IT Act for authentication.
  11. Legal consequences for violating the IT Act.

20 Clues: Illegal content covered under Section 67.Legal consequences for violating the IT Act.Manipulation of computer source code, Section 65.Legal action taken for offenses under the IT Act.Authority to decide penalties for cyber offenses.Area where the IT Act has the power to enforce laws.Authority responsible for issuing digital signatures....

TTS INFORMATIKA X.G 2025-04-10

TTS INFORMATIKA X.G crossword puzzle
Across
  1. Operator pencarian untuk hasil yang persis sama
  2. Profesi yang membuat aplikasi atau software
  3. Hak yang melindungi karya tulis atau lagu
  4. Profesi yang merancang tampilan antarmuka
  5. Profesi yang merancang struktur sistem informasi
  6. Informasi bohong yang menyebar di internet
  7. Proses menyebarkan konten ke banyak orang
  8. Konten digital yang mengangkat cerita rakyat
  9. Profesi yang menjaga keamanan jaringan
  10. Profesi yang menganalisis data besar
  11. Lembaga yang mengatur konten digital di Indonesia
Down
  1. Media untuk berbagi video berisi kebudayaan lokal
  2. Situs untuk mengecek fakta
  3. Fitur Google untuk membandingkan dua hal
  4. Simbol untuk pengecualian kata dalam hasil pencarian
  5. Operator untuk mencari hasil dari situs tertentu
  6. Operator untuk mencari dalam rentang angka
  7. Surat resmi yang menyatakan hak atas ciptaan
  8. Singkatan dari Hak Atas Kekayaan Intelektual
  9. Unsur yang harus dijaga saat memproduksi konten budaya
  10. Proses memeriksa kebenaran suatu informasi
  11. Proses untuk memastikan informasi yang tersebar tidak palsu atau menyesatkan
  12. Seni tradisional yang bisa diangkat dalam konten digital
  13. HAKI yang melindungi logo perusahaan
  14. Institusi pemerintah yang mengurus HAKI di Indonesia

25 Clues: Situs untuk mengecek faktaHAKI yang melindungi logo perusahaanProfesi yang menganalisis data besarProfesi yang menjaga keamanan jaringanFitur Google untuk membandingkan dua halHak yang melindungi karya tulis atau laguProfesi yang merancang tampilan antarmukaProses menyebarkan konten ke banyak orangOperator untuk mencari dalam rentang angka...

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Profesi yang bertugas untuk mengelola data
  2. Orang yang mengedit konten
  3. Proses mencari informasi di internet
  4. Proses menilai kebenaran konten
  5. Profesi yang membuat perangkat lunak
  6. Lembaga yang mengurus HAKI di Indonesia
  7. Hak ekslusif atas suatu merek dagang
  8. Bentuk perlindungan HAKI untuk karya seni.
  9. Hasil pencarian yang ditampilkan
  10. Proses penyebaran konten di internet
  11. Alamat untuk mengakses situs web
  12. Organisasi yang bertugas memvalidasi konten negatif di Indonesia
  13. Mesin pencari yang fokus pada privasi pengguna
  14. Profesi yang mengelola jaringan komputer
  15. Mesin pencari bawaan Microsoft
Down
  1. Hak ekslusif atas suatu penemuan
  2. Konten yang berisi ujaran kebencian
  3. Profesi yang merancang dan membangun situs web
  4. Platform untuk video berdurasi panjang
  5. Proses pembuatan konten digital
  6. Mesin pencari populer di dunia
  7. Profesi yang membuat konten digital
  8. Platform medsos berbasis foto dan video
  9. Konten digital yang berupa tulisan
  10. Bertugas menjaga keamanan sistem komputer
  11. Konten yang mengandung tindakan kekerasan
  12. Profesi yang mendesain antarmuka pengguna
  13. Mesin pencari dari Tiongkok
  14. Konten yang berisi informasi palsu
  15. Platform untuk menyebarkan tulisan dan artikel

30 Clues: Orang yang mengedit kontenMesin pencari dari TiongkokMesin pencari populer di duniaMesin pencari bawaan MicrosoftProses pembuatan konten digitalProses menilai kebenaran kontenHak ekslusif atas suatu penemuanHasil pencarian yang ditampilkanAlamat untuk mengakses situs webKonten digital yang berupa tulisanKonten yang berisi informasi palsu...

Tugas Daring Informatika Nur Keisya R. P. A 25/X-I 2025-04-11

Tugas Daring Informatika Nur Keisya R. P. A 25/X-I crossword puzzle
Across
  1. Unsur tradisional Indonesia yang bisa dimasukkan dalam konten digital
  2. Media yang sering dipakai menyebar hoaks dengan cepat
  3. Proses membuat dan menyebarluaskan konten di media digital
  4. Profesi pembuat perangkat lunak
  5. Penemuan baru di bidang teknologi dilindungi dengan
  6. Platform populer berbagi video pendek
  7. Kata kunci untuk membatasi pencarian di satu situs saja
  8. Profesi yang menganalisis data untuk menemukan pola
  9. Lembaga yang mengurus HAKI di Indonesia
  10. Tindakan mengecek kebenaran informasi sebelum disebarkan
  11. Jenis HAKI untuk merek dagang atau simbol bisnis
  12. Singkatan dari Hak atas Kekayaan Intelektual
  13. Profesi yang membuat tampilan visual aplikasi/web
  14. Situs untuk mengecek kebenaran hoaks di Indonesia
Down
  1. Simbol yang digunakan untuk mencari exact match dalam mesin pencari
  2. Platform pencarian milik Google
  3. Istilah untuk berita bohong di internet
  4. Profesi yang mengatur jaringan komputer
  5. Operator pencarian untuk mengecualikan kata tertentu dari hasil pencarian
  6. Konten digital yang menggabungkan gambar, suara, dan teks
  7. Operator pencarian untuk menampilkan dua kata sekaligus
  8. Tujuan menyisipkan budaya dalam konten digital
  9. Tindakan untuk memastikan suatu informasi bukan hoaks
  10. Hak atas hasil ciptaan seperti lagu, film, tulisan
  11. Profesi yang menjaga keamanan sistem digital

25 Clues: Platform pencarian milik GoogleProfesi pembuat perangkat lunakPlatform populer berbagi video pendekIstilah untuk berita bohong di internetProfesi yang mengatur jaringan komputerLembaga yang mengurus HAKI di IndonesiaProfesi yang menjaga keamanan sistem digitalSingkatan dari Hak atas Kekayaan IntelektualTujuan menyisipkan budaya dalam konten digital...

