cybersecurity Crossword Puzzles
THIS ONE'S FOR TATI! 2025-03-12
Across
- It follows Shetland & Old English in the names of dog breeds used to guide other animals
- A ransomware attack that encrypted 3,800 City of Atlanta computers demanded 6 of these digital items to unfreeze them
- In real life, it can slow the spread of flames and smoke; in your digital life, it blocks unauthorized access to your private data
- Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
- Breeds of this dog group include the Airedale & Bedlington
- "Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears"
- A Rand Corp. blog post says this, the "bedrock of most cybersecurity measures", is at risk when quantum computing scales up
Down
- The tallest of the working breeds, it's Pennsylvania's state dog; William Penn is said to have owned one
- Don't click on that link, dummy! You could fall prey to this common scam, which "lures" you into revealing private info
- This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
- The heaviest of dog breeds, it can exceed 180 pounds
- This hunting hound is the state dog of Virginia
12 Clues: This hunting hound is the state dog of Virginia • The heaviest of dog breeds, it can exceed 180 pounds • Breeds of this dog group include the Airedale & Bedlington • It follows Shetland & Old English in the names of dog breeds used to guide other animals • "Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears" • ...
How E-Marketplaces Work 2024-01-05
Across
- Indirect taxation on the consumption of goods and services, applicable to certain transactions on e-marketplaces.
- Guidelines and rules established by e-marketplaces to regulate user behavior, transactions, and overall platform usage.
- Software that allows different applications to communicate and share data on e-marketplaces.
- An online platform facilitating the exchange of goods and services between buyers and sellers.
- Marketing efforts aimed at increasing visibility and sales, often involving discounts, offers, and special deals on e-marketplaces.
- Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data.
- The transportation of products from sellers to buyers, including the methods, costs, and delivery times on e-marketplaces.
Down
- The process of buying or selling within an e-marketplace, involving payment and product/service delivery.
- The management of the movement of goods, including shipping, tracking, and delivery in e-marketplaces.
- Charges imposed by e-marketplaces on sellers for using their platform, often including listing fees, transaction fees, and subscription fees.
- The process by which customers can send back products they are dissatisfied with or that are damaged on e-marketplaces.
- A personal or business profile on an e-marketplace, enabling users to manage transactions, listings, and preferences.
- Refers to products classified as hazardous materials, with specific regulations and restrictions for shipping on e-marketplaces.
13 Clues: Software that allows different applications to communicate and share data on e-marketplaces. • An online platform facilitating the exchange of goods and services between buyers and sellers. • Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data. • ...
Compliance & Security Week 2023-11-16
Across
- It's like your underwear; don't share it with anyone and change it at least every 90 days
- Nasty software that can have a bad impact on your device or network
- What is HIPAA's (and DDID's) minimum training requirement for employees
- Unwanted emails or messages that usually try to sell you something
- What department (or Shane) should you report a suspected HIPAA breach to
- Universal Serial Bus, or a flash drive that you should never stick in a work computer
- What HIPAA rule protects individual rights
- A type of malicious software designed to block access until a sum of money is paid
Down
- Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
- The Health Act passed to protect individual's medical/dental records and other PHI
- A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
- Every aspect of protecting an organization and its employees/assets against cyber threats
- How should you send an email to outside recipients that contains PHI
- What is the acronym that identifies individual's information such as name, birthdate, and SSN
- The additional ways DDID uses to stop hackers getting into our system, even if they know your password
- An email that tricks you into clicking on a link or opening an attachment
- Using a device to gain unauthorized access to data in a system
17 Clues: What HIPAA rule protects individual rights • Using a device to gain unauthorized access to data in a system • Unwanted emails or messages that usually try to sell you something • Nasty software that can have a bad impact on your device or network • How should you send an email to outside recipients that contains PHI • ...
Principles of IT Terms 2023-08-23
Across
- components of a computer system, such as the central processing unit (CPU), memory, storage devices, and input/output devices.
- process of converting data into a code to prevent unauthorized access.
- Computing/Storing and accessing data and programs over the internet rather than on local computers.
- Technology/The use of computers, networks, software, and other technologies to manage and process information.
- structured collection of data that can be easily accessed, managed, and updated.
- Experience (UX):** The overall experience and satisfaction that a user has while interacting with a product or system.
- Interface (UI):** The visual and interactive elements that allow users to interact with software or hardware.
- and selling goods and services over the internet.
Down
- and applications that run on computer hardware to perform specific tasks.
- and fixing errors or bugs in software code.
- collection of connected devices and communication pathways that allow them to share resources and information.
- instructions in a programming language to create software applications or automate tasks.
- System/Software that manages computer hardware and provides services for other software applications.
- standard language for creating web pages and web applications.
- and measures to protect computer systems, networks, and data from cyber threats.
- Citizenship/The responsible and ethical use of technology, including online behavior, digital etiquette, and privacy considerations.
- Analytics/The process of examining and interpreting data to gain insights and make informed decisions.
- step-by-step procedure or formula for solving a problem or completing a task.
18 Clues: and fixing errors or bugs in software code. • and selling goods and services over the internet. • standard language for creating web pages and web applications. • process of converting data into a code to prevent unauthorized access. • and applications that run on computer hardware to perform specific tasks. • ...
Trends 2021 2021-01-11
Across
- Acronym for the current industry revolution.
- Term referring to new way for employees, starting with the acronym WFH
- Increasing cry amongst internet and social media users to protect their data _______.
- South Africa will receive 1 million doses of this from India at the end of January to combat Covid 19
- Customers continue to have high service expectations and have become smarter and more impatient. Companies must deliver on this (hint Cx)
- One of the larger international streaming partners available in South Africa
- A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
- A constant state of the unknown making it difficult to predict the future. Opposite of certainty.
- AWS, Google, Microsoft all offer this service where everything is hosted in the ______
- What comes after 4G? Vodacom and MTN launched it in 2020.
Down
- Umbrella tech term top of the IT agenda to ensure integrity and safety of network
- A freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
- Two common words for new age term for machine learning often shortened to two letters
- Something most people make up in the beginning of January, but most broken later in the year
- New technology trend which is “smart” and happening closer to the source or locality (hint on the "----" of my seat)
15 Clues: Acronym for the current industry revolution. • What comes after 4G? Vodacom and MTN launched it in 2020. • Term referring to new way for employees, starting with the acronym WFH • One of the larger international streaming partners available in South Africa • Umbrella tech term top of the IT agenda to ensure integrity and safety of network • ...
Puzzle No. 2 2022-09-06
Across
- A string of characters used to verify the identity of a user during the authentication process.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Ensuring that authorized users have access to information and associated assets when required.
- Sentence-like format of password which is strong but easier to remember.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- You should not write down your password in this type of physical medium.
Down
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- Ensuring that information is accessible only to those authorized to have access.
- Safeguarding the accuracy and completeness of information.
- Complete the sentence: ________ is everyone’s responsibility.
- A weakness in your security policy, implementation, design, and controls.
- These fix general software problems and provide new security patches where criminals might get in.
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- An event that will cause harm to you or your asset.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
15 Clues: An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Complete the sentence: ________ is everyone’s responsibility. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
The hardest crossword puzzle EVERRR 2022-11-16
Across
- Someone fraudulently trying to gain access to an unauthorized system.
- Any security practice put in place to mitigate a security event or incident from occurring.
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
- Most useful tool in cybersecurity, pretty much.
- The practice of utilizing trial and error to guess credentials.
- Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
- Copies of data
- A condiment
- describes a minor disruption to the digital landscape that is thought to be unintentional
Down
- A data file through which the identity, authenticity and reliability of a website or web application is established.
- Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
- A possibility of being attacked or harmed
- responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
- A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.
15 Clues: A condiment • Copies of data • A possibility of being attacked or harmed • Most useful tool in cybersecurity, pretty much. • The practice of utilizing trial and error to guess credentials. • Someone fraudulently trying to gain access to an unauthorized system. • Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of? • ...
IT_KD 2023-12-04
Across
- A networking device that directs data traffic between different computer networks.
- A high-level programming language known for its readability and versatility.
- The process of identifying and fixing errors or bugs in software code.
- A widely-used programming language that adds interactivity and dynamic content to web pages.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- The delivery of computing services, including storage, processing power, and software, over the internet.
- The standard markup language for creating web pages and web applications.
- A set of rules and tools for building software applications, enabling them to communicate with each other.
- A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
- A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
- The process of converting information into a code to secure it from unauthorized access or use.
- A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
- Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.
15 Clues: The process of identifying and fixing errors or bugs in software code. • The standard markup language for creating web pages and web applications. • A high-level programming language known for its readability and versatility. • A networking device that directs data traffic between different computer networks. • ...
Compliance & Security Week Take 2 2025-11-13
Across
- What is a digital "wall" that keeps bad guys out of our network?
- What is the type of data HIPAA protects?
- What do we have monitoring the security of our buildings?
- What is required when PHI is disclosed beyond treatment, payment, or operations?
- What is it when a bad threat actor gains unauthorized access to a system or building?
- Who is the person who reviews all reported emails?
- Where do you receive points for competing in Compliance and Cybersecurity week?
- What is the state of being informed about potential risks and company policies so you can make smart, safe choices every day?
- What is it when a bad actor covers up a good QR code with one that will send you to a fake payment site?
Down
- What is a common workplace rule that requires locking before leaving your desk?
- What is a formal review of tasks done to confirm they're in compliance?
- What is a weakness in a system that can be exploited and has a CVE library?
- What is the law protecting patient health information?
- What you need after having to do all the compliance trainings and shenanigans? (a break from work somewhere)
- What is a beverage that fuels many morning meetings?
- What is a quick-ish fix for software vulnerabilities?
- What do we call the process of converting data into a secure code to protect it?
- What is a word puzzle that challenges your brain?
- What is a quick way to spot a phishing email at DDID/AHS? (Sender's...?)
19 Clues: What is the type of data HIPAA protects? • What is a word puzzle that challenges your brain? • Who is the person who reviews all reported emails? • What is a beverage that fuels many morning meetings? • What is a quick-ish fix for software vulnerabilities? • What is the law protecting patient health information? • ...
Definitions 2025-02-13
Across
- One (sound) sample per second;
- A structured/organised set/collection of data // A (persistent) store/file of structured/organised data;
- controls / manages / runs the computer//enables the computer to function//manages the computer hardware / application software//provides a platform for other software / provides a platform to run application software;
- A database with multiple tables; that are linked together // that reference each other;
- (Malware is a blanket/umbrella term for) computer software/program/code; with malicious/hostile/intrusive intent;
- The processes / practices / technologies / measures designed to protect networks / computers / programs / data; from attack / damage / unauthorised access;
- Single point in an image;//Smallest (addressable) part / bit of an image//
- A computer system with a dedicated/specific purpose or function; built in to a physical product/device/machine;
- The number of bits per sample
- A field in one table; that is a primary key in another table;
Down
- retains data when power is lost / does not lose its contents when power is lost;
- Physical / electrical / electronic Component(s) / part(s) / element (of a computer system);
- The art of manipulating people so they give up confidential information.
- program / code / instructions (executed by / controls the operation of the hardware);
- A sequence / series of steps / instructions; (that can be followed) to complete a task / to solve a problem;
- for (end) user tasks;
- (A set of) rules; that allow devices / networks to communicate / transfer data;
- Removing unnecessary detail/information/data from the problem/task;
- a group/collection/number of computers; A. devices (that contain CPUs) connected/linked together;
19 Clues: for (end) user tasks; • The number of bits per sample • One (sound) sample per second; • A field in one table; that is a primary key in another table; • Removing unnecessary detail/information/data from the problem/task; • The art of manipulating people so they give up confidential information. • ...
Financial Risk Management 2024-07-15
Across
- risk -, demonstrating how commodity price volatility can impact the global economy.
- risk -can enhance resilience through redundant systems
- Risk -proactive legal compliance measures.
- Risk -This can lead to forced selling at unfavourable prices, potentially triggering margin calls
- Risk -This contributed to the crisis by forcing banks to sell assets at fire-sale prices
- Risk -Companies can mitigate this through regular safety inspections
- risk - The investor may have to accept a significant price discount or spread their sales
- Risk -This could lead to increased loan defaults, requiring higher loan loss provisions and potentially impacting the bank's capital adequacy and profitability
- Risk -highlighting the importance of understanding creditor priorities.
- Risk -This can lead to ETF prices deviating from their underlying asset values, potentially causing losses
- rate risk -This risk affects longer-duration bonds more severely than shorter-duration bonds
Down
- risk-To mitigate this, institutions can implement robust cybersecurity
- risk - Investors can mitigate this through diversification, hedging strategies, and maintaining a long-term investment horizon.
- Risk -The higher yields compensate investors for the increased risk of default associated with these lower-rated bonds.
- Risk -The bank could manage this through careful due diligence, ongoing monitoring, securing collateral, and potentially syndicating the loan
- Risk -potentially forcing some investors to sell and causing bond prices to fall.
- risk-This highlights how currency fluctuations can impact international investments.
