cybersecurity Crossword Puzzles

COMPUTER SCIENCE 2022-12-13

COMPUTER SCIENCE crossword puzzle
Across
  1. string of commands or directions used by different programming languages
  2. is the hardware component used to store data that is actively being used by a processor
  3. an area of computer science that is concerned with the intersection of social behavior and computational systems.
  4. maximum rate of data transfer across a given path.
Down
  1. is the process of protecting data from unauthorized users or hackers.
  2. The other Components of HCI for System Functionality aside from Hardware and Software
  3. simply specific procedures used to solve computational problems.
  4. computer program that transforms computer code written in one programming language (the source language) into another programming language
  5. a programming error that causes unexpected glitches or problems for a program’s end user.
  6. an abbreviation for “binary digit,”

10 Clues: an abbreviation for “binary digit,”maximum rate of data transfer across a given path.simply specific procedures used to solve computational problems.is the process of protecting data from unauthorized users or hackers.string of commands or directions used by different programming languages...

CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06

CyberSecurity Awareness Month Crossword Puzzle - Week 1 crossword puzzle
Across
  1. What is the best way to maintain privacy between two parties?
  2. Necessary when the circumstances of an incident require more details
  3. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  4. When someone sends an e-mail with a link a bogus website is called
Down
  1. What is the weakest link in cybersecurity?
  2. What type of calls are made by social engineers
  3. ___ was the first personal computer virus?
  4. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  5. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  6. Our company may _________ your internet usage

10 Clues: What is the weakest link in cybersecurity?___ was the first personal computer virus?Our company may _________ your internet usageWhat type of calls are made by social engineersWhat is the best way to maintain privacy between two parties?When someone sends an e-mail with a link a bogus website is called...

Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06

Cyber Security Awareness Month Crossword Puzzle - Week 1 crossword puzzle
Across
  1. What is the weakest link in cybersecurity?
  2. ___ was the first personal computer virus?
  3. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  4. Necessary when the circumstances of an incident require more details
  5. Our company may _________ your internet usage
Down
  1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  2. What is the best way to maintain privacy between two parties?
  3. When someone sends an e-mail with a link a bogus website is called
  4. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  5. What type of calls are made by social engineers

10 Clues: What is the weakest link in cybersecurity?___ was the first personal computer virus?Our company may _________ your internet usageWhat type of calls are made by social engineersWhat is the best way to maintain privacy between two parties?When someone sends an e-mail with a link a bogus website is called...

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  3. Powerful intercepting proxy and web vulnerability scanner.
  4. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  5. uicydata;104.18.12.126
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. A remote code execution flaw in Nginx web server.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  5. Rhysider 44.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. uicydata;104.18.12.126
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  3. Rhysider 44.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  5. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
  1. Powerful intercepting proxy and web vulnerability scanner.
  2. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  3. Shadowy cyber collective widely known because of its work since 02.2022.
  4. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  5. A remote code execution flaw in Nginx web server.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

Artificial Intelligence 2023-11-20

Artificial Intelligence crossword puzzle
Across
  1. The use of technology to perform tasks without human intervention.
  2. An expert at programming and solving problems with a computer
  3. To set in motion; make active or more active.
  4. Capable of operating independently without human control.
  5. A computer program designed to simulate conversation with human users, especially over the Internet.
  6. The systematic process of assessment and planning employed to prevent a developmental problem.
Down
  1. A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
  2. The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
  3. Not functioning in a previously intended way
  4. The design, construction, and operation of robots to perform tasks in the real world.

10 Clues: Not functioning in a previously intended wayTo set in motion; make active or more active.Capable of operating independently without human control.An expert at programming and solving problems with a computerThe use of technology to perform tasks without human intervention....

The Digital Reflection 2024-02-11

The Digital Reflection crossword puzzle
Across
  1. Pertaining to the online world as opposed to the physical.
  2. Information processed or stored by a computer, used in AI to understand user behaviors.
  3. How individuals are recognized or known in their social contexts, heavily influenced by digital interactions.
  4. A person utilizing information technology in order to engage in society, politics, and government participation.
  5. A process or set of rules followed by computers in problem-solving operations.
Down
  1. Platforms where users create, share content or participate in social networking.
  2. The quality of being genuine or true in the digital representation of oneself.
  3. The simulation of human intelligence in machines.
  4. The state of being free from public attention in the digital age.
  5. Measures taken to protect electronic information from unauthorized access.

10 Clues: The simulation of human intelligence in machines.Pertaining to the online world as opposed to the physical.The state of being free from public attention in the digital age.Measures taken to protect electronic information from unauthorized access.The quality of being genuine or true in the digital representation of oneself....

Hospitality Today - An Introduction Internal Assessment 1 2025-10-26

Hospitality Today - An Introduction Internal Assessment 1 crossword puzzle
Across
  1. Travel for leisure, business, or other purposes that drives demand in the hospitality industry.
  2. The use of technology to perform routine hospitality tasks efficiently without human intervention.
  3. Lodging facilities that provide overnight stays for guests, such as hotels and resorts.
  4. The protection of hospitality data and systems against digital threats and breaches
  5. A key customer demographic shaping modern hospitality trends through digital expectations.
  6. The act of providing services and experiences to guests with warmth and generosity.
Down
  1. A technologically advanced hotel that automates guest services and operations through IoT and AI.
  2. Practicing environmentally and socially responsible operations in hospitality services.
  3. A simulated digital environment that enhances guest engagement and training experiences in hospitality.
  4. The blending of business and leisure travel, creating new guest expectations and markets.

10 Clues: The protection of hospitality data and systems against digital threats and breachesThe act of providing services and experiences to guests with warmth and generosity.Practicing environmentally and socially responsible operations in hospitality services.Lodging facilities that provide overnight stays for guests, such as hotels and resorts....

crossword 2025-11-04

crossword crossword puzzle
Across
  1. Internet tarmog‘i orqali xalqaro va mahalliy bozorlarni ulashga imkon beruvchi iqtisodiy jarayon.
  2. Axborot-kommunikatsiya texnologiyalari yordamida ma’lumotlarni tezkor almashish va biznes jarayonlarni avtomatlashtirish imkonini beruvchi tizimlar.
  3. O‘zbekistonning “raqamli iqtisodiyot” konsepsiyasida davlat xizmatlarini onlayn shaklda koʻrsatish uchun yaratilgan tizim.
  4. Oʻzbekistonda elektron tijoratning rivojlanishida asosiy rol oʻynaydigan internet orqali tovar va xizmatlar savdosi.
  5. O‘zbekiston Respublikasi tomonidan ilgari surilgan zamonaviy iqtisodiyot va raqamli transformatsiya dasturi.
Down
  1. Axborot-kommunikatsiya texnologiyalari yordamida ish jarayonlarini masofadan boshqarish imkonini beruvchi vosita.
  2. Raqamli iqtisodiyotda xavfsizlikni ta’minlash, ma’lumotlarni himoya qilish va firibgarlikning oldini olish texnologiyalari.
  3. Axborot-kommunikatsiya texnologiyalari asosida ishlab chiqilgan startaplar va innovatsion loyihalarni rag‘batlantirish tizimi.
  4. Raqamli iqtisodiyotda korxonalarga moliyaviy va boshqa ma’lumotlarni boshqarish imkonini beruvchi dasturiy tizimlar.
  5. Zamonaviy texnologiyalar yordamida tahliliy va moliyaviy qarorlar qabul qilish imkonini beruvchi tizimlar.

10 Clues: Internet tarmog‘i orqali xalqaro va mahalliy bozorlarni ulashga imkon beruvchi iqtisodiy jarayon.Zamonaviy texnologiyalar yordamida tahliliy va moliyaviy qarorlar qabul qilish imkonini beruvchi tizimlar.O‘zbekiston Respublikasi tomonidan ilgari surilgan zamonaviy iqtisodiyot va raqamli transformatsiya dasturi....

Browsing safely 2025-05-19

Browsing safely crossword puzzle
Across
  1. It refers to an illegally en try into a Computer system
  2. grooming the process of 'befriend'children on social media
  3. Is a software that hells in preventing unauthorised access to a computer
  4. Fraud The use of illegal method to get money to get money
  5. Theft It refers go the act of stealing someone's personal information
  6. Is a collection of Technologies designed to protect Network ,Computers from unauthorised access
  7. an act of harming using information technology in a deliberate manner
  8. It is an act oc sending email to a user,misleading jim to believes that it is from trusted person
Down
  1. Criminal activity intended to harm anyone using a Computer
  2. Is designed to prevent and removed virus from a Computers
  3. extract confidential information from users and use this
  4. it is the program that disrupts the normal functioning of a Computer
  5. is fooled into believing that the message recieved by him is from A trusted source s
  6. What is Mcafee is a popular s software
  7. and password What are the Two types of Two step authentic atin for login

15 Clues: What is Mcafee is a popular s softwareIt refers to an illegally en try into a Computer systemextract confidential information from users and use thisIs designed to prevent and removed virus from a ComputersCriminal activity intended to harm anyone using a ComputerFraud The use of illegal method to get money to get money...

Cyber Security 2021-10-29

Cyber Security crossword puzzle
Across
  1. Malicious software that infects a user's computer and changes how is operates
  2. User's data is held hostage until a payment is made
  3. Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
  4. Hidden software that records a user's information secretly for a third-party
  5. The practice of protecting internet-connected systems from digital attacks
  6. A an email disguised as a legitimate source that tricks users into offering up personal information
Down
  1. Is protecting of information from malicious damage and unauthorized access
  2. A kind of software used to prevent, scan, detect and delete viruses from a computer
  3. A form of malware that is self-replicating infecting a computer and can spread across its network

9 Clues: User's data is held hostage until a payment is madeIs protecting of information from malicious damage and unauthorized accessThe practice of protecting internet-connected systems from digital attacksHidden software that records a user's information secretly for a third-party...

STEM Careers 2023-05-12

STEM Careers crossword puzzle
Across
  1. helps prevent, diagnose, and treat heath problems in animals
  2. engineer who designs and tests electrical equipment
  3. engineer who designs and builds tools and systems that provide us with clean water
  4. studies the atmosphere and how it affects the rest of the environment
  5. engineer who helps plan transportation systems like railways or traffic patterns
  6. engineer who makes tech for aircraft, defense systems, and space exploration
  7. studies behaviors and habitats of wild animals
  8. helps people ensure they are eating the right diet
Down
  1. engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
  2. safeguards a company's computer systems and networks
  3. studies how living things inherit traits through genes
  4. engineer who Involved in production of energy through natural resources
  5. studies physical properties of Earth
  6. treats injury and illness, checks symptoms and provides solutions
  7. keeps and inspect financial records for their employers
  8. studies water and the water cycle to predict drought or prevent pollution
  9. engineer who uses science of light to create tools such as lasers and fiber optics
  10. engineer who uses engineering to solve problems in medicine
  11. engineer who designs city structures such as bridges, buildings, and water systems

19 Clues: studies physical properties of Earthstudies behaviors and habitats of wild animalshelps people ensure they are eating the right dietengineer who designs and tests electrical equipmentsafeguards a company's computer systems and networksstudies how living things inherit traits through geneskeeps and inspect financial records for their employers...

Computer apps crossword 2022-04-29

Computer apps crossword crossword puzzle
Across
  1. The spacing required for MLA format is…
  2. Characters that you can unlock on blooket are…
  3. an online way to keep personal information safe is…
  4. What are you creating while on google cites.
  5. A page that is on your website but is a part of another page is a…
  6. The last thing you should add before sending an email is your…
  7. A device issued to students so they can complete homework and other projects
  8. What is it called when you change the background color and font on a presentation?
  9. The first thing to add before typing an email is a…
  10. An app to cite your sources
Down
  1. What app does all of your work get saved on (2 words)
  2. Coping information that isn’t yours without citing it is…
  3. You can use math on this app and it will solve
  4. The way works cited pages are organized
  5. A program used for presentations is…
  6. The number of different game modes on blooket
  7. Docs, Sheets, Slides, Forms, and Sites are all owned by…
  8. A program you can use to send out information and get multiple responses back is…
  9. You use blooket for this before tests

19 Clues: An app to cite your sourcesA program used for presentations is…You use blooket for this before testsThe way works cited pages are organizedThe spacing required for MLA format is…What are you creating while on google cites.The number of different game modes on blooketYou can use math on this app and it will solve...