Harley's Computer Apps. Crossword 2022-04-29

Harley's Computer Apps. Crossword crossword puzzle
Across
  1. a review game website that allows you to earn cash and buy upgrades
  2. Making sure your safe on the internet
  3. First thing we learned about
  4. Application that allows you to organize your information on a spreadsheet
  5. You can make your own website using this
  6. A citation Machine
  7. allows you to make a picture or text move or spin, etc.
  8. You can gather data from people who you share this with
  9. The brand of computers students use in PCM schools
  10. Company that owns sheets, docs, slides, etc.
Down
  1. the illegal act of using someone else's content without properly citing it
  2. Not letting people know about your personal life
  3. Application that allows you to make and share slides with people
  4. Application that allows you to create and edit videos for class
  5. what you always end your sentences in
  6. What gives slides their overall color and font
  7. Shortest unit of the school year
  8. what shape are the blocks from blooket
  9. How to do math using sheets
  10. The most commonly used game website for reviewing

20 Clues: A citation MachineHow to do math using sheetsFirst thing we learned aboutShortest unit of the school yearwhat you always end your sentences inMaking sure your safe on the internetwhat shape are the blocks from blooketYou can make your own website using thisCompany that owns sheets, docs, slides, etc.What gives slides their overall color and font...

test 2022-07-15

test crossword puzzle
Across
  1. Brand of sammi’s car -
  2. Basketball team michael supports -
  3. City they will live in after the wedding -
  4. How they met
  5. Location of their first post together on IG -
  6. Industry sammi works in -
  7. Color of michaels bathroom before they painted it -
  8. Sammi’s side hustle -
  9. State michael was raised in -
  10. Sauce michael hates -
  11. Music festival they attended -
  12. Month they met -
  13. Destination of first plane ride together -
  14. Engagement ring shape -
  15. Type of dance sammi did growing up -
  16. Sammis bridal shower was a ___ party -
  17. Michael proposed in ___ beach -
Down
  1. Sammis favorite flowers -
  2. Year they met -
  3. Attends ___ ___ community church -
  4. Type of engineer Michael is -
  5. European country michael lived in -
  6. Amusement park they had annual passes to -
  7. On the way to Big Sur they stopped at an ___ farm -
  8. City sammi did her internship in -
  9. City they took their engagement photos -
  10. Where they ate on their first date -
  11. Day of the week they attend life group -
  12. How we are honoring sammis dad at the wedding -
  13. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Sammis favorite flowers -Industry sammi works in -Type of engineer Michael is -State michael was raised in -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

test 2022-07-15

test crossword puzzle
Across
  1. City sammi did her internship in -
  2. Engagement ring shape -
  3. Sammi’s side hustle -
  4. How we are honoring sammis dad at the wedding -
  5. Where they ate on their first date -
  6. Sauce michael hates -
  7. Type of dance sammi did growing up -
  8. Industry sammi works in -
  9. Day of the week they attend life group -
  10. Sammis favorite flowers -
  11. Attends ___ ___ community church -
  12. Location of their first post together on IG -
  13. Year they met -
  14. Month they met -
  15. City they will live in after the wedding -
Down
  1. Amusement park they had annual passes to -
  2. City they took their engagement photos -
  3. Music festival they attended -
  4. Destination of first plane ride together -
  5. Color of michaels bathroom before they painted it -
  6. Basketball team michael supports -
  7. Brand of sammi’s car -
  8. State michael was raised in -
  9. European country michael lived in -
  10. Type of engineer Michael is -
  11. Sammis bridal shower was a ___ party -
  12. Michael proposed in ___ beach -
  13. On the way to Big Sur they stopped at an ___ farm -
  14. How they met
  15. City of the music festival they attended -

30 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -City sammi did her internship in -...

Wedding 2026-02-06

Wedding crossword puzzle
Across
  1. Where can you usually find the groom?
  2. Where was the couple's first date?
  3. What is the bride's cat's name?
  4. What country did the couple visit in June 2025?
  5. what is the bride's middle name?
  6. Where did the groom go to high school?
  7. Where was couple's first trip together?
  8. Where is Marcus' hometown?
  9. What is Marcus' nickname?
  10. What does the Alexis do as a career?
  11. What unit does the bride work in?
Down
  1. What is the bride's favorite cocktail?
  2. What is the groom's line name?
  3. What is the groom's cat's name?
  4. What month did the groom propose?
  5. What is the groom's favorite cocktail?
  6. What is the couple's goddaughter's name?
  7. What college did the bride earn her FIRST degree from?
  8. what is the Marcus' career?
  9. Where is the Lexi's hometown?
  10. Where did the groom go to college?
  11. Where did the bride go to high school?
  12. Who is the bride's favorite musical artist?
  13. How many years have the couple been together
  14. What is the nickname Lexi's family calls her?

25 Clues: What is Marcus' nickname?Where is Marcus' hometown?what is the Marcus' career?Where is the Lexi's hometown?What is the groom's line name?What is the groom's cat's name?What is the bride's cat's name?what is the bride's middle name?What month did the groom propose?What unit does the bride work in?Where was the couple's first date?...

