cybersecurity Crossword Puzzles

THIS ONE'S FOR TATI! 2025-03-12

THIS ONE'S FOR TATI! crossword puzzle
Across
  1. It follows Shetland & Old English in the names of dog breeds used to guide other animals
  2. A ransomware attack that encrypted 3,800 City of Atlanta computers demanded 6 of these digital items to unfreeze them
  3. In real life, it can slow the spread of flames and smoke; in your digital life, it blocks unauthorized access to your private data
  4. Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
  5. Breeds of this dog group include the Airedale & Bedlington
  6. "Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears"
  7. A Rand Corp. blog post says this, the "bedrock of most cybersecurity measures", is at risk when quantum computing scales up
Down
  1. The tallest of the working breeds, it's Pennsylvania's state dog; William Penn is said to have owned one
  2. Don't click on that link, dummy! You could fall prey to this common scam, which "lures" you into revealing private info
  3. This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
  4. The heaviest of dog breeds, it can exceed 180 pounds
  5. This hunting hound is the state dog of Virginia

12 Clues: This hunting hound is the state dog of VirginiaThe heaviest of dog breeds, it can exceed 180 poundsBreeds of this dog group include the Airedale & BedlingtonIt follows Shetland & Old English in the names of dog breeds used to guide other animals"Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears"...

Principles of IT Terms 2023-08-23

Principles of IT Terms crossword puzzle
Across
  1. components of a computer system, such as the central processing unit (CPU), memory, storage devices, and input/output devices.
  2. process of converting data into a code to prevent unauthorized access.
  3. Computing/Storing and accessing data and programs over the internet rather than on local computers.
  4. Technology/The use of computers, networks, software, and other technologies to manage and process information.
  5. structured collection of data that can be easily accessed, managed, and updated.
  6. Experience (UX):** The overall experience and satisfaction that a user has while interacting with a product or system.
  7. Interface (UI):** The visual and interactive elements that allow users to interact with software or hardware.
  8. and selling goods and services over the internet.
Down
  1. and applications that run on computer hardware to perform specific tasks.
  2. and fixing errors or bugs in software code.
  3. collection of connected devices and communication pathways that allow them to share resources and information.
  4. instructions in a programming language to create software applications or automate tasks.
  5. System/Software that manages computer hardware and provides services for other software applications.
  6. standard language for creating web pages and web applications.
  7. and measures to protect computer systems, networks, and data from cyber threats.
  8. Citizenship/The responsible and ethical use of technology, including online behavior, digital etiquette, and privacy considerations.
  9. Analytics/The process of examining and interpreting data to gain insights and make informed decisions.
  10. step-by-step procedure or formula for solving a problem or completing a task.

18 Clues: and fixing errors or bugs in software code.and selling goods and services over the internet.standard language for creating web pages and web applications.process of converting data into a code to prevent unauthorized access.and applications that run on computer hardware to perform specific tasks....

Compliance & Security Week 2023-11-16

Compliance & Security Week crossword puzzle
Across
  1. It's like your underwear; don't share it with anyone and change it at least every 90 days
  2. Nasty software that can have a bad impact on your device or network
  3. What is HIPAA's (and DDID's) minimum training requirement for employees
  4. Unwanted emails or messages that usually try to sell you something
  5. What department (or Shane) should you report a suspected HIPAA breach to
  6. Universal Serial Bus, or a flash drive that you should never stick in a work computer
  7. What HIPAA rule protects individual rights
  8. A type of malicious software designed to block access until a sum of money is paid
Down
  1. Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
  2. The Health Act passed to protect individual's medical/dental records and other PHI
  3. A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
  4. Every aspect of protecting an organization and its employees/assets against cyber threats
  5. How should you send an email to outside recipients that contains PHI
  6. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  7. The additional ways DDID uses to stop hackers getting into our system, even if they know your password
  8. An email that tricks you into clicking on a link or opening an attachment
  9. Using a device to gain unauthorized access to data in a system

17 Clues: What HIPAA rule protects individual rightsUsing a device to gain unauthorized access to data in a systemUnwanted emails or messages that usually try to sell you somethingNasty software that can have a bad impact on your device or networkHow should you send an email to outside recipients that contains PHI...