STEM Careers 2024-12-10

STEM Careers crossword puzzle
Across
  1. helps prevent, diagnose, and treat heath problems in animals
  2. engineer who designs and tests electrical equipment
  3. engineer who designs and builds tools and systems that provide us with clean water
  4. studies the atmosphere and how it affects the rest of the environment
  5. engineer who helps plan transportation systems like railways or traffic patterns
  6. engineer who makes tech for aircraft, defense systems, and space exploration
  7. studies behaviors and habitats of wild animals
  8. helps people ensure they are eating the right diet
Down
  1. engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
  2. safeguards a company's computer systems and networks
  3. studies how living things inherit traits through genes
  4. engineer who Involved in production of energy through natural resources
  5. studies physical properties of Earth
  6. treats injury and illness, checks symptoms and provides solutions
  7. keeps and inspect financial records for their employers
  8. studies water and the water cycle to predict drought or prevent pollution
  9. engineer who uses science of light to create tools such as lasers and fiber optics
  10. engineer who uses engineering to solve problems in medicine
  11. engineer who designs city structures such as bridges, buildings, and water systems

19 Clues: studies physical properties of Earthstudies behaviors and habitats of wild animalshelps people ensure they are eating the right dietengineer who designs and tests electrical equipmentsafeguards a company's computer systems and networksstudies how living things inherit traits through geneskeeps and inspect financial records for their employers...

ADSI Sebastian David Bautista Rivera 2022-06-01

ADSI Sebastian David Bautista Rivera crossword puzzle
Across
  1. reserved words, symbols and characters.
  2. request for information and/or data for a database.
  3. set of ordered, successive and perfectly defined instructions.
  4. language used to manage databases.
  5. information base that stores and is used by a program.
  6. tool to style web pages.
  7. programming language used in the data science and artificial intelligence environment.
Down
  1. the objective is to reduce the chances of errors in the operation of a program when it is used by the end user.
  2. editor de código, un compilador, un depurador y un constructor de interfaz gráfica
  3. to manage and plan products and projects.
  4. It is responsible for the privacy and data protection of companies and organizations to deal with cyber-attacks.
  5. Visual part, that the user sees and with which he interacts.
  6. es el nombre único que recibe un sitio web en internet.
  7. problem in the code that causes it not to run correctly.
  8. service that provides storage of information, images, video, or any content accessible via the Web.
  9. Is used especially for web development and is Html compatible.

16 Clues: tool to style web pages.language used to manage databases.reserved words, symbols and characters.to manage and plan products and projects.request for information and/or data for a database.information base that stores and is used by a program.es el nombre único que recibe un sitio web en internet....

Common STEM Concepts 2022-12-16

Common STEM Concepts crossword puzzle
Across
  1. Universal force of attraction acting between all matter, originally developed by Newton
  2. 2 words, computer systems able to perform tasks that usually require human intelligence
  3. Basic unit of a chemical element, building blocks of molecules
  4. Chemical in which life on Earth is reliant, atomic number 6
  5. Protection of computer systems from attacks or unauthorized use
  6. The ability to retain information or representation of past experiences
Down
  1. Statistical function that shows the possible values for a variable & how often they occur
  2. Darwin's theory, change in species over time
  3. 2 words, branch of mathematics in that deals with properties and relationships of numbers
  4. The process by which plants use sunlight to make food
  5. Carrier molecule of genetic information
  6. Branch of mathematics in which letters are used to represent numbers in equations and formulas
  7. Likelihood of the outcome of a certain event
  8. Study of heredity
  9. Thought process, includes all conscious and unconscious processes by which knowledge is gained
  10. Einstein's theory that all motion must be defined relative to a frame of reference and that space and time are relative concepts

16 Clues: Study of heredityCarrier molecule of genetic informationDarwin's theory, change in species over timeLikelihood of the outcome of a certain eventThe process by which plants use sunlight to make foodChemical in which life on Earth is reliant, atomic number 6Basic unit of a chemical element, building blocks of molecules...

WTB Cybersecurity Awareness Month Crossword Puzzle 2023-09-28

WTB Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. See question 18.
  2. See question 8.
  3. See question 1.
  4. See question 11.
  5. See question 15.
  6. See question 6.
  7. See question 5.
  8. See question 3.
  9. See question 2.
Down
  1. See question 10.
  2. See question 12.
  3. See question 9.
  4. See question 14.
  5. See question 16.
  6. See question 13.
  7. See question 7.
  8. See question 4.
  9. See question 17.

18 Clues: See question 9.See question 8.See question 1.See question 7.See question 6.See question 4.See question 5.See question 3.See question 2.See question 10.See question 12.See question 14.See question 16.See question 18.See question 13.See question 11.See question 15.See question 17.

Cybersecurity Lesson 1 & 2 Key Terms 2022-08-31

Cybersecurity Lesson 1 & 2 Key Terms crossword puzzle
Across
  1. are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
  2. where you connect with other players and can chat with them either by voice or by text.
  3. people online that often try to obtain information about you.
  4. a person who witness someone getting bullied but does nothing to stop it.
  5. is short for “internet etiquette” and are the rules for interacting politely online
  6. can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
  7. is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
  8. on the internet is a technical measure intended to restrict access to information.
  9. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
Down
  1. is exchange of suggestive messages or images via mobile phone texting.
  2. is the ability to act in a safe and responsible way on the internet and other connected environments.
  3. someone who intentionally targets people for harm using online chat rooms or social media.
  4. is the action of subjecting someone to aggressive pressure or intimidation.
  5. is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
  6. is bullying that takes place using electronic technology.
  7. keeping your personal information safe and personal.
  8. many social networking web sites require you to set up.
  9. is a detailed report, usually about a person.

18 Clues: is a detailed report, usually about a person.keeping your personal information safe and personal.many social networking web sites require you to set up.is bullying that takes place using electronic technology.people online that often try to obtain information about you.is exchange of suggestive messages or images via mobile phone texting....

Public Sector Cybersecurity Acronym Crossword 2024-06-07

Public Sector Cybersecurity Acronym Crossword crossword puzzle
Across
  1. The World’s Identity Company
  2. Third-party company that manages an organization's IT infrastructure and end-user systems
  3. U.S. DoD combat support agency
  4. A "smart" card that is the standard identification for government employees used to enable physical access to buildings and access to DoD computers
  5. System to manage identity authorization for external parties
  6. An authentication method that allows users to securely authenticate with multiple applications by using one set of credentials
Down
  1. Amazon Web Services
  2. Multi-step account login process
  3. Team of IT security professionals that protect the organization by monitoring and investigating cyber threats.
  4. Program provides federal agencies with a suite of capabilities that enable network security officials to continuously monitor cybersecurity risks in real-time
  5. The national coordinator for critical infrastructure security and resilience
  6. Security and business discipline to help the right people access the right assets at the right time while keeping unauthorized access and fraud at bay

12 Clues: Amazon Web ServicesThe World’s Identity CompanyU.S. DoD combat support agencyMulti-step account login processSystem to manage identity authorization for external partiesThe national coordinator for critical infrastructure security and resilienceThird-party company that manages an organization's IT infrastructure and end-user systems...

College & Career Readiness 2025-10-30

College & Career Readiness crossword puzzle
Across
  1. The branch that focuses on space operations, cybersecurity, and missile warning.
  2. The branch of the military that focuses on naval (sea) warfare and security.
  3. The first line of a professional email; usually includes the recipient's title and name.
  4. The branch known for its rapid deployment and amphibious (land and sea) operations.
  5. The email part that shows who the email is going to.
Down
  1. A formal closing phrase before your name.
  2. The most important email part; tells the recipient what the email is about in a few words.
  3. This part shows the sender's full contact information.
  4. The branch that is part of the Department of Homeland Security and patrols U.S. waters.
  5. The main message of the email, where you state your purpose clearly and politely.
  6. The branch primarily responsible for air and space operations; uses fighter jets and bombers.
  7. The branch responsible for combat operations on land and is known for ground forces.

12 Clues: A formal closing phrase before your name.The email part that shows who the email is going to.This part shows the sender's full contact information.The branch of the military that focuses on naval (sea) warfare and security.The branch that focuses on space operations, cybersecurity, and missile warning....

AI Crossword Puzzle 2024-10-17

AI Crossword Puzzle crossword puzzle
Across
  1. The technique of using past data to predict future outcomes (9 letters).
  2. Through this technique AI models can learn the underlying patterns and create realistic and novel outputs (12 letters).
  3. A popular programming language for AI development (6 letters).
  4. The process of automatically recognizing patterns in large data sets (6 letters).
  5. AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
Down
  1. The full form of "AI" (14 letters).
  2. A large data repository that is queried for insights (9 letters).
  3. A branch of AI focused on the interaction between computers and human language (3 letters).

8 Clues: The full form of "AI" (14 letters).A popular programming language for AI development (6 letters).A large data repository that is queried for insights (9 letters).The technique of using past data to predict future outcomes (9 letters).The process of automatically recognizing patterns in large data sets (6 letters)....

AI Crossword Puzzle 2024-10-17

AI Crossword Puzzle crossword puzzle
Across
  1. A large data repository that is queried for insights (8 letters).
  2. The technique of using past data to predict future outcomes (9 letters).
  3. The process of automatically recognizing patterns in large data sets (6 letters).
  4. The full form of "AI" (14 letters).
Down
  1. AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
  2. A popular programming language for AI development (6 letters).
  3. A branch of AI focused on the interaction between computers and human language (3 letters).
  4. Through this technique AI models can generate content based on patterns learned from large data (12 letters).

8 Clues: The full form of "AI" (14 letters).A popular programming language for AI development (6 letters).A large data repository that is queried for insights (8 letters).The technique of using past data to predict future outcomes (9 letters).The process of automatically recognizing patterns in large data sets (6 letters)....

CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06

CyberSecurity Awareness Month Crossword Puzzle - Week 1 crossword puzzle
Across
  1. what is the weakest link in cybersecurity?
  2. ___ was the first personal computer virus?
  3. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  4. Necessary when the circumstances of an incident require more details
  5. Our company may _________ your internet usage
Down
  1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  2. What is the best way to maintain privacy between two parties?
  3. When someone sends an e-mail with a link a bogus website is called
  4. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  5. What type of calls are made by social engineers

10 Clues: what is the weakest link in cybersecurity?___ was the first personal computer virus?Our company may _________ your internet usageWhat type of calls are made by social engineersWhat is the best way to maintain privacy between two parties?When someone sends an e-mail with a link a bogus website is called...

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. A remote code execution flaw in Nginx web server.
  4. Powerful intercepting proxy and web vulnerability scanner.
  5. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  6. uicydata;104.18.12.126
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  3. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  4. Rhysider 44.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

Artificial Intelligence 2023-11-19

Artificial Intelligence crossword puzzle
Across
  1. A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
  2. An expert at programming and solving problems with a computer
  3. The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
  4. The design, construction, and operation of robots to perform tasks in the real world.
  5. A computer program designed to simulate conversation with human users, especially over the Internet.
Down
  1. The systematic process of assessment and planning employed to prevent a developmental problem.
  2. Not functioning in a previously intended way
  3. Capable of operating independently without human control.
  4. The use of technology to perform tasks without human intervention.
  5. To set in motion; make active or more active.

10 Clues: Not functioning in a previously intended wayTo set in motion; make active or more active.Capable of operating independently without human control.An expert at programming and solving problems with a computerThe use of technology to perform tasks without human intervention....

asdfasdfa 2023-10-08

asdfasdfa crossword puzzle
Across
  1. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
  2. Converting data into a code to prevent unauthorized access, especially during transmission.
  3. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  4. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  5. Verifying the identity of users or systems to ensure secure access.
Down
  1. Malware that encrypts files, demanding payment for their release.
  2. An update to fix vulnerabilities or improve security in software or systems.
  3. Pertaining to the security challenges and measures for smartphones and tablets.
  4. Safeguarding personal information to ensure confidentiality and compliance with regulations.
  5. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.

10 Clues: Malware that encrypts files, demanding payment for their release.Verifying the identity of users or systems to ensure secure access.An update to fix vulnerabilities or improve security in software or systems.Pertaining to the security challenges and measures for smartphones and tablets....

Digital Safety 2024-10-14

Digital Safety crossword puzzle
Across
  1. using appropriate language, refraining from excessive capitalization and avoiding offensive or inappropriate content.
  2. be cautious about sharing personal details
  3. Develop critical thinking skills to evaluate the credibility and accuracy of online information. Be cautious of misinformation and fake news, and verify information from reliable sources before sharing it
  4. Be mindful of the content you share, comment on, or engage with, as it can have long-term consequences.
  5. Maintain a healthy balance between your online and offline life.
Down
  1. being mindful of the impact your posts and comments can have on other
  2. protection from digital attacks
  3. Do not use or distribute copyrighted material without proper permission or attribution.
  4. navigate the online world effectively.
  5. just as you would in face-to-face interactions

10 Clues: protection from digital attacksnavigate the online world effectively.be cautious about sharing personal detailsjust as you would in face-to-face interactionsMaintain a healthy balance between your online and offline life.being mindful of the impact your posts and comments can have on other...