complete_rmt_22 2022-02-09

complete_rmt_22 crossword puzzle
Across
  1. The role responsible for maintaining product roadmap
  2. The abbreviation for Innovation management.
  3. The meaning of RTE
  4. Creator of the Software Design plan
  5. The process of setting up an information pool, market segmentation, market sizing, customer analysis, competitor analysis, trend & technology analysis, internal analysis.
  6. The experience distilled from a project that should be actively taken into account in future projects in the context of KM.
  7. Role responsible for qualification of software
  8. Abbreviation for product management process
  9. Abbreviation for Scaled Agile Framenwork
  10. The time needed from creation of the problem to the resolution of the problem, i.e. rejection or the implementation and acceptance of a change.(2 words)
  11. Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
  12. Software Requirements Analysis process in ASPICE
  13. The meaning of swc
  14. Short name for workshops where a team reflects the way it works and identifies potentials for improvement.(plural)
  15. Abbreviation of Software Detailed Designs
  16. Abbreviation used for Cybersecurity Engineering process.
  17. Standard for road vehicles functional safety
  18. The prerequisite identified as necessary for a user, or a user group, to achieve a goal, within a specific context of use.
  19. Object oriented programming language lunched in 1995
  20. The abbreviation of Automotive Software Performance Improvement and Capability dEtermination
  21. The abbreviation of the business development process.
  22. The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
  23. The document that defines the safety strategy in the project
  24. The IEEE-STD-610 defines it as “An activity that ensures that an end product stakeholder’s true needs and expectations are met.”
  25. The abbreviation for the work result "Software Quality Assurance Plan", defined by IEEE 730.
  26. Record of the an exact result of a performed integration step.
  27. Abbreviation for a requirement management plan
  28. Role responsible for identification and analysis of market-specific trends & technologies.
  29. The inspection of selected processes in selected instances (projects, products, locations, …) and that identifies weaknesses in terms of compliance and risk
  30. The highest-level backlog in SAFe
  31. The process of identifying (current and future) business critical knowledge areas as well as capturing, developing, sharing, and effectively using organizational knowledge.
  32. The coordinator that helps the program achieve the program goals.
  33. Attribute of a change request derived from risk, impact, affected customers, upcoming release schedules, etc.
  34. The workresult work result defining the pricing in line with the market, in responsibility of the business development manager.
  35. Any potential failure identified in internal reviews, testing, etc.
  36. The infrastructure used by the project defined in the configuration management plan.
  37. Problem resolution management process in ASPICE
  38. Type of testing performed to expose defects in the interfaces and in the interactions between integrated components or systems.
  39. The task that tracks the program progress against the program goals and to identify potential deviations in time.
  40. Role responsible to create the cybersecurity concept.
Down
  1. Work result with the purpose to provide basic information about the expected outcome of the incubator project.
  2. Important event in the history or development of something or someone
  3. Abbreviation of Software integration and integration test process.
  4. An individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations. (ISO12207)
  5. The abbreviation for the features and high-level requirements
  6. Software integration and integration test process in ASPICE.
  7. The set of five criteria that a product name must fulfill in order to become a product brand.
  8. Abbreviation of User Experience Engineering process.
  9. Work result that is treated as a single entity in the configuration management process.
  10. The abbreviation of system test process
  11. Role responsible for evaluating the received new product ideas and giving feedback to the Employee (accept for further development, or reject).
  12. Task in portfolio management with the purpose to mitigate risks of double work in research and development and to use the scarce resources optimally.
  13. A software component, that contains one or more software components (units and/or other compositions)that makes hierarchical structures in the architectural design possible.
  14. A series of actions taken in order to achieve a certain result
  15. The abbreviation of software test process
  16. The role responsible to drive new business ideas, identify its business potential, and create new business models
  17. Standard used as reference for defining the User Experience Engineering process
  18. The abbreviation used for Problem Resolution Management process
  19. Work results that triggers the change management activities according to the change request management plan
  20. The name of the qualified set of frozen configuration items is
  21. The process established to maintain the integrity of all work results of a process or project and make them available to parties concerned.
  22. Role with skills that is independent of the project and performs process audits and assessments.
  23. Role responsible for deciding whether a change is to be applied.
  24. Smallest piece of software
  25. The strategy that provides the work result is to provide guidance for innovation activities in the next 5 years.
  26. The IEEE-STD-610 defines it as “A test of a system to prove that it meets all its specified requirements at a particular stage of its development.”
  27. Abbreviation of program management process
  28. A cross-functional group of 5-11 individuals who define, build, test, and deliver an increment of value in a short time box.
  29. Role responsible to plan, measure, act on and report the project.
  30. The abbreviation of Portfolio management process
  31. Implemented by planned activities, or divided into sub-goals
  32. The ordered list of features or enablers on a high level (e.g. epics), part of a program.
  33. A collection of projects which are connected by joint goals to obtain benefits not available from managing the projects individually.
  34. Abbreviation of Software Architectural Design
  35. Prioritization of software units to provide the information what is to be done in which order
  36. The fictitious yet realistic representations of users of a system, including details like their mental models, limitations in cognition or physical mobility.
  37. The list of the available product lines, products and product items with the corresponding license types and prices.
  38. The abbreviation for the work result "software project management plan", which is also defined by IEEE 1058
  39. Abbreviation for Subject Matter Expert.
  40. Abbreviation used for change request management process

80 Clues: The meaning of RTEThe meaning of swcSmallest piece of softwareThe highest-level backlog in SAFeCreator of the Software Design planThe abbreviation of system test processAbbreviation for Subject Matter Expert.Abbreviation for Scaled Agile FramenworkThe abbreviation of software test processAbbreviation of Software Detailed Designs...

GoGoByte Halloween English Quest 2025-10-29

GoGoByte Halloween English Quest crossword puzzle
Across
  1. A sweet food made from sugar and often flavored with chocolate or fruit.
  2. The structure of bones in a human or animal body.
  3. A violent physical attack
  4. A system or device that has been broken into or corrupted
  5. A machine that can carry out tasks automatically.
  6. A technology company specializing in cybersecurity.
  7. The complete absence of sound; a situation with no noise or talking.
Down
  1. A file or object sent with an email or message, or a strong emotional bond to something or someone.
  2. Twelve o'clock at night; the middle of the night.
  3. To break free from a dangerous or confining situation.
  4. To speak very quietly, using one's breath rather than one's throat.
  5. Extreme fear, often associated with horror.
  6. A place where you work, often with computers and desks.

13 Clues: A violent physical attackExtreme fear, often associated with horror.Twelve o'clock at night; the middle of the night.The structure of bones in a human or animal body.A machine that can carry out tasks automatically.A technology company specializing in cybersecurity.To break free from a dangerous or confining situation....

CyberQuest 2025-10-18

CyberQuest crossword puzzle
Across
  1. It clogs your inbox like unwanted guests at a party.
  2. The “key” everyone forgets right when they need it most.
  3. The digital gatekeeper that says, “You shall not pass!”
  4. The practice of protecting systems and data from digital attacks.
  5. When someone goes “fishing” for your passwords — but with emails.
  6. The hero hacker — breaks systems to protect them.
  7. A gift that brings trouble, not joy — just ask the Greeks!
Down
  1. Digital kidnapping: your files are the hostages!
  2. When a website gets so many fake visitors it forgets how to work.
  3. Online impersonation so convincing it fools your eyes — and inbox.
  4. A program that detects and removes malicious software.
  5. A person skilled at breaking into computer systems.
  6. Turning words into secrets that only the right decoder can read.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

CYBERCONQUEST 2025-10-18

CYBERCONQUEST crossword puzzle
Across
  1. When someone goes “fishing” for your passwords — but with emails.
  2. A gift that brings trouble, not joy — just ask the Greeks!
  3. It clogs your inbox like unwanted guests at a party.
  4. A program that detects and removes malicious software.
  5. The hero hacker — breaks systems to protect them.
  6. The digital gatekeeper that says, “You shall not pass!”
Down
  1. When a website gets so many fake visitors it forgets how to work.
  2. Digital kidnapping: your files are the hostages!
  3. The “key” everyone forgets right when they need it most.
  4. The practice of protecting systems and data from digital attacks.
  5. Online impersonation so convincing it fools your eyes — and inbox.
  6. Turning words into secrets that only the right decoder can read.
  7. A person skilled at breaking into computer systems.

13 Clues: Digital kidnapping: your files are the hostages!The hero hacker — breaks systems to protect them.A person skilled at breaking into computer systems.It clogs your inbox like unwanted guests at a party.A program that detects and removes malicious software.The digital gatekeeper that says, “You shall not pass!”...

Technology 2021-10-28

Technology crossword puzzle
Across
  1. a saved link to a particular web page
  2. the heart of operating system
  3. measures to protect of computer
  4. does not eliminate the servers
  5. collection of physical part of comp system
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  2. video adapter
  3. conventional method of transmitting data
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.

