cybersecurity Crossword Puzzles
Unit 5 Vocabulary 2023-09-03
Across
- A set of processes that are to be followed in order to complete an operation; a method to do something.
- Usage of automatic equipment (i.e machines) to automate a process.
- Protection of electronic data from criminals or unauthorized usage.
- An excessive amount; too much.
- Recognition of individuals from biological measurements or physical appearance.
Down
- The action of creating a new idea, product, etc.
- The state of being dependent.
- Rapid growth or reproduction of something.
- Using a network of servers to store data and information on the internet rather than a single computer.
- Being enthusiastic about technology or new advancements in technology.
- Adaptation to the usage of computers and internet.
11 Clues: The state of being dependent. • An excessive amount; too much. • Rapid growth or reproduction of something. • The action of creating a new idea, product, etc. • Adaptation to the usage of computers and internet. • Usage of automatic equipment (i.e machines) to automate a process. • Protection of electronic data from criminals or unauthorized usage. • ...
"Algorithm Enigma: A Technology and AI Crossword" 2023-07-01
Across
- an ai art generator
- image recognition api by microsoft
- A friendly AI assistant that can chat with you and answer questions.
- programming language commonly used in machine learning
- Using AI to create convincing fake videos or images
- When AI becomes self-aware and starts thinking like a human.
- father of artificial intelligence
Down
- personalized news app that curates articles using ai algorithms
- An AI art generator that takes you on a creative adventure.
- Recipe for solving a problem in the digital world.
- co-founder of DeepMind
- Machines that can do tasks on their own, like helpful little friends
- deep learning framework popular for computer vision tasks
- Protecting against digital threats with AI-powered defense systems.
- Letting machines do the work, so you can sit back and relax.
15 Clues: an ai art generator • co-founder of DeepMind • father of artificial intelligence • image recognition api by microsoft • Recipe for solving a problem in the digital world. • Using AI to create convincing fake videos or images • programming language commonly used in machine learning • deep learning framework popular for computer vision tasks • ...
Chapter 3 : Digital Culture and Society 2024-04-01
Across
- - Health services provided through digital platforms.
- Z - Demographic cohort known for its deep engagement with digital technology.
- Dependency - Overreliance on digital devices affecting daily life.
- - Digital method of making payments, like PayPal or Apple Pay.
- Media - Platforms for networking and communication online.
- - Measures to protect against unauthorized digital attacks.
- Privacy - Protection of personal information in the digital age.
Down
- Learning - Educational approach combining online and face-to-face methods.
- Society - A society transformed by the integration of advanced technologies.
- Shopping - Buying goods or services via the internet.
- Navigation - Technology used for determining one’s location and finding routes.
- Tech - Devices used for tracking health and activity.
- - Country recognized for its advanced digital society.
- - Method of watching TV and movies over the internet.
- Work - Employment model where tasks are completed outside a traditional office.
15 Clues: - Health services provided through digital platforms. • Shopping - Buying goods or services via the internet. • Tech - Devices used for tracking health and activity. • - Method of watching TV and movies over the internet. • - Country recognized for its advanced digital society. • Media - Platforms for networking and communication online. • ...
TTS INFOR 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
technology 2025-02-25
Across
- Technology that simulates a 3D environment.
- A idea or method that leads to advancement.
- A mobile phone with multiple functionalities.
- A technology that allows data storage and access over the internet.
- A type of malicious code that replicates itself by inserting copies into other programs or files.
- The process of converting information into code to prevent unauthorized access.
- Protection against digital threats.
Down
- A field of study focused on creating intelligent machines that can perform tasks.
- A global network for communication and information.
- The standard markup language for creating web pages.
- Technology that builds and controls robots.
- Wireless internet network.
- Software application used to access the Internet.
- A simulated experience that can be similar to or completely different from the real world.
14 Clues: Wireless internet network. • Protection against digital threats. • Technology that simulates a 3D environment. • A idea or method that leads to advancement. • Technology that builds and controls robots. • A mobile phone with multiple functionalities. • Software application used to access the Internet. • A global network for communication and information. • ...
Puzzle #31 2023-02-05
Across
- - the protection of computers and networks from digital threats
- - information that can be processed by a computer
- - a collection of structured data
- - a computer that requests resources from a server
- - a set of instructions used to perform a specific task
- reality - a simulated environment that can be experienced through computer devices
Down
- computing - using remote servers over the internet to store, process, and manage data
- - a security system that monitors and controls incoming and outgoing network traffic
- - the process of converting data into a code to protect it
- intelligence - the development of computer systems to perform tasks that normally require human intelligence
- - a computer that provides shared resources
11 Clues: - a collection of structured data • - a computer that provides shared resources • - information that can be processed by a computer • - a computer that requests resources from a server • - a set of instructions used to perform a specific task • - the process of converting data into a code to protect it • ...
AI 2025-09-28
Across
- Pola pikir untuk menyelesaikan masalah menggunakan prinsip ilmu komputer.
- Kepanjangan dari "AI"
Down
- Mesin yang mampu belajar sendiri dari data tanpa diprogram ulang.
- Sistem keamanan digital untuk melindungi data dan jaringan.
- Bidang ilmu yang mempelajari pengolahan data dalam jumlah besar dan kompleks.
- Teknologi yang menghubungkan perangkat fisik ke internet.
6 Clues: Kepanjangan dari "AI" • Teknologi yang menghubungkan perangkat fisik ke internet. • Sistem keamanan digital untuk melindungi data dan jaringan. • Mesin yang mampu belajar sendiri dari data tanpa diprogram ulang. • Pola pikir untuk menyelesaikan masalah menggunakan prinsip ilmu komputer. • ...
Prep for Cybermonth with us! 2025-05-16
Across
- the month that we celebrate Cybersecurity Awareness
- attacks that hackers use to exploit human error
- the name of the team who promotes cyberawareness
Down
- using artificial intelligence to put faces of someone onto another body
- something that keeps your accounts safe
- those who are ill actors in the cyber space
6 Clues: something that keeps your accounts safe • those who are ill actors in the cyber space • attacks that hackers use to exploit human error • the name of the team who promotes cyberawareness • the month that we celebrate Cybersecurity Awareness • using artificial intelligence to put faces of someone onto another body
Online security 2019-12-03
Across
- This mode is more secure than public
- When you save your information within an external drive is called a:
- When you research online you should visit only _____ to avoid risks
Down
- Being aware of your online protection
- Have one and keep it updated to avoid malware and other online risks
- Needed to access devices
6 Clues: Needed to access devices • This mode is more secure than public • Being aware of your online protection • When you research online you should visit only _____ to avoid risks • Have one and keep it updated to avoid malware and other online risks • When you save your information within an external drive is called a:
Technology Vocabulary 2024-11-12
Across
- A collection of data organized for easy access.
- The practice of protecting computers and data from unauthorized access.
- Programs and operating systems that tell the hardware what to do
- Converting data into a secret code for security
Down
- The physical parts of a computer
- The ability of a computer to perform tasks needing human intelligence
- A way of representing information using only two digits, 0 and 1.
- Writing instructions in a language a computer can understand
8 Clues: The physical parts of a computer • A collection of data organized for easy access. • Converting data into a secret code for security • Writing instructions in a language a computer can understand • Programs and operating systems that tell the hardware what to do • A way of representing information using only two digits, 0 and 1. • ...
Cybersecurity 2023-03-25
Across
- A security measure designed to verify an individual`s authorization to access a computer or security information
Down
- Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access
- A collection of computers subject to centralized remote control by an outside party, usually without the knowledge of the owners, using surreptitiously installed software robots. The robots are spread by trojan horses and viruses. The botnets can be used to launch denial-of-service attacks and transmit spam
- Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred
4 Clues: A security measure designed to verify an individual`s authorization to access a computer or security information • Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access • ...
Computer Ethics Crossword 2022-10-11
Across
- A shorter word for "Internet"
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- A secret combination of words or numbers that allows a user to access an online service
- Short form for "World Wide Web"
- Harm inflicted through text, emails, or online sites
- Any action that's taken to protect and prevent online crime
- When someone tracks, lures, or harasses people online
- Software designed to damage a computer or phone
- A security system used to block threats to your computer
Down
- An internet-related crime
- Online etiquette-being nice and respectful to others online
- Leaving offensive messages on the internet
- Unwanted emails or junk mail
- Software that displays unwanted advertising on your computer
- Searching through websites freely
- Self-replicating software program that attacks a computer system
- A dishonest scheme to get information or money
- Computer equipment, machines, and parts
- Someone who gains unauthorized access to people's computers
19 Clues: An internet-related crime • Unwanted emails or junk mail • A shorter word for "Internet" • Short form for "World Wide Web" • Searching through websites freely • Computer equipment, machines, and parts • Leaving offensive messages on the internet • A dishonest scheme to get information or money • Software designed to damage a computer or phone • ...
vocab 2024-10-13
Across
- Because of all the ___ I still haven't got my visa
- although
- My clothes always ___ a bit after being in the washing machine
- working in a way that does not waste a resource, productive
- I got into a car ___ accident on the way, which is why I was late
- a field in IT where the main goal is protection from digital attacks
- After giving that 3 hour lecture, my ___ really hurt
- before
Down
- many of the company's employees were ___ after AI replaced them
- It's not nice to make ___ about someone based on their looks
- a state/feeling of uncontrolled excitement/behaviour.