𝗕𝗥𝗢𝗪𝗦𝗜𝗡𝗚 𝗦𝗔𝗙𝗘𝗟𝗬 2025-05-20

𝗕𝗥𝗢𝗪𝗦𝗜𝗡𝗚   𝗦𝗔𝗙𝗘𝗟𝗬 crossword puzzle
Across
  1. = they are also called unethical hackers
  2. faurds = it is the use of illegal method to get money or anything that belongs to a bank or its customer
  3. = it reffers to an illegal entry into a computer system or network
  4. = it's a collection of Technologies processes and practices design to protect network,computer,program from attack or damage
  5. = a criminal activity intended to harm anyone using a computer and an Internet connection
  6. = a software that helps in preventing unauthorised access to your computer by blocking unsolicited communication
Down
  1. = strongest password among abcd 12345 azybxc
  2. = it is the act of sending a faurd email to an user.
  3. = it is an act of harming of harssing using information technology in a deliberate manner
  4. = Vital Information Resources Under Seize

10 Clues: = they are also called unethical hackers= Vital Information Resources Under Seize= strongest password among abcd 12345 azybxc= it is the act of sending a faurd email to an user.= it reffers to an illegal entry into a computer system or network= a criminal activity intended to harm anyone using a computer and an Internet connection...

CAM 2025-10-06

CAM crossword puzzle
Across
  1. The place to go to learn about emerging cybersecurity threats
  2. Software designed with malicious intent
  3. An email designed to get you to take an action, like download a file, open an attachment or click a link
  4. These help identify you protect information and should be created to be strong, complex and unique
Down
  1. Where to forward suspicious emails
  2. Software Social engineering technique that realistically mimics a person’s voice in fake videos and phone calls

6 Clues: Where to forward suspicious emailsSoftware designed with malicious intentThe place to go to learn about emerging cybersecurity threatsThese help identify you protect information and should be created to be strong, complex and uniqueAn email designed to get you to take an action, like download a file, open an attachment or click a link...

EY Digital Movement 2018-11-22

EY Digital Movement crossword puzzle
Across
  1. what is the word used to describe keeping data safe from hackers?
  2. What word is often today in the context of the digitization and innovation of payment transactions?
Down
  1. These two words describe the extraction of actionable and valuable information from big data.
  2. You are now in University of _
  3. Fill in the blank: Long _ of Careers

5 Clues: You are now in University of _Fill in the blank: Long _ of Careerswhat is the word used to describe keeping data safe from hackers?These two words describe the extraction of actionable and valuable information from big data.What word is often today in the context of the digitization and innovation of payment transactions?

Dr. Harris Cybersecurity Crossword Puzzle 2025-03-19

Dr. Harris Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Incoming Mail Server
  2. Malicious software
  3. Cryptomalware
  4. Software user does not want on their computer
  5. WWW.WCCCD.EDU
  6. Rules
Down
  1. Earliest form of Ransomware
  2. Tracking software
  3. Outgoing Mail Server
  4. Language to combine text, graphics, images, audio
  5. Tracking technology that gathers information about user activities
  6. Silently captures keystrokes
  7. Global computer network

13 Clues: RulesCryptomalwareWWW.WCCCD.EDUTracking softwareMalicious softwareIncoming Mail ServerOutgoing Mail ServerGlobal computer networkEarliest form of RansomwareSilently captures keystrokesSoftware user does not want on their computerLanguage to combine text, graphics, images, audioTracking technology that gathers information about user activities

Executive Departments 2022-02-10

Executive Departments crossword puzzle
Across
  1. to enhance the health and well-being of all Americans
  2. assists U.S. communities in providing fair and equal housing
  3. counterterrorism, cybersecurity, aviation security, border security, port security, maritime security
  4. responsible for formulating and recommending domestic and international financial, economic, and tax policy
  5. oversees the management and distribution of the federal budget for education initiatives
  6. to enforce the law and defend the interests of the United States according to the law
  7. foster, promote, and develop the welfare of the wage earners
  8. to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions
  9. promotes job creation and economic growth by ensuring fair trade
Down
  1. responsible for planning and coordinating federal transportation projects
  2. to enforce the law and defend the interests of the United States according to the law
  3. the principal defense policymaker and adviser
  4. in charge of coordinating agricultural research, extension and teaching activity
  5. advises the president and leads the nation in foreign policy issues
  6. responsible for administering veteran benefits, memorials/cemeteries, and health care

15 Clues: the principal defense policymaker and adviserto enhance the health and well-being of all Americansassists U.S. communities in providing fair and equal housingfoster, promote, and develop the welfare of the wage earnerspromotes job creation and economic growth by ensuring fair tradeadvises the president and leads the nation in foreign policy issues...

QAP 2.0 : Brain Teaser 2020-11-02

QAP 2.0 : Brain Teaser crossword puzzle
Across
  1. New Process DQP/DQI/DQF created that was presented in recent Summit are related to
  2. In GIA, what does 'G' stands for
  3. New doc added to DQP 45-000 related to software requirement
  4. One of the approvers for Biocomp Protocol
  5. One of the mandatory approvers for engineering assessment for V&V.
Down
  1. Latest version for DQP 25-003 will be
  2. This contains information like Ref number, UDI, LOT number, temperature condition, mfg site details, sterility implant/instrument type and name, etc.
  3. Recently added to the list of Countries accepting eIFU. (hint: the country with the largest postal network)
  4. Initial Clinical Evaluation Plan is initiated at PR?
  5. A 14 digit number used to uniquely identify the trade item
  6. CUN are the part of which document
  7. Risk Management Board is required in which DR?
  8. MDCG is a Guidance on? (hint: its software process requirement)
  9. It is a combination of the probability of occurrence of harm and the severity of that harm

14 Clues: In GIA, what does 'G' stands forCUN are the part of which documentLatest version for DQP 25-003 will beOne of the approvers for Biocomp ProtocolRisk Management Board is required in which DR?Initial Clinical Evaluation Plan is initiated at PR?A 14 digit number used to uniquely identify the trade item...

Tech Week Day 3 2024-05-08

Tech Week Day 3 crossword puzzle
Across
  1. Immersive technology that creates a simulated environment.
  2. Processing data closer to the source or "edge" of the network, reducing latency and bandwidth usage.
  3. Distributed ledger technology used for secure and transparent transactions.
  4. Electric car company founded by Elon Musk.
  5. Subset of AI that allows systems to learn and improve from experience without being explicitly programmed.
  6. Search engine and technology company known for its web services and products.
  7. Measures taken to protect computer systems and data from unauthorized access or attacks.
Down
  1. Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
  2. Large volumes of structured and unstructured data that can be analyzed for insights.
  3. Cryptocurrency created by an unknown person or group of people using the name Satoshi Nakamoto.
  4. Markup language used for creating web pages.
  5. Private aerospace manufacturer and space transportation company founded by Elon Musk.
  6. Simulation of human intelligence processes by machines, especially computer systems.
  7. Technology that overlays digital information onto the real world.

14 Clues: Electric car company founded by Elon Musk.Markup language used for creating web pages.Immersive technology that creates a simulated environment.Technology that overlays digital information onto the real world.Distributed ledger technology used for secure and transparent transactions....

Global Outage 2024-08-27

Global Outage crossword puzzle
Across
  1. a way of working, especially with a piece of software, that avoids a particular problem but does not actually solve the problem
  2. measures that are taken to protect against the criminal use of electronic data
  3. easy to do or to understand
  4. not harmful or dangerous
  5. having a good knowledge and understanding of modern technology, especially computers
  6. use something effectively
  7. a quantity of work that should have been done already, but has not yet been done
Down
  1. well known for being bad or evil
  2. the act of starting a computer, smartphone, etc. again immediately after you have switched it of
  3. prevent an aircraft from taking off
  4. a situation in which it is difficult for something to continue in the normal way
  5. a person who suffers or a thing that is destroyed when something else takes
  6. manage to achieve something with difficulty, or in a hurry, without much control
  7. a period of time when the supply of electricity, etc. is not working

14 Clues: not harmful or dangerouseasy to do or to understanduse something effectivelywell known for being bad or evilprevent an aircraft from taking offa period of time when the supply of electricity, etc. is not workinga person who suffers or a thing that is destroyed when something else takes...

TECNO CROSSWORD 2024-11-12

TECNO CROSSWORD crossword puzzle
Across
  1. A small part of a computer that stores information.
  2. This device lets you see and hear people far away in real time.
  3. An assistant on phones that talks back and helps with tasks.
  4. A flying device controlled by remote, often used to take pictures from above.
  5. A device that helps people take clear pictures or videos.
  6. A large group of computers connected to share resources.
  7. A tiny device that powers and runs electronic items.
  8. A small device used to make calls, send texts, and access apps.
  9. Media People use this to connect, share photos, and send messages online.
Down
  1. The process of protecting devices from online attacks.
  2. Reality This type of "reality" is created by computers to make you feel like you’re somewhere else.
  3. Game A type of game played on a computer, phone, or console.
  4. A place where you can search for information on any topic.
  5. A machine that can be programmed to do tasks by itself.

14 Clues: A small part of a computer that stores information.A tiny device that powers and runs electronic items.The process of protecting devices from online attacks.A machine that can be programmed to do tasks by itself.A large group of computers connected to share resources.A device that helps people take clear pictures or videos....

Fun Friday 2023-02-09

Fun Friday crossword puzzle
Across
  1. sending emails purporting to be from reputable companies to induce you to reveal personal information
  2. cybersecurity attack carried out over mobile text messaging
  3. depositing funds thru this device to inflate your balance
  4. phone calls purporting to be from reputable companies in order to reveal personal information
  5. Congratulations you have won the publishers clearinghouse!
  6. consumers respond to an online solicitation for “easy money” and provide a debit card for withdrawal of fake check deposits
  7. making multiple deposits between institutions to move funds and withdraw money
Down
  1. device to help catch fraudulent IDs
  2. obtaining information or ID to establish a fake identity
  3. scam where you meet someone online, build up a love interest, and request funds from them
  4. pretending to be something else in an attempt to gain a victim's confidence & steal data
  5. the process of identifying the person in front of you
  6. a check to compare to the one that is being presented to you
  7. warning you can set up to notify you of suspicious activity

14 Clues: device to help catch fraudulent IDsthe process of identifying the person in front of youobtaining information or ID to establish a fake identitydepositing funds thru this device to inflate your balanceCongratulations you have won the publishers clearinghouse!cybersecurity attack carried out over mobile text messaging...

Intellectual Property Rights 2025-02-05

Intellectual Property Rights crossword puzzle
Across
  1. - A requirement meaning an invention must be new.- A legal notice demanding the stop of infringing activity.
  2. - The practice of protecting systems and data from cyber threats.
  3. - A legal right granted for an invention, giving the creator exclusive rights to use or sell the invention for a certain period.
  4. - The violation or breach of a law, right, or agreement, especially intellectual property rights.
  5. - A process where a neutral third party helps resolve disputes.
  6. - A recognizable sign identifying products or services.
  7. - Legal protection for original works of authorship.
  8. Rights - Legal authority to prevent others from using an invention.
  9. - An exclusive legal right granted to an inventor.
Down
  1. - The quality of being new, original, or unique.
  2. - The act of extending or restoring something, often a contract or license, for a new period.
  3. - The process of creating new ideas, products, or methods that bring improvements or advancements.
  4. - Legal statements in a patent that define the scope of protection granted to the inventor.
  5. - Unauthorized use of a patented invention.
  6. Art - Existing knowledge that may affect patentability.
  7. - The process of creating an early sample or model of a product to test or demonstrate its concept.
  8. - An established procedure or protocol, often associated with official or ceremonial conduct.

17 Clues: - Unauthorized use of a patented invention.- The quality of being new, original, or unique.- An exclusive legal right granted to an inventor.- Legal protection for original works of authorship.Art - Existing knowledge that may affect patentability.- A recognizable sign identifying products or services....

Crossword Edition 4 2020-04-22

Crossword Edition 4 crossword puzzle
Across
  1. solutions do not require software installation, thus they are more accessible
  2. protocol is used by the IoT device to send a periodic update to a cloud server running AWS IoT services
  3. the protocol used to communicate temperature data to Cloud-based applications for trend analysis
  4. is one of the IoT trend in manufacturing that needs an increased attention
Down
  1. name one of the Smart parking sensor
  2. type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service
  3. promises of ultra-low latency,ultra-high reliability and very high speed and connectivity
  4. Iot device invented for Safe Social Distancing
  5. temperature sensors that enables the cities to provide better health monitoring and services to communities

9 Clues: name one of the Smart parking sensorIot device invented for Safe Social Distancingis one of the IoT trend in manufacturing that needs an increased attentionsolutions do not require software installation, thus they are more accessiblepromises of ultra-low latency,ultra-high reliability and very high speed and connectivity...