12 Clues: video adapterthe heart of operating systemdoes not eliminate the serversmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

IT Crossword 2021-10-28

IT Crossword crossword puzzle
Across
  1. a saved link to a particular web page.
  2. the heart of operating system.
  3. measures to protect of computer.
  4. does not eliminate the servers.
  5. collection of physical part of comp system.
Down
  1. exclusive right as recognized in each country to publish and sell artistic and literacy materials.
  2. video adapter.
  3. conventional method of transmitting data.
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. part of application that performs a task not known to a user.
  6. part of computer system or network that is designed to block unauthorized access by permitting outward communication.
  7. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result

12 Clues: video adapter.the heart of operating system.does not eliminate the servers.measures to protect of computer.a saved link to a particular web page.conventional method of transmitting data.collection of physical part of comp system.part of application that performs a task not known to a user....

Cyberpuzzle 2023-08-08

Cyberpuzzle crossword puzzle
Across
  1. Substitute_ with numbers, punctuation marks or symbols when creating your password
  2. Phishing attempt directed at specific individuals or companies
  3. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  4. Kind of software used to prevent, scan, detect and delete viruses from a computer
  5. Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
  6. Cybersecurity Awareness Month
  7. Mandatory to wear inside the organisation and to remove outside
Down
  1. Action to do when I receive a suspicious email
  2. When available, use stronger_for an added layer of security
  3. Type of malware that disrupts computers, servers, and other devices
  4. Phishing attack deployed via SMS message
  5. Defensive technology designed to keep the bad guys out

12 Clues: Cybersecurity Awareness MonthPhishing attack deployed via SMS messageAction to do when I receive a suspicious emailDefensive technology designed to keep the bad guys outWhen available, use stronger_for an added layer of securityPhishing attempt directed at specific individuals or companies...

The Wedding Crossword 2021-03-28

The Wedding Crossword crossword puzzle
Across
  1. What is Liam's favourite game?
  2. Where did Liam and Ais go on their first date?
  3. What did Ais want to be when she grew up?
  4. Liam and Ais went to the Six Nations in Dublin to see Ireland play what team?
  5. What is Ais's Godmother's surname?
  6. Where did Liam and Ais meet for the very first time?
  7. What TV computer nerd inspired Ais to consider studying cybersecurity and forensics?
  8. An Irish fairy known for being talkative and mischievous
  9. Liam and Ais share their favourite cake - what is it?
  10. Where did Liam and Ais live in Cork?
Down
  1. One of the destinations on the honeymoon
  2. Liam and Ais's favourite place to visit in Koln.
  3. Where did Liam go to the Gaelteacht?
  4. What is Ais's favourite game?
  5. Ais and Liam got back into Formula One last year - what's their favourite team?
  6. What is Liam's Godmother's surname?
  7. Ais's childhood cat is famous at the local vet for what?
  8. What is the name of Liam's personal pandemic hairdresser?

18 Clues: What is Ais's favourite game?What is Liam's favourite game?What is Ais's Godmother's surname?What is Liam's Godmother's surname?Where did Liam go to the Gaelteacht?Where did Liam and Ais live in Cork?One of the destinations on the honeymoonWhat did Ais want to be when she grew up?Where did Liam and Ais go on their first date?...

Technology CW 2023-06-07

Technology CW crossword puzzle
Across
  1. a proprietary audio/video interface for transmitting uncompressed video data
  2. the protection of computer systems and networks
  3. a method of transmitting and receiving messages using electronic devices.
  4. a file format developed by Adobe in 1992 to present documents
  5. a hardware or software component that stores data
  6. data using a two-symbol system.
  7. a file format developed by Adobe in 1992 to present documents
  8. a coding format for digital audio
  9. a mapping from some domain (for example, a range of integers)
  10. a humanoid robot or synthetic organism designed to imitate a human
Down
  1. blocks of data created by a web server
  2. a file format developed by Adobe in 1992 to present documents
  3. a bitmap image format that was developed by a team at the online services provider
  4. a collection of discrete values that convey information
  5. the most important processor in a given computer.
  6. a commonly used method of lossy compression for digital images
  7. an American multinational technology company
  8. a digital multimedia container format most commonly used to store video and audio
  9. a method of representing data
  10. any software intentionally designed to cause disruption to a computer

20 Clues: a method of representing datadata using a two-symbol system.a coding format for digital audioblocks of data created by a web serveran American multinational technology companythe protection of computer systems and networksthe most important processor in a given computer.a hardware or software component that stores data...

kelompok 2 2025-04-19

kelompok 2 crossword puzzle
Across
  1. Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
  2. Profesi yang menjaga keamanan sistem komputer.
  3. Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
  4. Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
  5. Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
  6. Perlindungan hukum atas hak merek, desain industri, paten, dll.
  7. Proses penggunaan teknologi digital untuk melestarikan budaya.
  8. Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
  9. Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
  10. Individu yang berperan dalam perencanaan dan pengevaluasian IT.
  11. Platform untuk memperkenalkan budaya Indonesia secara global.
  12. Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
  13. Ahli dalam menulis kode untuk membuat perangkat lunak.
Down
  1. Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
  2. Singkatan dari bidang pekerjaan di bidang teknologi informasi.
  3. Lembaga pemerintah yang mengatur HAKI di Indonesia.
  4. Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
  5. Orang yang menciptakan software berbagai jenis permainan.
  6. Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
  7. Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.

20 Clues: Profesi yang menjaga keamanan sistem komputer.Lembaga pemerintah yang mengatur HAKI di Indonesia.Ahli dalam menulis kode untuk membuat perangkat lunak.Orang yang menciptakan software berbagai jenis permainan.Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.Disiplin ilmu yang mempelajari fenomena di sekitar komputer....

Embracing the Digital Tapestry 2024-02-11

Embracing the Digital Tapestry crossword puzzle
Across
  1. The act of introducing new ideas, devices, or methods.
  2. Digital or virtual currency secured by cryptography.
  3. The ability to understand and share the feelings of another in the context of digital interactions.
  4. The state or condition of being free from public attention in the digital realm.
  5. A global system of interconnected computer networks.
Down
  1. Simulation of human intelligence in machines for performing complex tasks.
  2. Online platforms that enable users to create, share content, or participate in social networking.
  3. A decentralized ledger of all transactions across a network.
  4. The era marked by rapid technological advancements and global connectivity.
  5. Protective measures and technologies used to safeguard information and systems.

10 Clues: Digital or virtual currency secured by cryptography.A global system of interconnected computer networks.The act of introducing new ideas, devices, or methods.A decentralized ledger of all transactions across a network.Simulation of human intelligence in machines for performing complex tasks....

technical 2024-07-29

technical crossword puzzle
Across
  1. This language is known for its simplicity and is named after a type of snake.
  2. The practice of protecting systems and networks from digital attacks.
  3. A widely used operating system developed by Microsoft.
  4. Management This acronym refers to a type of database that organizes data into tables.
  5. The method used to connect multiple devices in a network.
  6. A diagram used to visually represent the flow of a program.
Down
  1. A common tool used to prevent unauthorized access to a network.
  2. The physical components of a computer system.
  3. This term refers to a device that stores data using magnetic disks.
  4. The process of writing and maintaining the source code of software.