- I've been waiting for that ___ for months, I really need the extra money
- something happening at the same time
- sometimes a synonym for "also"
- successful in achieving the results that you want
15 Clues: before • although • sometimes a synonym for "also" • something happening at the same time • successful in achieving the results that you want • Because of all the ___ I still haven't got my visa • After giving that 3 hour lecture, my ___ really hurt • a state/feeling of uncontrolled excitement/behaviour. • working in a way that does not waste a resource, productive • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
Ethical Online Teaching and Data Management 2025-07-22
Across
- Making sure information is only accessible to those authorized
- Hiding information so only authorized users can see it
- An incident when sensitive information is exposed or stolen
- Trail of data users leave behind online
- Document explaining how a website collects and uses data
- Rules that users must agree to for online tools or access
Down
- An extra layer of security beyond a password
- Collecting only the data that is necessary
- Guidelines for responsible technology use in schools or workplaces
- Fraudulent attempt to obtain sensitive information, usually via email or text
- U.S. Law protecting the privacy of students and their educational records
- A U.S. law protecting children under 13 years old in online environments
- Stealing someone's personal information for fraud
- Malicious software like viruses or spyware
- Steps taken to protect digital data
15 Clues: Steps taken to protect digital data • Trail of data users leave behind online • Collecting only the data that is necessary • Malicious software like viruses or spyware • An extra layer of security beyond a password • Stealing someone's personal information for fraud • Hiding information so only authorized users can see it • ...
Virus- Alexis Goodney 2018-11-15
Across
- an unwanted piece of software that does something to your computer
- a person who uses computers to gain unauthorized info
- messages distributed to recipients via a network
- collection of data instructions that tells a computer what to do
- good hacker who hacks to find out how a companies system is faulty
- protection of computer systems
Down
- blocking servers, clogging up networks so they can't get to real costumers
- a strategy that pretends to be something it isn't
- violates security for personal gain
- something that enters your network's system then duplicates itself and spreads via the network
- programming instructions
- the attempt to obtain personal information by disguising yourself as a reliable company
- a reason why someone might send you a virus
- software intended to disable computers
- a type of computer virus
15 Clues: programming instructions • a type of computer virus • protection of computer systems • violates security for personal gain • software intended to disable computers • a reason why someone might send you a virus • messages distributed to recipients via a network • a strategy that pretends to be something it isn't • a person who uses computers to gain unauthorized info • ...
tech crossword 2023-06-07
Across
- a type of computer memory where data is stored
- it is a mobile operating system
- a malicous software that may cause disruption to your computer and leak private information online
- it is any sequence of one or more symbols
- small blocks of data created by a server
- a system that protects the Internet from cyber attacks
- a program that once is executed, would cause major damage to the computer
Down
- a digital representation of text and data
- a collection of data duplicating original values
- a mapping for some domain to bits
- one of the largest technology companies
- an image that is used for representing data
- a hardware used for transmitting digital video and audio from one device to another
- a moving digital image
- a method of transmitting and receiving messages using electronic devices
15 Clues: a moving digital image • it is a mobile operating system • a mapping for some domain to bits • one of the largest technology companies • small blocks of data created by a server • a digital representation of text and data • it is any sequence of one or more symbols • an image that is used for representing data • a type of computer memory where data is stored • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
TTS kEAMANAN DATA DAN INFORMASI KELAS 9 2026 2026-01-21
Across
- Tipe malware yang nempel di file atau program komputer adalah...
- Tindakan memperoleh akses ke data dalam komputer atau jaringan disebut ...
- Malware yang tugasnya munculin iklan terus-terusan adalah...
- Hacker yang memanfaatkan keterampilan teknis untuk menyuarakan pendapat politik adalah...
- Malware mata-mata yang kerjanya ngintipin orang diam-diam adalah...
- Malware yang mengunci semua file penting dikomputer untuk meminta uang tebusan adalah...
- Upaya perlindungan terhadap data dan sistem yang terbuhung dengan internet disebut...
Down
- Upaya penipuan siber yang dilakukan dengan cara menyamar sebagai pihak terpercaya disebut...
- Sekelompok pengemar sistem telekomunikasi dikenal sebagai...
- Perangkat lunak berbahaya yang dapat merusak sistem komputer disebut...
- Peretasan komputer pertama dilakukan oleh mahasiswa dari ..
- Serangan siber yang mengarahkan pengguna ke situs web palsu adalah...
- Malware yang menyamar jadi aplikasi biasa adalah...
- Malware yang bisa nyebar sendiri tanpa bantuan manusia adalah...
- Versi ekstremnya trojan adalah...
15 Clues: Versi ekstremnya trojan adalah... • Malware yang menyamar jadi aplikasi biasa adalah... • Peretasan komputer pertama dilakukan oleh mahasiswa dari .. • Sekelompok pengemar sistem telekomunikasi dikenal sebagai... • Malware yang tugasnya munculin iklan terus-terusan adalah... • Tipe malware yang nempel di file atau program komputer adalah... • ...
Cyber Safety 2024-03-05
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
Computer Ethics Crossword 2024-04-05
Across
- A shorter word for "Internet"
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- A secret combination of words or numbers that allows a user to access an online service
- Short form for "World Wide Web"
- Harm inflicted through text, emails, or online sites
- Any action that's taken to protect and prevent online crime
- When someone tracks, lures, or harasses people online
- Software designed to damage a computer or phone
- A security system used to block threats to your computer
Down
- An internet-related crime
- Online etiquette-being nice and respectful to others online
- Leaving offensive messages on the internet
- Unwanted emails or junk mail
- Software that displays unwanted advertising on your computer
- Searching through websites freely
- Self-replicating software program that attacks a computer system
- A dishonest scheme to get information or money
- Computer equipment, machines, and parts
- Someone who gains unauthorized access to people's computers
19 Clues: An internet-related crime • Unwanted emails or junk mail • A shorter word for "Internet" • Short form for "World Wide Web" • Searching through websites freely • Computer equipment, machines, and parts • Leaving offensive messages on the internet • A dishonest scheme to get information or money • Software designed to damage a computer or phone • ...
Cyber Physical Systems - 1 2025-03-20
Across
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- Processing data closer to the source rather than a central server.
- Study of control and communication in machines and living beings.
- A highly automated, connected, and intelligent manufacturing system.
- Internet-based computing providing storage and processing power.
- A network of connected devices that communicate over the internet.
- Using models to replicate real-world behaviors.
- Devices that detect and respond to physical changes.
- The ability of different systems to work together.
- Large volumes of data used for analytics and decision-making.
Down
- A decentralized and secure digital ledger technology.
- Combining different subsystems into a unified system.
- A virtual replica of a physical system for monitoring and analysis.
- A computing system integrated into a larger system.
- The capability of a system to function independently.
- Devices that convert electrical signals into mechanical motion.
- Related to manufacturing and production systems.
- The process of making systems operate without human intervention.
19 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Compliance and Ethics 2021-11-29
Across
- attempt by individual or private interest group to lawfully influence government decision
- An official inspection of an individual's or organization's accounts
- guideline of ethical practices that a company expects its employees to follow
Down
- Unwelcome act of physical contact or advances
- conforming to a rule i.e policy, standard or law
- Computer Security
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
- anything of value given as attempt to influence a decision to acquire improper advantage
8 Clues: Computer Security • Unwelcome act of physical contact or advances • conforming to a rule i.e policy, standard or law • An official inspection of an individual's or organization's accounts • guideline of ethical practices that a company expects its employees to follow • Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others • ...
Cyber Safe Seniors Crossword Puzzle 2024-03-09
Across
- Short for “malicious software”
- The measures taken to protect electronic data
- A string of characters that allows access to a computer system or service
- The practice of making fraudulent phone calls or leaving voice messages
Down
- Software designed to detect and destroy computer viruses
- A person who engages in criminal activity by means of computers or the internet
- The fraudulent practice of sending emails purporting to be from reputable companies
- Malware which changes, corrupts, or destroys information (think disease)
8 Clues: Short for “malicious software” • The measures taken to protect electronic data • Software designed to detect and destroy computer viruses • The practice of making fraudulent phone calls or leaving voice messages • Malware which changes, corrupts, or destroys information (think disease) • A string of characters that allows access to a computer system or service • ...
Digital literacy 2024-08-10
Across
- - The practice of protecting information from unauthorized access.
- - Technology used to secure online transactions and protect data.
- - Online platforms where people can share updates and interact.
- - A global network of interconnected computers and servers.
Down
- - The measure of how well personal information is protected online.
- - A collection of related web pages accessible through the internet.
- - The ability to use digital tools and technologies effectively.
- - A type of software used to access and view web pages.
- - Software used for specific tasks like creating documents or spreadsheets.
- - Data that provides context about other data.
- - The process of organizing and finding information online.
- - A system used to manage and organize digital documents.
12 Clues: - Data that provides context about other data. • - A type of software used to access and view web pages. • - A system used to manage and organize digital documents. • - The process of organizing and finding information online. • - A global network of interconnected computers and servers. • - Online platforms where people can share updates and interact. • ...
WBCi Roadshow Puzzle 1 2025-11-17
Across
- Auditory stories from women navigating the world of infosec (8 letters)
- Quick connections for growth, WBCi style (14 letters)
- Found in the Spotlight Gallery (11 letters)
- WBCi area focused on skill-building and mentorship (11 letters)
- Demystifying cybersecurity—one belief at a time (12 letters)
- The 'F' in F.L.Y. stands for this bold quality (8 letters)
- Amplified, not replaced — what true allies elevate (6 letters)
Down
- Intentional advocacy from the sidelines (8 letters)
- Visibility-building dialogues in Product circles (12 letters)
- Seasonal initiative focused on balance, rest, and renewal (8 letters)
- Where memories get framed at the roadshow’s finale (5 letters)
- The social structures that enable connection and learning (8 letters)
12 Clues: Found in the Spotlight Gallery (11 letters) • Intentional advocacy from the sidelines (8 letters) • Quick connections for growth, WBCi style (14 letters) • The 'F' in F.L.Y. stands for this bold quality (8 letters) • Demystifying cybersecurity—one belief at a time (12 letters) • Visibility-building dialogues in Product circles (12 letters) • ...