- Risk -This can force the REIT to seek alternative funding sources, potentially at higher costs
- risk-This risk affects the entire market and is difficult to diversify away, as it impacts all sectors
- risk-. Banks can implement strict compliance procedures to mitigate the risk
20 Clues: Risk -proactive legal compliance measures. • risk -can enhance resilience through redundant systems • Risk -Companies can mitigate this through regular safety inspections • risk-To mitigate this, institutions can implement robust cybersecurity • Risk -highlighting the importance of understanding creditor priorities. • ...
Privacy Cross Word 2024-01-12
Across
- A state of being in solitude or separated from the environment or society, commonly used in contexts like quarantine or solitary confinement.
- The action of making new or secret information known, especially in legal or corporate settings.
- An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems.
Down
- Unsolicited and typically irrelevant or inappropriate messages sent over the Internet, usually to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
- The quality of being able to be used or obtained;
- A secret word or phrase that must be used to gain admission to something, typically a cornerstone of digital security.
- An instance of intruding, especially illegally or without permission, into a system or place, often in the context of privacy or cybersecurity.
7 Clues: The quality of being able to be used or obtained; • The action of making new or secret information known, especially in legal or corporate settings. • An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems. • ...
Modules 18 to 20 Crossword 2023-03-31
Across
- Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
- A weakness in a system or its design that could be exploited by a threat actor.
- BYOD means Bring Your Own ____
- This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
- The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
- Any potential danger to an asset.
- This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
- This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
- A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
- Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
10 Clues: BYOD means Bring Your Own ____ • Any potential danger to an asset. • A weakness in a system or its design that could be exploited by a threat actor. • This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector. • ...
Cyber Law 2021-09-04
Across
- It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
- regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
- 'citizen of the internet' can be called__
- which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
- It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
- It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
- The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
- you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
- it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
- It is a conversion of data,document and processes from analog to digital
10 Clues: 'citizen of the internet' can be called__ • It is a conversion of data,document and processes from analog to digital • It refers to the adoption or increase in use of computer technology by an organization,Industry etc. • It can be thought of as a global electronic village with instantaneous communication and no geographical barriers • ...
Puzzle - 3 2022-10-10
Across
- The core of a computer's operating system that houses the most essential functions of the computer
- is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
- the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- a type of malware that is aimed to infect and harm a file, a system or a network
- a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- Customizable additions to software for extra functionality
- string of characters used to verify the identity of an user during the authentication process
- a program that can automatically perform some simple repeated task to reach a pursued goal.
10 Clues: Customizable additions to software for extra functionality • a type of malware that is aimed to infect and harm a file, a system or a network • a program that can automatically perform some simple repeated task to reach a pursued goal. • string of characters used to verify the identity of an user during the authentication process • ...
CW_1 2022-10-11
Across
- Comprised of any number and variety of interconnected devices
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- weaknesses in software programs that can be exploited by hackers to compromise computers.
- string of characters used to verify the identity of a n user during the authentication process
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- a network security system that filters unsanctioned incoming and outgoing traffic.
- a type of malware that is aimed to infect and harm a file, a system or a network
10 Clues: Comprised of any number and variety of interconnected devices • a type of malware that is aimed to infect and harm a file, a system or a network • a network security system that filters unsanctioned incoming and outgoing traffic. • weaknesses in software programs that can be exploited by hackers to compromise computers. • ...
ADSI Juan Pablo Robayo 2022-02-11
Across
- the practice of tricking Internet users (as through the use of deceptive email messages or websites)
- thing made for a particular purpose, especially a piece of mechanical or electronic equipment. For example an keyboard.
- is a programming language commonly used in web development.
- refers to a system of connected computers and other devices such as printers that exchange data with each other.
Down
- when talking about transferring data or information from a main computer source to another device or transferring information from the cloud.
- a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems
- is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- is defined as a framework with a set of best practices for delivering efficient IT support services.
- mean making a copy of data and files to protect them against accidental loss.
- is a framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.
10 Clues: is a programming language commonly used in web development. • mean making a copy of data and files to protect them against accidental loss. • the practice of tricking Internet users (as through the use of deceptive email messages or websites) • is defined as a framework with a set of best practices for delivering efficient IT support services. • ...
Teka-Teki Silang Seputar Materi Informatika 2025-08-24
Across
- Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
- Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
- Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
- Perangkat keras yang digunakan untuk memproses data.
- Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
- Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
Down
- Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
- lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
- Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
- Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.
10 Clues: Perangkat keras yang digunakan untuk memproses data. • Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide. • lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya. • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- It is news or knowledge received or given
- Help protect computer systems against cyber-attacks or unauthorized access
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- Unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
iACE Crossword Puzzle 3 2021-11-08
Across
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- An official inspection of an individual’s or organization’s accounts.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
- Unacceptable or improper behaviour, especially by an employee or professional person.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- Wrongful or criminal deception intended to result in financial or personal gain
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
Unit 6 Vocab Crossword 2021-09-28
Across
- offensive maneuver that targets computer information systems, computer networks, infrastructures
- the practice of protecting critical systems and sensitive information from digital attacks
- is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
- are criminals who break into computer networks with malicious intent.
- slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
- the use of computer-based technique such as hacking as a form of civil disobedience
- a relatively unskilled individual who uses scripts or programs
- prevents someone watching your connection from knowing what websites you visit
- parts of the World Wide Web whose contents are not indexed by standard web search-engines.
- is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- allows developers to discover and resolve bugs before the general public is aware of such bug
- a path or means by which an attacker or hacker can gain access to a computer or network server
- the gaining of unauthorized access to data in a system or computer.
- open-source software for enabling anonymous communication.
15 Clues: open-source software for enabling anonymous communication. • a relatively unskilled individual who uses scripts or programs • the gaining of unauthorized access to data in a system or computer. • are criminals who break into computer networks with malicious intent. • prevents someone watching your connection from knowing what websites you visit • ...
ICT 2019-11-25
Across
- A letter or note that you can send electronically
- You may request one of these if you wish to know that your e-mail has arrived safely
- The software application used to store all of the records of crimes and victims
- The person who the e-mail is from
- An e-mail can transmit one of these in an attachment
- Devices such as mobile phones, laptops, personal computers (PCs), printers, digital cameras, and video game consoles, can connect to each other and exchange information using Bluetooth protocol for wireless communication. Bluetooth can only be used for relatively short distances (a few metres).
- Acronym for the Police National Computer
- MSN is a method of ....-time communication
Down
- This type of junk e-mail is now becoming a major problem
- In order to send an e-mail, a person needs to have their own e-mail .......
- This type of conference enables people to see and hear one another
- This enables two people to hold a conversation
- An illicit attempt to trick individuals into handing over personal, confidential information.
- Important for cybersecurity, a Firewall is a hardware- or software-based system used as an interface between the internet and a (home or corporate) computer system, that monitors and filters incoming and outgoing traffic and block malware attacks.
- A paper based method of communication
15 Clues: The person who the e-mail is from • A paper based method of communication • Acronym for the Police National Computer • MSN is a method of ....-time communication • This enables two people to hold a conversation • A letter or note that you can send electronically • An e-mail can transmit one of these in an attachment • ...
Browsing Safely 2025-06-04
Across
- The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
- An illegal entry into a computer system or network.
- A collection of technologies, processes, and data from attack, damage, or unauthorised access.
- It is an act of harming or harassing using information technology in a deliberate manner.
- Act of stealing and misusing someone's personal information.
- The receiver of a message is fooled into believing that message received by him is from a trusted source, which is actually not true.
Down
- Any criminal activity intended to harm anyone using a computer and an internet connection.
- Use of illegal methods to get money or other things that belong to a bank or its customers.
- Used yo conduct terrorism through the use of computers and internet in order to cause fear and panic.
- An impression you create when you engage in various online activities, like browsing, communicating with others, or uploading content.
- A crime in which the victim is attacked first and then forced to pay money to stop further attacks.
- The act of sending an email to a user; misleading him to believe that is from a trusted person or organisation.
- A set of programs that disrupts the normal functioning of a computer.
13 Clues: An illegal entry into a computer system or network. • Act of stealing and misusing someone's personal information. • A set of programs that disrupts the normal functioning of a computer. • It is an act of harming or harassing using information technology in a deliberate manner. • ...
Crossword 3 2024-07-25
Across
- A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
- A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- A security concept that ensures that data is only accessible to those with authorized access.
- A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
- A security protocol that ensures privacy between communicating applications and their users on the internet.
- A type of firewall that filters traffic between a trusted and an untrusted network.
- A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
- A security measure that involves hiding internal IP addresses.
- A method used to verify the integrity and authenticity of a message, software, or digital document.
- A security model that enforces strict access controls and compartmentalization.
- A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- A type of security threat that is disguised as legitimate software.
13 Clues: A security measure that involves hiding internal IP addresses. • A type of security threat that is disguised as legitimate software. • A security model that enforces strict access controls and compartmentalization. • A type of firewall that filters traffic between a trusted and an untrusted network. • ...
The IoT - Crossword 2021-04-19
Across
- an event that makes it very difficult or changes the way things or a system usually works.
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
Down
- the part of a car that contains some of the controls used for driving and the devices for measuring speed and distance
- to make a process in a factory or office operate by machines or computers, in order to reduce the amount of work done by humans and the time taken to do the work
- a subject or problem that people are thinking and talking about
- someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
- an object or machine that has been invented for a particular purpose
- having the abilities needed to do an activity or job well
8 Clues: having the abilities needed to do an activity or job well • a subject or problem that people are thinking and talking about • an object or machine that has been invented for a particular purpose • an event that makes it very difficult or changes the way things or a system usually works. • ...
Technology Terminologies 2023-04-28
Across
- The process of designing, writing, testing, and maintaining computer programs.
- A programming language used to create interactive web pages and web applications.
- The process of encoding data in a way that can only be accessed by authorized parties.
- The process of creating a virtual version of something, such as a computer system or network.
- A set of instructions written in a programming language that a computer can execute.
- A programming language used to manage and manipulate relational databases.
- A collection of data that can be accessed, managed, and updated by a computer.
- The language used to create web pages and define their structure and content.
- A step-by-step process for solving a problem or completing a task.
Down
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
- A group of interconnected devices and computers that can communicate and share resources.
- The practice of securing communication and data through techniques such as encryption and decryption.
- The part of a website or application that the user interacts with directly.
- A collection of programs and data that perform a specific task or set of tasks on a computer.
- Data that describes other data, such as information about a file's format, size, or author.
- A set of practices that combines software development and IT operations to streamline software delivery.
- A security system that monitors and controls incoming and outgoing network traffic.
- The latest version of HTML, used to create modern web pages and applications.
- Refers to the design and user experience of software or applications.
19 Clues: A step-by-step process for solving a problem or completing a task. • Refers to the design and user experience of software or applications. • A programming language used to manage and manipulate relational databases. • The part of a website or application that the user interacts with directly. • ...
Technology 2021-03-23
Across
- circulated rapidly and widely from one internet user to another.
- use of social media to stay connected with friends, family etc.. (two words)
- software application for accessing the World Wide Web (2 words)
- protecting computer systems and networks from information disclosure, theft of, or damage to hardware or software.
- 3-D image formed by the interference of light beams from a laser or other light source.
- communication over a distance by cable, telegraph, telephone, or broadcasting.
- computer program made to simulate conversation with human users over the internet
- a detection system that uses radio waves to determine the range, angle, or velocity of objects.
- sports competition using video games
- aircraft without a human pilot on board.
Down
- simulation of human intelligence in machines programmed to think like humans and mimic their action (2 words)
- a computer based technology which allows the sharing of ideas, thoughts, and information through virtual networks and communities.(2 words)
- easy to use or understand.
- amplifying device which fits on the ear, worn by a partially deaf person.(2 words)
- a digital currency that can be used to buy goods and services
- a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.
- home setup where appliances can be controlled remotely from anywhere with an internet connection using a mobile or other networked device. (2 words)
- a person who fears, dislikes, or avoids new technology.
- outdated computer hardware, software, technology, services or practices that are no longer used
19 Clues: easy to use or understand. • sports competition using video games • aircraft without a human pilot on board. • a person who fears, dislikes, or avoids new technology. • a digital currency that can be used to buy goods and services • software application for accessing the World Wide Web (2 words) • circulated rapidly and widely from one internet user to another. • ...
Puzzle - 7 2022-10-10
Across
- a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
- a regular system update released by developers to fix bugs and other software vulnerabilities
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- a list of permitted items that are automatically let through whatever gate is being used.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
- a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- State of being safe / free from danger or threat
- a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system, except those explicitly mentioned which are denied access.
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- The programs and other operating information used by a computer
10 Clues: State of being safe / free from danger or threat • The programs and other operating information used by a computer • a list of permitted items that are automatically let through whatever gate is being used. • a regular system update released by developers to fix bugs and other software vulnerabilities • ...
Puzzle - 11 2022-10-10
Across
- a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- an isolated environment on a network that mimics end-user operating environments.