10 Clues: The physical components of a computer system.A widely used operating system developed by Microsoft.The method used to connect multiple devices in a network.A diagram used to visually represent the flow of a program.A common tool used to prevent unauthorized access to a network.This term refers to a device that stores data using magnetic disks....

Internet Safety 2025-03-07

Internet Safety crossword puzzle
Across
  1. video-taping the assault of someone for social media attention
  2. A loud call of cry used when expressing strong emotions
  3. Committing illegal acts on computers or the internet
Down
  1. A type of software designed to block access to something until an amount of money is paid
  2. The act of insulting or using verbal hostility towards someone
  3. unauthorized reproduction of someone's intellectual property without their consent
  4. The protection of crime and unauthorized access from data, network, and devices
  5. Files of data made to track your activities and information online
  6. The act of using social media to watch, monitor what someone is doing and harass them
  7. How people talk online

10 Clues: How people talk onlineCommitting illegal acts on computers or the internetA loud call of cry used when expressing strong emotionsThe act of insulting or using verbal hostility towards someonevideo-taping the assault of someone for social media attentionFiles of data made to track your activities and information online...

Risk Culture Awareness 2022-01-18

Risk Culture Awareness crossword puzzle
Across
  1. your ability and willingness to stomach a decline in the value of your investments.
  2. risk of loss resulting from ineffective or failed internal processes, people, systems
  3. not part of operational risk
  4. chance of something happening
  5. level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
  6. there are three lines of them
Down
  1. reputational harm stemming from a cyberattack or breach within an organization's network
  2. you are part of this line
  3. represents the third line
  4. the elimination of hazards, activities and exposures that can negatively affect an organization and its assets

10 Clues: you are part of this linerepresents the third linenot part of operational riskchance of something happeningthere are three lines of themyour ability and willingness to stomach a decline in the value of your investments.risk of loss resulting from ineffective or failed internal processes, people, systems...

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Tech'22 2022-01-07

Tech'22 crossword puzzle
Across
  1. ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
  2. A unique and non-interchangeable unit of data stored on a blockchain.
  3. A network of 3D virtual worlds focused on social connection.
  4. Everything as a service
Down
  1. _______ automation: orchestrated use of multiple technologies, tools or platforms including AI for automation
  2. Refers to all the cryptocurrencies other than Bitcoin.
  3. __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
  4. ____3: New age internet.
  5. The combination of video games and decentralized finance.
  6. Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.

10 Clues: Everything as a service____3: New age internet.Refers to all the cryptocurrencies other than Bitcoin.The combination of video games and decentralized finance.A network of 3D virtual worlds focused on social connection.A unique and non-interchangeable unit of data stored on a blockchain....

Cyber Security Awareness Month 2022-09-22

Cyber Security Awareness Month crossword puzzle
Across
  1. Always hover over these in emails before you click them.
  2. You can send all suspicious emails to this email address so the security team can review them for you.
  3. These emails entice you to click an unsafe link or attachment.
  4. This is cybersecurity awareness month.
  5. Always tell this person if an incident occurs
Down
  1. Never leave you company computer or phone like this
  2. This is a password that contains a long string of words that are easy to remember but hard to guess
  3. Never share this with anyone
  4. This can infect your computer when you download unsafe software
  5. Always get approval from this department before downloading any software

10 Clues: Never share this with anyoneThis is cybersecurity awareness month.Always tell this person if an incident occursNever leave you company computer or phone like thisAlways hover over these in emails before you click them.These emails entice you to click an unsafe link or attachment.This can infect your computer when you download unsafe software...

Science and technology C1 2024-03-01

Science and technology C1 crossword puzzle
Across
  1. the development and use of a new idea or method
  2. becoming very popular very quickly on the internet
  3. protecttive measures taken against the criminal access of electronic data
  4. very modern
  5. to obtain a more powerful or feature-rich computer or electronic device
  6. a person who is enthusiastic about new technology
  7. involving or causing a complete or dramatic change and improvement
Down
  1. a person who fears or dislikes new technology, especially computers, and does not want to use it
  2. a small mechanical or electronic device or too
  3. not in use any more, having been replaced by something better
  4. a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology
  5. to suddenly stop working

12 Clues: very modernto suddenly stop workinga small mechanical or electronic device or toothe development and use of a new idea or methoda person who is enthusiastic about new technologybecoming very popular very quickly on the internetnot in use any more, having been replaced by something better...

Impact of computing 2025-03-25

Impact of computing crossword puzzle
Across
  1. It verifies the identity of websites, individuals, organizations, or devices.
  2. A type of license that allows sharing and reuse of copyrighted material
  3. The protection of information systems from theft or damage
  4. The ability of a system to keep running without failure
  5. Loss of jobs due to automation
Down
  1. The unauthorized access to or use of computer systems
  2. The use of technology to collect and analyze large amounts of data
  3. A type of bias found in algorithms due to unrepresentative data
  4. The gap between those with and without access to technology
  5. It is essentially public participation in scientific research.
  6. The practice of obtaining information from a large group online
  7. A cyber crime where people are tricked into revealing sensitive information.

12 Clues: Loss of jobs due to automationThe unauthorized access to or use of computer systemsThe ability of a system to keep running without failureThe protection of information systems from theft or damageThe gap between those with and without access to technologyIt is essentially public participation in scientific research....

Cybersecurity Awareness Crossword 2022-09-10

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. malware designed to deny a user or organization access to files on their computer
  2. _____ theft happens when someone impersonates people to commit fraud
  3. is an attack that attempts to steal your money or your identity via voice call
  4. provides the first line of defence against unauthorized access to your computer and personal information
Down
  1. security exploit in which an infected USB charging station is used to compromise connected devices
  2. social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
  3. type of malicious software or malware that is installed on a computer without the end user's knowledge.
  4. is an attack that attempts to steal your money or your identity via email

8 Clues: _____ theft happens when someone impersonates people to commit fraudis an attack that attempts to steal your money or your identity via emailis an attack that attempts to steal your money or your identity via voice callmalware designed to deny a user or organization access to files on their computer...