OSHEC Crossword 2023-08-16
Across
- Download PDF – First word of ‘Abstract’ - Article Name: Influence of Educational Robots on Learning Performance of Learners Majoring in Computer Science.
- Last word of ‘Background’ - Article Name: The accuracy of artificial intelligence used for non-melanoma skin cancer diagnoses: a meta-analysis.
- Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
- Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
- Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
Down
- Second word of ‘Introduction’ - Article Name: Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review.
- Last word, before ‘footnotes’ - Article Name: Global Mental Health Services and the Impact of Artificial Intelligence-Powered Large Language Models.
- Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Training in Sociology and Public Health an Essential in Medical Education.
- Fill in the blank -Literature, Film and ________ (Look at the Sub-headings) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
- Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
10 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs. • Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture. • ...
Inclusive Engineering Design 2025-03-11
Across
- A key principle of inclusive design that ensures usability for all.
- Designs should align with the UN’s Sustainable Development Goals to promote ______.
- The inclusive engineering ______ includes people-centered solutions, ethics, and sustainability.
- Engineering must prevent bias and discrimination while upholding ______.
- Teaching inclusive engineering early can foster awareness and innovation.
- Working with diverse teams improves design solutions and encourages ______.
- An important process in engineering to ensure usability and inclusivity.
- Designs must protect against online threats, ensuring safety and ______.
Down
- A lack of ______ in engineering teams can lead to biased designs.
- Engineering should be ______ to meet diverse user needs.
- Inclusive design benefits everyone, especially individuals with ______.
- Future-proof solutions must anticipate emerging ______ trends.
- Inclusive designs should prioritize usability and ______ for all users.
- Unconscious ______ can influence engineering decisions and impact inclusivity.
- Engineers create solutions through thoughtful and user-centered ______.
15 Clues: Engineering should be ______ to meet diverse user needs. • Future-proof solutions must anticipate emerging ______ trends. • A lack of ______ in engineering teams can lead to biased designs. • A key principle of inclusive design that ensures usability for all. • Inclusive design benefits everyone, especially individuals with ______. • ...
Technology crossword 2025-06-26
Across
- Programs you use on your phone or tablet.
- (Virtual Reality) A headset that lets you enter a 3D digital world.
- Protection of computers and data from attacks.
- A machine that can think or learn like a human.
- Software you can download and use for free.
- Provide The company that gives you internet access.
- Device A phone, watch, or TV that can connect to the internet.
- Technology Devices like smartwatches or fitness bands you wear.
Down
- Engine A website like Google to find information.
- A small electronic tool or device.
- A place where you can connect to wireless internet.
- Media Platforms like Instagram, TikTok, or Twitter.
- A picture taken of your screen.
- A big computer that stores data and websites.
- Browser An app like Chrome or Safari to explore websites.
- Network A site where people connect and share, like Facebook.
16 Clues: A picture taken of your screen. • A small electronic tool or device. • Programs you use on your phone or tablet. • Software you can download and use for free. • A big computer that stores data and websites. • Protection of computers and data from attacks. • A machine that can think or learn like a human. • Engine A website like Google to find information. • ...
Ethical Online Teaching and Data Management 2025-07-12
Across
- Data fraud disguised as communication
- Learning environment or technology that adapts to diverse learner needs and preferences
- U.S. law: civil rights protections for individuals with disabilities
- Information is accessible only to those authorized
- U.S. federal law that protects the privacy of student education records
- A UDL principle: providing content in multiple formats
- A UDL principle: offers choices to increase motivation
Down
- Data protection from digital attacks
- Acronym: supports flexible learning environments to accommodate diverse learners
- All learners feel valued and supported in learning environments
- Providing fair access to opportunities, resources, and support based on individual needs
- An extra layer of login protection
- Acronym: international standards that makes digital content accessible for all users
- Ensuring all users can access online content regardless of ability
- How user data is handled and stored
15 Clues: An extra layer of login protection • How user data is handled and stored • Data protection from digital attacks • Data fraud disguised as communication • Information is accessible only to those authorized • A UDL principle: providing content in multiple formats • A UDL principle: offers choices to increase motivation • ...
Technology 2024-11-27
Across
- A program you can download onto your phone or tablet.
- What you do when looking for information online.
- A phone that can access the internet and run apps.
- Wireless internet connection often found at home or cafes.
- Tools and devices used to make life easier.
- A collection of pages you visit on the internet.
Down
- A fraudulent scheme designed to trick or steal information.
- A secret word or phrase to protect your accounts.
- A way to send messages online, often used for communication.
- A popular video conferencing platform.
- A global network that connects computers and devices.
- To access your account by entering your username and password.
- To transfer files from the internet to your device.
- A device you move to control the cursor on a screen.
- Protecting your personal data online.
15 Clues: Protecting your personal data online. • A popular video conferencing platform. • Tools and devices used to make life easier. • What you do when looking for information online. • A collection of pages you visit on the internet. • A secret word or phrase to protect your accounts. • A phone that can access the internet and run apps. • ...
Cyber Security! 2023-10-20
Across
- Viruses, Spyware, Malicious Softwares
- encoding data, by converting the original representation of the information
- Cybercriminals sending malicious emails.
Down
- results in confidential, sensitive information being exposed
- a string of characters that allows access to a computer system or service which is usually of short length
- protection from malicious attacks
- attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid
7 Clues: protection from malicious attacks • Viruses, Spyware, Malicious Softwares • Cybercriminals sending malicious emails. • results in confidential, sensitive information being exposed • encoding data, by converting the original representation of the information • attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid • ...
Phishing A technique used to trick someone to reveal sensitive information 2024-05-10
Across
- A type of attack that floods a network or server with excess traffic
- The process of converting data into unreadable format to prevent unauthorized access
- The practice of preventing systems from digital attacks
- A technique used to trick someone to reveal sensitive information
Down
- A unique string of characters used for authentication
- Software designed to block unauthorized access
- A technique used to gain unauthorized access to a system by guessing passwords
- A secret code that must be entered to enter a system or account
- A malicious program that self replicates and spreads to other systems
- Unauthorized access to data or systems
- A deceptive email scam targeting personal information
11 Clues: Unauthorized access to data or systems • Software designed to block unauthorized access • A unique string of characters used for authentication • A deceptive email scam targeting personal information • The practice of preventing systems from digital attacks • A secret code that must be entered to enter a system or account • ...
Crossword On Internet and Technology 2025-10-03
Across
- Protection of digital systems from theft or damage
- The introduction of new ideas or methods
- A digital world where people interact with each other, digital objects and environments in real time
- An important and sudden discovery or progress
- The right to keep personal information secure
Down
- Old-fashioned; no longer useful
- A person who is connected to the internet or who is using electronic devices
- Happening in many places or among many people
- A person who is knowledgeable and skilled in the use of technology
- Cyber attacks that trick people into giving away personal data
10 Clues: Old-fashioned; no longer useful • The introduction of new ideas or methods • Happening in many places or among many people • An important and sudden discovery or progress • The right to keep personal information secure • Protection of digital systems from theft or damage • Cyber attacks that trick people into giving away personal data • ...
October Crossword - Cyber Security 2022-02-07
Across
- software designed to prevent, detect, and remove malware
- cyberattack that tries already compromised usernames and passwords in other sites
- username and ... should be complex
- any crime committed electronically
- pretending to be someone and accessing their information
Down
- fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
- ensures that you are the only one who has access to your account
- campaign launched in 2010 by the Department of Homeland Security
- any software intended to damage, disable, or give someone unauthorized access
- agency that informs and educates about cybersecurity
10 Clues: username and ... should be complex • any crime committed electronically • agency that informs and educates about cybersecurity • software designed to prevent, detect, and remove malware • pretending to be someone and accessing their information • ensures that you are the only one who has access to your account • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Claims Board Fun Friday 9/13 2024-09-12
Across
- Company which will bring 2 astronauts who are stuck in International Space Station
- Text messages to trick individuals to reveal personal information
- Cybersecurity form with major outage impacting Microsoft apps
- Attaches itself to clean files and spreads to other files
- Deceives via phone calls
- Use phone calls to trick individuals to reveal personal details
- Movie name referred by Google CEO during his meetings
Down
- Publishes latest tech news and Tech CEOs start their day going through this site
- Caused by Solar Storms
- Every action has an outcome and none other than you are responsible for it f
10 Clues: Caused by Solar Storms • Deceives via phone calls • Movie name referred by Google CEO during his meetings • Attaches itself to clean files and spreads to other files • Cybersecurity form with major outage impacting Microsoft apps • Use phone calls to trick individuals to reveal personal details • Text messages to trick individuals to reveal personal information • ...
technology crossword 2023-06-07
Across
- it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure,
- it is a method of representing data in a visual,
- it represents text, computer processor instructions
- it is an American multinational technology company
- it is the most important processor in a given computer.
Down
- it is a mobile operating system
- it is a mapping from some domain
- it allows developers to directly manipulate its underlying data structures:...
- is a method of transmitting and receiving messages using electronic devices.
- it is a collection of discrete values that convey information,
10 Clues: it is a mobile operating system • it is a mapping from some domain • it is a method of representing data in a visual, • it is an American multinational technology company • it represents text, computer processor instructions • it is the most important processor in a given computer. • it is a collection of discrete values that convey information, • ...