- Comprised of any number and variety of interconnected devices
Down
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- Breach of a system's security policy in order to affect its integrity or availability
- any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
- string of characters used to verify the identity of an user during the authentication process
10 Clues: Comprised of any number and variety of interconnected devices • an isolated environment on a network that mimics end-user operating environments. • Breach of a system's security policy in order to affect its integrity or availability • string of characters used to verify the identity of an user during the authentication process • ...
corps of signals 2023-01-11
Across
- the use of radio waves to transmit and receive information, a primary means of communication for the corps of signals
- a military branch that specializes in communications, responsible for providing and maintaining the communication systems and networks used by a military force.
- the use of speech to convey information, one of the primary means of communication for the corps of signals
- communications: the use of satellites to transmit and receive information, a key capability of the corps of signals
- a group of interconnected devices and systems that can exchange information and share resources
- the practice of protecting communication systems, networks and data from unauthorized access or attack
Down
- ios or smartphones, to communicate, an essential capability for the corps of signals
- a communication facility that receives a signal from one source and retransmits it on to another, used by the corps of signals to extend the range of communication networks.
- the process of converting plain text into a coded form to protect the information from unauthorized access
- the use of light-carrying fibers to transmit information, a technology used by the corps of signals for high-speed data transfer
10 Clues: ios or smartphones, to communicate, an essential capability for the corps of signals • a group of interconnected devices and systems that can exchange information and share resources • the practice of protecting communication systems, networks and data from unauthorized access or attack • ...
Datafication and Digital Trust 2022-11-09
Across
- Information _________ is the right to have some control over how your personal information is collected and used.
- The method by which information is converted into secret code that hides the information's true meaning
- Data as processed, stored, or transmitted by a computer
- A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
- Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
- Intrusive software that is designed to damage and destroy computers and computer systems
- The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
- When somebody sends an e-mail with a link to a bogus website it is called ___________
- An organized collection of structured information, or data, typically stored electronically in a computer system
- Smallest unit of data
10 Clues: Smallest unit of data • Data as processed, stored, or transmitted by a computer • When somebody sends an e-mail with a link to a bogus website it is called ___________ • Intrusive software that is designed to damage and destroy computers and computer systems • ...
Puzzle - 2 2022-10-10
Across
- encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- weaknesses in software programs that can be exploited by hackers to compromise computers.
- a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
- the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
- the process of decoding cipher text to plain text, so it is readable by humans.
- a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
- Cryptocurrency, a form of electronic cash
10 Clues: Cryptocurrency, a form of electronic cash • the process of decoding cipher text to plain text, so it is readable by humans. • a type of internet fraud that seeks to acquire a user’s credentials by deception. • weaknesses in software programs that can be exploited by hackers to compromise computers. • ...
Puzzle - 6 2022-10-10
Across
- extends a private network across a public network and enables users to send and receive data across shared or public networks
- a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- Breach of a system's security policy in order to affect its integirty or availability
- any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
- a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
- name commonly given to unsolicited email.
- contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
- a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
- Good guys in the world of cybercrime. Hackers who use their skills and talents for good
10 Clues: name commonly given to unsolicited email. • Breach of a system's security policy in order to affect its integirty or availability • Good guys in the world of cybercrime. Hackers who use their skills and talents for good • contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed. • ...
CW-2 2023-09-15
Across
- which cmd is used to display the contents of a text file in the terminal
- a term for a software application that allows users to access and navigate the WWW to view websites and web pages
- a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
- in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
- a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
- the core component of an operating system that manages hardware resources
Down
- in linux, what cmd is used to change the ownership of files and directories
- a term for a computer program or hardware device that provides a specific service or functionality to other software applications
- in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
- what do you type into a web browser to visit a websit
10 Clues: what do you type into a web browser to visit a websit • which cmd is used to display the contents of a text file in the terminal • the core component of an operating system that manages hardware resources • in linux, what cmd is used to change the ownership of files and directories • ...
phish 2024-03-21
Across
- What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
- What type of malicious software disguises itself as legitimate software to gain access to a computer system?
- What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
- What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
Down
- What process in cybersecurity involves encoding data to protect it from unauthorized access?
- What are the software updates released to fix vulnerabilities and improve security in computer systems?
- What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
- A software that is designed to detect and destroy computer viruses.
- What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
- What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
10 Clues: A software that is designed to detect and destroy computer viruses. • What process in cybersecurity involves encoding data to protect it from unauthorized access? • What are the software updates released to fix vulnerabilities and improve security in computer systems? • ...
phish 2024-03-21
Across
- What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
- What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
- What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
- What type of malicious software disguises itself as legitimate software to gain access to a computer system?
- What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
Down
- What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
- What are the software updates released to fix vulnerabilities and improve security in computer systems?
- What process in cybersecurity involves encoding data to protect it from unauthorized access?
- What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
- A software that is designed to detect and destroy computer viruses.
10 Clues: A software that is designed to detect and destroy computer viruses. • What process in cybersecurity involves encoding data to protect it from unauthorized access? • What are the software updates released to fix vulnerabilities and improve security in computer systems? • ...
Technology 2025-01-28
Across
- It's a way of linking devices and systems together so they can communicate and share information more quickly and efficiently.
- This is another technology that we all use often without realizing it.
- It's a way for computers to learn and improve from data without being directly told what to do.
- t's the practice of protecting computers, networks, and data from unauthorized access or attacks.
Down
- Write a simple and short definition of software like a student and without using word:
- It's a digital world where people can interact, work, and play using virtual reality or online platforms.
- It's a way of making physical objects by building them layer by layer from a digital design, using materials like plastic or metal.
- It's the use of technology to study, create, or improve living things and biological processes.
- It's a set of instructions or programs that tell a computer what to do, helping it perform tasks or run applications.
- It's a branch of technology that designs and builds machines to perform tasks, often by imitating human actions or working automatically.
10 Clues: This is another technology that we all use often without realizing it. • Write a simple and short definition of software like a student and without using word: • It's the use of technology to study, create, or improve living things and biological processes. • It's a way for computers to learn and improve from data without being directly told what to do. • ...
Technology 2025-01-28
Across
- It's a way of linking devices and systems together so they can communicate and share information more quickly and efficiently.
- This is another technology that we all use often without realizing it.
- It's a way for computers to learn and improve from data without being directly told what to do.
- t's the practice of protecting computers, networks, and data from unauthorized access or attacks.
Down
- Write a simple and short definition of software like a student and without using word:
- It's a digital world where people can interact, work, and play using virtual reality or online platforms.
- It's a way of making physical objects by building them layer by layer from a digital design, using materials like plastic or metal.
- It's the use of technology to study, create, or improve living things and biological processes.
- It's a set of instructions or programs that tell a computer what to do, helping it perform tasks or run applications.
- It's a branch of technology that designs and builds machines to perform tasks, often by imitating human actions or working automatically.
10 Clues: This is another technology that we all use often without realizing it. • Write a simple and short definition of software like a student and without using word: • It's the use of technology to study, create, or improve living things and biological processes. • It's a way for computers to learn and improve from data without being directly told what to do. • ...
CISO Crossword Quiz - 2225 2025-08-02
Across
- Which secured number is not required for receiving money through UPI?
- What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
- What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
- What disguised link leads to a malicious webpage?
Down
- What method uses a QR code to lead users to fake webpage/payment sites?
- What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
- What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
- What should be strong and unique to protect your online accounts?
- What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
- What attack tricks people into clicking something different than they think?
10 Clues: What disguised link leads to a malicious webpage? • What should be strong and unique to protect your online accounts? • Which secured number is not required for receiving money through UPI? • What method uses a QR code to lead users to fake webpage/payment sites? • What attack tricks people into clicking something different than they think? • ...
CSA CROSSWORD #1 2022-01-07
Across
- industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- form of cloud computing that provides virtualized computing resources over the internet.
- cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
- a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
- This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
- cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- Centre of expertise for cyber security in Europe
- widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
- cybersecurity control framework for cloud computing
10 Clues: Centre of expertise for cyber security in Europe • cybersecurity control framework for cloud computing • form of cloud computing that provides virtualized computing resources over the internet. • cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
October's Blackink Crossword 2024-09-24
Across
- network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- process of converting information or data into a code to prevent unauthorized access.
- type of malicious software designed to block access to a computer system until a sum of money is paid.
- maximum rate of data transfer across a given path, measured in bits per second (bps).
- method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
- A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
- A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
- A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
- delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
- A method of trying to gather personal information using deceptive e-mails and websites.
10 Clues: process of converting information or data into a code to prevent unauthorized access. • maximum rate of data transfer across a given path, measured in bits per second (bps). • A method of trying to gather personal information using deceptive e-mails and websites. • ...
INTELLECTUAL PROPERTY RIGHTS 2025-02-05
Across
- The specific legal statements in a patent that define the scope of protection granted to the inventor.
- is the natural person who has created the work. Some examples of authors include: writers, composers, carvers, etc.
- The practice of protecting online systems, networks, and data from cyber threats, ensuring the safe use of e-services.
- How well a product performs its intended purpose.
Down
- The process where a patent office reviews an application to determine if it meets legal requirements for patentability.
- The detailed explanation of an invention in a patent application, ensuring that the public can understand how it works once the patent expires.
- the transmission by wireless means for the public reception of sounds or of images or of representations thereof
- An exclusive legal right granted to an inventor, giving them control over the use, sale, and production of their invention for a limited period.
- a legal term which comprises both the economic and moral rights which creators have over their literary and artistic works.
- process where a neutral arbitrator hears evidence from both parties and makes a binding decision to resolve the dispute.
10 Clues: How well a product performs its intended purpose. • The specific legal statements in a patent that define the scope of protection granted to the inventor. • the transmission by wireless means for the public reception of sounds or of images or of representations thereof • ...
Teka-Teki Seputar Materi Informatika 2025-08-24
Across
- Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
- Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
- Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
- Perangkat keras yang digunakan untuk memproses data.
- Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
- Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
Down
- Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
- lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
- Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
- Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.
10 Clues: Perangkat keras yang digunakan untuk memproses data. • Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide. • lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya. • ...
Teka-Teki Silang Seputar Materi Informatika 2025-08-25
Across
- Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
- Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
- Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
- lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
- Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.
- Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
- Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
Down
- Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
- Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
- Perangkat keras yang digunakan untuk memproses data.
10 Clues: Perangkat keras yang digunakan untuk memproses data. • Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide. • lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya. • ...
TECH 2024-07-08
Across
- A decentralized and distributed digital ledger technology that records transactions across multiple computers in a way that is secure, transparent, and resistant to tampering.
- Source: Software or technology that is released with a license that allows anyone to inspect, modify, and distribute its source code.
- A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.
- The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches
Down
- The process of converting data into a code to prevent unauthorized access, especially during transmission over networks.
- Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.
6 Clues: A set of rules or instructions designed to solve a specific problem or accomplish a task in computing. • The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches • The process of converting data into a code to prevent unauthorized access, especially during transmission over networks. • ...
Cyber Security 2024-08-29
Across
- Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
- tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
- Jenis malware yang merekam aktivitas pengguna di komputer
- Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
- Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
- jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
- proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
- Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
- Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
- Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
- proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
- proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
- Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
- Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
- Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
- Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
- Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
- Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
- Jenis malware yang menyebarkan dirinya melalui email atau lampiran
- Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain
20 Clues: Jenis malware yang merekam aktivitas pengguna di komputer • Teknik manipulasi psikologis untuk mendapatkan informasi sensitif • Jenis malware yang menyebarkan dirinya melalui email atau lampiran • Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna • Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer • ...
ICT Crossword 2023-03-28
Across
- The learning process of new skills necessary to complete a different role; move onto a new role within their current company.
- A cyber attack intended to redirect a website's traffic to another fake site
- A wireless computer network that links two or more devices using wireless communication to form a local area network.
- The safe and responsible use of technology.
- A type of malware that attaches to another program and can replicate and spread to other computers.
- The replacement of skilled people with technology that require people who can operate that only need fewer skills.
- What is a private computer network within an organization
- Allows two staff members to share the responsibilities of one full-time position.
- A person who uses computers to gain unauthorized access to data
Down
- A telecommunications network that extends over a large geographic area.
- Phone calls that induce you to reveal personal information.
- Unsolicited messages sent in bulk by email.
- Information relating to an identified or identifiable individual.
- A meeting held by people who are talking to each other over the internet
- A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- What is a global network of interconnected computer networks
- A phishing cybersecurity attack carried out over mobile text messaging
- A collection of devices connected together in one physical location.
- What is usually considered as working fewer than 35 hours, or 30 hours, per week.
- An attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate.
20 Clues: Unsolicited messages sent in bulk by email. • The safe and responsible use of technology. • What is a private computer network within an organization • Phone calls that induce you to reveal personal information. • What is a global network of interconnected computer networks • A person who uses computers to gain unauthorized access to data • ...
Chapter 8 - Errors, Failures, and Risks 2024-11-19
Across
- A data structure that allows for pushing and popping elements in a last-in-first-out order.
- An organized collection of data that can be accessed and updated electronically.
- System used to confirm whether a job applicant is legally authorized to work.
- A repeated error caused by an error in the system or program.
- Abbreviation for the US deferral agency for public security including immigration, cybersecurity, and disaster prevention.
- A software and computer program error that causes incorrect behavior.
- The process of planning, decision making and putting a system into effect.
- The process of identifying and fixing errors in systems.
- A displayed description to help the programmer/operator know the issue the program is having.