Dangers Of The Internet 2025-03-13

Dangers Of The Internet crossword puzzle
Across
  1. malware that collects user information such as pin codes, payment information and passwords without the user’s permission
  2. any illegal activity which takes place online
  3. act of using electronic communication to bully or intimidate a person
  4. security of electronic information and systems from unauthorized access or attacks
  5. malware that takes on the appearance of desirable software to take control of victims’ systems for malicious purposes
Down
  1. someone who gains unauthorized access to data in a system or computer
  2. individuals who use the internet to engage in criminal activities
  3. malware in the form of software used to encrypt and disable access to data until a ransom is paid
  4. software created to disrupt, damage or gain unauthorized access to a computer system

9 Clues: any illegal activity which takes place onlineindividuals who use the internet to engage in criminal activitiessomeone who gains unauthorized access to data in a system or computeract of using electronic communication to bully or intimidate a personsecurity of electronic information and systems from unauthorized access or attacks...

what are the main industries that uses AI ? 2022-11-08

what are the main industries that uses AI ? crossword puzzle
Across
  1. / when you hear this industry's name you immediately imagine hackers 👩🏻‍💻
  2. / actually we are in this industry!
Down
  1. / they take care of you physically and mentally 💟
  2. / something has to do with financials 💰

4 Clues: / actually we are in this industry!/ something has to do with financials 💰/ they take care of you physically and mentally 💟/ when you hear this industry's name you immediately imagine hackers 👩🏻‍💻

ETSI crossword 2023-05-24

ETSI crossword crossword puzzle
Across
  1. The partnership project shaping the future of mobile telecommunications.
  2. The first word of the first column on page 5 of Enjoy April 2023 edition.
  3. You can hardly live without it and it's your best friend on holidays.
  4. The next evolutionary step in computing, leveraging the principles of advanced physics.
  5. We are the _______ people.
  6. The youngest don’t know it, but they know 5G, the latest generations.
  7. Agreement, the basis of all ETSI technical work
  8. Network of interconnected devices that communicate and exchange data.
  9. An RFID technology to enable you to pay on your mobile phone.
Down
  1. We're already working on the 6th one for telecommunications.
  2. You call this service as your last resort before your laptop crashes.
  3. If it's not strong enough, your ICT system might be in trouble.
  4. The capacity of machines to try to imitate human intelligence.
  5. You’re reading it!
  6. E= Mc2 and the name of the second ETSI building.
  7. The current mobile telecommunications technology offers blazing-fast data transfer speeds and significantly lower latency than 4G.
  8. Wireless communication protocol for cordless telephones and voice data transmissions.
  9. The ancestor of chat, still widely used today, an ETSI standard.

18 Clues: You’re reading it!We are the _______ people.Agreement, the basis of all ETSI technical workE= Mc2 and the name of the second ETSI building.We're already working on the 6th one for telecommunications.An RFID technology to enable you to pay on your mobile phone.The capacity of machines to try to imitate human intelligence....

Monthly Cybersecurity Crossword (May, 2020) 2020-04-30

Monthly Cybersecurity Crossword (May, 2020) crossword puzzle
Across
  1. The team responsible for securing the hardware and software technology for the global distribution centers.
  2. How often McKesson employees are sent training phishing campaigns each quarter.
  3. Term used for suspicious emails
  4. Where you access McKesson approved software for Windows machines to download to your machine.
Down
  1. Engineering team which supports any device that communicates with our network.
  2. the type of access which refers to connecting to an asset using a wireless network.
  3. The program which raises awareness of the latest threats through cybersecurity awareness and advocacy
  4. The tool used as the main connection point of the Sentinels program.
  5. the team acting as the front line of defense for the protection of McKesson patients and employees from cyber threats.

9 Clues: Term used for suspicious emailsThe tool used as the main connection point of the Sentinels program.Engineering team which supports any device that communicates with our network.How often McKesson employees are sent training phishing campaigns each quarter.the type of access which refers to connecting to an asset using a wireless network....

The Digital World 2023-11-15

The Digital World crossword puzzle
Across
  1. anyone who uses a digital device or accesses the internet is called.
  2. technology is similar to WiFi.
  3. WiFi connection uses invisible waves to send and receive information over small distances.
  4. can be added before any word to mean the word has to do with the world of computers and digital things.
  5. WiFi is used to connect devices to the.
Down
  1. connection a smartphone can connect to a car’s speaker system or to a portable speaker through.
  2. set of ideas and guidelines that keep us safe while using digital devices.
  3. number of different ways to connect into the digital world.
  4. world invisible space where computers talk to one another called cyberspace, is not a physical place.
  5. what makes the digital world so interesting.

10 Clues: technology is similar to WiFi.WiFi is used to connect devices to the.what makes the digital world so interesting.number of different ways to connect into the digital world.anyone who uses a digital device or accesses the internet is called.set of ideas and guidelines that keep us safe while using digital devices....

Crossword 2024-04-18

Crossword crossword puzzle
Across
  1. the programs and other operating information used by a computer
  2. he protection of computer systems and networks from attacks by malicious actors
  3. team focus is on phone networks, recording calls and call center
  4. a request for information
  5. set of data processing elements connected in series, the output of one element is the input of another
  6. (abbrev)determines stakeholder needs and drives strategy for IT team
  7. objectively analyze desired processes and outcomes, advise on correct combo of IT systems
Down
  1. position focus is to support teams on IT floor to produce efficiently and effectively
  2. the systems put in place to operate and manage IT services and environments
  3. a structured set of data held in a computer
  4. creates/develops training materials for IT
  5. team focused on keeping monitors, computers and general physical technology in working order
  6. maximum rate of data transfer across a given path
  7. (abbrev) much of the job involves attempting to "break" code
  8. subset of programming entailing logical reasoning, analysis, and planning a sequence of instructions
  9. (abbrev) computer systems able to perform tasks such as visual perception, speech recognition, decision-making

16 Clues: a request for informationcreates/develops training materials for ITa structured set of data held in a computermaximum rate of data transfer across a given path(abbrev) much of the job involves attempting to "break" codethe programs and other operating information used by a computerteam focus is on phone networks, recording calls and call center...

Technology 2023-06-12

Technology crossword puzzle
Across
  1. Physical parts of a computer or electronic device that you can touch and see
  2. Reality (VR) Computer-generated simulation of a three-dimensional environment for an immersive experience
  3. Collection of web pages that can be accessed on the internet
  4. Programs and applications that run on a computer or electronic device
  5. Writing instructions or commands for a computer program
  6. Intelligence (AI) Creating intelligent machines that can think and learn like humans
  7. Mechanical device that can perform tasks automatically or be controlled by humans
Down
  1. Creating and developing computer programs by giving instructions to the computer
  2. Relating to using technology to process and display information in numbers
  3. Measures taken to protect computer systems and data from unauthorized access
  4. A group of computers or devices connected together to share information
  5. Short for "application," a program or tool designed for a specific purpose
  6. Introducing new ideas, methods, or technologies to create something better
  7. Electronic machine used to store, process, and retrieve information
  8. Information that is stored and processed by a computer
  9. Worldwide network of computers that allows communication and access to information

16 Clues: Information that is stored and processed by a computerWriting instructions or commands for a computer programCollection of web pages that can be accessed on the internetElectronic machine used to store, process, and retrieve informationPrograms and applications that run on a computer or electronic device...

Cyber Crosswords 2025-07-03

Cyber Crosswords crossword puzzle
Across
  1. Software that protects your computer from harmful programs.
  2. Malicious software that locks your files and demands money to unlock them.
  3. A method of converting data into a code to prevent unauthorized access.
  4. A secret word or phrase used to access a system or account.
  5. A voice-based scam where attackers call pretending to be from a trusted source.
  6. A person who gains unauthorized access to data or systems.
  7. A network security system that blocks unwanted access while allowing safe communication.
  8. A type of phishing attack done through SMS or text messages.
Down
  1. The practice of protecting systems, networks, and data from digital attacks.
  2. A weakness in software or systems that can be exploited by attackers.
  3. Malicious software designed to damage or gain unauthorized access to systems.
  4. Malware disguised as a legitimate program but harmful once opened.
  5. A short-range wireless technology used to connect devices like headphones and keyboards.
  6. A group of connected computers and devices that share resources.
  7. A longer version of a password made up of multiple words.
  8. A scam where attackers trick you into giving personal or financial information.

16 Clues: A longer version of a password made up of multiple words.A person who gains unauthorized access to data or systems.Software that protects your computer from harmful programs.A secret word or phrase used to access a system or account.A type of phishing attack done through SMS or text messages....

STEM Vocabulary: Digital Citizenship 2024-03-18

STEM Vocabulary: Digital Citizenship crossword puzzle
Across
  1. Check to make sure your account is on "Friends Only" under the _____ section.
  2. Use your _____ skills to make wise decisions by evaluating information.
  3. It is necessary in 2024 to have _____ because we are in the age of technology.
  4. When someone is experiencing harassment online, it is considered ________.
  5. Microsoft makes me use _____ when signing in to ensure my identity and prevent hacking.
  6. Timmy copied my entire essay and was written up for _____.
Down
  1. _____ are individuals who want to harm others online.
  2. I must be mindful of my _____ because anything on the Internet can be found.
  3. Aadi is very interested in _____ because he cares deeply for protecting people from data leaks.
  4. My _____ is the responsibility to use my technology ethically.
  5. It is important to have maximum _____ to ensure that your account is protected.
  6. Please use the correct decorum and _____ when speaking to others on the Internet.

12 Clues: _____ are individuals who want to harm others online.Timmy copied my entire essay and was written up for _____.My _____ is the responsibility to use my technology ethically.Use your _____ skills to make wise decisions by evaluating information.When someone is experiencing harassment online, it is considered ________....

Science and Technology Crossword Puzzle 2025-03-06

Science         and Technology Crossword Puzzle crossword puzzle
Across
  1. (5): The curved path of a celestial object around a star or planet.
  2. (7) - A medical operation performed by a doctor.
  3. (12): The process of making a person resistant to disease through vaccination.
  4. (8) - The study of heredity and inherited traits.
  5. (7): The process of creating an identical copy of an organism.
  6. (8) - A treatment that removes waste from the blood when kidneys fail.
  7. (8): The science of designing and using machines that can perform tasks automatically.
Down
  1. (14) - The science of manipulating materials on an extremely small scale.
  2. (15) - A medical procedure to replace a failing organ with a healthy one.
  3. (12) - The protection of computer systems against theft or damage.
  4. (9) - A set of step-by-step instructions used to solve a problem.
  5. (12) - A serious lung disease caused by bacteria.
  6. (2): The simulation of human intelligence by machines.
  7. (13): The use of living organisms or systems to develop products, often for medicine or agriculture.
  8. (9): The central unit in a computer that performs instructions.
  9. (6): A small electronic device used for practical functions.

16 Clues: (7) - A medical operation performed by a doctor.(12) - A serious lung disease caused by bacteria.(8) - The study of heredity and inherited traits.(2): The simulation of human intelligence by machines.(6): A small electronic device used for practical functions.(7): The process of creating an identical copy of an organism....

Inspiring Facilities & Innovative Equipment 2021-01-05

Inspiring Facilities & Innovative Equipment crossword puzzle
Across
  1. Last name of ACTE’s Administrator of the year, Jean
  2. What keynote speaker and issue contributor Kevin J. Fleming seeks to redefine in his book
  3. ACTE conference being hosted virtually for the first time ever in February 2021
  4. State in which Grace Godfrey teaches agricultural science using CASE
  5. One of five virtual internship types offered by Professional Prep Academy
  6. Previous name of Wendell Krinn Technical High School
Down
  1. The A in STEAM
  2. Last name of ACTE’s recent Champion for CTE Award winner, Joseph P.
  3. One of four pillars of the online classroom, according to Rasha ElSahel Elhage
  4. Deb Moore & Kevin English want CTE educators to be this, in Classroom Connection
  5. Defined by Theo Pappas as “to give power to, to enable, to realize promise and recognition, to make stronger and to elevate confidence”
  6. ACTE hosted its CareerTech VISION 2020 in this format

12 Clues: The A in STEAMLast name of ACTE’s Administrator of the year, JeanPrevious name of Wendell Krinn Technical High SchoolACTE hosted its CareerTech VISION 2020 in this formatLast name of ACTE’s recent Champion for CTE Award winner, Joseph P.State in which Grace Godfrey teaches agricultural science using CASE...