The Cyber Word Hunt 2025-10-22
Across
- : Field concerned with protecting systems and data from online attacks
- : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
- : The act of checking and improving quality in AML processes
- : Cyber attack that tricks users into revealing personal info via fake emails
- : The shift from traditional banking to online banking is called digital ___
Down
- : Process of verifying user identity before accessing an online account
- : Sending money electronically through a banking app
- : Device most commonly used to access digital banking apps
- : A new generation of online-only banks with no physical branches
- : Department that manages IT risk, compliance, and governance
10 Clues: : Sending money electronically through a banking app • : Device most commonly used to access digital banking apps • : The act of checking and improving quality in AML processes • : Department that manages IT risk, compliance, and governance • : A new generation of online-only banks with no physical branches • ...
SECURITY AWARENESS EASTER EGG HUNT 2024-04-09
Across
- A secret word or phrase allows access to a computer system, email or services
- The process for educating employees about cybersecurity best practices
- A divison of Distributors that supplies a wide range of brands, generics, OTC, medical supplies, etc
- Your companies name
- One of the affiliated companies that provide banking services
Down
- One of the affiliated companies that deals with the production of our powdered and liquid goods
- One of the affiliated companies that supply customers with goods
- Malicious software that infects and damages computer
- Electronic messages sent and received over a computer network
9 Clues: Your companies name • Malicious software that infects and damages computer • Electronic messages sent and received over a computer network • One of the affiliated companies that provide banking services • One of the affiliated companies that supply customers with goods • The process for educating employees about cybersecurity best practices • ...
January Newsletter Crossword 2026-01-29
Across
- The core part of an operating system managing hardware and software.
- A grid-like data structure often used in coding and robotics.
- Writing small programs to automate repetitive tasks.
- Short for cybersecurity, the practice of protecting systems and networks.
Down
- A unit of digital storage equal to about 1000 gigabytes.
- An open-source electronics platform used in robotics and DIY projects.
- A collection of technologies used together to build applications.
- A virtual space where data and apps are stored remotely.
- A network of infected computers controlled by hackers.
9 Clues: Writing small programs to automate repetitive tasks. • A network of infected computers controlled by hackers. • A unit of digital storage equal to about 1000 gigabytes. • A virtual space where data and apps are stored remotely. • A grid-like data structure often used in coding and robotics. • A collection of technologies used together to build applications. • ...
NotPetya Crossword. 2023-10-19
Across
- forename of the person who created this crossword
- modified version of Petya
- damaging process NotPetya did to files
- name of the country that was most affected by the NotPetya ransomware attack.
- year that the NotPetya ransomware attack occurred.
- abbreviation of the Russian organization that created it
- what class are we in?
Down
- behaves more like a ______ malware rather than ransomware
- while NotPetya may have been targeted at Ukraine, what was the bigger "group" that was affected
- shipping company majorly affected by NotPetya
- the file was more a ______ than a killswitch
- name of the cybercriminal group believed to be responsible for the NotPetya ransomware attack.
- how long after the outbreak did the police raid the headquarters?
- amount of billions that NotPetya is estimated to have caused in damages.
14 Clues: what class are we in? • modified version of Petya • damaging process NotPetya did to files • the file was more a ______ than a killswitch • shipping company majorly affected by NotPetya • forename of the person who created this crossword • year that the NotPetya ransomware attack occurred. • abbreviation of the Russian organization that created it • ...
Computer science 2025-01-27
Across
- A decentralized ledger technology often used for cryptocurrencies
- A plain language description of an algorithm
- A programming technique where a function calls itself
- Interconnected devices sharing data and resources
- A data type with two possible values: true or false
- An error when a program’s stack exceeds its limit
- An organized way of storing and organizing data
Down
- A popular sorting algorithm with O(n log n) average time complexity
- Software that manages hardware and software resources of a computer
- process of converting information into code to prevent unauthorized access
- A subset of AI that enables systems to learn from data
- Translates high-level code into machine code
- Practice of protecting systems, networks, and data from digital attacks
- A step-by-step procedure for solving a problem
14 Clues: A plain language description of an algorithm • Translates high-level code into machine code • A step-by-step procedure for solving a problem • An organized way of storing and organizing data • Interconnected devices sharing data and resources • An error when a program’s stack exceeds its limit • A data type with two possible values: true or false • ...
DBMS and GIT commands 2023-03-09
Across
- A process of securely logging into a computer system or network
- A type of NoSQL database management system
- A technique used to protect computer networks and systems
- A type of application designed to run on cloud infrastructure
Down
- A security practice that involves protecting sensitive information from unauthorized access or disclosure
- A design pattern used in software development that emphasizes loose coupling between components
- A type of database management system
- A version control system commonly used in software development
- A tool used in software development to automate the building and testing of code
- Object-oriented programming paradigm
10 Clues: A type of database management system • Object-oriented programming paradigm • A type of NoSQL database management system • A technique used to protect computer networks and systems • A type of application designed to run on cloud infrastructure • A version control system commonly used in software development • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Making Science Work and knowing STEM 2024-09-06
Across
- the original model of something from which later forms are developed
- a type of machine through which liquid or gas flows and turns a special wheel with blades in order to produce power
- The study of the brain
- A new or dramatic discovery or advancement
- Important or noticeable
- The study of space and the universe
- A new process or device
Down
- a test done in order to learn something or to discover if something works or is true
- ways of protecting computer systems against threats such as viruses
- to study something in a systematic and careful way
10 Clues: The study of the brain • Important or noticeable • A new process or device • The study of space and the universe • A new or dramatic discovery or advancement • to study something in a systematic and careful way • ways of protecting computer systems against threats such as viruses • the original model of something from which later forms are developed • ...
Compliance and Ethics Week Puzzle 2025-09-03
Across
- : Individual that informs appropriate authority of misconduct
- : The requirement to adhere to the legal, ethical, professional and company standards
- : Standards that guide actions based on core values
- : Billing for services not provided/ falsifying docum ents
- : Consistency of values and actions
Down
- : Practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
- : Differential treatment based on a protected class or category
- : Taking responsibility for one's actions and results
- : Number used to report compliance incident
- : Any form of punishment or action taken against someone for the act of reporting misconduct
10 Clues: : Consistency of values and actions • : Number used to report compliance incident • : Standards that guide actions based on core values • : Taking responsibility for one's actions and results • : Billing for services not provided/ falsifying docum ents • : Individual that informs appropriate authority of misconduct • ...
Nasalization of SEIRIM 2021-10-29
6 Clues: Name for a Chinese astronaut • Theme style for the new SEIRIM design • Minutes away from Nasa where Stephen grew up • Website where Stephen got most of his design examples • New service from SEIRIM that keeps client companies safe • Design asset type which is source of the name "Nasalization"
July 15 2024-07-15
6 Clues: A method of encoding data • Language for Managing Database • A temporary storage area used to quickly access data • The process of finding and fixing errors in a program • The practice of protecting systems from digital attacks • A visual way to represent the flow of data in a program
Criss-Cross Craze 2025-06-10
Across
- a controlled network that allows access to outsiders like partners or venders
- a local area network that connects computer within a limited area like a home or office
- protection of data and system from digital attacks
- a wireless networking technology
- the physical or logical arrangement of devices in a computer network
- the actual rate of successful data transfer in a network
- the process of establishing a connection between two devices before communication
- a command used to test the reachability of a device on a network
Down
- the use of digital technologies to harass, threaten, or humiliate someone online
- the method used to send data across a network
- virtual private network
- file transfer protocol, a standard method for transferring files over the internet
- internet service provider
- global system of interconnected computer networks
- unwanted digital attacks
- service set identifier
16 Clues: service set identifier • virtual private network • unwanted digital attacks • internet service provider • a wireless networking technology • the method used to send data across a network • global system of interconnected computer networks • protection of data and system from digital attacks • the actual rate of successful data transfer in a network • ...
GS Dec 2024 2024-11-25
Across
- Activities like painting or gardening that retirees can explore.
- An online service to manage finances securely in retirement.
- Platforms like Facebook that help retirees stay connected.
- Holistic health, including mental and physical well-being.
- Essential for maintaining physical health in retirement.
- Measures like two-factor authentication to stay safe online.
- A tool that enhances connectivity, convenience, and health.
Down
- Fraudulent schemes that retirees need to watch out for.
- A critical aspect of managing pensions and avoiding scams.
- An activity that keeps the mind sharp in retirement.
- A way for retirees to share knowledge and give back.
- The type of learning that keeps retirees engaged and curious.
- Essential for energy and well-being during retirement.
- An area supported by apps like fitness trackers or telemedicine.
- A common sleep issue involving difficulty falling or staying asleep.
- A phase of life after ending full-time work.
16 Clues: A phase of life after ending full-time work. • An activity that keeps the mind sharp in retirement. • A way for retirees to share knowledge and give back. • Essential for energy and well-being during retirement. • Fraudulent schemes that retirees need to watch out for. • Essential for maintaining physical health in retirement. • ...
Eldorado Anniversary 2023-09-23
Across
- What is Eldorado's zip code?
- What percentage score is required to pass the Workplace Readiness Exam?
- How many wrestling state championships has Eldorado won?
- What is the magnet coordinator's telephone extension?
- How many free CTE college credits can a student earn for completing the Cybersecurity program of study?
- What was the last year Eldorado had a second campus?
- What year did Mrs. Brockett graduate from Eldorado?
- What year was Eldorado Magnet launched?
- What year did Eldorado open a second campus?
Down
- What year did the first class graduate?
- What year did Eldorado open
- What are the last four digits of the schools telephone number?
- How many principals have served Eldorado
- How many classes of seniors have graduated from EHS?
- What is the street address of EHS?
- At its largest capacity, EHS housed over how many students?
- How many students was Eldorado designed to accommodate
- What year did Eldorado receive the MSA School of Distinction Award?
- How old is Eldorado
19 Clues: How old is Eldorado • What year did Eldorado open • What is Eldorado's zip code? • What is the street address of EHS? • What year did the first class graduate? • What year was Eldorado Magnet launched? • How many principals have served Eldorado • What year did Eldorado open a second campus? • What year did Mrs. Brockett graduate from Eldorado? • ...