- Reliance on computer systems and technology for essential functions.
- The concept where everyday devices are embedded with software and communication technologies to connect and exchange data over the internet.
- A check within a program that sees whether a given output or input falls within a logical range of what is acceptable.
- A variable in computer programming storing true or false (0 or 1) for a condition in the program.
Down
- Including duplicate components of systems in software to ensure reliability.
- Process of identifying, analyzing, and evaluating potential risks in a system to ensure safety in the technology.
- A mistake where the incorrect data is entered into a system.
- A variable exceeding the storage capacity of memory it was allocated for.
- A device that can operate in two different modes.
- A computer controlled radiation therapy machine that caused several incidences with radiation overdoses to patients.
- The name of Hong Kong’s international airport that experienced system failures.
20 Clues: A device that can operate in two different modes. • The process of identifying and fixing errors in systems. • A mistake where the incorrect data is entered into a system. • A repeated error caused by an error in the system or program. • Reliance on computer systems and technology for essential functions. • ...
INFORMATIKA KELAS VII SEMESTER 1 2024-12-03
Across
- Platform kolaborasi digital yang memungkinkan komunikasi real time antaranggota tim dan memungkinkan anggota tim berkomunikasi secara langsung melalui video berbagi layer dan berkolaborasi dalam waktu nyata mengatasi hambtan geografis
- Komponen computer yang bertanggung jawab untuk melakukan pemrosesan data dan menjalankan instruksi
- Orang yang menggunakan, memakai ataupun mengoperasikan perangkat computer disebut
- ibu memasak nasi goreng dengan langkah-langkah yang telah diresepkan nenek. Serangkaian langkah terstruktur dan sistematis yang dilakukan ibu disebut
- Alat utama yang berfungsi mengolah data secara digital dan sering disebut sebagai otak computer adalah
- Alamat unik web disebut
- perangkat lunak yang digunakan untuk browsing
- Alat output yang berfungsi menampilkan hasil proses komputasi
- Keyboard termasuk perangkat ...
- Fitur email yang berfungsi untuk melampirkan file dokumen
- Penggunaan internet merupakan salah satu factor penting yang membantu dalam kegiatan pembelajaran dan praktik,adalah manfaat internet dalam bidang
Down
- Speaker teramsuk perangkat ...
- Tempat utama pesan e-mail diterima dan disimpan
- Orang yang mengoperasikan computer atau user
- Di era teknologi yang sangat canggih sangat memerlukan praktik dan teknologi yang berfungsi untuk melindungi siostem computer, jaringan, perangkat dan data dari ancaman dan serangan yang berasal dari dunia digital, teknologi tersebut disebut dengan
- Fitur web yang memungkinkan pengguna untuk menyimpan alamat web atau halaman web yang sering dikunjungi, sehingga dapat diakses dengan mudah di kemudian hari
- Platform digital yang mengkinkan anggota tim untuk bekerja sama dalam dokumen yang sama secara online
- Gaya antar muka berbasis grafis disebut
- Flashdisk salah satu Perangkat computer sebagai
- Bagian dari system computer sebagai perangkat yang dapat diraba, dilihat secara fisik, dan bertindak untuk melanjutkan instruksi dari perangkat lunak (software)
- Perangkat elektronik yang dapat menerima, meyimpan, memproses dan menghasilkan informasi secara digital
21 Clues: Alamat unik web disebut • Speaker teramsuk perangkat ... • Keyboard termasuk perangkat ... • Gaya antar muka berbasis grafis disebut • Orang yang mengoperasikan computer atau user • perangkat lunak yang digunakan untuk browsing • Tempat utama pesan e-mail diterima dan disimpan • Flashdisk salah satu Perangkat computer sebagai • ...
FAI Unit 5 CIE 2025-04-30
Across
- Popular library for image processing and computer vision.
- Technique used to enhance or manipulate digital pictures.
- The ability of AI tools to handle growing data and computation needs.
- Tool that uses AI to monitor and predict website traffic behavior.
- Googles multimodal AI model that supports text, code, and video.
- These automate responses in customer service chats.
- Open-source AI framework developed by Google Brain.
- Abbreviation for the field where AI processes human language.
- Type of AI that runs on local devices without needing the cloud.
- General category of services like AWS and Google Cloud.
- Amazon's cloud platform offering scalable AI services.
- Statistical data visualization library built on Matplotlib.
- Ability to tweak AI models for specific industry needs.
- AI movement focused on transparent and understandable decisions.
- Deep learning framework known for dynamic computation graphs.
- Using AI tools to generate blogs, ads, or emails.
- Field of AI involving autonomous machines.
- AI content generator used in marketing and copywriting.
- Finding patterns and making sense of large datasets.
Down
- Analyzing data to make future predictions.
- Charts and graphs made using AI tools like Seaborn.
- Converts spoken language into text using deep learning.
- AI-powered services like Siri or Alexa fall under this category.
- A learning paradigm used in gaming and robotics.
- Python library used for data visualization with a MATLAB-like interface.
- AIs role in replacing manual, repetitive tasks.
- How accurate AI predictions are compared to human decisions.
- Area where AI detects threats and prevents online attacks.
- A key branch of machine learning used for neural networks.
- AI-powered chatbot developed by OpenAI.
30 Clues: AI-powered chatbot developed by OpenAI. • Analyzing data to make future predictions. • Field of AI involving autonomous machines. • AIs role in replacing manual, repetitive tasks. • A learning paradigm used in gaming and robotics. • Using AI tools to generate blogs, ads, or emails. • Charts and graphs made using AI tools like Seaborn. • ...
Intro to IT Crossword 2025-05-05
Across
- A wireless way to connect devices to the internet
- websites and applications that enable users to create and share content or to participate in social networking
- a part of the internet that is not indexed by traditional search engines and is typically accessed using specialized browsers or network configurations
- technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
- American former NSA intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs
- the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information
- programming language that helps you give instructions to a computer
Down
- Software that protects against malware
- making machines think and act like humans, especially in ways that require intelligence, like learning, problem-solving, and making decisions
- CEO & Inventor of Apple
- computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
- Helps users with technical issues
- co-founding and being the CEO of Facebook
- protecting computer systems, networks, and data from unauthorized access, use, disruption, or destruction
- A network security device that monitors and controls network traffic based on defined security rules
- type of cyberattack where attackers attempt to deceive individuals into revealing sensitive information like passwords or credit card details
- computer program designed to simulate conversation with human users, especially over the internet
- A person who writes code
- information about a particular person that exists on the internet as a result of their online activity
- The operating system used by Apple computers
- a large language model chatbot created by OpenAI
- An electronic device for storing and processing data
22 Clues: CEO & Inventor of Apple • A person who writes code • Helps users with technical issues • Software that protects against malware • co-founding and being the CEO of Facebook • The operating system used by Apple computers • a large language model chatbot created by OpenAI • A wireless way to connect devices to the internet • ...
ICT crosswords 2025-05-16
Across
- is a law that sets rules for how organizations can collect, store, and use personal data about individuals.
- a type of malware that masquerades as legitimate software to deceive users into installing it.
- short name of Repetitive Strain Injury
- ICT Chapter4
- is a type of cyberattack where criminals trick people into revealing sensitive info like passwords or credit card details.
- is a company that provides users with access to the internet for a monthly fee.
- its a law in ICT when you use others things
- part of system life cycle which include technical and user documentation
- an electronic document that verifies the identity of a user, device, server, or website.
- software that help a user to finds websites using keywords or phrases.
- combination of internet and etiquette
- The lack of harm or injury caused by a physical object or related practices.
- is a type of malware that spreads between computers and causes damage to data and software.
- is a type of malware that covertly record keystrokes on a keyboard.
Down
- 4stage of system life cycle
- online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
- part of a design stage that check for correctness, meaningfulness, and security of data that are input to the system.
- a device that links multiple computers and devices together
- Name of our ICT teacher
- It extends intranet to trusted outsiders
- is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing.
- name of chapter 9
- network that use in an organisation
- is a security device that separates a trusted network from an untrusted one.
- 1stage of system life cycle
25 Clues: ICT Chapter4 • name of chapter 9 • Name of our ICT teacher • 4stage of system life cycle • 1stage of system life cycle • network that use in an organisation • combination of internet and etiquette • short name of Repetitive Strain Injury • It extends intranet to trusted outsiders • its a law in ICT when you use others things • ...
Technology Crossword 2024-04-11
Across
- a device used to only capture photos and videos
- a device that sends out signals wirelessly
- a nonhuman technology
- they produce sounds so you can listen to music or audio out loud
- a machine used for sending and receiving documents
- a display screen that shows the converted code
- a device used to watch movies and shows
- a lighting system commonly used on gaming computers
- you can wear them on your head a listen to music
- a tool used to type words
- portable device used for communication
- a device used for playing video games
- a device able to track things
- the practice of protecting computers and serves form online threats and viruses
Down
- the main circuit board of a computer
- a computer component that helps render and display images and videos
- a computer component that helps cool down parts of a computer
- a portable power source for electronic devices
- reality a technology that lets you escape to a different world
- a type of coding used in Mr.Kannani's class
- a flying device able to record videos
- a device used to do school work, watch videos, and play games
- a handheld object that is used to control objects on a computer screen
- a device that prints documents and images
- a technology that allows wireless communication between devices over a great distance
- the "brain" of the computer
- a fancy term used for online shopping
- a camera that goes on a monitor
- a technology that allows wireless communication between devices over a short distance
- a type of computer memory
30 Clues: a nonhuman technology • a tool used to type words • a type of computer memory • the "brain" of the computer • a device able to track things • a camera that goes on a monitor • the main circuit board of a computer • a flying device able to record videos • a fancy term used for online shopping • a device used for playing video games • portable device used for communication • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Remote Work: Challenges and Benefits 2025-07-23
Across
- Ongoing business expenses not directly attributed to creating a product or service, like rent or utilities.
- A large and impersonal political, corporate, or social structure regarded as indivisible and uniform.
- A situation or event that creates a sudden increase in wealth, good fortune, or profits.
- A state of emotional, physical, and mental exhaustion caused by excessive and prolonged stress.
- A seemingly absurd or self-contradictory statement or proposition that when investigated or explained may prove to be well founded or true.
- The regular journey between one's home and place of work.
- Describing work or communication where participants are not engaged at the same time.
- Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.
- The condition of being alone or separated from others.
- The state of being protected against the criminal or unauthorized use of electronic data.
- Something made by combining two different elements; in business, a model combining remote and in-office work.
- The ideas, customs, and social behavior of a particular people or organization.
- The study of people's efficiency in their working environment, often focused on comfort and safety.
Down
- The state of being involved with something; in business, an employee's commitment to their job and company.
- The quality of being done on purpose; deliberateness.
- The state or quality of producing something; the effectiveness of productive effort.
- The quality of bending easily without breaking; the ability to be easily modified or to change.
- The right or condition of self-government; freedom from external control or influence.
- Not physically existing as such but made by software to appear to do so.
- The action of working with someone to produce or create something.
20 Clues: The quality of being done on purpose; deliberateness. • The condition of being alone or separated from others. • The regular journey between one's home and place of work. • The action of working with someone to produce or create something. • Not physically existing as such but made by software to appear to do so. • ...
Intro to CompSci Vocab 2025-08-15
Across
- The delivery of computing services-including servers, storage, databases, networking, software, analytics, and intelligence-over the internet.
- A block of code designed to perform a specific task.
- A set of instructions written in a programming language that a computer can understand.
- A number system that uses only two digits, 0 and 1.
- A step-by-step procedure or formula for solving a problem.
- A type of temporary, high-speed memory that stores data the CPU needs to access quickly.
- The process of finding and fixing errors or "bugs" in a program.
- The set of rules that defines how a program must be written in a specific programming language.
- Information processed or stored by a computer.
- The physical components of a computer, such as the monitor, keyboard, and hard drive.
Down
- A control structure that repeats a block of code multiple times.
- The practice of protecting computer systems and networks from digital attacks.
- A collection of interconnected computers and devices that can share data and resources.
- A control structure that allows a program to execute different code blocks based on whether a condition is true or false.
- A group of 8 bits.
- A storage location in memory that holds a value.
- The core software that manages all the hardware and software resources of the computer.
- The programs and other operating information used by a computer.
- The "brain" of the computer that performs all the calculations and instructions.
- The smallest unit of data in a computer, represented by a single binary digit.
- A unique numerical label assigned to each device participating in a computer network.
21 Clues: A group of 8 bits. • Information processed or stored by a computer. • A storage location in memory that holds a value. • A number system that uses only two digits, 0 and 1. • A block of code designed to perform a specific task. • A step-by-step procedure or formula for solving a problem. • A control structure that repeats a block of code multiple times. • ...
Cybersecurity Fundamental Chapter 8 Part 2 2024-06-05
Across
- The process of distributing and applying updates to software to fix known vulnerabilities.
- The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
- The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- The process of addressing and managing the aftermath of a security breach or cyberattack.
- Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
- A proactive system that detects and prevents identified threats from infiltrating a network
- The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
- An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
- Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
- The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- A system that monitors network traffic for suspicious activity and potential threats
- The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.