Technology - Oct'23 2023-11-06

Technology - Oct'23 crossword puzzle
Across
  1. Orchestrates containerized applications, managing scaling and load balancing in deployment.
  2. Protects digital systems from threats with firewalls, encryption, and audits.
  3. Merges biology and data science to analyze biological data, particularly in genomics and proteomics.
  4. Utilizes a distributed ledger for secure, transparent, and immutable transactions.
  5. Automated machines with AI, sensors, and actuators used in manufacturing and healthcare.
  6. Enhances security and identity verification through unique traits like fingerprints and facial recognition.
  7. Combines development and operations, emphasizing automation and collaboration for streamlined software deployment.
Down
  1. Manipulates matter at the nanoscale, enabling precision engineering with applications in medicine and materials.
  2. Isolate software applications for streamlined development and deployment, often using Docker.
  3. AI-powered virtual assistants providing automated responses in chat for customer support and more.
  4. Framework for big data processing, splitting data for parallel analysis and storage.
  5. Creates 3D visual representations using interference patterns, applied in art, medical imaging, and security.

12 Clues: Protects digital systems from threats with firewalls, encryption, and audits.Utilizes a distributed ledger for secure, transparent, and immutable transactions.Framework for big data processing, splitting data for parallel analysis and storage.Automated machines with AI, sensors, and actuators used in manufacturing and healthcare....

Social Issues 2023-03-06

Social Issues crossword puzzle
Across
  1. a population with an increased proportion of elderly
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. the movement of people from one country or place of residence, to settle in another
  4. the inability to read and write
  5. discrimination against an individual on the basis of their skin color, race or ethnicity
  6. a state of lacking financial resources and essentials for a certain standard of living
  7. the problem of long-term shifts in temperatures and weather patterns
  8. the basic rights and freedoms that belong to every person in the world
Down
  1. the social phenomenon in which people are not treated equally on the basis of gender
  2. a form of dishonesty or criminal offense undertaken by a person entrusted in a position of authority
  3. the condition of people unable to find any work
  4. a situation in which too many people or animals live in a certain area

12 Clues: the inability to read and writethe condition of people unable to find any worka population with an increased proportion of elderlythe problem of long-term shifts in temperatures and weather patternsa situation in which too many people or animals live in a certain areathe basic rights and freedoms that belong to every person in the world...

Incident Response Plan 2024-05-22

Incident Response Plan crossword puzzle
Across
  1. Organizations can detect incidents through security_______tools
  2. typically includes a summary of the incident, impact assessment, timeline of events, and response actions taken.
  3. ________________ is the process of restoring and returning affected systems and devices back to normal operation securely.
  4. Incident Response____________ oversees and coordinates the response to an incident and is the primary decision-maker.
  5. ____________involves removing the threat from all affected systems.
  6. A ________________is an alert that inaccurately indicates malicious activity
  7. A ____________ incident is any attempted or successful unauthorized access, use, disclosure, or modification, or destruction of
Down
  1. __________ is vital for coordinating response efforts, informing stakeholders, and maintaining transparency with external
  2. Incident ______________ is the methodology an organization uses to respond to and manage a cyberattack or breach.
  3. Learned Key stages include Preparation, Identification, Containment, Eradication, Recovery, and__________.
  4. ______ correctly identifies actual malicious activity.
  5. _______include having tools and processes in place and training personnel on their roles during containment.

12 Clues: ______ correctly identifies actual malicious activity.Organizations can detect incidents through security_______tools____________involves removing the threat from all affected systems.A ________________is an alert that inaccurately indicates malicious activity...

Cybersecurity crossword puzzle 2024-06-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. Measures to protect computer systems from unauthorized access or attacks
  2. A person who uses computers to gain unauthorized access to data
  3. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
  1. The protection of internet-connected systems, including hardware, software, and data
  2. A secret word or phrase used to gain access to a computer system
  3. The state of being free from being observed or disturbed by other people

6 Clues: A person who uses computers to gain unauthorized access to dataA secret word or phrase used to gain access to a computer systemThe state of being free from being observed or disturbed by other peopleMeasures to protect computer systems from unauthorized access or attacks...

Voting 2023-05-14

Voting crossword puzzle
Across
  1. protecting information, equipment, devices, computer, computer resource etc.
  2. Mode in which documents may be sent for postal ballot
  3. date not earlier than seven days before the date of general meeting for determining the eligibility to vote by electronic means or in the general meeting;
  4. Mode in which documents may be sent for postal ballot
  5. Method of voting
  6. A Resolution passed by postal ballot shall not be rescinded otherwise than by a _____
  7. After general notice, ___ must be sent for e-voting
Down
  1. facility of casting votes by a member using an electronic voting system from a place other than venue of general meeting;
  2. a person who shall maintain register regarding voting
  3. The notice of the postal ballot shall also be placed on the _____
  4. Method of voting
  5. Mode in which documents may be sent for postal ballot
  6. credential required to vote electronically
  7. Enterprise to which s.108 does not apply
  8. National Securities Depository Limited, the Central Depository Services (India) Limited or any other entity approved by the Ministry of Corporate Affairs

15 Clues: Method of votingMethod of votingEnterprise to which s.108 does not applycredential required to vote electronicallyAfter general notice, ___ must be sent for e-votinga person who shall maintain register regarding votingMode in which documents may be sent for postal ballotMode in which documents may be sent for postal ballot...

BMA 4103: Group 2 2024-10-27

BMA 4103: Group 2 crossword puzzle
Across
  1. Dodd-Frank Act are to enhance regulation and promoting _________ .
  2. this is what usually happens when companies face pressure to adopt internationally recognized standards.
  3. enables board to address complex issue effectively and uphold accountability and transparency.
  4. disguising the origins of illegally obtained money to be legitimate
  5. practice of protecting systems, networks and programs from digital attack.
  6. SOX Act helps protect investors from _________ financial reporting by corporation.
  7. the board should focus on creating sustainable value and be accountable to shareholders for its performance.
  8. ongoing assessment of organization’s performance and adherence to government standards.
Down
  1. the process through which shareholders exercise through voting rights on ESG.
  2. refers to the process of having an independent party review to verify the info reported by the company.
  3. it imposes governance standards that influence local companies seeking to attract foreign investment or list in abroad.
  4. this particularly focused on preventing the excessive risk taking that contributed to the financial crisis.

12 Clues: Dodd-Frank Act are to enhance regulation and promoting _________ .disguising the origins of illegally obtained money to be legitimatepractice of protecting systems, networks and programs from digital attack.the process through which shareholders exercise through voting rights on ESG....

Definisi Keselamatan Siber 2024-06-17

Definisi Keselamatan Siber crossword puzzle
Across
  1. Program yang mereplikasi dirinya untuk merebak ke komputer lain.
  2. Seseorang yang menggunakan komputer untuk mendapatkan akses tanpa kebenaran ke data.
Down
  1. Amalan melindungi sistem, rangkaian, dan program daripada serangan digital.
  2. Perisian berniat jahat yang direka untuk merosakkan, mengganggu, atau mendapatkan akses tanpa kebenaran kepada sistem komputer.
  3. Kaedah serangan di mana seorang penyerang menipu individu untuk mendedahkan maklumat sulit.

5 Clues: Program yang mereplikasi dirinya untuk merebak ke komputer lain.Amalan melindungi sistem, rangkaian, dan program daripada serangan digital.Seseorang yang menggunakan komputer untuk mendapatkan akses tanpa kebenaran ke data.Kaedah serangan di mana seorang penyerang menipu individu untuk mendedahkan maklumat sulit....

Information Management Vocab 2025-09-23

Information Management Vocab crossword puzzle
Across
  1. Predicting potential risks/dangers and preventing them before they happen, or just having a plan for if it goes downhill.
  2. An unbiased inspection/review to assess the safety and accuracy of information and procedures,
  3. The protection of the network, personal data, and the devices from unwanted threats.
  4. A business function which involves organized information about people, processes, and systems.
Down
  1. The validity and accuracy of data over a certain period of time
  2. A system which uses computers to help the Information Management business function
  3. A process or practice which is generally not shared outside of the company.
  4. Anything that has value but isn’t something physical
  5. Anything created from your brain and intellect, like ideas.

9 Clues: Anything that has value but isn’t something physicalAnything created from your brain and intellect, like ideas.The validity and accuracy of data over a certain period of timeA process or practice which is generally not shared outside of the company.A system which uses computers to help the Information Management business function...

On Demand Technologies 2021-08-04

On Demand Technologies crossword puzzle
Across
  1. A technology that deals with the study and applications of data
  2. A trending technology that changed the connectivity between different gadgets and appliances through various censors
  3. a simulation of human intelligence in machines
  4. a subset of AI which allows machines learn and work with less human intervention
Down
  1. A technology that deals with the protection of data,internet and virtual assets
  2. A technology that is helping in the reach of applications (apps) to many users
  3. A technology that is being used to change the traditional way of data presentation
  4. a technology in demand which is changing the traditional data storage method
  5. This uses simulation and real-world capturing together. An extension to across(5)
  6. a technology that creates a real-world replica in simulation.
  7. A technology that is based on decentralised digital ledgers and also a cornerstone for cryprtocurrencies

11 Clues: a simulation of human intelligence in machinesa technology that creates a real-world replica in simulation.A technology that deals with the study and applications of dataa technology in demand which is changing the traditional data storage methodA technology that is helping in the reach of applications (apps) to many users...

Imp. of Misuse and Cybersecurity 2020-12-03

Imp. of Misuse and Cybersecurity crossword puzzle
Across
  1. monitors incoming and outgoing network traffic based on a set of security rules
  2. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
  3. an unauthorized attempt to access a system, device and/or network via the Internet
  4. receiving lots of junk email
  5. a person gains unauthorized access to financial accounts and changed the details of those accounts to their advantage
Down
  1. stolen information is later used to conduct cash transfers or online purchases without the owner knowing
  2. internally produced software
  3. focuses on stopping threats that attempt to access a computer or other systems in the network
  4. spreading both beneficial and harmful material using computer systems
  5. involve the use of websites and email messages that try to trick you into entering your personal information

10 Clues: internally produced softwarereceiving lots of junk emailspreading both beneficial and harmful material using computer systemsmonitors incoming and outgoing network traffic based on a set of security rulesan unauthorized attempt to access a system, device and/or network via the Internet...

How Aware Are You? 2025-09-12

How Aware Are You? crossword puzzle
Across
  1. Verifying the identity of a user, often using a username and password.
  2. A fake website designed to steal personal information.
  3. The practice of protecting systems and networks from digital attacks.
  4. A program that replicates itself and spreads to other computers.
  5. A software that monitors and blocks unauthorized access to a computer network.
  6. A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
  1. A string of characters used to log in to a system, it should be unique and complex.
  2. Adding a second layer of verification beyond a password, often a code sent to your phone
  3. The"lock" icon in a browser's address bar indicates a secure connection using this .
  4. A type of malware that blocks access to your data until a sum of money is paid.

10 Clues: A fake website designed to steal personal information.A program that replicates itself and spreads to other computers.The practice of protecting systems and networks from digital attacks.Verifying the identity of a user, often using a username and password.A software that monitors and blocks unauthorized access to a computer network....

M.Zabran.R 8i 2025-10-11

M.Zabran.R 8i crossword puzzle
Across
  1. fitur keamanan untuk melindungi pengguna dari situs berbahaya atau penipuan saat berselancar di internet.
  2. Tempat untuk menyimpan dan mengelompokan file atau dokumen di komputer. agar lebih teratur.
  3. keamanan yang melindungi pengguna saat menjelajah internet dari situs berbahaya dan ancaman siber.
  4. upaya penipuan dengan cara meniru situs resmi untuk mencuri data pribadi seperti pasword atau nomor rekening.
  5. perangkat lunak berbahaya yang digunkan untuk merusak sistem komputer atau mencuri data.
  6. Tampilan utama di layar komputer setelah sistem operasi di jalankan.
Down
  1. proses menampilkan atau memproses gambar,video,atau halaman web agar bisa di lihat di layar.
  2. program yang digunakan untuk mengatur dan mempercepat proses pengunduhan.
  3. proses mengubah data menjadi kode rahasia agar tidak bisa dibaca oleh pihak yang berwenang.
  4. Langkah dan teknologi untuk melindungi sistem komputer dan jaringan dari ancaman digital.

10 Clues: Tampilan utama di layar komputer setelah sistem operasi di jalankan.program yang digunakan untuk mengatur dan mempercepat proses pengunduhan.perangkat lunak berbahaya yang digunkan untuk merusak sistem komputer atau mencuri data.Langkah dan teknologi untuk melindungi sistem komputer dan jaringan dari ancaman digital....