TEKNOLOGI 2024-11-19
Across
- Teknologi elektronik yang dapat dipakai seperti jam pintar
- Teknologi dan praktik untuk melindungi sistem dan data dari ancaman
- OPTIC Teknologi transmisi data menggunakan kabel serat kaca
- Teknologi yang menghubungkan perangkat fisik ke internet
- Teknologi identifikasi berdasarkan ciri fisik manusia
- Mata uang digital yang menggunakan teknologi kriptografi untuk keamanan
- Teknologi untuk mengelola dan menganalisis data berukuran sangat besar
- Teknologi komputasi yang menggunakan prinsip mekanika kuantum
- Teknologi yang menciptakan versi virtual dari perangkat keras atau sistem operasi
- Serangkaian langkah yang digunakan untuk menyelesaikan masalah dalam teknologi
Down
- Teknologi basis data terdesentralisasi yang digunakan untuk menyimpan transaksi
- Teknologi yang menggabungkan dunia nyata dengan elemen virtual
- Kendaraan udara tanpa awak yang dikendalikan dari jarak jauh
- Layanan penyimpanan dan pemrosesan data melalui internet
- Ilmu yang mempelajari desain dan aplikasi robot
- Teknologi yang bekerja pada skala atom dan molekul
- Teknologi jaringan seluler generasi kelima yang sangat cepat
- Proses pengamanan data dengan mengubahnya menjadi kode
- HOME Sistem rumah pintar yang terhubung dengan teknologi otomatisasi
19 Clues: Ilmu yang mempelajari desain dan aplikasi robot • Teknologi yang bekerja pada skala atom dan molekul • Teknologi identifikasi berdasarkan ciri fisik manusia • Proses pengamanan data dengan mengubahnya menjadi kode • Layanan penyimpanan dan pemrosesan data melalui internet • Teknologi yang menghubungkan perangkat fisik ke internet • ...
The Internet: Vocab Pt2 2025-01-09
Across
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
- Confirms the identity and authenticity of a website.
- When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
- The usage of deceptive emails and websites to maliciously gather personal information
- Completes multiple tasks at a time, simultaneously.
- The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
- A type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Down
- Identity theft, stealing money, stealing private information, controlling private computers.
- A protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).
- Anonymity describes situations where the acting person’s identity is unknown.
- Censorship is the suppression of words, images, or ideas that are “offensive.”
- Generally comprises data that is created by, or prepared for, electronic systems and devices such as computers, screens, calculators, communication devices and so on, and can be stored on those devices or in the Cloud
- Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
- Refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
- The units of data that are sent over the network.
- Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.
- Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.
- The digital divide is a gap between those who have access to digital technology and those who don’t.
19 Clues: The units of data that are sent over the network. • Completes multiple tasks at a time, simultaneously. • Confirms the identity and authenticity of a website. • Anonymity describes situations where the acting person’s identity is unknown. • Censorship is the suppression of words, images, or ideas that are “offensive.” • ...
TEst 2025-02-19
Across
- Giant central identity database behind Aadhaar
- National-level portal that provides e-documents to citizens
- An attack where hackers overwhelm a system’s resources, causing service denial
- The process of scrambling data so only authorized parties can read it
- India’s nodal agency for responding to computer security incident
- The repeated attempt to guess a password by systematically trying possibilities
- India’s initiative to raise awareness and help clean infected devices
Down
- Indian police initiative or facility for cybercrime investigations (seen in Kerala)
- Common type of malicious software demanding money
- Deceptive online technique used to trick users into revealing personal info
- India’s leading digital payment infrastructure operator
- Central cybersecurity body protecting critical information infrastructure
- Practice of keeping systems updated to vulnerabilities
- Malevolent software that hides within legitimate programs
- A harmful program that self-replicates and spreads to other computers
15 Clues: Giant central identity database behind Aadhaar • Common type of malicious software demanding money • Practice of keeping systems updated to vulnerabilities • India’s leading digital payment infrastructure operator • Malevolent software that hides within legitimate programs • National-level portal that provides e-documents to citizens • ...
Computer languages and browsing safely 2025-06-05
Across
- act of stealing and misusing someone's personal information
- It can do addition, subtraction, multiplication, division, etc.
- an illegal entry into a computer system or network
- use of illegal methods to get money or other things that belong to a bank
- process of 'befriending' children on social media
- it is vital information resources
- It has based 2
- Act to believe the email has been sent from a trusted person or organisation
- the number system consists of 16 digits
- it means hoaxing or misleading
Down
- the number system consists of 10 digits
- it consists of 8 digits
- Collection of technologies, processes, and practices design to protect networks, computers, programs, and data
- Any criminal activity intended to harm anyone using a computer and an internet connection
- Extract confident information from users and use this information to execute fraudulent tasks online
15 Clues: It has based 2 • it consists of 8 digits • it means hoaxing or misleading • it is vital information resources • the number system consists of 10 digits • the number system consists of 16 digits • process of 'befriending' children on social media • an illegal entry into a computer system or network • act of stealing and misusing someone's personal information • ...
Ways of working 2026-01-04
Across
- Reducing the amount of time needed to complete tasks(2 words)
- The ability to generate new ideas or solutions
- A report studying patterns and changes in the workplace
- A combination of in-office and remote working(2 words)
- Employees bringing their own AI tools to the workplace
- The process of learning and using new technology (2 words)
- The benefit a company gains from processes or tools(2 words)
- Online meetings using video and audio communication
Down
- AI (2 words)
- Trying new methods or tools to see how they work
- A lack of qualified workers for certain jobs (2 words)
- A method of collecting opinions or data from people
- The measure of how much work is completed efficiently
- Protection of computer systems and data from attacks
- Work done from home or outside the office (2 words)
15 Clues: AI (2 words) • The ability to generate new ideas or solutions • Trying new methods or tools to see how they work • A method of collecting opinions or data from people • Work done from home or outside the office (2 words) • Online meetings using video and audio communication • Protection of computer systems and data from attacks • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- use one key to encrypt data and a different key to decrypt data.
- to encrypt and decrypt messages.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
- science of making and breaking secret codes.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- has a fixed block size of 128, 192 or 256 bits.
- implementing cryptography into a web browser.
- a protocol that provides a secure remote access connection to network devices.
- way to store and transmit data so only the intended recipient can read or process it.
- fundamental component of ipsec virtual private networks (vpn).
12 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • use one key to encrypt data and a different key to decrypt data. • ...
Social Engineering Cybersecurity Crossword 2026-03-05
Across
- Slepens autentifikācijas kods ko cenšas iegūt sociālie inženieri
- Ļaunprātīga programmatūra ko izplata caur sociālās inženierijas uzbrukumiem
- Krāpniecisks uzbrukums e-pasta veidā, kas viltus vietnes izmanto datu zagšanai
- Krāpnieciskas SMS īsziņas ar viltus saitēm
- Neautorizēta iekļūšana telpā sekojot pilnvarotai personai
Down
- Uzticēšanās ko sociālie inženieri izmanto pret upuriem
- Aizsardzības sistēma kas bloķē nesankcionētu tīkla piekļuvi
- Uzbrucējs izveido fiktīvu scenāriju lai iegūtu informāciju
- Mērķēts pikšķerēšanas uzbrukums konkrētai personai vai organizācijai
- Telefoniska krāpšana, uzdodoties par banku vai valsts iestādi
- Uzbrukums ar viltus pievilcīgu piedāvājumu vai USB ierīci
- Identitātes viltošana uzdodoties par citu personu
12 Clues: Krāpnieciskas SMS īsziņas ar viltus saitēm • Identitātes viltošana uzdodoties par citu personu • Uzticēšanās ko sociālie inženieri izmanto pret upuriem • Uzbrukums ar viltus pievilcīgu piedāvājumu vai USB ierīci • Neautorizēta iekļūšana telpā sekojot pilnvarotai personai • Uzbrucējs izveido fiktīvu scenāriju lai iegūtu informāciju • ...
STATION X 2023 2023-03-02
Across
- For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
- The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- The diplomas offered in the School of Design & Environment focuses on ________.
- The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- Ngee Ann Polytechnic is an award-winning smart and ______campus.
- Located at the Atrium, there is a 24/7 unmanned ______.
- If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
- Common _____ Programme is a new programme offered in the School of Film & Media Studies.
- Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
- Students are able to pursue a minor via the ______Learning Pathway Programme.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
- Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
- Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
20 Clues: Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic is an award-winning smart and ______campus. • Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______. • Students are able to pursue a minor via the ______Learning Pathway Programme. • The diplomas offered in the School of Design & Environment focuses on ________. • ...
CyberSecurity Awareness Month 2024 2024-05-03
Across
- Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
- A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
- A secret combination of characters used to access an account or device.
- An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
- A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
- A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
- Technology that simulates human intelligence processes through automated algorithms.
- Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
- A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.
12 Clues: A secret combination of characters used to access an account or device. • Technology that simulates human intelligence processes through automated algorithms. • Software designed to disrupt, damage, or gain unauthorized access to a computer system. • A type of barcode that can be scanned to access information quickly, often used with smartphones. • ...
Cybersecurity Concepts and Threats 2025-01-24
Across
- system used by hackers to guess long passwords
- a program that enables communication between a user and computer
- a list of commands that can be compiled together
- a matrix bar that is read by scanning with camera/smartphone
- a suspicious program intended to disrupt software
- an infectious program that can damage a system
Down
- a device that connects and entire network to the VPN
- a tool that regulates and analyzes network traffic
- a system used by hackers to guess passwords
- the total number of digits transmitted in data
- an email account or website that is almost identical to a legitimate one
- allows computer applications to communicate within a LAN
12 Clues: a system used by hackers to guess passwords • system used by hackers to guess long passwords • the total number of digits transmitted in data • an infectious program that can damage a system • a list of commands that can be compiled together • a suspicious program intended to disrupt software • a tool that regulates and analyzes network traffic • ...