12 Clues: A system that monitors network traffic for suspicious activity and potential threats • The process of addressing and managing the aftermath of a security breach or cyberattack. • The process of distributing and applying updates to software to fix known vulnerabilities. • ...
Technology 2023-06-14
Across
- A technology that creates a computer-generated environment, simulating a realistic experience.
- A machine that can store, process, and retrieve information, and perform various tasks.
- The process of creating instructions for computers to follow, often using programming languages.
- Measures and practices to protect computer systems and networks from unauthorized access or attacks.
- A mobile phone that can also perform functions similar to a computer, such as internet browsing.
- The development of computer systems that can perform tasks that would normally require human intelligence.
- Information that is stored and processed by computers, often in the form of numbers or text.
- The physical components of a computer or electronic device, such as the processor or screen.
Down
- The use of remote servers to store, manage, and process data over the internet, rather than locally.
- The process of converting information into a secret code to prevent unauthorized access.
- Relating to information that is stored and processed in a digital format, such as digital photos or music.
- The branch of technology that deals with the design, construction, and operation of robots.
- The process of transmitting or receiving multimedia content, such as videos or music, over the internet.
- A global network that connects computers and allows people to access and share information.
- Programs or applications that run on a computer or smartphone, providing specific functionalities.
- The act of playing electronic games, often on a computer or gaming console.
16 Clues: The act of playing electronic games, often on a computer or gaming console. • A machine that can store, process, and retrieve information, and perform various tasks. • The process of converting information into a secret code to prevent unauthorized access. • The branch of technology that deals with the design, construction, and operation of robots. • ...
CNB Employee Community Banking Month Crossword 2023-04-18
Across
- KnowBe4 allows us to offer free ____________ training to all our customers.
- The Videos section of our website features Customer ______________. They’re also featured on our YouTube channel.
- CNB currently has _____________________ branch locations through Ohio.
- In 1920, Citizens National Bank opened its doors and gave everyone an ___________ in appreciation for stopping by.
- Each year, CNB offices host Community Shred Day on the last _____________ of April.
- CNB was recently named one of the Top 50 Community Banks in the _______________.
- Customers may enter in person or ____________ to win a Community Gift Basket, which includes items from each of our markets, valued at more than $150.
- The CNB ____________ Club was re-introduced this year, offering the opportunity for employees to donate resources and time to charity.
- Our Financial _________________ Sweepstakes runs through May 31st and offers the chance to win $2000 for using bill payment products.
- If someone is interested in retirement accounts or investment opportunities, they can speak with someone from Citizens ____________ Management Group.
Down
- The Executive Newsletter is geared towards ___________________, providing information for owners and managers.
- Both the Free Checking and Go ________________ Account can be opened completely online through our website.
- In 2022, CNB ____________ more than $180,000 to local schools and organizations.
- Our _____________________ newsletter offers personal finance information and info about CNB.
- We offer many financial ___________________, including mortgage, investment, loan/credit card, on our website under the Resources tab.
- CNB Visa Credit Card customers can earn 5x points through the end of June at Home ____________ stores, such as Lowe’s.
16 Clues: CNB currently has _____________________ branch locations through Ohio. • KnowBe4 allows us to offer free ____________ training to all our customers. • In 2022, CNB ____________ more than $180,000 to local schools and organizations. • CNB was recently named one of the Top 50 Community Banks in the _______________. • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- An official inspection of an individual’s or organization’s accounts.
Down
- _____________ refers to adherence to policies, plans, procedures, laws, regulations, contracts, or other requirements.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Wrongful or criminal deception intended to result in financial or personal gain.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
The central technologies to digital transformation 2023-12-15
Across
- practice of protecting critical systems and sensitive information from digital attacks
- provides a secure and transparent way to record and verify transactions. It is commonly associated with cryptocurrencies but has broader applications, such as supply chain management and secure data sharing.
- involves the use of software robots to automate repetitive and rule-based tasks. It helps streamline business processes, reduce errors, and increase operational efficiency.
- technology enhances user experiences by creating immersive virtual environments
- provides faster and more reliable connectivity, enabling the seamless operation of applications that require high data transfer speeds
- enable systems to learn from data and make intelligent decisions.
Down
- involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
- involves connecting physical devices to the internet, allowing them to collect and exchange data
- enable the processing and analysis of large volumes of data to derive insights and make informed business decisions.
- provides scalable and flexible resources, allowing organizations to store and access data, run applications, and deploy services without the need for on-premises infrastructure
10 Clues: enable systems to learn from data and make intelligent decisions. • technology enhances user experiences by creating immersive virtual environments • practice of protecting critical systems and sensitive information from digital attacks • involves connecting physical devices to the internet, allowing them to collect and exchange data • ...
Corporate Compliance and Ethics Week 2023 2023-10-30
Across
- What you must do if you suspect that someone is doing anything that violates the Compliance and Ethics code and our Standards of Conduct.
- The acronym for the policy that ensures and protects a patient's electronic health record (EHR).
- The acronym for our "Safety and Compliance" reporting system.
- The practice of protecting systems, networks and programs from digital attacks.
- The fraudulent practice of sending emails purporting to be from a reputable company in order to trick someone into sharing their personal information.
Down
- Following the rules. It means we try to understand and comply with all the laws and policies that apply to our duties at Community.
- A system of moral principles dealing with values with respect to the rightness and wrongness of certain actions and to the goodness and badness of motives and ends of such actions.
- Who is responsible for compliance at Community Health System.
- A type of email that covers a range of protective measures and creates a secure connection between a dedicated web server and browser.
- Another name for your CHS system username and password.
10 Clues: Another name for your CHS system username and password. • Who is responsible for compliance at Community Health System. • The acronym for our "Safety and Compliance" reporting system. • The practice of protecting systems, networks and programs from digital attacks. • ...
CW-2 2023-09-15
Across
- a term for a software application that allows users to access and navigate the WWW to view websites and web pages
- in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
- what do you type into a web browser to visit a websit
- a term for a computer program or hardware device that provides a specific service or functionality to other software applications
- in linux, what cmd is used to change the ownership of files and directories
Down
- the core component of an operating system that manages hardware resources
- a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
- in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
- which cmd is used to display the contents of a text file in the terminal
- a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
10 Clues: what do you type into a web browser to visit a websit • which cmd is used to display the contents of a text file in the terminal • the core component of an operating system that manages hardware resources • in linux, what cmd is used to change the ownership of files and directories • ...
Dark Web Saga 2024-02-04
Across
- Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?
- I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.
- In circuits, I compute without a hitch, a brain of metal and silicon which is which?
- With keys at my command, I type and code, a writer's ally on the digital road. What am I, in the coding abode?
- A web of connections, wires in a dance, transmitting data at a rapid advance. What am I, in the networking expanse?
- A language, zeroes and ones, the foundation of code, where the digital journey begins. What am I, in the coding bins?
Down
- In the coding labyrinth, where symbols align, a programmer's toolkit, where solutions shine. What am I, in the coding design?
- Pixels and screens, a visual delight, bringing images to life, in the digital light. What am I, in the visual height?
- With keys and codes, I lock and secure, a guardian of data, making breaches obscure.
- I hide in the shadows, a secret unknown, where the internet's darker side is shown.
10 Clues: Clicks and beeps, a language I speak, what am I, a gadget for the tech geek? • I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow. • I hide in the shadows, a secret unknown, where the internet's darker side is shown. • With keys and codes, I lock and secure, a guardian of data, making breaches obscure. • ...
altafiber Security Awareness 2022-08-29
Across
- Your ____ is like your underwear; don't share it with your friends, and change it often.
- Personal Identifiable Information
- _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
- A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
- A weakness in a program or system that can be exploited
- A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
- The process of changing plain text to cipher text using an algorithm
- Logical or physical device used to filter network traffic
Down
- Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
- United States Federal Agency that specializes in cybersecurity
- National Institute of Standards and Technology
- The form of malware that encrypted Colonial Pipeline files in 2021.
- An email that tricks you into giving up your passphrase, password or clicking on a malicious link
- Cyber Security Awareness Month
- A Virtual Private Network connection that establishes a secure connection between you and the internet.
- Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
- Similar to a password except you use a string of words and it gives you access to your computer.
18 Clues: Cyber Security Awareness Month • Personal Identifiable Information • National Institute of Standards and Technology • A weakness in a program or system that can be exploited • Logical or physical device used to filter network traffic • United States Federal Agency that specializes in cybersecurity • The form of malware that encrypted Colonial Pipeline files in 2021. • ...
IoT Word Puzzle 2025-04-01
Across
- is a set of technologies that enable computers to perform a variety of advanced functions, including the ability to see, understand and translate spoken and written language, analyze data, make recommendations, and more
- an electronic device generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously.
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- involves using technology, programs, robotics, or processes to perform tasks with minimal human input
- a device that detects and responds to a physical stimulus (like heat, light, sound, pressure, or motion) and transmits a resulting impulse, often for measurement or control.
- extremely large and diverse collections of structured, unstructured, and semi-structured data
- the state of being connected or interconnected.
7 Clues: the state of being connected or interconnected. • extremely large and diverse collections of structured, unstructured, and semi-structured data • involves using technology, programs, robotics, or processes to perform tasks with minimal human input • ...
Cybersecurity Awareness month at Kent! 2024-10-14
Across
- Sense created by the attacker to make you react quickly without thinking.
- When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- Software attack method to harm or exploit a device or network.
- Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- The address of a webpage which you check the validity of before clicking it. (Acronym)
8 Clues: Software attack method to harm or exploit a device or network. • Sense created by the attacker to make you react quickly without thinking. • The address of a webpage which you check the validity of before clicking it. (Acronym) • Additional layer of security that verifies a user's access to an account more than once. (Acronym) • ...
FITAVocab.kr 2013-05-15
Across
- a saying or group of words representing a business, store, etc
- 1000 kilobytes
- Ram, memory
- a formal induction into office
- when you think who what and why when someone is talking to you online
- to start a computer by turning it off and then back on
- a port where you plug in an internet cable
- a character
- WIFI
- how you protect yourself online
- ex: dogpile and mamma.com
- circuit board
- ISP, a company that offers access to the internet and email
- NCSA
- CPU, how fast it is
- a pattern serving as a guide in mechanical work, something to get you going
- credit
- an image representing a business, store, etc
- DSL and cable are options
Down
- 8 bits
- SSID
- a brief written account about personal, educational, and professional qualifications and experience
- how you act online
- LED, lightbulb
- a right to copy and license a piece of work
- an arrangement or plan, how it looks
- ex: speaker
- a port for plugging in flash-drives
- a continuous stream of information
- ex: google, yahoo
- being safe online
- 1000 bytes
- 3G and 4G are options
- LCD, display
- a wireless networking technology that uses short-wave radio frequencies to connect wireless electronic devices
- the totality of a computer and the devices connected to it
- a port for plugging in headphones
- 1000 gigabytes
- an electronic receiver for a PS2 cable usually used to plug in a keyboard or mouse
- an promise presidents say
- gaming ports
- ex: mouse
- 1000 megabytes
- uses ones and zeros to transmit information
- the arrangement of data
45 Clues: SSID • WIFI • NCSA • 8 bits • credit • ex: mouse • 1000 bytes • Ram, memory • a character • ex: speaker • LCD, display • gaming ports • circuit board • 1000 kilobytes • LED, lightbulb • 1000 gigabytes • 1000 megabytes • ex: google, yahoo • being safe online • how you act online • CPU, how fast it is • 3G and 4G are options • the arrangement of data • ex: dogpile and mamma.com • an promise presidents say • ...
IT and How Computers Work 2023-07-05
Across
- this type of memory is permanent and saved on the hard drive
- job-specific high-speed wire used to communicate the processor with other components
- overseer of the CPU
- information that gets returned by the computer
- A machine that can quickly complete a vast number of extremely simple tasks.
- this type of bus carries data back and forth
- Stores data which is virtual information only accessible with a computer
- arithmetic and logic operations are processed here
- data we give to our computers
- printed circuit board that houses important hardware components via ports
- 0's and 1's
- used to store either temporary or permanent information
- limited space, high-speed memory that the CPU can use for quick processing
- comprised of the translation of input and the instructions given for output
Down
- this type of bus carries a specific address in memory and are unidirectional
- A way for computers all around the world to communicate with each other
- Making sure the information is communicated and stored safely and securely – only the right people should have access to it
- type of input device
- "brain of the computer"
- physical outlet used to connect outside, IO (Input/Output) devices to a computer.
- Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
- responsible for the long-term, or secondary storage of data and programs
- type of output device
- fast and temporary memory
- a mouse being clicked
- this type of bus carries the control signals to the other components and are unidirectional
- the use of technology to organize, store, share, and process information.
27 Clues: 0's and 1's • overseer of the CPU • type of input device • type of output device • a mouse being clicked • "brain of the computer" • fast and temporary memory • data we give to our computers • this type of bus carries data back and forth • information that gets returned by the computer • arithmetic and logic operations are processed here • ...