Science and Technology Crossword Puzzle 2025-03-06

Science         and Technology Crossword Puzzle crossword puzzle
Across
  1. (5): The curved path of a celestial object around a star or planet.
  2. (7) - A medical operation performed by a doctor.
  3. (12): The process of making a person resistant to disease through vaccination.
  4. (8) - The study of heredity and inherited traits.
  5. (7): The process of creating an identical copy of an organism.
  6. (8) - A treatment that removes waste from the blood when kidneys fail.
  7. (8): The science of designing and using machines that can perform tasks automatically.
Down
  1. (14) - The science of manipulating materials on an extremely small scale.
  2. (15) - A medical procedure to replace a failing organ with a healthy one.
  3. (12) - The protection of computer systems against theft or damage.
  4. (9) - A set of step-by-step instructions used to solve a problem.
  5. (12) - A serious lung disease caused by bacteria.
  6. (2): The simulation of human intelligence by machines.
  7. (13): The use of living organisms or systems to develop products, often for medicine or agriculture.
  8. (9): The central unit in a computer that performs instructions.
  9. (6): A small electronic device used for practical functions.

16 Clues: (7) - A medical operation performed by a doctor.(12) - A serious lung disease caused by bacteria.(8) - The study of heredity and inherited traits.(2): The simulation of human intelligence by machines.(6): A small electronic device used for practical functions.(7): The process of creating an identical copy of an organism....

Key Words From Offline Is the New Luxury 2024-06-18

Key Words From Offline Is the New Luxury crossword puzzle
Across
  1. Something that is incredibly important, but constantly in danger due to increased online risks; Our ______
  2. What electronic devices often are; as opposed to a tool
  3. An example of a cybersecurity threat that has been growing in abundance in recent years
  4. The acronym for a common fear people have when they are away from their devices
Down
  1. A place where there is no internet or cell service, according to the documentary
  2. What the "white spots" app shows you in its immersive AR experience; internet/cell ______
  3. What is Happening to Society as a result of the expansion of internet access
  4. Staying ______ is one of the best ways to help prevent and avoid cyber attacks

8 Clues: What electronic devices often are; as opposed to a toolWhat is Happening to Society as a result of the expansion of internet accessStaying ______ is one of the best ways to help prevent and avoid cyber attacksThe acronym for a common fear people have when they are away from their devices...

describing technical functions and applications 2025-09-23

describing technical functions and applications crossword puzzle
Across
  1. : The base-2 number system used by computers, consisting of just zeros and ones.
  2. : The component of a computer that performs the main calculations.
  3. Clues
  4. : A set of rules or instructions for solving a problem or performing a task.
  5. : The physical parts of a computer or electronic system.
  6. : The set of instructions and data that tells a computer what to do.
  7. Clues
  8. : A device that detects and responds to some type of input from the physical environment.
  9. : A single point in a graphical image on a digital display.
  10. : An organized collection of structured information.
Down
  1. : A closed loop through which an electric current can flow.
  2. : The process of writing instructions for a computer to execute.
  3. : The practice of protecting systems and networks from digital threats.
  4. : A small piece of semiconducting material on which an integrated circuit is imprinted.
  5. : An object placed in orbit to transmit and receive signals, used for communication or GPS.
  6. : The point where a user and a computer system interact.
  7. : A type of signal that is continuous and represented by a physical quantity.
  8. : The engineering field that deals with the design and operation of mechanical machines.
  9. : A deviation from what is standard, normal, or expected.

19 Clues: CluesClues: An organized collection of structured information.: The point where a user and a computer system interact.: The physical parts of a computer or electronic system.: A deviation from what is standard, normal, or expected.: A closed loop through which an electric current can flow.: A single point in a graphical image on a digital display....

Oral Histories - Technology, Machines, & The Future 2024-02-15

Oral Histories - Technology, Machines, & The Future crossword puzzle
Across
  1. The practice of protecting systems, networks, and programs from digital attacks
  2. Energy derived from natural resources
  3. A speech spoken aloud by one person only
  4. Historical information gathered through spoken narratives
  5. The delivery or passing of something elsewhere
  6. The use of control systems and technology to automate processes
  7. Another term for story
  8. The act of asking questions of someone in a formal or informal setting
  9. Cultural knowledge, beliefs, customs, stories, and history told through spoken communication rather than through written texts
Down
  1. Shared beliefs, values, customs, traditions, behaviors, and artifacts that characterize a particular group of people or society.
  2. The deliberate modification of the characteristics of an organism by manipulating its genetic material
  3. A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way by a person
  4. Keep intact for the future
  5. The simulation of human intelligence processes by machines
  6. A traditional story often telling of the origins of things, places, people...
  7. The manipulation of matter on an atomic, molecular, and supramolecular scale
  8. Someone that tells a story, for a listener
  9. The interdisciplinary branch of engineering and science that deals with the design, construction, operation, and use of robots

18 Clues: Another term for storyKeep intact for the futureEnergy derived from natural resourcesA speech spoken aloud by one person onlySomeone that tells a story, for a listenerThe delivery or passing of something elsewhereHistorical information gathered through spoken narrativesThe simulation of human intelligence processes by machines...

Ethical Online Teaching and Data Management ABB 2025-07-25

Ethical Online Teaching and Data Management ABB crossword puzzle
Across
  1. U.S. law that protects the privacy of children under 13 online.
  2. The practice of protecting systems and networks from digital attacks.
  3. Data that provides information about other data.
  4. European Union regulation that governs data protection and privacy.
  5. The principle of protecting personal and academic info of learners. (Three Words)
  6. U.S. law that protects the privacy of student education records.
  7. Using technology and data in ways that respect rights and responsibilities.
  8. The trail of data left behind by users on the internet. (Two Words)
  9. The process of removing identifying details from data.
  10. Required permission from users before collecting or sharing their data.
Down
  1. Ethical duty to keep student or user information private.
  2. A school or organization's rules for technology use. (Three Words)
  3. An incident where sensitive information is accessed without authorization. (Two Words)
  4. A method of securing information by converting it into code. (Two Words)
  5. A security measure that uses two forms of identification. (Three Words)
  6. Verifying the identity of users before granting access.
  7. Collecting only the data necessary for a specific purpose. (Two Words)
  8. A deceptive attempt to obtain sensitive information via email or messaging.

18 Clues: Data that provides information about other data.The process of removing identifying details from data.Verifying the identity of users before granting access.Ethical duty to keep student or user information private.U.S. law that protects the privacy of children under 13 online.U.S. law that protects the privacy of student education records....

Smart System 2021-06-30

Smart System crossword puzzle
Across
  1. Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
  2. Application that involves wireless sensor and RFID technology,
  3. Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
  1. A maintenance technique that estimates when maintenance should be performed
  2. Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
  3. A sensor that detects movement sensor that detects
  4. Smart system application that reduces global emission

7 Clues: A sensor that detects movement sensor that detectsSmart system application that reduces global emissionApplication that involves wireless sensor and RFID technology,A maintenance technique that estimates when maintenance should be performed...

SUNY Canton Crossword 2020-04-01

SUNY Canton Crossword crossword puzzle
Across
  1. / One of the two newest additions to the Athletics Program
  2. / Criminal Justice _____ Photography
  3. / Sports Management
  4. / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
  5. / Flame-cooked at the Corner
  6. / Relieve stress in the _____ Room
  7. / The Library
  8. / Dr. Szafran
  9. / Campus _____ Garden
  10. / BIOL 209
  11. / Catch a movie on campus
  12. / Three _____ Design
  13. / Team based hero shooter
  14. / No longer Underground Lounge
  15. / MATH 141
  16. / House of Engineering
  17. / Fifty Years on the _____
  18. / When you're looking for something to do
Down
  1. / David R. _____ Award
  2. / Where to find International Student Initiatives
  3. / SUNY Canton has _____ traditional athletic teams
  4. / First Year _____ Program
  5. / Student Service Center
  6. / SGA holds bi-weekly Budget and _____ meetings
  7. / Renewable energy
  8. / An older mascot
  9. / Early _____
  10. / Dorm
  11. / Computer focused criminal justice
  12. / You can find SGA and CAB in this office
  13. / Physical _____
  14. / Funeral services career opportunity
  15. / The Annual Steel _____ Competition
  16. / Join the College _____ Board to bring your event ideas to life
  17. / Roos House
  18. / Headliner at Spring 2019 concert
  19. / _____ Competency Badge
  20. / 90 hours of supervised clinical experiences
  21. / Our favorite Macropod
  22. / The _____ flag can be found hanging proudly in Roos House and the Campus Center

40 Clues: / Dorm/ BIOL 209/ MATH 141/ Roos House/ Early _____/ The Library/ Dr. Szafran/ Physical _____/ An older mascot/ Renewable energy/ Sports Management/ Three _____ Design/ Campus _____ Garden/ David R. _____ Award/ House of Engineering/ Our favorite Macropod/ Student Service Center/ _____ Competency Badge/ Catch a movie on campus...

Media and Technology 2023-11-28

Media and Technology crossword puzzle
Across
  1. - Promoting products or services using digital channels like social media and email.
  2. - A mobile phone with advanced features like internet access and app capabilities.
  3. - A digital audio or video file that is available for streaming or downloading.
  4. - Online platforms for sharing content and connecting with others.
  5. - Storing and accessing data and programs over the internet instead of a computer's hard drive.
  6. - Analyzing large sets of data to discover patterns and information.
  7. - Overlaying digital information onto the real world through technology.
  8. - Measures taken to protect computer systems and networks from cyber attacks.
  9. - A seminar conducted over the internet.
  10. - Sending multimedia content in a continuous stream.
Down
  1. - Buying and selling goods and services over the internet.
  2. - The process of converting data into a code to prevent unauthorized access.
  3. - The simulation of human intelligence in computers.
  4. - Computer-generated simulation of a three-dimensional image or environment.
  5. - Playing electronic games, often on a computer or console.
  6. - Content that spreads rapidly on the internet.
  7. (Internet of Things) - Interconnected devices that can communicate and exchange data.
  8. - Bullying that takes place using electronic communication.
  9. - Small digital images used to express an idea or emotion in electronic communication.
  10. - A set of rules followed by a computer to solve problems or perform tasks.

20 Clues: - A seminar conducted over the internet.- Content that spreads rapidly on the internet.- The simulation of human intelligence in computers.- Sending multimedia content in a continuous stream.- Buying and selling goods and services over the internet.- Playing electronic games, often on a computer or console....

RiddleRealm 2024-02-16

RiddleRealm crossword puzzle
Across
  1. Testing to ensure existing functionalities still work after changes.
  2. Storage and retrieval system that uses keys for efficient data access.
  3. Base-2 number system used in computing.
  4. Quick check to verify basic functionalities are working.
  5. Subset of artificial intelligence where systems learn and improve from data.
  6. Sequence of steps to test a specific functionality.
  7. AI-powered program designed to simulate conversation with users.
  8. Document detailing discovered issues during testing.
  9. Rules governing the structure of code.
  10. Likes to chase mice
  11. A versatile programming language known for its platform independence.
  12. The practice of identifying and removing defects or errors in software
  13. The process of performing tasks without human intervention, often used in testing.
  14. Flying mammal
Down
  1. Protection of computer systems, networks, and data from cyber threats.
  2. A pre-built structure for developing software.
  3. Confirming that the software meets specified requirements.
  4. Software component relied upon by another.
  5. Interface for interacting with software components.
  6. Interconnected network of devices communicating and sharing data.
  7. Step-by-step procedure for solving a problem.
  8. Detailed instructions for executing a specific test.
  9. Decentralized and distributed ledger technology.
  10. Has a trunk
  11. Large marsupial
  12. A distributed version control system widely used in software development.
  13. A set of instructions that performs a specific task in programming.

27 Clues: Has a trunkFlying mammalLarge marsupialLikes to chase miceRules governing the structure of code.Base-2 number system used in computing.Software component relied upon by another.Step-by-step procedure for solving a problem.A pre-built structure for developing software.Decentralized and distributed ledger technology....

Future trends 2024-07-08

Future trends crossword puzzle
Across
  1. Electronic devices worn on the body
  2. Technology based on biology
  3. Urban areas that use technology to improve efficiency and quality of life
  4. Technology that simulates human intelligence
  5. Virtual-reality space where users can interact
  6. Manipulation of matter on an atomic or molecular scale
  7. Power generated by nuclear fusion
  8. Extremely large data sets analyzed computationally
  9. Decentralized ledger technology used in cryptocurrencies
  10. Study of genomes
  11. Digital or virtual currency using cryptography for security
  12. Proposed high-speed transportation system
  13. Energy from sources that are naturally replenishing
  14. Technology used to improve financial services
  15. Methods of storing energy for later use
  16. Self-driving vehicles and robots
Down
  1. A subset of AI that involves computers learning from data
  2. Technology involving the design and application of robots
  3. Simulated experience that can be similar to or different from the real world
  4. Protection of internet-connected systems
  5. Medical treatment involving the alteration of genes
  6. Advanced computing using quantum-mechanical phenomena
  7. Currency available only in digital form
  8. Network of physical objects connected to the internet
  9. Unmanned aerial vehicles used for various purposes
  10. Technology in education
  11. Vehicles powered by electricity
  12. Fifth-generation mobile network
  13. Wearable mobile machine that allows for limb movement
  14. Delivery of healthcare services via telecommunications technology

30 Clues: Study of genomesTechnology in educationTechnology based on biologyVehicles powered by electricityFifth-generation mobile networkSelf-driving vehicles and robotsPower generated by nuclear fusionElectronic devices worn on the bodyCurrency available only in digital formMethods of storing energy for later useProtection of internet-connected systems...