FOC - Cybersecurity - Unit 6 2024-11-15
Across
- Involves one key for both encryption and decryption
- A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- Information about an individual that identifies, links, relates, or describes them
- A process of encoding messages to keep them secret, so only "authorized" parties can read it
Down
- A wireless access point that gives unauthorized access to secure networks
- Protects a computing system against infection
- Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
- A process that reverses encryption, taking a secret message and reproducing the original plain text
- Software intended to damage a computing system or to take partial control over its operation
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
12 Clues: Protects a computing system against infection • Involves one key for both encryption and decryption • A wireless access point that gives unauthorized access to secure networks • Information about an individual that identifies, links, relates, or describes them • Software intended to damage a computing system or to take partial control over its operation • ...
7th Period Cybersecurity Vocabulary 2026-04-02
Across
- protects a computing system against infection
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- a process of encoding messages to keep them secret, so only "authorized" parties can read it
- software intended to damage a computing system or to take partial control over its operation
- a process that reverses encryption, taking a secret message and reproducing the original plain text
- includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
Down
- a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- information about an individual that identifies, links, relates, or describes them
- involves one key for both encryption and decryption
- a wireless access point that gives unauthorized access to secure networks
12 Clues: protects a computing system against infection • involves one key for both encryption and decryption • a wireless access point that gives unauthorized access to secure networks • information about an individual that identifies, links, relates, or describes them • a process of encoding messages to keep them secret, so only "authorized" parties can read it • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Program perangkat lunak yang dirancang untuk melakukan tugas tertentu. • ...
Vocabulary revision 1 2024-10-30
Across
- a small device or tool that has a specific use
- money given to a student to help pay for their education
- the act of leaving to start a journey
- having strong feelings or enthusiasm for something you love
- information that is stored in computers
- the protection of computers and networks from being attacked
Down
- the money you pay for education at a college or university
- to revise one day before an exam
- the flight that takes place within your country
- free time used for relaxation
- the place you are travelling to
- to complete studies at a school, college, or university
- a person who does something for fun; not a professional
- a talk given by a professor to a group of students about a subject
- a place where people go for vacations and fun, for example, for skiing
- to love something or someone very much
- a person who uses computers to find or change information, without permission
- strong and lasting a long time without breaking
18 Clues: free time used for relaxation • the place you are travelling to • to revise one day before an exam • the act of leaving to start a journey • to love something or someone very much • information that is stored in computers • a small device or tool that has a specific use • the flight that takes place within your country • strong and lasting a long time without breaking • ...
Kelompokk 5 2025-04-19
Across
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
- Orang yang menciptakan software berbagai jenis permainan.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
Down
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Profesi yang menjaga keamanan sistem komputer.
- Platform untuk memperkenalkan budaya Indonesia secara global.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Kelompok 5 2025-04-19
Across
- Platform untuk memperkenalkan budaya Indonesia secara global.
- Disiplin ilmu yang mempelajari fenomena di sekitar komputer.
- Menggunakan merek "Ayam Geprek Legendaris" tanpa izin pemilik resminya termasuk pelanggaran.
- Pelanggaran HAKI berupa meniru karya orang lain tanpa izin.
- Orang yang menerapkan prinsip-prinsip rekayasa perangkat lunak.
- Individu yang berperan dalam perencanaan dan pengevaluasian IT.
- Penggunaan perangkat lunak tanpa lisensi dapat dianggap pelanggaran atas hak eksklusif pemilik disebut.
Down
- Orang yang menciptakan software berbagai jenis permainan.
- Proses mengonversi dan memperkenalkan budaya ke platform digital dikenal sebagai.
- Proses penggunaan teknologi digital untuk melestarikan budaya.
- Ahli dalam menulis kode untuk membuat perangkat lunak.
- Hak eksklusif pencipta atas karya cipta di bidang ilmu pengetahuan, seni, dan sastra.
- Digitalisasi musik tradisional berfungsi sebagai upaya untuk ... warisan budaya.
- Profesi yang bertanggung jawab merancang, membangun, dan menguji aplikasi web.
- Tindakan ilegal yang melibatkan penggandaan perangkat lunak tanpa izin disebut.
- Profesi yang menjaga keamanan sistem komputer.
- Jenis lisensi yang mana pengguna dapat mengembangkan kode program.
- Lembaga pemerintah yang mengatur HAKI di Indonesia.
- Singkatan dari bidang pekerjaan di bidang teknologi informasi.
- Perlindungan hukum atas hak merek, desain industri, paten, dll.
20 Clues: Profesi yang menjaga keamanan sistem komputer. • Lembaga pemerintah yang mengatur HAKI di Indonesia. • Ahli dalam menulis kode untuk membuat perangkat lunak. • Orang yang menciptakan software berbagai jenis permainan. • Pelanggaran HAKI berupa meniru karya orang lain tanpa izin. • Disiplin ilmu yang mempelajari fenomena di sekitar komputer. • ...
Talk To Me in Cybersecurity 2021-09-16
Across
- Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
- A formal and approved list of users who have defined access rights to an asset
- Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
- Surveillance software that can record every keystroke made on a computer’s keyboard
- The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- The psychological manipulation of people into performing actions or divulging confidential information
- Computer program used to prevent, detect, and remove malware
Down
- The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
- Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
- Refers to a company security policy that allows for employees’ personal devices to be used in business
- Devices or software designed to find and prevent malicious activity on corporate networks
- Actions a company takes to manage the aftermath of a security breach or cyberattack
- A type of authentication method where the proof of a user’s identity is gained by different independent sources
17 Clues: Computer program used to prevent, detect, and remove malware • A formal and approved list of users who have defined access rights to an asset • Surveillance software that can record every keystroke made on a computer’s keyboard • Actions a company takes to manage the aftermath of a security breach or cyberattack • ...
Cybersecurity Unit 1 Lesson 1 2022-12-02
Across
- Changes your directory
- A set of steps to accomplish a task.
- A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- Guidelines that team members develop in order to be followed when working together.
- A system that can distinguish between a human and an automated program.
- Shows the contents of your directory
- A process that converts human-readable text or data into a coded form.
Down
- A team of individuals working together to investigate cyber events and anomalies.
- A collection of rules detailing appropriate student behavior.
- Software that is intended to do harm or damage.
- The trail that you leave behind when you engage in online experiences.
- To guess or discover, especially a password.
- Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
- To confirm your identity using knowledge know only to you or information interpreted by you.
- An attempt to discover information, especially passwords, through trial and error.
- Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.
17 Clues: Changes your directory • A set of steps to accomplish a task. • Shows the contents of your directory • To guess or discover, especially a password. • Software that is intended to do harm or damage. • A collection of rules detailing appropriate student behavior. • The trail that you leave behind when you engage in online experiences. • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Program perangkat lunak yang dirancang untuk melakukan tugas tertentu. • ...
LOGIC LATTICE 2024-02-16
Across
- Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Software used to access and view websites on the internet.
- The manipulation of matter on an atomic or molecular scale.
Down
- Digital or virtual currency that uses cryptography for security.
- A structured set of data stored electronically.
- Software that is embedded into hardware devices.
- A security system that monitors and controls incoming and outgoing network traffic.
- Programs and applications that run on computers and other devices.
- The process of converting data into a code to prevent unauthorized access.
- A step-by-step procedure for solving a problem.
10 Clues: A structured set of data stored electronically. • A step-by-step procedure for solving a problem. • Software that is embedded into hardware devices. • Software used to access and view websites on the internet. • The manipulation of matter on an atomic or molecular scale. • Digital or virtual currency that uses cryptography for security. • ...
Technology 2024-02-18
Across
- I'm a thinking machine, processing data tirelessly. What device am I?
- Intangible, yet I control what you see. What type of program am I?
- I move without being alive. What field of technology am I?
- Following steps, I solve problems. What logical process am I?
- Constant change, perpetual improvement. What technological concept am I?
Down
- I complement reality. What technology am I?
- I write instructions for machines. What technological skill am I?
- I guard against digital threats. What specialized area am I?
- I connect the world. What network am I?
- I store information. What logical structure am I?
10 Clues: I connect the world. What network am I? • I complement reality. What technology am I? • I store information. What logical structure am I? • I move without being alive. What field of technology am I? • I guard against digital threats. What specialized area am I? • Following steps, I solve problems. What logical process am I? • ...
TTS KONSEP MEDIA DIGITAL LISTIANA 2025-03-12
Across
- Media digital dapat menampilkan informasi dalam bentuk video, audio, gambar, atau bentuk lainnya.
- Tindakan perundungan yang dilakukan secara disengaja melalui teknologi digital
- Tindakan menyalin atau mengambil konten orang lain tanpa izin di media digital
- Platform pendidikan yang menggunakan media digital
Down
- Informasi yang dibuat-buat atau direkayasa untuk menutupi informasi yang sebenarnya disebut
- Media digital yang fungsinya khusus untuk berbelanja
- Media digital disebut juga sebagai media
- Keamanan dalam media digital yang bertujuan melindungi data dari serangan siber
- Tempat di mana artikel atau blog dapat dipublikasikan secara digital
- Tindakan kejahatan yang dilakukan secara online menggunakan komputer atau jaringan internet disebut
10 Clues: Media digital disebut juga sebagai media • Platform pendidikan yang menggunakan media digital • Media digital yang fungsinya khusus untuk berbelanja • Tempat di mana artikel atau blog dapat dipublikasikan secara digital • Tindakan perundungan yang dilakukan secara disengaja melalui teknologi digital • ...