Public Safety 2024-08-09
Across
- a person whose job is to extinguish fires
- the action of evacuating a person or a place
- a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
- responsible for the prevention and detection of crime and the maintenance of public order
- an established or official way of doing something
- freedom from disturbance
- the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
- the action of keeping something harmful under control or within limits
- a danger or risk
- the action of protecting, or the state of being protected
- an act of saving or being saved from danger or distress
Down
- a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
- the action of stopping something from happening or arising
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the act of compelling observance of or compliance with a law, rule, or obligation
- rule or directive made and maintained by an authority
- the state of being free from danger or threat
- one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
- protected from or not exposed to danger or risk; not likely to be harmed or lost
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise
20 Clues: a danger or risk • freedom from disturbance • a person whose job is to extinguish fires • the action of evacuating a person or a place • the state of being free from danger or threat • an established or official way of doing something • rule or directive made and maintained by an authority • an act of saving or being saved from danger or distress • ...
September Edition Crossword 2024-09-24
Across
- 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
- This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
- This French political party accused the election of being "stolen" after Michel Barnier was named President.
- A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
- Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
- First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
- A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
- Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
- Surname of the Supreme Allied Commander of NATO.
Down
- A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
- This Chinese investment program has led to complicated ties with Myanmar.
- Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
- This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
- Campus News Editor Madeline Rowe interned with this former congressman.
- A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
- A recent rise in this political phenomenon threatens long-term stability and economic performance.
- This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
- Former vice president of Google's ad platform.
- This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
- This statute in international law reaffirms the authority of the International Criminal Court.
20 Clues: Former vice president of Google's ad platform. • Surname of the Supreme Allied Commander of NATO. • Campus News Editor Madeline Rowe interned with this former congressman. • This Chinese investment program has led to complicated ties with Myanmar. • Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete. • ...
Technology Crossword 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is the protection of computer systems and networks from attack by malicious actors.
- is a form of computer memory that can be read and changed in any orde.
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a file format developed by Adobe in 1992 to present document
- is a digital multimedia container format most commonly used to store video and audi.
- is a collection of discrete values that convey informatio.
- is a method of representing data in a visual, machine-readable form
Down
- is an American multinational technology company
- is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- are small blocks of data created by a web server.
- is a bitmap image format that was developed by a team at the online services provider CompuServe.
- is a mobile operating system
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a mapping from some domain (for example, a range of integers) to bits.
- is a method of transmitting and receiving messages using electronic devices.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.
20 Clues: is a mobile operating system • is an American multinational technology company • are small blocks of data created by a web server. • is the most important processor in a given computer. • is a collection of discrete values that convey informatio. • is a file format developed by Adobe in 1992 to present document • ...
Unit 8 Key Terms 2023-04-27
Across
- taken to achieve this.
- a place of refuge or safety.
- the state of being protected against the criminal or unauthorized use of electronic data, or the
- a term typically used to describe international, supranational, and global resource domains in
- a tax or duty paid on a particular class of imports or exports.
- the system.
- to do so.
- fiscal policy to stimulate the economy.
- sum of money provided by the government or a public body
- economically stimulus refers to attempts to use monetary policy
- a system of recording information in a way that makes it difficult or impossible to change, hack, or
- common-pool resources are found.
- the profession, activity or skill of managing international relations, typically
Down
- the state of being equal especially in status, rights and opportunities.
- a video of a person in which their face or body has been digitally altered so that they appear to be
- to reveal personal information, such as passwords and credit card numbers
- else, typically used maliciously or to spread false information
- money paid regularly at a particular rate for the use of money lent.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
- sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
- to influence a country's economy.
- businesses.
- controlling the overall supply of money that is available to the nation's banks, its consumers, and
- a set of tools that a nation's central bank has available to promote sustainable economic growth
- the use of government revenue collection and
- a countries representative abroad.
- existing or occurring within a particular country
- assist an industry or business in order to remain competitive.
28 Clues: to do so. • businesses. • the system. • taken to achieve this. • a place of refuge or safety. • common-pool resources are found. • to influence a country's economy. • a countries representative abroad. • fiscal policy to stimulate the economy. • the use of government revenue collection and • existing or occurring within a particular country • ...
TECH CONNECT 2023-08-30
Across
- Writing and structuring code that computers can execute to perform desired functions.
- Programs and applications that run on computers or devices, enabling various tasks.
- A set of rules defining how data is transmitted and received across a network.
- A interconnected system that allows devices to communicate and share resources.
- Implementing systems or processes that operate with minimal human intervention.
- The point of interaction between a user and a device or software application.
- Writing instructions that computers can understand to perform specific tasks.
- Measures to protect digital systems and information from unauthorized access or attacks.
- A remote network of servers for storing, managing, and processing data over the internet.
- A powerful computer that stores and manages data and resources for other devices.
- Intelligence, The ability of machines to simulate human cognitive functions.
Down
- Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
- Using technology to streamline and execute tasks without human intervention.
- The global network connecting computers and devices, facilitating information exchange.
- Identifying and removing errors or issues in software code.
- The process of introducing new ideas, methods, or technologies to improve existing systems.
- Combining different components or systems to work together seamlessly.
- Often in the form of facts, figures, or statistics, used for analysis.
- Examination of data to extract meaningful insights and make informed decisions.
- Converting data into a code to prevent unauthorized access.
- Short for "application," referring to software designed for specific tasks or purposes.
- The process of designing, creating, and refining software, systems, or products.
- Physical components of computers and devices that enable software to function.
- The person interacting with a device, system, or software application.
- A set of step-by-step instructions for solving a problem or completing a task.
25 Clues: Identifying and removing errors or issues in software code. • Converting data into a code to prevent unauthorized access. • Combining different components or systems to work together seamlessly. • Often in the form of facts, figures, or statistics, used for analysis. • The person interacting with a device, system, or software application. • ...
Bureaucracy and Foreign Policy 2024-10-03
Across
- Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
- The method of influencing someone, usually a country, to behave in a certain way
- Department that leads the country’s foreign policy
- A government’s set of strategies and goals for dealing with other nations
- Allows both groups to meet their interests
- Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
- Large, complex administrative structure that handles the everyday business of an organization
- Provides the President with the support and services he needs to govern effectively
- Department that oversees and advises the president on military action
- Violent attacks against civilians
- The President oversees the miliatry as ________-in-chief.
- Government officials who live in foreign countries and represent their government
- A type of agency such as the CIA, NSA, and DIA
Down
- The heads of independent agencies are confirmed by what?
- Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
- An agreement between countries
- Type of aid that helps develop other nations
- Congress holds the power of the _________—they control how government money is raised and spent
- The federal bureaucracy is part of the ___________ branch.
- Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
- Economics method to stop trade and assistance to a specific country
- Mutually beneficial relationship between an agency, congressional committee, and interest group.
- When the U.S. only threatens (key word threatens) to use military forces against another country
- Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue
24 Clues: An agreement between countries • Violent attacks against civilians • Allows both groups to meet their interests • Type of aid that helps develop other nations • A type of agency such as the CIA, NSA, and DIA • Department that leads the country’s foreign policy • The heads of independent agencies are confirmed by what? • ...
Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11
Across
- digital upaya untuk memerangi penyebaran konten negatif disebut...
- analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
- creator profesi yang bertugas membuat konten untuk media sosial adalah...
- rangkaian karakter yang digunakan untuk mencari informasi di mesin pencari.....
- scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
- proses penyebaran konten digital kepada khalayak luas disebut...
- proses verifikasi kebenaran konten digital disebut...
- operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
- operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
- cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
- simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
Down
- salah satu contoh platform untuk diseminasi konten digital adalah...
- salah satu contoh HAKI adalah...
- Tanda kutip ganda (") digunakan untuk mencari frasa yang...
- pelanggaran haki dapat dikenakan sanksi...
- etika dalam memproduksi dan mendiseminasikan konten digital disebut...
- salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan.
- profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
- salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
- dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
- salah satu contoh konten digital yang mengandung unsur budaya adalah...
- dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
- salah satu contoh konten negatif adalah...
- hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
- organisasi internasional yang mengurusi HAKI adalah...
- grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...
26 Clues: salah satu contoh HAKI adalah... • pelanggaran haki dapat dikenakan sanksi... • salah satu contoh konten negatif adalah... • proses verifikasi kebenaran konten digital disebut... • organisasi internasional yang mengurusi HAKI adalah... • Tanda kutip ganda (") digunakan untuk mencari frasa yang... • proses penyebaran konten digital kepada khalayak luas disebut... • ...
TTS27X_D 2025-04-27
Across
- Platform atau media yang seringkali menjadi sarana penyebaran konten negatif
- Ahli yang mengelola dan memelihara sistem basis data
- Untuk mencari informasi dari situs web tertentu, kita dapat menggunakan awalan site diikuti dengan
- Simbol asterisk dalam search engine berfungsi sebangai karakter
- Kegiatan menyaring atau membersihkan platform digital dari konten yang merugikan
- Upaya untuk memperkenalkan dan menyebarkan warisan budaya melalui platfrom digital
- Hak eksklu untuk menggunakan simbol, logo, atau nama tertentu dakam kegiatan perdagangan atau jasa
- Singkatan dari Hak Kekayaan Intelektual
- Adaptasi cerita atau mitos tradisional ke dalam format konten digital yang lebih modern
- Profesi yang bertugas merancang dan membangun jaringan komputer
- Ahli yang fokus pada keamanan sistem komputer dan jaringan dari ancaman siber
- Orang yang memberikan dukungan teknis kepada pengguna komputer dan sistem informasi
- Proses awal dalam membuat konten digital yang seringkali terinspirasi dari kekayaan budaya
Down
- Bentuk perlindungan HAKI untuk karya cipta di bidang ilmu pengetahuan, seni, dan sastra
- Operator logika dalam search engine yang mengharuskan kedua kata kunci ada dalam hasil pencarian
- Hak eksklusif yang diberikan kepada invetor atas invensinya
- Proses untuk memastikan kebenaran suatu informasi dan menangkal berita bohong
- Profesi yang berfokus pada pengembangan dan pemeliharaan situs web
- Penggunaan tanda filetype dalam pencarian digunakan untuk mencari file dengan format
- Simbol yang digunakan untuk menunjukkann merek dagang yang belum terdaftar secara resmi
- Salah satu bentuk konten digital yang efektif menyampaikan cerita rakyat atau legenda daerah
- Kemampuan berpikir kritis dan analitis dalam mengevaluasi informasi yang diterima
- Situs web atau sistem yang dirancang untuk mencari informasi di internet
- Metode untuk memeriksa keaslian gambar atau video yang beredar di internet
- Media digital yang sering digunakan untuk menyebarkan konten budaya seperti video tari tradisisonal
25 Clues: Singkatan dari Hak Kekayaan Intelektual • Ahli yang mengelola dan memelihara sistem basis data • Hak eksklusif yang diberikan kepada invetor atas invensinya • Simbol asterisk dalam search engine berfungsi sebangai karakter • Profesi yang bertugas merancang dan membangun jaringan komputer • Profesi yang berfokus pada pengembangan dan pemeliharaan situs web • ...
Applications of AI 2025-04-30
Across
- AI technology that converts spoken words to text
- AI tailors educational content to individual students
- AI helps with crop monitoring and yield prediction
- AI tools can generate novel images and music
- AI field focused on understanding and processing human language
- Vehicles that use AI to navigate without human input
- AI generates content and powers recommendation systems
- AI enabling computers to "see" and interpret images
- Identifying and labeling patterns, like faces or speech
- AI systems that sort and prioritize information
- AI detects threats and anomalies in networks
- AI programs that help with tasks, often voice-activated
- Field where AI diagnoses diseases and analyzes images
- AI is used for fraud detection and algorithmic trading in this sector
- Autonomous vehicles rely heavily on AI
- Chatbots and virtual agents are common here
Down
- AI accelerates the process of finding new medicines
- AI forecasts equipment failures in industry
- AI models help forecast weather and study environmental changes
- Personalized learning paths and grading are AI applications here
- AI is used to identify and prevent deceptive activities
- AI suggests products or content based on user history
- AI provides the intelligence for automated machines
- AI optimizes production and quality control
- AI personalizes advertising and analyzes consumer behavior
- AI systems that convert text or speech from one language to another
- AI controls non-player characters and generates game content
- Identifying objects or patterns in data, often using AI
- Creating new content like text, images, or music using AI
- AI is good at spotting unusual patterns that might indicate fraud or issues
30 Clues: Autonomous vehicles rely heavily on AI • AI forecasts equipment failures in industry • AI optimizes production and quality control • Chatbots and virtual agents are common here • AI tools can generate novel images and music • AI detects threats and anomalies in networks • AI systems that sort and prioritize information • AI technology that converts spoken words to text • ...
SCIENCE AND TECHNOLOGY 2024-10-25
Across
- The force that pulls objects toward each other, especially toward the Earth.
- The technology used to design and create robots.
- The science of building and using tiny structures at a molecular scale.
- The basic building block of all living organisms.
- The study of matter, energy, and the forces that act on them.
- The act of introducing something new, often advancing technology or science.
- A proposed explanation made based on limited evidence, to be tested.
- Facts or statistics collected for analysis or reference.
- The power needed to do work, from sources like fuel, electricity, or the sun.
- Something made by humans rather than occurring naturally.