Technical quiz 2025-03-05

Technical quiz crossword puzzle
Across
  1. : A security system that monitors and controls incoming and outgoing network traffic
  2. : The address of a web page on the internet
  3. : The smallest unit of data in a computer
  4. : The practice of protecting systems and networks from digital attacks
  5. : A decentralized and secure method of recording transactions
  6. : A step-by-step procedure for solving a problem
  7. : A cyber attack that tricks people into revealing sensitive information
  8. Computing : An advanced field of computing using quantum mechanics
  9. Intelligence : Technology that enables machines to mimic human intelligence
Down
  1. Computing : The delivery of computing services over the internet
  2. : A device that forwards data between computer networks
  3. : The process of converting data into a secure, unreadable format
  4. : The process of finding and fixing errors in code
  5. : A popular programming language known for its simplicity and versatility
  6. : A modern type of storage device that is faster than a hard drive
  7. : A small storage location that stores frequently accessed data for quick retrieval
  8. : The standard language for creating web pages
  9. Source : Software whose source code is freely available to the public
  10. : A material used to make computer chips and electronic devices
  11. : A test used to determine whether a user is human or a bot

20 Clues: : The smallest unit of data in a computer: The address of a web page on the internet: The standard language for creating web pages: A step-by-step procedure for solving a problem: The process of finding and fixing errors in code: A device that forwards data between computer networks: A test used to determine whether a user is human or a bot...

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Mobile device application that secures users network connectivity and protect a device from malware.
  4. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Specific agreement and setup that allow an employee to connect a personal device.
  5. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  4. Mobile device application that secures users network connectivity and protect a device from malware.
  5. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Specific agreement and setup that allow an employee to connect a personal device.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

New words 2024-06-14

New words crossword puzzle
Across
  1. Measures taken to protect a computer or computer system against unauthorized access or attack.
  2. Individuals who exploit others online for their own gain.
  3. The act of ignoring someone in favor of using a smartphone.
Down
  1. A condition characterized by an over-reliance on digital devices.
  2. The amount of time spent using a device such as a computer, television, or games console.
  3. The information about a person that exists on the internet as a result of their online activity.

6 Clues: Individuals who exploit others online for their own gain.The act of ignoring someone in favor of using a smartphone.A condition characterized by an over-reliance on digital devices.The amount of time spent using a device such as a computer, television, or games console....

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. Schneider Electric cloud-based file collaboration space to store and share company files.
  4. An employee must press this button, when he/she receives the suspicious mail.
  5. Mobile device application that secures users network connectivity and protect a device from malware.
  6. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. For Schneider Electric's technical support to complete customer service, contact _____.
  3. Specific agreement and setup that allow an employee to connect a personal device.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service, contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Digital Citizenship 2023-10-26

Digital Citizenship crossword puzzle
Across
  1. Tools and settings that allow parents to monitor and manage their children's online activities.
  2. The persona an individual presents online, including profiles and usernames.
  3. The use of digital technologies to harass, threaten, or intimidate others.
  4. The trail of data and information left behind by an individual's online activities.
  5. Rules and norms governing polite behavior on the internet, often referred to as "netiquette."
Down
  1. Practices and measures to ensure one's safety while using the internet.
  2. Ensuring that all individuals have equal access to digital resources and opportunities.
  3. Ethical principles and values applied to online interactions and decisions.
  4. Measures and practices to protect digital devices, networks, and data from threats and attacks.
  5. False or misleading information circulated on the internet, often with the intent to deceive.
  6. Groups or networks of people who interact and share common interests or goals on the internet.

11 Clues: Practices and measures to ensure one's safety while using the internet.The use of digital technologies to harass, threaten, or intimidate others.Ethical principles and values applied to online interactions and decisions.The persona an individual presents online, including profiles and usernames....

IS Security and the Dark Side of IT 2023-10-05

IS Security and the Dark Side of IT crossword puzzle
Across
  1. Adherence to rules, regulations, or policies to ensure proper behavior or operations.
  2. Measures taken to protect computer systems and data from theft, damage, or unauthorized access.
  3. Strategies and processes used to identify, assess, and mitigate potential risks.
  4. The act of coercing someone by threatening to reveal embarrassing or damaging information.
  5. A difficulty or problem that requires creative solutions or efforts to overcome.
  6. The hidden part of the internet where illegal activities often occur.
Down
  1. A set of rules or guidelines that govern behavior or decision-making within an organization.
  2. A breach or infringement of a rule, law, or policy.
  3. Protective measures taken to safeguard against potential threats.
  4. Individuals within an organization who have access to sensitive information.
  5. Measures taken to protect against threats, ensuring the safety and integrity of systems, data, and assets.

11 Clues: A breach or infringement of a rule, law, or policy.Protective measures taken to safeguard against potential threats.The hidden part of the internet where illegal activities often occur.Individuals within an organization who have access to sensitive information.Strategies and processes used to identify, assess, and mitigate potential risks....

Cybersecurity Vocab - (no spaces) 2021-08-25

Cybersecurity Vocab - (no spaces) crossword puzzle
Across
  1. The rights given to a person over the creations of their mind
  2. The use of ethics within computer/information technologies
  3. the act of obtaining to or respecting proper morals
  4. The correct or acceptable way of using the internet
  5. A document that legalizes the use of certain unlicensed digital items without consequence.
  6. the act of using an electronic device to break someone down and hurt them
Down
  1. A form of protection by the US government that keeps people from stealing other's works.
  2. governs a person's use of the internet
  3. The unauthorized use or reproduction of another’s work.

9 Clues: governs a person's use of the internetthe act of obtaining to or respecting proper moralsThe correct or acceptable way of using the internetThe unauthorized use or reproduction of another’s work.The use of ethics within computer/information technologiesThe rights given to a person over the creations of their mind...

Cybersecurity Hacker Group Edition 2025-05-07

Cybersecurity Hacker Group Edition crossword puzzle
Across
  1. Iranian group targeting journalists and human rights organizations
  2. North Korean-backed group known for global financial attacks
  3. Turkish group known for malware distribution through fake software
  4. Russian group primarily targeting Ukraine
Down
  1. U.S.-linked hacking group known for sophisticated attack methods
  2. Russian cybercrime group targeting businesses for credit card data
  3. Vietnamese group targeting international and human rights organizations
  4. Russian group linked to the SolarWinds attack
  5. Russian group involved in NotPetya malware and attacks on Ukraine

9 Clues: Russian group primarily targeting UkraineRussian group linked to the SolarWinds attackNorth Korean-backed group known for global financial attacksU.S.-linked hacking group known for sophisticated attack methodsRussian group involved in NotPetya malware and attacks on UkraineRussian cybercrime group targeting businesses for credit card data...

Cybersecurity Lesson 1 & 2 Key Terms 2022-08-31

Cybersecurity Lesson 1 & 2 Key Terms crossword puzzle
Across
  1. is exchange of suggestive messages or images via mobile phone texting.
  2. many social networking web sites require you to set up.
  3. are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
  4. is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
  5. someone who intentionally targets people for harm using online chat rooms or social media.
  6. is a detailed report, usually about a person.
  7. people online that often try to obtain information about you.
  8. is bullying that takes place using electronic technology.
  9. on the internet is a technical measure intended to restrict access to information.
Down
  1. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
  2. is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
  3. can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
  4. keeping your personal information safe and personal.
  5. is the action of subjecting someone to aggressive pressure or intimidation.
  6. is the ability to act in a safe and responsible way on the internet and other connected environments.
  7. where you connect with other players and can chat with them either by voice or by text.
  8. a person who witness someone getting bullied but does nothing to stop it.

17 Clues: is a detailed report, usually about a person.keeping your personal information safe and personal.many social networking web sites require you to set up.is bullying that takes place using electronic technology.people online that often try to obtain information about you.is exchange of suggestive messages or images via mobile phone texting....

Tech Week Test 2024-04-29

Tech Week Test crossword puzzle
Across
  1. A program that enables a computer to perform specific tasks.
  2. Step-by-step procedure for solving a problem.
  3. Manipulation of matter on an atomic, molecular, and supramolecular scale.
  4. Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  5. Collection of structured information stored in a computer system.
  6. Process of converting information into a code to prevent unauthorized access.
  7. Creation of a virtual version of something, such as an operating system or server.
Down
  1. Wireless networking technology that allows devices to connect to the internet without using cables.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. Mobile phone with advanced features, such as internet connectivity and app support.
  4. Internet-based computing that provides shared resources and data storage on demand.
  5. Software application used to access and view websites on the internet.
  6. Measures taken to protect computer systems and data from unauthorized access or attacks.
  7. Simulation of human intelligence processes by machines, especially computer systems.
  8. A security system that monitors and controls incoming and outgoing network traffic.

15 Clues: Step-by-step procedure for solving a problem.A program that enables a computer to perform specific tasks.Collection of structured information stored in a computer system.Software application used to access and view websites on the internet.Manipulation of matter on an atomic, molecular, and supramolecular scale....

Information Security in Artificial intelligence 2023-11-27

Information Security in Artificial intelligence crossword puzzle
Across
  1. The branch of artificial intelligence that enables computer systems to improve their performance through experience
  2. Physiological or behavioral characteristics of an individual used for authentication
  3. The practice of protecting networks and computer systems from digital attacks
  4. The process of algorithmically transforming information to hide its content
  5. A form of communication used to send and receive electronic messages
  6. Relates to the concept of protecting personal information from being improperly collected, processed or shared
  7. A computational model that mimics the structure of the human brain and is used for learning and decision-making in artificial intelligence
Down
  1. A complex neural network technique that simulates the human learning process
  2. A person who breaks into a computer system or network
  3. A set of instructions used in artificial intelligence to solve problems and perform tasks
  4. Malicious software that can damage a computer or steal data
  5. Information for machine learning and analytics
  6. A security system used to prevent unauthorized access to a network system
  7. A communication channel connecting computers to each other
  8. Weaknesses in system security that can be exploited

15 Clues: Information for machine learning and analyticsWeaknesses in system security that can be exploitedA person who breaks into a computer system or networkA communication channel connecting computers to each otherMalicious software that can damage a computer or steal dataA form of communication used to send and receive electronic messages...

Trade school vs 4 year College 2024-02-26

Trade school vs 4 year College crossword puzzle
Across
  1. what is one of the hardest trade school
  2. he structure of laws, rules and agencies designed to hold criminals
  3. you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. what trade jobs pat the most

5 Clues: what trade jobs pat the mostwhat is one of the hardest trade schoolhe structure of laws, rules and agencies designed to hold criminalsyou to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .....

Survival Game 2020-12-30

Survival Game crossword puzzle
Across
  1. To browse the Internet
  2. Set of security policies to screen incoming and outgoing messages
  3. computer Industries are an example of ---------- manufacturing
  4. A program that accesses and displays files and other data available on the internet and other networks
  5. refers to equipment that is operated through the use of digital information rather than human input
Down
  1. Moving certain operations to another county, either by relocating affected operations to facilities in another country or by outsourcing the operations to a foreign supplier.
  2. Reorganising a business to reduce capacity and increase efficiency
  3. The term implies that disparate computers, information databases, and communications networks are integrated
  4. A measure of the success of an operation in converting inputs to outputs.
  5. to implement an appropriate level of cybersecurity across the supply chain of the defense industrial base

10 Clues: To browse the InternetSet of security policies to screen incoming and outgoing messagesReorganising a business to reduce capacity and increase efficiencycomputer Industries are an example of ---------- manufacturingA measure of the success of an operation in converting inputs to outputs....

internet dangers 2021-03-15

internet dangers crossword puzzle
Across
  1. computer program that replicates itself in order to spread to other computers.
  2. a malicious piece of computer code designed to spread from device to device.
  3. collection of instructions and data that tell the computer how to work
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
Down
  1. attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. the protection of computer systems and networks from information disclosure,
  4. aimed at causing the network connection to fail.
  5. any malware which misleads users of its true intent
  6. messages transmitted and received by digital computers through a network

10 Clues: aimed at causing the network connection to fail.any malware which misleads users of its true intentcollection of instructions and data that tell the computer how to workmessages transmitted and received by digital computers through a networkthe protection of computer systems and networks from information disclosure,...

chpt 5 2021-07-13

chpt 5 crossword puzzle
Across
  1. Mapping of _____ controls for each risk identified for an asset.
  2. Risk ______ is the first step towards risk management.
  3. Managing cybersecurity risks is not just a job for which department?
  4. This describes the highest level of damage possible when an accident occurs from a particular hazard
  5. Who can carry out generalized assessments when experiencing budget or time constraints?
Down
  1. What do you need to create for all current applications, tools, and utilities?
  2. Apart from Systemic, what is the other form of vulnerability?
  3. Which factor is not normally considered in risk control?
  4. ______ of potential risks reduces the surprises that come along the way during the course of a project and thus helps improving strategies for achieving goals effectively.
  5. Under risk assessment, the first thing you need to do is take ____of what you are analysing.