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Security Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- The practice of protecting systems, networks, and data from digital threats.
- Ensuring data is accurate and has not been tampered with.
- Surfing A sneaky way to steal information by watching someone type their password.
- An unexpected event that compromises the integrity or availability of data.
- Software designed to detect and remove malicious programs.
10 Clues: Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Software designed to detect and remove malicious programs.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- A sneaky way to steal information by watching someone type their password.
- The practice of protecting systems, networks, and data from digital threats.
- Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- An unexpected event that compromises the integrity or availability of data.
- Ensuring data is accurate and has not been tampered with.
10 Clues: Protecting data and systems hosted on remote servers. • Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Lock & Key: An Information Security Challenge 3 2025-12-01
Across
- Software designed to detect and remove malicious programs.
- Following rules, regulations, and standards in cybersecurity.
- Manipulating people into giving up confidential information.
- The practice of protecting systems, networks, and data from digital threats.
- Protecting data and systems hosted on remote servers.
Down
- A sneaky way to steal information by watching someone type their password.
- Ensuring data is accurate and has not been tampered with.
- An unexpected event that compromises the integrity or availability of data.
- A type of malicious software that can replicate and spread.
- A formal review of systems and processes to ensure security and compliance.
10 Clues: Protecting data and systems hosted on remote servers. • Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Cybersecurity decoded 1x1 2 2020-07-30
12 Clues: Distant labor • childhood game • the iron giant • Troy's downfall • Not canned food • code's evil twin • type of cleanliness • sugar comes in these • Dr's are messy with this • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses
8 Cybersecurity & Global Impacts 2025-09-16
Across
- includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- software intended to damage a computing system or to take partial control over its operation
- a process of encoding messages to keep them secret, so only "authorized" parties can read it.
- information about an individual that identifies, links, relates, or describes them.
- a process that reverses encryption, taking a secret message and reproducing the original plain text.
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Down
- pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
- protects a computing system against infection
- a wireless access point that gives unauthorized access to secure networks.
- a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- involves one key for both encryption and decryption.
12 Clues: protects a computing system against infection • involves one key for both encryption and decryption. • a wireless access point that gives unauthorized access to secure networks. • information about an individual that identifies, links, relates, or describes them. • software intended to damage a computing system or to take partial control over its operation • ...
11 Essential Cybersecurity Controls 2025-08-29
Across
- maintaining list of all hardware, software and more
- updating software to make sure there are no gaps or vulnerabilities
- Method for limiting and controlling access to high-value systems, accounts, data
- Should be offline, segmented and tested with RTO validation as a critical last line of defense
- Product for detecting endpoint activity
- _security to protect your organization from phishing attempts
Down
- _classification and structured _ management. knowing where it lives and how it's protected is critical.
- needed to review recorded events and activities within systems, networks, applications
- _ segmentation, which limits blast radius, protects crown jewels, and slows down adversaries.
- What method of security requires users to verify their identity with multiple forms of authentication?
- often goes hand in hand with TTX
- safeguards, policies, processes, or techniques designed to protect assets
12 Clues: often goes hand in hand with TTX • Product for detecting endpoint activity • maintaining list of all hardware, software and more • _security to protect your organization from phishing attempts • updating software to make sure there are no gaps or vulnerabilities • safeguards, policies, processes, or techniques designed to protect assets • ...
Chapter 3 - Countermeasure in Cybersecurity 2026-01-12
Across
- Security classification related to storage media like USB drives and disks
- Software layer where users interact with systems
- Security device that filters incoming and outgoing network traffic
- Infrastructure that focuses on storing and managing data
- A fake system designed to trap and study attackers
- Security system that detects suspicious activities in a network
- Minimum security standard that systems must follow
- IT infrastructure responsible for managing communication between systems
Down
- Type of IT infrastructure that includes servers, computers, and hardware
- Tool used to scan networks and discover active devices
- Process of strengthening an application by removing unnecessary features
- A secure tunnel used to protect data over public networks
- Security design that shows how security components are arranged in a network
- Tool used to capture and analyze network traffic
- Small update released to fix a specific security vulnerability
- Physical security method that uses fingerprints or facial recognition
- Network area that separates internal systems from the internet
17 Clues: Tool used to capture and analyze network traffic • Software layer where users interact with systems • A fake system designed to trap and study attackers • Minimum security standard that systems must follow • Tool used to scan networks and discover active devices • Infrastructure that focuses on storing and managing data • ...
Cybersecurity Terms and Definitions 2025-12-09
Across
- claims of a loan or government grant for college, home repairs, business costs or other expenses.
- preys on victims of natural disasters
- a company asking for money in advance for licensing, registration or insurance.
- often begins with an online contact stemming from social media, dating platforms, or messaging apps.
- targets seniors by often pretending to be a grandchild or other relative in trouble.
- the scammer pretends to be someone else to trick you into sending money or to get your information, such as passwords, account numbers or Social Security numbers.
Down
- these present like prizes, lottery winnings and other “free” money
- a scam revolving around trying to get paid money up front in the hopes of a larger sum later.
- purchase most often paying for a product or service without receiving it.
- imposters use a disguise to threaten or scare you into paying money or revealing information.
- a scam preying on your urge to help others in need. For example during natural disasters.
- an imposter pretending to assist you with computer issues that you may not have even known existed.
12 Clues: preys on victims of natural disasters • these present like prizes, lottery winnings and other “free” money • purchase most often paying for a product or service without receiving it. • a company asking for money in advance for licensing, registration or insurance. • targets seniors by often pretending to be a grandchild or other relative in trouble. • ...
Data Privacy Crosswords 2025-01-27
Across
- The ability to access, correct, or delete your personal data
- A document that explains how your data is collected and used
- The process of converting data into unreadable code for security
- The process of deleting personal identifiers from data
Down
- When a company keeps your data safe from hackers
- The right to stop a company from using your personal data
- The principle of collecting only the data that is needed
- A law or set of rules governing personal data use
8 Clues: When a company keeps your data safe from hackers • A law or set of rules governing personal data use • The process of deleting personal identifiers from data • The principle of collecting only the data that is needed • The right to stop a company from using your personal data • The ability to access, correct, or delete your personal data • ...
Friday - Server Demonstration Review 2025-11-10
Across
- (5,6) is a feature in Windows that allows administrators to centrally manage and enforce settings for users and computers in an Active Directory environment
- (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups.
- (acronym) It stores the names and IP addresses of all computers and devices on the Domain and provides the necessary name resolution for clients to authenticate and for AD services to function correctly.
- (14,4) the function of the (OU) is to act as a container for logically grouping users, computers, and other objects to simplify management, delegate administrative authority, and apply policies or settings consistently
Down
- (2,7) the numerical identifier and network locator for devices and servers such as the domain controller, allowing them to be found and communicate with each other
- (7,6) is a centrally managed collection of interconnected devices and users, like computers and printers, that operate under a single set of security policies and rules.
- (5,9) is a cybersecurity concept that grants users, applications, and systems only the minimum access and permissions necessary to perform their job functions, and nothing more
- (acronym) primary function is to automatically assign IP addresses and other network configuration information, such as the subnet mask and default gateway, to client devices.
- an isolated, secure environment used in cybersecurity to safely execute and analyse projects.
9 Clues: an isolated, secure environment used in cybersecurity to safely execute and analyse projects. • (6,9,5,3,9) is a graphical tool used to administer AD DS, allowing IT staff to manage users, computers, and groups. • ...
IoT Puzzle 2025-04-01
Across
- The practice of protecting internet-connected systems from cyber threats.
- A secret or hidden way to bypass security and gain unauthorized access to a system or network.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a code to prevent unauthorized access.
- Short-range wireless technology.
- Devices that collect and transmit real-time data from the environment.
Down
- Malicious software designed to harm or exploit devices or networks.
- Wireless standard for IoT connectivity.
- Software embedded in IoT devices that controls their operations.
- Verifying a user’s identity before granting access to a system.
- Remote servers used for data storage & processing.
- Connects IoT devices to the internet.
- Wireless transmission of data.
- Wireless communication protocol for IoT.
- A type of cyber-attack where attackers trick users into providing sensitive information.
- A network topology where devices connect directly and relay data to each other.
16 Clues: Wireless transmission of data. • Short-range wireless technology. • Connects IoT devices to the internet. • Wireless standard for IoT connectivity. • Wireless communication protocol for IoT. • Remote servers used for data storage & processing. • Verifying a user’s identity before granting access to a system. • ...
Digital Citizenship Vocabulary 2025-11-19
Across
- a person who speaks or acts in support of an individual or cause,
- getting sew for copying somebody work
- The trail of data you leave online, like breadcrumbs, from every click, post, and search.
- bullying online
- Stop, Question, Check" method
- A bystander is a person who witnesses an event but is not directly involved.
- it is your citizenship for your device
- your public profile with strong passwords, privacy settings
- security that help with crime on the internet
- the act or practice of converting messages into cipher or code.
Down
- imformation that is pesonal
- where somebody scam you for something
- Secure your accounts with strong passwords and be cautious about what you share online
- the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online.
- setting that you can help protect your imformation
- the ability to understand and share the feelings of another.
16 Clues: bullying online • imformation that is pesonal • Stop, Question, Check" method • where somebody scam you for something • getting sew for copying somebody work • it is your citizenship for your device • security that help with crime on the internet • setting that you can help protect your imformation • your public profile with strong passwords, privacy settings • ...