- A place where scientists conduct experiments and research.
- The study of genes and heredity in living organisms.
- A branch of physics studying the behavior of particles on the smallest scales.
- A language or set of instructions used to program computers.
- The study of stars, planets, and outer space.
Down
- A path through which electric current flows.
- The molecule that carries genetic information in living organisms.
- An imitation of a real-world process for study or training purposes.
- A new idea or method that improves how things are done.
- The protection of computer systems from digital attacks.
- A small piece of matter, like an atom or molecule.
- A test done to discover or prove something.
- Microscopic organisms, some of which can cause diseases.
- A device that orbits Earth or another planet, used for communication or research.
- A set of rules or instructions for solving a problem, often used in computing.
- A collection of data organized for easy access and analysis.
- A small infectious agent that can multiply in living cells.
- The process by which species change over time through natural selection.
- The use of machines and technology to operate without human intervention.
29 Clues: A test done to discover or prove something. • A path through which electric current flows. • The study of stars, planets, and outer space. • The technology used to design and create robots. • The basic building block of all living organisms. • A small piece of matter, like an atom or molecule. • The study of genes and heredity in living organisms. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Security documentation that details system resource usage by users and processes for auditing.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Attacks that overwhelm a target system or network with a flood of traffic
- Policy-based accept or deny of network traffic.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Injecting malicious scripts into webpages viewed by other users
- Matching known patterns of threats against security event data to find potential matches.
- Code examination performed without running the malicious program.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Process of transforming information into a scrambled format to secure it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- The correlation that matches the known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Issues and Impacts Crossword 2025-12-03
Across
- Unfairness in algorithms or AI systems that can discriminate
- All the information about a person that exists online
- Copying someone else’s work without credit
- Crime where someone uses another person’s personal details illegally
- Illegal activities carried out using computers or the internet
- Platforms that can spread misinformation or affect mental health
- Technology that identifies people by their face
- Incident where sensitive information is accessed without permission
- Deliberately posting offensive or upsetting content online
- False or misleading information spread online
- Protecting systems and data from online threats
- Monitoring of people’s activities using technology
Down
- Gap between people who have access to technology and those who do not
- Computer-generated environment that feels real to users
- Software designed to damage or disrupt computers
- Legal right protecting creators of software, music, or digital content
- Money that exists only electronically, like Bitcoin
- Discarded electronic devices that harm the environment
- Technology that simulates human thinking and decision-making
- Small files stored by websites to track user activity
- Software that is freely available and can be modified by anyone
- Moral principles guiding responsible use of technology
- Process of converting data into code to prevent unauthorized access
- Creations of the mind protected by law
- Technology that overlays digital information onto the real world
- Environmental effects of producing and using technology
- Excessive use of technology leading to negative impacts on health or lifestyle
- Replacement of human jobs with computer-controlled systems
- Fraudulent attempt to steal sensitive information via fake emails or websites
- Ensuring personal information is kept safe and not misused
- Unauthorized access to computer systems
- Programs that can copy themselves and damage computers
32 Clues: Creations of the mind protected by law • Unauthorized access to computer systems • Copying someone else’s work without credit • False or misleading information spread online • Technology that identifies people by their face • Protecting systems and data from online threats • Software designed to damage or disrupt computers • ...
FITDVocabulary.lm 2013-05-15
Across
- the way you behave online
- the design of a document
- things that your computer needs
- computer plug-ins
- selling of a company
- rtf
- LCD
- campaigning for a company
- a more modern version of power point
- doc.
- standards that a product must meet
- how secure you and your computer is while online
- a giant search engine
- ipad, cellphone
- a website with tips that help keep you safer while online
- what a president says when elected
- ISP
- an area where you plug in a cord to give you internet access
- a booklet representing a company
- a sign/symbol that represents a business
- credit for an author or writer
- a form you turn into a business
- where you put your CD's
- additional hardware for a computer (needed for gamers)
- an online flash drive
Down
- web
- LED
- the second smallest form of storage
- a device that gives out
- a computer's short term memory
- where you plug in your headphones
- wireless internet
- an internet hosting service that lets people and organizations have internet
- a tool that allows you to have access to the internet
- the smallest form of storage
- start up
- a device that gives in
- an option for a document's layout
- extra things for a computer
- VDU
- CPU
- word, pages
- "talking up" a company
- a service that is able to be downloaded for pleasure
- being safe online
- a patent on writing
- brain of the computer
- a catch phrase that helps you remember a business
50 Clues: web • LED • pdf • rtf • LCD • ISP • VDU • CPU • doc. • google • start up • word, pages • ipad, cellphone • computer plug-ins • wireless internet • being safe online • a patent on writing • selling of a company • a giant search engine • brain of the computer • an online flash drive • a device that gives in • "talking up" a company • a device that gives out • where you put your CD's • the design of a document • ...
RU ITEC411-Crime and Security 2022-10-16
Across
- gaining unauthorized access to data in a system or computer
- software that allow future access to a computer system by bypassing the normal layers of security.
- can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
- biological characteristics unique to an individual
- criminal activity that involves the use of a computer r a network
- person that uses their technical knowledge to break into a computer system or network by no standard means.
- irrelevant or inappropriate messages sent in bulk to recepients
- malware that can monitor or record victim's activities on a computer or mobile phone
- group of internet connected devices each of which runs one or more bots.
- use of computers or computer network techniques such as hacking to promote political agenda
- the assurance that private data will remain private
Down
- sending fraudulent text messages on purpose appearing to come from reputable and legit companies
- the assurance that data will not change without authorization
- malware that blocks access to data or threatens to publish it unless a ransom is paid.
- recording devices inside credit card readers to collect credit card numbers and PINs.
- converting information into secret code that hides the meaning of the information
- protection of computer systems and networks from information theft or hardware damage.
- the way in which thieves collect personal data by luring the victims to fake websites
- sending deceiving emails in order to obtain sensitive personal information from the victim
- malicious computer worm that targets a specific type of control system
- software designed intentionally to be intrusive and destructive to a computer or network
- software that attaches itself to other software and spreads when someone runs an infected program.
22 Clues: biological characteristics unique to an individual • the assurance that private data will remain private • gaining unauthorized access to data in a system or computer • the assurance that data will not change without authorization • irrelevant or inappropriate messages sent in bulk to recepients • criminal activity that involves the use of a computer r a network • ...
Tech puzzle 2023-02-26
Across
- A software program that allows you to surf the web
- reality ____________ reality is the integration of digital information with live video
- Give one example of a game that used unity and C#
- What protects your computer from hackers
- Primary memory is also known as _______ memory
- the primary component of a computer that acts as its “control center.”
- _______ is the way of sending messages over the Internet
- What technology was used in avengers end game
- Which technology is used in Brahmastra movie
- Protection of computer system and information from harm theft and unauthorised use
- what’s the name of Tony Stark’s computer that features advanced artificial intelligence
- Smallest unit of measurement in computing
Down
- RAM stands for _______ access memory
- The initial program that runs when a computer is powered up or rebooted
- Visual display unit is also called
- What is a document sent with with an email message ?
- This number system has a base 8
- What is the #1 social media app
- Is temporarily stored on your computer
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the univerals gates.
- computing the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- _________________ protects your computer from viruses and hackers
- An incredibly powerful tool used to get meaning out of vast amounts of data
- A chatbot developed by openAI and launched in November 2022
- An interrupt triggered by a software
- Hyperlink is a saved link to a particular web page
27 Clues: This number system has a base 8 • What is the #1 social media app • Visual display unit is also called • RAM stands for _______ access memory • An interrupt triggered by a software • Is temporarily stored on your computer • What protects your computer from hackers • Smallest unit of measurement in computing • Which technology is used in Brahmastra movie • ...
Envision Crossword 2024-02-29
Across
- : Who famously exclaimed "Eureka!" when he discovered the principle of buoyancy while taking a bath?
- : What term describes a startup company valued at over $1 billion?
- : What mountain range serves as a natural barrier between Italy and Switzerland?
- : What geological feature erupts molten rock, ash, and gases from beneath the Earth's surface?
- : What branch of mathematics deals with symbols and the rules for manipulating those symbols?
- : Which prolific composer from the Classical era created over 600 works, including operas, symphonies, and concertos?
- : What field focuses on protecting computer systems, networks, and data from unauthorized access or attacks?
- : What is the planned sequence of learning experiences designed to achieve specific educational goals?
- : What city in Japan was devastated by the first wartime use of an atomic bomb?
- : Who proposed the concept of the "Neuralink," a brain–computer interface technology?
Down
- : What term refers to the process of designing, launching, and running a new business?
- : Who is the protagonist of a popular anime series about a young ninja striving for recognition and aiming to become the strongest ninja in his village?
- : What traditional teaching tool consists of a dark surface on which teachers can write with chalk?
- : What is a set of instructions designed to perform a specific task?
- : What sport is traditionally played with an oval-shaped ball?
- : What area of the school provides meals and a place for students to eat?
- : Who developed the theory of special relativity, which describes the relationship between space and time?
- : What is the first and most well-known cryptocurrency?
- : What term refers to ownership interest in a company, typically represented by shares of stock?
- : Which tennis tournament is played on grass courts?
20 Clues: : Which tennis tournament is played on grass courts? • : What is the first and most well-known cryptocurrency? • : What sport is traditionally played with an oval-shaped ball? • : What term describes a startup company valued at over $1 billion? • : What is a set of instructions designed to perform a specific task? • ...
technology and innovation vocabulary for IELTS bumper crossword (2) www.atomicielts.com 2024-09-01
Across
- to go -----; spreading quickly and widely on the internet (5)
- data-driven decisions are decisions or ------- based on data analysis (7)
- ----- computing; using the internet to store and access data and programs (5)
- e-learning is learning conducted via electronic media, typically on the --------(8)
- growing --------; when more and more people are becoming curious or involved in something (8)
- research methodology; the ------- or methods used in research (7)
- automation ------; the effect of using machines and technology to do jobs once done by people (6)
- digital --------; the ability to use technology and understand digital information (8)
- different forms of content like text, video, and audio together (10)
Down
- proving that something is true or meets a standard (10)
- ----- technology; technology that is environmentally friendly (5)
- a digital record of transactions that is secure and cannot be changed (10)
- user -------- designs; designing products with the needs of the user in mind (7)
- cybersecurity is protecting --------- and data from theft or damage (9)
- ------- transformation; the use of technology to change how a business or society operates (7)
- ----- cities; cities that use technology to improve services and quality of life (5)
- to change something in a big way (9)
- --------- biology is creating new biological parts or systems that do not exist in nature (9)
- pharmacogenomics is how a person’s ----- affect their response to drugs (5)
- ------- concerns are worries about how personal information is used or shared online (7)
- telecommuting is working from home using the internet to connect with the office (4)
- gene ------- is creating new biological parts or systems that do not exist in nature (7)
22 Clues: to change something in a big way (9) • proving that something is true or meets a standard (10) • to go -----; spreading quickly and widely on the internet (5) • ----- technology; technology that is environmentally friendly (5) • research methodology; the ------- or methods used in research (7) • different forms of content like text, video, and audio together (10) • ...
Technology crossword. 2023-06-07
Across
- standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- are small blocks of data created by a web server while a user is browsing
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information,
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain (for example, a range of integers) to bits.
- is a bitmap image format that was developed by a team at the online services
- is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- is a commonly used method of lossy compression for digital images
- Android is a mobile operating system
Down
- is an American multinational technology company
- is a hardware or software component that stores data so that future requests for that data can be served faster;
- also called a central processor or main processor
- is a collection of discrete values that convey information
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the protection of computer systems and networks
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a method of transmitting and receiving messages using electronic devices.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
20 Clues: Android is a mobile operating system • is an American multinational technology company • also called a central processor or main processor • is the protection of computer systems and networks • is a collection of discrete values that convey information • is a commonly used method of lossy compression for digital images • ...
Data Protection 2022-09-19
Across
- To gather compromised information and/or defense secrets
- Individuals who want to attack computers yet lack the knowledge
- Following a victim with authorized credentials through a door or other secure building access point
- Data at rest
- Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
- Designed to hold a computer system or the data it contains captive until a payment
- A security breach can have a negative long-term impact on an organization’s _________
- More targeted version of the phishing
- Employees, contract staff or trusted partners
- Telling a computer to perform some task using CLI
- Cyberwarfare can destabilize a nation
Down
- an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
- Preventing unwanted changes or alteration
- Network, Devices, Power Grid, Roads
- Data traveling between information systems
- A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
- Core Principles of Cybersecurity
- Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
- Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
- Amateurs or skilled attackers outside of the organization
- Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
- Breaks into networks or computer systems to identify and improve any weaknesses
- Technique used on unshredded documents
- Make political statements in order to raise awareness about issues
- Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems
25 Clues: Data at rest • Core Principles of Cybersecurity • Network, Devices, Power Grid, Roads • More targeted version of the phishing • Cyberwarfare can destabilize a nation • Technique used on unshredded documents • Preventing unwanted changes or alteration • Data traveling between information systems • Employees, contract staff or trusted partners • ...