10 Clues: Risk ______ is the first step towards risk management.Which factor is not normally considered in risk control?Apart from Systemic, what is the other form of vulnerability?Mapping of _____ controls for each risk identified for an asset.Managing cybersecurity risks is not just a job for which department?...

IEM October SM Crossword 2022-10-28

IEM October SM Crossword crossword puzzle
Across
  1. About 90% of account data breaches happen because of ______.
  2. IEM was a _____ level NEMA Sponsor.
  3. October is National ________ Awareness Month, an annual campaign launched by CISA in 2004.
  4. Team IEM has been named a 2022 Best Place to work in _____ for the 8th Consecutive Year.
Down
  1. Team IEM participated in the Great ______ to practice earthquake preparedness.
  2. The simple act of washing your _____ with soap and water can stop the spread of germs, prevent diseases, and save lives.
  3. The U.S. ______ celebrated its 247th birthday this month.
  4. IEMer who was honored with the NIBS Distinguished Service Award.
  5. Over 4 billion people around the world have access to the _______.
  6. IEMer who was a featured subject matter expert in the webinar “Elopement: Preparedness and Response for People with Dementia and Autism”

10 Clues: IEM was a _____ level NEMA Sponsor.The U.S. ______ celebrated its 247th birthday this month.About 90% of account data breaches happen because of ______.IEMer who was honored with the NIBS Distinguished Service Award.Over 4 billion people around the world have access to the _______....

Teka-Teki Silang 2 2024-09-15

Teka-Teki Silang 2 crossword puzzle
Across
  1. Suatu bagian di dalam komputer dimana data atau instruksi program bisa disimpan atau dipulihkan.
  2. Untuk menyalin atau memindahkan program atau informasi ke dalam memori komputer, terutama dari internet atau komputer yang lebih besar.
  3. Reloading atau updating apa yang sedang ditampilkan atau disimpan.
  4. Tidak membutuhkan kabel untuk membuat koneksi atau untuk berkomunikasi.
  5. Teknologi apa saja, latihan, dan peraturan untuk menghindari serangan siber atau mengurangi dampaknya.
Down
  1. Bahasa pemrograman dengan level tinggi, salah satu bahasa pemrograman yang paling populer saat ini.
  2. Satu set papan tombol di komputer atau mesin tik yang anda tekan agar dapat berfungsi.
  3. Peralatan yang memproduksi listrik yang menyediakan tenaga untuk peralatan elektronik, mobil, dan lain-lain.
  4. Kode yang mengidentifikasi dimana sepotong/sepenggal informasi disimpan.
  5. Salah satu cara untuk menyimpan angka, huruf, dan simbol untuk bertukar informasi di antara sistem komputer.

10 Clues: Reloading atau updating apa yang sedang ditampilkan atau disimpan.Tidak membutuhkan kabel untuk membuat koneksi atau untuk berkomunikasi.Kode yang mengidentifikasi dimana sepotong/sepenggal informasi disimpan.Satu set papan tombol di komputer atau mesin tik yang anda tekan agar dapat berfungsi....

Technology 2023-02-06

Technology crossword puzzle
Across
  1. (a simulated experience that can be similar to or completely different from the real world)
  2. (a type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement)
  3. (the branch of engineering that deals with the design, construction, and use of robots)
  4. (the simulation of human intelligence in machines)
Down
  1. (the protection of internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access)
  2. (a technology that superimposes digital information onto the real world)
  3. (the delivery of computing resources over the internet)
  4. (a decentralized and distributed digital ledger used to record transactions)
  5. (a network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and network connectivity)
  6. (large and complex data sets that are difficult to process using traditional data processing techniques)

10 Clues: (the simulation of human intelligence in machines)(the delivery of computing resources over the internet)(a technology that superimposes digital information onto the real world)(a decentralized and distributed digital ledger used to record transactions)(the branch of engineering that deals with the design, construction, and use of robots)...

Technology and Digital Literacy 2025-04-14

Technology and Digital Literacy crossword puzzle
Across
  1. : Measures taken to protect computers, networks, and data from attacks or damage.
  2. : The process of converting information into a secret code to prevent unauthorized access.
  3. : A secret word or phrase used to gain access to a system or service.
  4. : A model or program that imitates real-world processes or systems for study or training.
  5. : Programs and operating information used by a computer.
  6. : A set of step-by-step instructions used to solve a problem or perform a task.
Down
  1. : A computer that provides data and services to other computers over a network.
  2. : A new idea, method, or device that brings improvement or change.
  3. : A group of connected computers or devices that share resources and information.
  4. : Information, often in the form of facts or numbers, that is collected and used for analysis.

10 Clues: : Programs and operating information used by a computer.: A new idea, method, or device that brings improvement or change.: A secret word or phrase used to gain access to a system or service.: A computer that provides data and services to other computers over a network.: A set of step-by-step instructions used to solve a problem or perform a task....

CISO Crossword Quiz - 2425 2025-10-16

CISO Crossword Quiz - 2425 crossword puzzle
Across
  1. Cyber ____ is the ability of an organization or nation to prepare for, withstand, recover from, and adapt to cyber threats or attacks
  2. Process of verifying user identity to prevent unauthorized access to data & systems
  3. Cyber Security principle which ensures data remains accurate and unaltered
  4. Which month is observed globally as National Cyber Security Awareness Month?
Down
  1. An Assurance that someone cannot deny having performed a specific action, such as sending a message or making a transaction
  2. NCSAM aims to increase Cyber ____ of India’s cybersecurity posture
  3. Cyber Security principle which ensures data and systems/resources of an organization are accessible to authorized users when needed
  4. Which Cyber Security principle ensures that only authorized people get access to the data?
  5. Cyber ____ Bharat is this year’s NCSAM theme in India focusing on cyber awareness
  6. Which term is used to describe safe and responsible online behavior?
  7. Which department sets the annual NCSAM theme every year?

11 Clues: Which department sets the annual NCSAM theme every year?NCSAM aims to increase Cyber ____ of India’s cybersecurity postureWhich term is used to describe safe and responsible online behavior?Cyber Security principle which ensures data remains accurate and unalteredWhich month is observed globally as National Cyber Security Awareness Month?...

cloud services stratergy 2025-03-23

cloud services stratergy crossword puzzle
Across
  1. A computing model where resources such as servers and storage are provided on demand
  2. The structured implementation of modifications in cloud environments without disruption.
  3. A principle that ensures an organization is neither over- nor under-utilizing cloud resources.
  4. A structured approach to cloud adoption aligning with business goals and IT infrastructure.
  5. A cybersecurity concern where unauthorized parties gain access to sensitive cloud data.
Down
  1. A method used to analyze and mitigate security, operational, and financial threats in the cloud.
  2. A formalized set of rules that define how cloud services should be used securely.
  3. A major challenge in cloud computing where businesses become dependent on one provider.
  4. The process of ensuring IT resources are available to meet fluctuating business demands.
  5. A practice that allows businesses to scale cloud resources dynamically based on workload needs.

10 Clues: A formalized set of rules that define how cloud services should be used securely.A computing model where resources such as servers and storage are provided on demandA major challenge in cloud computing where businesses become dependent on one provider.A cybersecurity concern where unauthorized parties gain access to sensitive cloud data....

TECH_TUES 2024-11-26

TECH_TUES crossword puzzle
Across
  1. – The study of protecting systems and networks from digital attacks.
Down
  1. – A network device that connects multiple computers in a LAN.
  2. – The process of making predictions or decisions without human intervention.
  3. – An algorithm used to scramble data for secure communication.

4 Clues: – A network device that connects multiple computers in a LAN.– An algorithm used to scramble data for secure communication.– The study of protecting systems and networks from digital attacks.– The process of making predictions or decisions without human intervention.

Edider Puzzle 3 2024-01-26

Edider Puzzle 3 crossword puzzle
Across
  1. A modern urban planning approach that integrates digital technologies in energy, transportation, and services.
  2. Technological control used to increase efficiency and reliability in energy systems.
  3. Energy obtained from renewable, environmentally friendly sources.
  4. The use of advanced algorithms to make the best or most effective use of resources, especially applied in energy systems.
  5. An electric grid equipped with communication and automatic control technologies to optimize energy supply and consumption.
  6. The process of increasing the size and capacity of energy systems.
Down
  1. Methods used to extract information from large data sets, increasingly important in energy systems.
  2. The amount of carbon dioxide emitted by an individual, organization, or product.
  3. A crucial area for ensuring the safety and integrity of digital energy systems.
  4. Techniques and methods applied for more efficient use of energy resources.

10 Clues: Energy obtained from renewable, environmentally friendly sources.The process of increasing the size and capacity of energy systems.Techniques and methods applied for more efficient use of energy resources.A crucial area for ensuring the safety and integrity of digital energy systems....

csm 2025-03-23

csm crossword puzzle
Across
  1. A formalized set of rules that define how cloud services should be used securely.
  2. A method used to analyze and mitigate security, operational, and financial threats in the cloud.
  3. The structured implementation of modifications in cloud environments without disruption.
  4. A major challenge in cloud computing where businesses become dependent on one provider.
  5. A principle that ensures an organization is neither over- nor under-utilizing cloud resources
Down
  1. cybersecurity concern where unauthorized parties gain access to sensitive cloud data.
  2. A structured approach to cloud adoption aligning with business goals and IT infrastructure
  3. A practice that allows businesses to scale cloud resources dynamically based on workload needs.
  4. A computing model where resources such as servers and storage are provided on demand
  5. The process of ensuring IT resources are available to meet fluctuating business demands.

10 Clues: A formalized set of rules that define how cloud services should be used securely.A computing model where resources such as servers and storage are provided on demandcybersecurity concern where unauthorized parties gain access to sensitive cloud data.A major challenge in cloud computing where businesses become dependent on one provider....

cyber security 2024-10-25

cyber security crossword puzzle
Across
  1. Tries to steal information by impersonating a trusted entity.
  2. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  3. Specialist Protects a company from cyber threats.
  4. A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  5. Creates harmful software to damage the network.
Down
  1. The process of converting information or data into a code to prevent unauthorized access.
  2. An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  3. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  4. Acts as a security barrier, inspecting every request and filtering threats.
  5. Attempts to break into a system by manipulating data input.

10 Clues: Creates harmful software to damage the network.Specialist Protects a company from cyber threats.Attempts to break into a system by manipulating data input.Tries to steal information by impersonating a trusted entity.Acts as a security barrier, inspecting every request and filtering threats....

Navigating the Web of Cyber Law 2025-06-05

Navigating the Web of Cyber Law crossword puzzle
Across
  1. A violation of privacy where an individual's data is exposed or stolen.
  2. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
  3. A legal framework that governs the use of electronic signatures in contracts.
  4. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
  5. The unauthorized copying or distribution of software or digital content.
Down
  1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
  2. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  3. A method of writing in code so that only authorized parties can access it.
  4. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
  5. The unlawful act of accessing a computer system without authorization.

10 Clues: The unlawful act of accessing a computer system without authorization.A violation of privacy where an individual's data is exposed or stolen.The unauthorized copying or distribution of software or digital content.A method of writing in code so that only authorized parties can access it....

Romance scam 2024-02-16

Romance scam crossword puzzle
Across
  1. The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
  2. A person engaged in fraudulent activities, such as scams or deceit.
  3. The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
  4. To identify or discover something, often used in the context of finding fraudulent activities.
Down
  1. To stop something from happening, in this case, stopping romance scams before they occur.
  2. The act of intentionally misleading or tricking someone.
  3. Malicious software designed to harm or exploit computer systems.

7 Clues: The act of intentionally misleading or tricking someone.Malicious software designed to harm or exploit computer systems.A person engaged in fraudulent activities, such as scams or deceit.To stop something from happening, in this case, stopping romance scams before they occur....