Basic Cybersecurity Terms 2025-01-27

Basic Cybersecurity Terms crossword puzzle
Across
  1. Force Attack
  2. Horse
  3. Engineering
  4. Web
  5. Attack
Down
  1. Authentication (MFA)
  2. (Virtual Private Network)
  3. (Distributed Denial-of-Service) Attack

8 Clues: WebHorseAttackEngineeringForce AttackAuthentication (MFA)(Virtual Private Network)(Distributed Denial-of-Service) Attack

Cyber ethics terms 2021-08-25

Cyber ethics terms crossword puzzle
Across
  1. unauthorized use or reproduction of another's work
  2. legal right, given to an originator
  3. a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
  4. correct or acceptable way of communicating on the internet
  5. moral principles
  6. a document stipulating constraints and practices that a user must agree to for access
  7. a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
  1. the philosophic study of ethics pertaining to computers
  2. all rights associated with intangible assets owned by a person or company
  3. criminal activities carried out by means of computers or the internet
  4. bullying that is cyber
  5. tricking someone on the web
  6. allows the creator protection from theft of their idea
  7. abusive message posted on the internet

14 Clues: moral principlesbullying that is cybertricking someone on the weblegal right, given to an originatorabusive message posted on the internetunauthorized use or reproduction of another's workallows the creator protection from theft of their ideathe philosophic study of ethics pertaining to computers...

CIS 178 Participation 3 Security crossword 2023-04-21

CIS 178 Participation 3 Security crossword crossword puzzle
Across
  1. information for users online activity
Down
  1. Protects devices services and netwoks
  2. two components to verify users
  3. designed to stop remove viruses

4 Clues: two components to verify usersdesigned to stop remove virusesProtects devices services and netwoksinformation for users online activity

Technology 2021-10-28

Technology crossword puzzle
Across
  1. part of computer system or network that is designed to block unauthorized access by permitting outward communication
  2. video adapter
  3. error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
  4. exclusive right as recognized in each country to publish and sell artistic and literacy materials
  5. measures to protect of computer
  6. not eliminate the servers
  7. a saved link to a particular web page
Down
  1. the heart of operating system
  2. conventional method of transmitting data
  3. part of application that performs a task not known to a user
  4. a software system that links top on screen to related info n graphics which are typically accessed by point and click method
  5. collection of physical part of comp system

12 Clues: video adapternot eliminate the serversthe heart of operating systemmeasures to protect of computera saved link to a particular web pageconventional method of transmitting datacollection of physical part of comp systempart of application that performs a task not known to a user...

Cyber Security Crossword 2024-01-16

Cyber Security Crossword crossword puzzle
Across
  1. A malicious program that infects computers without user knowledge or permission.
  2. Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
  3. Malicious party attacking a company.
  4. A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
  5. attack that affects availability of a resource.
  6. A botnet is a network of private computers infected with malicious software.
Down
  1. Secret expression required to gain access to a computing system.
  2. Attack type.
  3. Excessive push notifications leading to unwanted response.
  4. authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
  5. Data Leakage due to well-crafted AI prompt.
  6. Firewall type that protects Web-based Applications.

12 Clues: Attack type.Malicious party attacking a company.Data Leakage due to well-crafted AI prompt.attack that affects availability of a resource.Firewall type that protects Web-based Applications.Excessive push notifications leading to unwanted response.Secret expression required to gain access to a computing system....

Information, data and technology ESL vocabulary 2024-12-16

Information, data and technology ESL vocabulary crossword puzzle
Across
  1. An organized collection of data
  2. Programs and other operating information used by a computer
  3. The process of encoding information to prevent unauthorized access
  4. A collection of related data
  5. Intelligence (AI): The simulation of human intelligence processes by machines
  6. Retrieval: The process of obtaining information from a database or archive
Down
  1. The science of collecting, analyzing, and interpreting data
  2. Information collected for analysis
  3. Mining: The practice of examining large databases to generate new information
  4. Computing: The practice of using a network of remote servers to store and process data
  5. of Things (IoT): The interconnection of computing devices embedded in everyday objects
  6. Measures taken to protect a computer or computer system against unauthorized access
  7. Data: Large and complex data sets that require advanced methods to analyze
  8. Data that provides information about other data
  9. A process or set of rules followed in problem-solving operations

15 Clues: A collection of related dataAn organized collection of dataInformation collected for analysisData that provides information about other dataThe science of collecting, analyzing, and interpreting dataPrograms and other operating information used by a computerA process or set of rules followed in problem-solving operations...

26. Technology 2023-09-09

26. Technology crossword puzzle
Across
  1. A handheld device that combines a phone with computing functions.
  2. A machine designed to carry out tasks autonomously or under human control.
  3. A machine that processes information and performs tasks.
  4. A simulated environment created by computer technology.
  5. Global Positioning System, used for location and navigation.
  6. The process of encoding information to secure it from unauthorized access.
  7. A global network that connects computers and devices worldwide.
  8. Information that can be stored, processed, and analyzed.
Down
  1. Machines and software that can think and learn like humans.
  2. The measurement and analysis of unique physical or behavioral characteristics for identification.
  3. The physical components of computers and electronic devices.
  4. Programs and applications that run on computers and devices.
  5. Measures taken to protect computer systems and data from cyber threats.
  6. The creation of three-dimensional objects from digital designs.

14 Clues: A simulated environment created by computer technology.A machine that processes information and performs tasks.Information that can be stored, processed, and analyzed.Machines and software that can think and learn like humans.The physical components of computers and electronic devices.Programs and applications that run on computers and devices....

vocab 2025-03-13

vocab crossword puzzle
Across
  1. An institution that holds historical artifacts
  2. the branch of science and engineering devoted to designing, producing, and using structures, devices, and systems by manipulating atoms and molecules at nanoscale
  3. Structure made of sand
  4. what families do when they cook outside in the summer
  5. what families do when they prepare food for an outdoor mean
  6. The ability of computers to do tasks traditionally done by humans
  7. An event that hosts musical performances
Down
  1. Protecting networks, devices, and date from criminal use
  2. the use of automatic equipment in manufacturing
  3. sport of using a board on the water
  4. the ability to maintain at a certain rate
  5. the creation of new ideas or methods
  6. An activity that you do while swimming that allows you to see underwater
  7. the flame you make while on a nature excursion

14 Clues: Structure made of sandsport of using a board on the waterthe creation of new ideas or methodsAn event that hosts musical performancesthe ability to maintain at a certain rateAn institution that holds historical artifactsthe flame you make while on a nature excursionthe use of automatic equipment in manufacturing...

Impact of computing 2025-03-25

Impact of computing crossword puzzle
Across
  1. A cyber crime where people are tricked into revealing sensitive information.
  2. The unauthorized access to or use of computer systems
  3. The use of technology to collect and analyze large amounts of data
  4. The ability of a system to keep running without failure
  5. The spread of false or misleading information online
  6. It is essentially public participation in scientific research.
  7. The protection of information systems from theft or damage
Down
  1. The gap between those with and without access to technology
  2. Loss of jobs due to automation
  3. A type of bias found in algorithms due to unrepresentative data
  4. The ability to use digital technology effectively
  5. It verifies the identity of websites, individuals, organizations, or devices.
  6. A type of license that allows sharing and reuse of copyrighted material
  7. The practice of obtaining information from a large group online

14 Clues: Loss of jobs due to automationThe ability to use digital technology effectivelyThe spread of false or misleading information onlineThe unauthorized access to or use of computer systemsThe ability of a system to keep running without failureThe protection of information systems from theft or damage...