Cybersec A 2026-01-03
5 Clues: Aset informasi digital yang wajib dilindungi • Aspek menjaga kerahasiaan data dari akses ilegal • Aspek memastikan sistem selalu tersedia saat dibutuhkan • Aspek memastikan data asli dan tidak diubah sembarangan • Upaya perlindungan sistem dan data dari serangan digital
Cyber Security Threads 2024-10-01
Across
- An attack that floods a network with excessive traffic, disrupting services
- Ensures that data is accurate and has not been tampered with
- Falsifying data to deceive systems or users
- The ability of a system to recover quickly from disruptions or attacks
- Ensures that systems are accessible and functional when needed
Down
- Ensures that information is accessible only to those authorized to access it
- The process of converting information into a secret code
- A model that describes the stages of a cyberattack ( 2 words )
- A weakness in a system that can be exploited by attackers
- A type of malware disguised as legitimate software
- A potential danger or harmful event in cybersecurity
- A security system that monitors and controls network traffic
- An attempt to exploit a system or network
13 Clues: An attempt to exploit a system or network • Falsifying data to deceive systems or users • A type of malware disguised as legitimate software • A potential danger or harmful event in cybersecurity • The process of converting information into a secret code • A weakness in a system that can be exploited by attackers • ...
azure-data-oro-idc-day-of-learning-november 2022-11-24
Across
- Meaning of ORO?
- India's most attractive employer brand by Randstad
- Microsoft had announced a Metaverse partnership with which organization
- In which year, ORO team is formed - Two Thousand….?
- A lightweight markup language used to create Azure's public documentation
- Who wrote ORO team song?
- Internal portal used for joining various distribution and security groups
- Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
- Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
- Number of years since IDC was established
- - FIFA world cup 2022 is played in which country?
- Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
- Tool used in Microsoft to manage livesite incidents
13 Clues: Meaning of ORO? • Who wrote ORO team song? • Number of years since IDC was established • - FIFA world cup 2022 is played in which country? • India's most attractive employer brand by Randstad • In which year, ORO team is formed - Two Thousand….? • Tool used in Microsoft to manage livesite incidents • ...
CYBERCONQUEST 2025-10-18
Across
- A program that detects and removes malicious software.
- Turning words into secrets that only the right decoder can read.
- Digital kidnapping: your files are the hostages!
- Online impersonation so convincing it fools your eyes — and inbox.
- The hero hacker — breaks systems to protect them.
Down
- When a website gets so many fake visitors it forgets how to work.
- A person skilled at breaking into computer systems.
- The digital gatekeeper that says, “You shall not pass!”
- A gift that brings trouble, not joy — just ask the Greeks!
- The practice of protecting systems and data from digital attacks.
- The “key” everyone forgets right when they need it most.
- It clogs your inbox like unwanted guests at a party.
- When someone goes “fishing” for your passwords — but with emails.
13 Clues: Digital kidnapping: your files are the hostages! • The hero hacker — breaks systems to protect them. • A person skilled at breaking into computer systems. • It clogs your inbox like unwanted guests at a party. • A program that detects and removes malicious software. • The digital gatekeeper that says, “You shall not pass!” • ...
Technology in Supply Chain Management 2023-05-01
Across
- Highly skilled IT professionals, process engineers,and the appropriate technologies.
- technologies combine data management, communications, decision support, and processing capabilities.
- technologies create greater connectivity and speed flow.
- support systems provide computing power to make higher-quality decisions faster.
- Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
- technologies provide 24/7 resource availability.
- Protection against online threats.
7 Clues: Protection against online threats. • technologies provide 24/7 resource availability. • technologies create greater connectivity and speed flow. • support systems provide computing power to make higher-quality decisions faster. • Highly skilled IT professionals, process engineers,and the appropriate technologies. • ...
Vocabulary 2024-11-26
Across
- A paid position
- The practice of protecting digital systems
- A systematic error in AI systems that leads to unfair or discriminatory outcomes.
- A person that engaged and qualified in a profession
Down
- The rate at which goods or services are produced
- The ability to direct or influence others
- A branch of computer science that deals with creating machines capable of performing tasks that typically require human intelligence
7 Clues: A paid position • The ability to direct or influence others • The practice of protecting digital systems • The rate at which goods or services are produced • A person that engaged and qualified in a profession • A systematic error in AI systems that leads to unfair or discriminatory outcomes. • ...
TA6 - The Internet of Everything 2025-11-09
Across
- The part of the IoE model that focuses on how actions are carried out.
- Devices connected and able to share data without human input.
- The use of technology to perform tasks without human intervention.
- Communication where devices exchange information directly.
- Turning raw data into meaningful information.
- The raw facts and figures collected by sensors or systems.
Down
- Information derived from data that has been processed and organised.
- The concept linking people, data, processes and things through networked connections.
- A technology that measures real-world conditions, such as temperature or movement.
- A smart system that adjusts traffic flow based on real-time conditions.
- Protecting data and systems from unauthorised access or attacks.
- The global network that allows computers and devices to exchange data.
12 Clues: Turning raw data into meaningful information. • Communication where devices exchange information directly. • The raw facts and figures collected by sensors or systems. • Devices connected and able to share data without human input. • Protecting data and systems from unauthorised access or attacks. • ...
Benefits and Challenges 2024-12-30
Across
- Improving the productivity and output of business operations.
- The system of rules and procedures to ensure compliance.
- Saving both time and money by using no-code platforms.
- Empowering non-technical individuals to build and enhance solutions, individuals and businesses can stay agile, adapting quick
Down
- Giving employees the ability to create applications and solutions.
- Protecting apps and data from potential threats.
- Ensuring different applications work together smoothly.
7 Clues: Protecting apps and data from potential threats. • Saving both time and money by using no-code platforms. • Ensuring different applications work together smoothly. • The system of rules and procedures to ensure compliance. • Improving the productivity and output of business operations. • Giving employees the ability to create applications and solutions. • ...
Cybersecurity Fundamental Chapter 1 2023-10-03
Across
- who rally and protest against different political and social ideas.
- unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- collection of technologies that enable the connection of various devices to the Internet.
- break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
- Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
- great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
- who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- Their targets are foreign governments, terrorist groups, and corporations.
- hackers who are either self-employed or working for large cybercrime organizations.
- may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- result of data sets that are large and complex, making traditional data processing applications inadequate.
12 Clues: who rally and protest against different political and social ideas. • Their targets are foreign governments, terrorist groups, and corporations. • hackers who are either self-employed or working for large cybercrime organizations. • collection of technologies that enable the connection of various devices to the Internet. • ...
Cybersecurity Lesson 1-3 2023-09-21
Across
- automatically tags any pictures you take with the location of where you took it
- the freedom to be left alone
- formal ways of giving credit to people for their work
- everything you do online
- a detailed report
- untrue, defamatory statements that are written.
- short for internet etiquette
- the exclusive right to make copies
Down
- includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
- stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
- someone who intentionally targets people for harm using online chat rooms or social media
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody
12 Clues: a detailed report • everything you do online • the freedom to be left alone • short for internet etiquette • the exclusive right to make copies • untrue, defamatory statements that are written. • formal ways of giving credit to people for their work • automatically tags any pictures you take with the location of where you took it • ...
12 Days of Christmas ITHD Puzzle 2024-12-09
Across
- a link to something in a website.
- Collection of professional creative software made by Adobe.
- a secret word or phrase that must be used to gain admission to something.
- Prevents unauthorized access to a disk's contents, even if the disk is offline.
- Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
- The practice of protecting devices, networks and programs from digital attacks.
- Creates a private connection between your computer and a remote server.
- The programs and other operating information used by a computer.
- Person who breaches computer security
- Group of devices connected within a limited area, such as a home, office or building.
- A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
- Programming error
- Unsolicited email
- Temporary data storage
14 Clues: Programming error • Unsolicited email • Temporary data storage • a link to something in a website. • Person who breaches computer security • Collection of professional creative software made by Adobe. • The programs and other operating information used by a computer. • Creates a private connection between your computer and a remote server. • ...
Unit 1: Intro to IT 2023-12-20
Across
- Two-dimensional bar code that contains an encoded web or e-mail address.
- Working for a company from home using IT.
- Software that resides in the cloud that is accessed by users without downloading or installing.
- Gap between those with access to technology and those who do not.
- Storage that is cloud-based.
- Type of computer found inside of other devices.
- Involves storing and retrieving data from Internet-based spaces.
Down
- How efficiently and quickly a person completes tasks.
- Branch of IT that protects computer systems.
- Method of searching through huge amounts of data to find patterns.
- Amount of data that can travel on a communication system.
- Includes all the work done with computers.
- View of the live world that has been enhanced with graphics, sounds, or other outputs.
- Type of e-book that contains integrated multimedia features.
14 Clues: Storage that is cloud-based. • Working for a company from home using IT. • Includes all the work done with computers. • Branch of IT that protects computer systems. • Type of computer found inside of other devices. • How efficiently and quickly a person completes tasks. • Amount of data that can travel on a communication system. • ...
IT_Tóth Dániel Károly 2023-12-24
Across
- The field concerned with protecting computer systems and data.
- Software application designed for use on mobile devices.
- The process of determining the structure and functionality of a program.
- The activity of writing or designing a computer program.
- (!Internet of Things!) The network of physical devices capable of communicating over the internet.
- services provided electronically, such as online banking or e-commerce.
- A structured storage system that allows efficient data management.
- Designing the user interface and user experience for software.
- A computer providing specialized services to other computers or devices.
Down
- Large volumes of data used for analytical purposes.
- Computing resources and services accessible over the internet.
- Language A set of rules and instructions interpreted by a computer.
- A sequence of steps to perform a computer task.
- An iterative and incremental development method in software design.
- A system of interconnected computers or devices.
15 Clues: A sequence of steps to perform a computer task. • A system of interconnected computers or devices. • Large volumes of data used for analytical purposes. • Software application designed for use on mobile devices. • The activity of writing or designing a computer program. • The field concerned with protecting computer systems and data. • ...