IT_KD 2023-12-04

IT_KD crossword puzzle
Across
  1. A networking device that directs data traffic between different computer networks.
  2. A high-level programming language known for its readability and versatility.
  3. The process of identifying and fixing errors or bugs in software code.
  4. A widely-used programming language that adds interactivity and dynamic content to web pages.
  5. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  6. A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
  7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. The delivery of computing services, including storage, processing power, and software, over the internet.
  2. The standard markup language for creating web pages and web applications.
  3. A set of rules and tools for building software applications, enabling them to communicate with each other.
  4. A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
  5. A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
  6. The process of converting information into a code to secure it from unauthorized access or use.
  7. A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
  8. Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.

15 Clues: The process of identifying and fixing errors or bugs in software code.The standard markup language for creating web pages and web applications.A high-level programming language known for its readability and versatility.A networking device that directs data traffic between different computer networks....

Trends 2021 2021-01-11

Trends 2021 crossword puzzle
Across
  1. Acronym for the current industry revolution.
  2. Term referring to new way for employees, starting with the acronym WFH
  3. Increasing cry amongst internet and social media users to protect their data _______.
  4. South Africa will receive 1 million doses of this from India at the end of January to combat Covid 19
  5. Customers continue to have high service expectations and have become smarter and more impatient. Companies must deliver on this (hint Cx)
  6. One of the larger international streaming partners available in South Africa
  7. A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
  8. A constant state of the unknown making it difficult to predict the future. Opposite of certainty.
  9. AWS, Google, Microsoft all offer this service where everything is hosted in the ______
  10. What comes after 4G? Vodacom and MTN launched it in 2020.
Down
  1. Umbrella tech term top of the IT agenda to ensure integrity and safety of network
  2. A freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
  3. Two common words for new age term for machine learning often shortened to two letters
  4. Something most people make up in the beginning of January, but most broken later in the year
  5. New technology trend which is “smart” and happening closer to the source or locality (hint on the "----" of my seat)

15 Clues: Acronym for the current industry revolution.What comes after 4G? Vodacom and MTN launched it in 2020.Term referring to new way for employees, starting with the acronym WFHOne of the larger international streaming partners available in South AfricaUmbrella tech term top of the IT agenda to ensure integrity and safety of network...

Puzzle No. 2 2022-09-06

Puzzle No. 2 crossword puzzle
Across
  1. A string of characters used to verify the identity of a user during the authentication process.
  2. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  3. Ensuring that authorized users have access to information and associated assets when required.
  4. Sentence-like format of password which is strong but easier to remember.
  5. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  6. You should not write down your password in this type of physical medium.
Down
  1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Safeguarding the accuracy and completeness of information.
  4. Complete the sentence: ________ is everyone’s responsibility.
  5. A weakness in your security policy, implementation, design, and controls.
  6. These fix general software problems and provide new security patches where criminals might get in.
  7. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  8. An event that will cause harm to you or your asset.
  9. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.

15 Clues: An event that will cause harm to you or your asset.Safeguarding the accuracy and completeness of information.Complete the sentence: ________ is everyone’s responsibility.Sentence-like format of password which is strong but easier to remember.You should not write down your password in this type of physical medium....

The hardest crossword puzzle EVERRR 2022-11-16

The hardest crossword puzzle EVERRR crossword puzzle
Across
  1. Someone fraudulently trying to gain access to an unauthorized system.
  2. Any security practice put in place to mitigate a security event or incident from occurring.
  3. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
  4. Most useful tool in cybersecurity, pretty much.
  5. The practice of utilizing trial and error to guess credentials.
  6. Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
  7. Copies of data
  8. A condiment
  9. describes a minor disruption to the digital landscape that is thought to be unintentional
Down
  1. A data file through which the identity, authenticity and reliability of a website or web application is established.
  2. Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
  3. A possibility of being attacked or harmed
  4. responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
  6. A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.

15 Clues: A condimentCopies of dataA possibility of being attacked or harmedMost useful tool in cybersecurity, pretty much.The practice of utilizing trial and error to guess credentials.Someone fraudulently trying to gain access to an unauthorized system.Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?...