Crash Course Computer Science Cybersecurity 2019-02-25

Crash Course Computer Science Cybersecurity crossword puzzle
Across
  1. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
  2. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
  3. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
  4. Another issue with biometric authentication is it what
  5. How a system is secured what on who it’s being secured against
  6. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
  7. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
Down
  1. the best we have right now is a process called Independent Verification and ____
  2. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
  3. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
  4. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
  5. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
  6. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
  7. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
  8. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
  9. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file

16 Clues: Another issue with biometric authentication is it whatHow a system is secured what on who it’s being secured againstthe best we have right now is a process called Independent Verification and ____Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what...

Cybersecurity Awareness Month - Week 3 2022-10-05

Cybersecurity Awareness Month - Week 3 crossword puzzle
Across
  1. Cirrus' tool for endpoint security
  2. A memorized secret consisting of a sequence of random words that is longer than a typical password
  3. Cirrus' email security platform
  4. A password attack that uses trial-and-error by attempting every possible combination
  5. Malware that disables access to data until a fee is paid
  6. A type of virus that automatically spreads itself
Down
  1. software designed to detect and destroy viruses
  2. A network of devices infected and controlled by the same virus
  3. A physical device that connects to a network
  4. A social engineering attack delivered by SMS text message
  5. A phishing attack aimed at senior executives
  6. The process of encoding data using complex algorithms for confidentiality
  7. An attack that prompts an MFA approval request over and over
  8. Malware that is disguised as legitimate software
  9. A social engineering technique where an attacker creates a fake scenario
  10. A type of trojan spyware that records your keystrokes

16 Clues: Cirrus' email security platformCirrus' tool for endpoint securityA physical device that connects to a networkA phishing attack aimed at senior executivessoftware designed to detect and destroy virusesMalware that is disguised as legitimate softwareA type of virus that automatically spreads itselfA type of trojan spyware that records your keystrokes...

Crash Course Computer Science Cybersecurity 2019-02-25

Crash Course Computer Science Cybersecurity crossword puzzle
Across
  1. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
  2. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
  3. How a system is secured what on who it’s being secured against
  4. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
  5. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
  6. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
  7. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
  8. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
Down
  1. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
  2. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
  3. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
  4. the best we have right now is a process called Independent Verification and ____
  5. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
  6. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what
  7. Another issue with biometric authentication is it what
  8. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch

16 Clues: Another issue with biometric authentication is it whatHow a system is secured what on who it’s being secured againstthe best we have right now is a process called Independent Verification and ____Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what...

Crash Course Computer Science Cybersecurity 2019-02-25

Crash Course Computer Science Cybersecurity crossword puzzle
Across
  1. Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what
  2. Operating Systems attempt to _____ applications by giving each their own block of memory that others programs can’t touch
  3. To differentiate between right and wrong people, we use ____the process by which a computer understands who it’s interacting with.Generally, there are three types, each with their own pros and cons: What you know authentication is based on knowledge of a secret that should be known only by the real user and the computer
  4. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -____ permission allows a user to modify the contents
  5. What you know and what you have authentication have the nice property of being ______ either correct or incorrect
  6. Good developers should take the approach that, not if, but when their programs are compromised, the damage should be limited and contained, and not let it compromise other things running on the computer. This principle is called what
  7. They typically require _________, so it’s much harder for remote attackers to gain access. What you are authentication is based on... you! You authenticate by presenting yourself to the computer
  8. Another issue with biometric authentication is it what
Down
  1. So,security experts suggest using two or more forms of authentication for important Accounts. This is known as two-factor or ______ authentication
  2. For organizations with users at different levels of access it’s especially important for Access Control Lists to be _____ to ensure secrecy, integrity and availability
  3. the best we have right now is a process called Independent Verification and ____
  4. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.-____ permission allows a user to run a file, like a program
  5. How a system is secured what on who it’s being secured against
  6. What is a set of techniques to protect the secrecy, integrity and availability of computer systems and data against threats
  7. After authentication comes Access Control. This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer. -_____permission allows a user to see the contents of a file
  8. To achieve these three general goals, security experts start with a specification of who your “enemy” is, at an abstract level, called a what

16 Clues: Another issue with biometric authentication is it whatHow a system is secured what on who it’s being secured againstthe best we have right now is a process called Independent Verification and ____Biometric authentication, however, is ___________. There’s some chance the system won’t recognize you what...

9ABD 2025-04-15

9ABD crossword puzzle
Across
  1. that may use quantum encryption to protect data.
  2. between two consecutive wave peaks.
  3. link between particles no matter how far apart.
  4. can act as both a wave and a particle.
  5. Spectra,Unique patterns of light produced by atoms when electrons drop energy levels.
  6. Principle,Heisenberg’s rule: you can’t know both position and momentum precisely.
  7. Effect,Electrons are ejected when light hits a surface in this quantum phenomenon.
  8. particle of light with no mass, just energy.
  9. Polarization,Describes the direction of oscillation in a transverse wave.
Down
  1. happens to electrons in the photoelectric effect.
  2. of wave cycles per second.
  3. Mechanics,Branch of physics that explains the behavior of particles on a small scale.
  4. Phenomena,General term for strange behavior at the atomic and subatomic levels.
  5. basic unit of matter, central to quantum studies.
  6. a quantum system exists in multiple states at once.
  7. to excite electrons or eject them from metal surfaces.
  8. Behaviors,Includes reflection, refraction, diffraction, and interference.
  9. display type that relies on polarized light.
  10. Wave,Electromagnetic radiation that can behave like both a wave and a particle.

19 Clues: of wave cycles per second.between two consecutive wave peaks.can act as both a wave and a particle.display type that relies on polarized light.particle of light with no mass, just energy.link between particles no matter how far apart.that may use quantum encryption to protect data.happens to electrons in the photoelectric effect....

it-words 2022-11-08

it-words crossword puzzle
Across
  1. communication over a distance by cable, telegraph or telephone
  2. a person who uses or operates something, especially a computer or other machine
  3. WWW
  4. copy (data) from one computer system to another, typically over the internet
  5. the state of being protected against the criminal or unauthorized use of electronic data or the measures taken to achieve this
  6. networked computing facilities providing remote data storage and processing services via the internet
  7. the activity of buying and selling, especially on a large scale
Down
  1. program instructions
  2. you have to press it to turn on the computer
  3. the programs and other operating information used by a computer
  4. Excel table with one word
  5. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  6. modern technology's synonym
  7. input device with which you can write text
  8. the "soul" of the computer

15 Clues: WWWprogram instructionsExcel table with one wordthe "soul" of the computermodern technology's synonyminput device with which you can write textyou have to press it to turn on the computercommunication over a distance by cable, telegraph or telephonethe programs and other operating information used by a computer...