RU ITEC411 Chapter 5 2025-03-19
Across
- the use of computer hacking for politically or socially motivated purposes
- a cyberattack that uses fake calls to trick people into giving sensitive information
- an act that makes it so that gambling businesses cannot knowingly accept bets/wagers from people over the internet
- an international organization that allows people to buy services from other countries as long as its legal in their own
- Unique physiological or behavioral characteristics that are used to verify the identity of a person
- a software used to prevent/delete viruses from a computer
- a cyberattack that uses fake texts to trick people into giving sensitive information
- a computer worm that targets control systems and was thought to be the cause of the damage to the nuclear program of Iran
- people who are considered cybersecurity professionals who use their skills show system vulnerabilities
- a security barrier that monitors incoming and outgoing network traffic
- a law made to help with national security by creating more government surveillance
Down
- a cyberattack that uses fake emails to trick people into giving sensitive information
- a type of program designed to prevent/find unwanted spyware programs
- a decoy system designed to trap potential attackers
- The act of going to a foreign place with libel laws so the person can sue
- a cyberattack that uses fake websites to trick people into giving sensitive information
- the act of breaking unto digital devices intentionally
- a cyberattack that makes a computer resource unavailable to users by overwhelming it with traffic
- the illegal acquisition and use of a person's identifying information
- a bill passed in the US that fixed the existing computer fraud law
20 Clues: a decoy system designed to trap potential attackers • the act of breaking unto digital devices intentionally • a software used to prevent/delete viruses from a computer • a bill passed in the US that fixed the existing computer fraud law • a type of program designed to prevent/find unwanted spyware programs • ...
BUAW Crossword 2024-11-12
Across
- The act of adhering to laws, regulations, and standards.
- An official examination and verification of financial accounts and records.
- A portion of a company's earnings distributed to shareholders.
- Any individual or group that has an interest in the operations of a business.
- The act of reporting illegal or unethical practices within an organization, often to an external body or regulatory agency.
- The process of distributing decision-making power away from a central authority to smaller, localized units.
- A digital or virtual currency that uses cryptography for security.
- A method for identifying and assessing risks through Threat, Assessment, Risk, and Action.
- A business structure where two or more individuals share ownership and responsibility.
- The process of creating a unique identity for a product or company in the marketplace.
- The practice of conducting business in an open and accountable manner.
- The ability to maintain or improve business operations without depleting natural resources.
- A market structure dominated by a small number of large firms, leading to limited competition.
Down
- A market state where supply and demand are balanced.
- A company’s financial obligations or debts.
- The combination of two or more companies into one entity.
- The availability of assets to meet short-term obligations
- The value of ownership interest in a business, after liabilities are subtracted.
- Financial assets used by a business to fund its operations and growth.
- A decentralized digital ledger technology used for secure, transparent transactions, often associated with cryptocurrency.
- The practice of contracting external parties to perform business functions or services.
- The practice of protecting computer systems and networks from digital threats such as hacking, malware, and data breaches.
- Rules or laws created to control or govern business practices.
23 Clues: A company’s financial obligations or debts. • A market state where supply and demand are balanced. • The act of adhering to laws, regulations, and standards. • The combination of two or more companies into one entity. • The availability of assets to meet short-term obligations • A portion of a company's earnings distributed to shareholders. • ...
TTS29X_D 2025-04-22
Across
- Istilah yang digunakan untuk menggambarkan tanda yang digunakan untuk membedakan produk atau jasa
- Proses untuk memperoleh perlindungan HAKI di beberapa negara
- Scientist Ahli yang mengelola data besar menggunakan berbagai algoritma dan analisis
- Proses memeriksa apakah konten yang ada melanggar kebijakan atau hukum
- Istilah yang digunakan untuk menggambarkan proses produksi konten digital yang melibatkan kolaborasi antara kreator konten dan komunitas budaya tertentu.
- Sebutkan satu contoh platform media sosial yang populer digunakan untuk membagikan konten digital berbasis budaya
- Jenis konten yang dapat mengganggu kenyamanan atau melanggar etika
- Pekerjaan yang mengembangkan perangkat lunak untuk berbagai keperluan
- Istilah yang digunakan untuk menggambarkan penyebaran konten digital yang cepat dan luas melalui media sosial
- Jenis HAKI yang melindungi penemuan dan inovasi teknologi
- Orang yang bekerja untuk mengelola basis data dan memastikan integritasnya
- Profesi yang menangani keamanan sistem komputer dan jaringan
- Sintaks pencarian untuk mencari cache halaman web
Down
- Kegiatan yang dilakukan untuk meninjau dan menghapus konten yang tidak sesuai
- Profesi yang bertugas mengelola dan merawat jaringan komputer
- Sintaks pencarian untuk mencari kata dalam teks halaman
- Pemeriksaan terhadap gambar, video, atau teks untuk menghindari penyebaran kebencian
- Perangkat atau sistem yang digunakan untuk mendeteksi konten berbahaya
- Lembaga internasional yang menangani HAKI
- Sebutkan satu contoh platform online yang dapat digunakan untuk membagikan konten digital berbasis budaya
- Sintaks pencarian untuk mencari hasil pencarian yang terkait dengan kata tertentu
- Sebutkan satu contoh jenis konten digital yang dapat digunakan untuk mempromosikan budaya lokal
- Cipta Istilah yang digunakan untuk menggambarkan hak eksklusif yang diberikan kepada pencipta karya intelektual
- Sintaks pencarian untuk mencari kata dalam judul halaman
- Sintaks pencarian untuk mencari kata dalam URL
25 Clues: Lembaga internasional yang menangani HAKI • Sintaks pencarian untuk mencari kata dalam URL • Sintaks pencarian untuk mencari cache halaman web • Sintaks pencarian untuk mencari kata dalam teks halaman • Sintaks pencarian untuk mencari kata dalam judul halaman • Jenis HAKI yang melindungi penemuan dan inovasi teknologi • ...
Internet Safety 2025-02-26
Across
- Editing an image
- Criminal activities carried out by means of computers or the internet.
- Online grooming is when someone uses the internet to build a relationship with a young person, with the intention of assault
- The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user
- The fraudulent practice of sending emails or other messages Purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Using all caps
- Bullying online
- The correct or acceptable way of communicating on the internet.
- A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
- A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
Down
- Someone who uses the internet to commit sexual acts towards children
- The intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes
- Using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- Joking about someone online
- Conversation
- Downloading and distributing copyrighted works digitally without permission
- Unique trail of data that a person creates while using the internet.
- Protecting networks, devices, and data from unauthorized access or criminal use
20 Clues: Conversation • Using all caps • Bullying online • Editing an image • Joking about someone online • The correct or acceptable way of communicating on the internet. • Someone who uses the internet to commit sexual acts towards children • Unique trail of data that a person creates while using the internet. • ...
Abdoulaye's word puzzle 2025-02-27
Across
- talk in a friendly and informal way.
- (short for weblog) Blog is an abbreviation of “weblog”
- Flame trolling is the posting of a provocative or offensive message, known as flamebait
- shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
- the intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes.
- an animal that naturally preys on others.
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- Typing in all CAPPPSSS!!!!!!.
- Theft identity theft can sometimes be a component of impersonation
- using the Internet, email, or other electronic communications to stalk someone.
Down
- the unique trail of data that a person or business creates while using the internet
- sending,posting, or sharing negative, harmful, false, or mean content about someone else.
- the correct or acceptable way of communicating on the internet.
- unauthorized reproduction or distribution of someone's intellectual property without their consent.
- small text files that websites store on your computer to remember information about you and your browsing activity
- the practice of protecting systems, networks, and programs from digital attacks.
- the practice of preparing or training someone for a particular purpose or activity.
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- Settings controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
20 Clues: Typing in all CAPPPSSS!!!!!!. • talk in a friendly and informal way. • an animal that naturally preys on others. • (short for weblog) Blog is an abbreviation of “weblog” • the correct or acceptable way of communicating on the internet. • Theft identity theft can sometimes be a component of impersonation • ...
Crossword Puzzle 2025-03-04
Across
- The percentage of available hotel rooms sold
- – A type of event that is a mix of in-person and virtual event experiences
- A diagram showing a process step by step
- Direct _______ Conversion - Immediate switch from an old system to a new one
- A tiny chip used for tracking objects and individuals
- _______ Meetings - Online gatherings where participants join remotely
- A type of expense that is tied to a specific project or service
- A type of conversion but while running both old and new systems simultaneously
- – A type of communication that leverages wireless technology and is used for contactless payments and access control
- (2 words) Large and complex datasets used for trend analysis
- (2 words) Unauthorized access or release of personal data
- An Analysis that assesses emotions in digital communications
- (2 words) An on-site assessment for planning or evaluation purposes
- Costs which are unexpected expenses and not initially considered
- _______ Rate - A measure of interaction with online content
- Small files websites use to track visitor activity
Down
- (2 words) A system offering rewards for repeat customers
- Protecting digital systems from unauthorized access
- The right to control personal information
- Costs that are expenses which are not directly linked to a specific project or service
- _______ Recognition - Technology that identifies attendees based on facial features
- A type of pricing whereby the manager adjusts prices based on demand and consumer data
- A set of rules a computer follows to process data
- _______ Retrieval Systems - Tools used to capture attendee contact information at events
- _______ Learning - AI that improves its performance through experience
- Scrambling data to protect sensitive information
- Event _______ - Digital or printed identification for event attendees
- The amount of data a network can handle at one time
28 Clues: A diagram showing a process step by step • The right to control personal information • The percentage of available hotel rooms sold • Scrambling data to protect sensitive information • A set of rules a computer follows to process data • Small files websites use to track visitor activity • Protecting digital systems from unauthorized access • ...
INFLUENCE OF SOCIAL MEDIA IN INDIA 2025-03-05
Across
- Study of mechanical principles in biological systems
- Technology that overlays digital elements in the real world
- Materials that change properties in response to environmental conditions
- Manipulation of matter on an atomic and molecular scale
- Computing systems inspired by human brain functioning
- Unmanned aerial vehicles that operate without direct human control
- The use of technology to perform tasks with minimal human intervention
- Technology that creates three-dimensional objects layer by layer
- Machines designed to simulate human intelligence
- Protection of internet-connected systems from cyber threats
- Cars powered by electricity instead of fossil fuels
- Vehicles that operate without human intervention using AI and sensors
- Network of physical devices connected to the internet for data exchange
Down
- A decentralized digital ledger for secure transactions
- Analysis of vast amounts of structured and unstructured data
- Environmentally friendly innovations for sustainability
- Urban development integrating IoT and sustainable technology
- The use of living organisms for technological advancements
- Engineering innovations for space travel and research
- Remote servers providing computing resources over the internet
- Algorithms that allow computers to learn from data and improve over time
- The application of computer science in biological research
- Engineering that designs and builds robots for various applications
- Electronic devices worn on the body for health and communication
- A new computing paradigm using quantum mechanics principles
- A simulated experience that can be similar to or completely different from reality
- Modifying genetic material to create desired biological traits
- Engineering solutions focused on reducing carbon footprint
- Energy sources that are naturally replenished, such as solar and wind
- The next-generation wireless network for faster data transfer
30 Clues: Machines designed to simulate human intelligence • Cars powered by electricity instead of fossil fuels • Study of mechanical principles in biological systems • Engineering innovations for space travel and research • Computing systems inspired by human brain functioning • A decentralized digital ledger for secure transactions • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
PROTECT YOUR PRIVACY 2025-01-09
Across
- something that the FBI and CIA and NSA claim to protect us from
- NSA program that allowed telecommunication companies to turn over customer data
- this group was surveilled under the COINTELPRO program
- house leader who was very critical of the FBI and J. Edgar Hoover who later disappeared in a mysterious plane vanishing in Alaska
- the practice of protecting systems devices and data from cyber attacks
- collects and analyzes real time internet data
- something the FBI and the CIA commit
- profoundly immoral and wicked
- this group was surveilled under the COINTELPRO program
- president who signed the Executive Order 12,333
- secretly monitoring and recording a person's communications
- in 2013 this whistleblower leaked NSA documents
- group of seven judges picked by the Chief Justice who review government requests for warrants to authorize electronic surveillance for foreign agents or American citizens suspected of involvement in espionage
- transmits a mobile phone's location via hidden text message
Down
- edited in order to obscure or remove information
- something the FBI and NSA do
- how long before the parkland shooting that the FBI received a tip
- a key reason for the COINTELPRO program
- director of the NSA
- group of lawyers that has struggled to rein in the illegal surveillance by the government
- what the FBI did to MLK
- collects mobile phone location data and eavesdrops
- this person was murdered by a member of the KKK who was also an FBI informant
- FBI surveillance and neutralization program of lawful political dissent
- this group was surveilled under the COINTELPRO program
- carry out a systematic or formal inquiry to discover and examine the facts
- act that allowed the government to collect a record of every single phone call made by every single American "on an ongoing daily basis"
27 Clues: director of the NSA • what the FBI did to MLK • something the FBI and NSA do • profoundly immoral and wicked • something the FBI and the CIA commit • a key reason for the COINTELPRO program • collects and analyzes real time internet data • president who signed the Executive Order 12,333 • in 2013 this whistleblower leaked NSA documents • ...