Compliance & Security Week Take 2 2025-11-13

Compliance & Security Week Take 2 crossword puzzle
Across
  1. What is a digital "wall" that keeps bad guys out of our network?
  2. What is the type of data HIPAA protects?
  3. What do we have monitoring the security of our buildings?
  4. What is required when PHI is disclosed beyond treatment, payment, or operations?
  5. What is it when a bad threat actor gains unauthorized access to a system or building?
  6. Who is the person who reviews all reported emails?
  7. Where do you receive points for competing in Compliance and Cybersecurity week?
  8. What is the state of being informed about potential risks and company policies so you can make smart, safe choices every day?
  9. What is it when a bad actor covers up a good QR code with one that will send you to a fake payment site?
Down
  1. What is a common workplace rule that requires locking before leaving your desk?
  2. What is a formal review of tasks done to confirm they're in compliance?
  3. What is a weakness in a system that can be exploited and has a CVE library?
  4. What is the law protecting patient health information?
  5. What you need after having to do all the compliance trainings and shenanigans? (a break from work somewhere)
  6. What is a beverage that fuels many morning meetings?
  7. What is a quick-ish fix for software vulnerabilities?
  8. What do we call the process of converting data into a secure code to protect it?
  9. What is a word puzzle that challenges your brain?
  10. What is a quick way to spot a phishing email at DDID/AHS? (Sender's...?)

19 Clues: What is the type of data HIPAA protects?What is a word puzzle that challenges your brain?Who is the person who reviews all reported emails?What is a beverage that fuels many morning meetings?What is a quick-ish fix for software vulnerabilities?What is the law protecting patient health information?...

Definitions 2025-02-13

Definitions crossword puzzle
Across
  1. One (sound) sample per second;
  2. A structured/organised set/collection of data // A (persistent) store/file of structured/organised data;
  3. controls / manages / runs the computer//enables the computer to function//manages the computer hardware / application software//provides a platform for other software / provides a platform to run application software;
  4. A database with multiple tables; that are linked together // that reference each other;
  5. (Malware is a blanket/umbrella term for) computer software/program/code; with malicious/hostile/intrusive intent;
  6. The processes / practices / technologies / measures designed to protect networks / computers / programs / data; from attack / damage / unauthorised access;
  7. Single point in an image;//Smallest (addressable) part / bit of an image//
  8. A computer system with a dedicated/specific purpose or function; built in to a physical product/device/machine;
  9. The number of bits per sample
  10. A field in one table; that is a primary key in another table;
Down
  1. retains data when power is lost / does not lose its contents when power is lost;
  2. Physical / electrical / electronic Component(s) / part(s) / element (of a computer system);
  3. The art of manipulating people so they give up confidential information.
  4. program / code / instructions (executed by / controls the operation of the hardware);
  5. A sequence / series of steps / instructions; (that can be followed) to complete a task / to solve a problem;
  6. for (end) user tasks;
  7. (A set of) rules; that allow devices / networks to communicate / transfer data;
  8. Removing unnecessary detail/information/data from the problem/task;
  9. a group/collection/number of computers; A. devices (that contain CPUs) connected/linked together;

19 Clues: for (end) user tasks;The number of bits per sampleOne (sound) sample per second;A field in one table; that is a primary key in another table;Removing unnecessary detail/information/data from the problem/task;The art of manipulating people so they give up confidential information....

Financial Risk Management 2024-07-15

Financial Risk Management crossword puzzle
Across
  1. risk -, demonstrating how commodity price volatility can impact the global economy.
  2. risk -can enhance resilience through redundant systems
  3. Risk -proactive legal compliance measures.
  4. Risk -This can lead to forced selling at unfavourable prices, potentially triggering margin calls
  5. Risk -This contributed to the crisis by forcing banks to sell assets at fire-sale prices
  6. Risk -Companies can mitigate this through regular safety inspections
  7. risk - The investor may have to accept a significant price discount or spread their sales
  8. Risk -This could lead to increased loan defaults, requiring higher loan loss provisions and potentially impacting the bank's capital adequacy and profitability
  9. Risk -highlighting the importance of understanding creditor priorities.
  10. Risk -This can lead to ETF prices deviating from their underlying asset values, potentially causing losses
  11. rate risk -This risk affects longer-duration bonds more severely than shorter-duration bonds
Down
  1. risk-To mitigate this, institutions can implement robust cybersecurity
  2. risk - Investors can mitigate this through diversification, hedging strategies, and maintaining a long-term investment horizon.
  3. Risk -The higher yields compensate investors for the increased risk of default associated with these lower-rated bonds.
  4. Risk -The bank could manage this through careful due diligence, ongoing monitoring, securing collateral, and potentially syndicating the loan
  5. Risk -potentially forcing some investors to sell and causing bond prices to fall.
  6. risk-This highlights how currency fluctuations can impact international investments.
  7. Risk -This can force the REIT to seek alternative funding sources, potentially at higher costs
  8. risk-This risk affects the entire market and is difficult to diversify away, as it impacts all sectors
  9. risk-. Banks can implement strict compliance procedures to mitigate the risk