Browsing safely 2025-06-15

Browsing safely crossword puzzle
Across
  1. applications used to prevent the entry of virus into the computer system
  2. full form of virus
  3. acts done to protect one's computer system
  4. Collection of various networks in the form of a web
  5. providing malwares and viruses into one's computer through various links and emails
  6. illegal entry into one's computer through various links
  7. cyber crime in which money is demanded after attacking the victim
  8. a type of anti-virus
  9. befriending children on social media and causing harm through social media or physically
  10. full form of OTP
Down
  1. criminal activities intented to harm a person through online
  2. act of terrorism conducted through the use of internet
  3. full form of ICT
  4. sequence of characters or numbers used in any device or system to keep it protected
  5. act of harassing people through the use of internet

15 Clues: full form of ICTfull form of OTPfull form of virusa type of anti-virusacts done to protect one's computer systemCollection of various networks in the form of a webact of harassing people through the use of internetact of terrorism conducted through the use of internetillegal entry into one's computer through various links...

BROWSING SAFELY 2025-06-05

BROWSING SAFELY crossword puzzle
Across
  1. SIMILAR TO 'ONLINE SAFETY', BUT CAN ALSO ENCOMPASS OTHER DIGITAL ACTIVITIES
  2. PROTECT AGAINST DAMAGE OR HARM
  3. A TYPE OF MALWARE THAT SPREADS BETWEEN COMPUTER AND CAUSES DAMAGE TO THE DATA
  4. THIS BROADER TERM CAN INCLUDE BROWSING, BUT ALSO OTHER ASECTS OF ONLINE ACTIVITY
  5. THE STATE OF BEING FREE FROM DANGER OR HARM
  6. PRESERVED FROM HARM
  7. MEASURES PROMOTING THE SAFE USAGE OF THE INTERNET, ESPECIALLY IN ORDER TO PROTECT AGAINST VIRUSES, FRAUD, OR OTHER FORMS OF ATTACK
  8. NOT HARMED BY VIRUSES OR DANGER
Down
  1. SIMILAR TO 'SECURE BROWSING', BUT EXPLICITLY STATES ABOUT THE WEB
  2. PROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURE
  3. THE STATE OF BEING PROTECTED AGAINST THE CRIMINAL OR UNAUTHORISED USE OF ELECTRONIC DATA OR THE MEASURES TAKEN TO ACHIVE THIS
  4. PROTECT FROM DANGER OR RISK OF ONLINE
  5. NOT DAMAGED BY HARMFUL VIRUSES
  6. SERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY
  7. CERTAIN TO REMAIN SAFE AND UNTHREATENED

15 Clues: PRESERVED FROM HARMPROTECT AGAINST DAMAGE OR HARMNOT DAMAGED BY HARMFUL VIRUSESNOT HARMED BY VIRUSES OR DANGERPROTECT FROM DANGER OR RISK OF ONLINECERTAIN TO REMAIN SAFE AND UNTHREATENEDTHE STATE OF BEING FREE FROM DANGER OR HARMPROTECT FROM HARM OR DAMAGE WITH AN APPROPRIATE MEASURESERVICES AND TOOLS DESIGNED TO ENHANCE SAFETY AND SECURITY...

IT үгийн сүлжээ 2025-09-08

IT үгийн сүлжээ crossword puzzle
Across
  1. Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”.
  2. Өгөгдлийг эмх цэгцтэй хадгалдаг "номын сан". Гэхдээ бүх ном нь тоо, текст, зураг.
  3. Компьютерт “энэ ажлыг тэгээд дараа нь ингэ” гэж зааж өгсөн алхам алхамтай жор.
  4. Компьютерийн “булчин” ба “яс”. CPU нь тархи, дэлгэц нь нүд, гар нь гараа хөдөлгөдөг гарыг орлоно.
  5. Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч
  6. Шар өрөөнд байдаг зүйл
  7. Компьютерийн “багахан хайрцаг”. Дотор нь зураг, текст, дуу, гээд юу ч хийж болдог.
  8. Дэлхий даяарх “цагаан толгойн чатаар” бүгд холбогдож буй аварга сүлжээ.
Down
  1. Программистын өдөр тутмын “шар айраг”-гүйгээр хийдэг хэцүү ажил. Алдаа олоход баяр, засахад бахархал.
  2. Утас болон компьютерийн “хобби”. Тоглоомоос эхлээд банкны апп хүртэл бүгд багтана.
  3. Компьютерийг хүний адил “бодолтой мэт” болгосон тархи. Заримдаа хэтэрхий ухаантай болж айлгадаг
  4. Нэг жолооч
  5. Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй.
  6. Интернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг.
  7. Компьютеруудын “найзын хүрээлэл”. Хэр их найзтай байна, төдий чинээ мэдээлэл дамжуулна.

15 Clues: Нэг жолоочШар өрөөнд байдаг зүйлИнтернэт дээрх “гэрийн хуудас”. Хүн бүрийн өөрийн булан байдаг.Компьютерийн иддэг хоол. Тоо, үсэг, зураг бүгдээрээ түүний “меню”.Төхөөрөмжүүдийн “гар барилт”. Гар бариагүй бол мэдээлэл дамжихгүй.Мэдээллийг хакеруудын "муу санаатнуудаас" хамгаалдаг дижитал хамгаалагч...

Welcome to CyberSecurity! 2023-01-03

Welcome to CyberSecurity! crossword puzzle
Across
  1. ones and zeroes that make up computer code
  2. the kind of app or website that you might use to share photos or message friends
  3. a person who intentionally finds weak points in a computer system and exploits them
  4. a program that infects your computer and interferes with its programming
Down
  1. a place where information is posted on the internet; you'll want to check the source to see if the information is trustworthy
  2. the kind of security that depends on a person's fingerprint, face, or even the patterns on their retina
  3. the secret part of your login information that protects your accounts from other users
  4. emails that are sent by hackers to attempt to get your information with suspicious links and attachments

8 Clues: ones and zeroes that make up computer codea program that infects your computer and interferes with its programmingthe kind of app or website that you might use to share photos or message friendsa person who intentionally finds weak points in a computer system and exploits them...

Cybersecurity Crossword Puzzle 2025-09-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Device that blocks unwanted traffic
  2. "Two-____ Authentication"
  3. Tricky email scam
Down
  1. Software that steals info disguised as something useful
  2. Trying to guess passwords
  3. Converts data into unreadable format
  4. Unique secret used to log in
  5. Connecting securely online

8 Clues: Tricky email scamTrying to guess passwords"Two-____ Authentication"Connecting securely onlineUnique secret used to log inDevice that blocks unwanted trafficConverts data into unreadable formatSoftware that steals info disguised as something useful