20 Clues: Risk -proactive legal compliance measures.risk -can enhance resilience through redundant systemsRisk -Companies can mitigate this through regular safety inspectionsrisk-To mitigate this, institutions can implement robust cybersecurityRisk -highlighting the importance of understanding creditor priorities....

Privacy Cross Word 2024-01-12

Privacy Cross Word crossword puzzle
Across
  1. A state of being in solitude or separated from the environment or society, commonly used in contexts like quarantine or solitary confinement.
  2. The action of making new or secret information known, especially in legal or corporate settings.
  3. An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems.
Down
  1. Unsolicited and typically irrelevant or inappropriate messages sent over the Internet, usually to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  2. The quality of being able to be used or obtained;
  3. A secret word or phrase that must be used to gain admission to something, typically a cornerstone of digital security.
  4. An instance of intruding, especially illegally or without permission, into a system or place, often in the context of privacy or cybersecurity.

7 Clues: The quality of being able to be used or obtained;The action of making new or secret information known, especially in legal or corporate settings.An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems....

Modules 18 to 20 Crossword 2023-03-31

Modules 18 to 20 Crossword crossword puzzle
Across
  1. Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
  2. A weakness in a system or its design that could be exploited by a threat actor.
  3. BYOD means Bring Your Own ____
  4. This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
  5. The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
  1. Any potential danger to an asset.
  2. This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
  3. This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
  4. A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
  5. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.

10 Clues: BYOD means Bring Your Own ____Any potential danger to an asset.A weakness in a system or its design that could be exploited by a threat actor.This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector....

Cyber Law 2021-09-04

Cyber Law crossword puzzle
Across
  1. It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
  2. regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
  3. 'citizen of the internet' can be called__
  4. which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
  5. It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
  1. It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
  2. The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
  3. you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
  4. it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
  5. It is a conversion of data,document and processes from analog to digital

10 Clues: 'citizen of the internet' can be called__It is a conversion of data,document and processes from analog to digitalIt refers to the adoption or increase in use of computer technology by an organization,Industry etc.It can be thought of as a global electronic village with instantaneous communication and no geographical barriers...

Puzzle - 3 2022-10-10

Puzzle - 3 crossword puzzle
Across
  1. The core of a computer's operating system that houses the most essential functions of the computer
  2. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
  3. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. a type of malware that is aimed to infect and harm a file, a system or a network
  5. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
  1. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. Customizable additions to software for extra functionality
  4. string of characters used to verify the identity of an user during the authentication process
  5. a program that can automatically perform some simple repeated task to reach a pursued goal.

10 Clues: Customizable additions to software for extra functionalitya type of malware that is aimed to infect and harm a file, a system or a networka program that can automatically perform some simple repeated task to reach a pursued goal.string of characters used to verify the identity of an user during the authentication process...

CW_1 2022-10-11

CW_1 crossword puzzle
Across
  1. Comprised of any number and variety of interconnected devices
  2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. weaknesses in software programs that can be exploited by hackers to compromise computers.
  4. string of characters used to verify the identity of a n user during the authentication process
  5. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  6. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
  1. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. a network security system that filters unsanctioned incoming and outgoing traffic.
  4. a type of malware that is aimed to infect and harm a file, a system or a network

10 Clues: Comprised of any number and variety of interconnected devicesa type of malware that is aimed to infect and harm a file, a system or a networka network security system that filters unsanctioned incoming and outgoing traffic.weaknesses in software programs that can be exploited by hackers to compromise computers....

ADSI Juan Pablo Robayo 2022-02-11

ADSI Juan Pablo Robayo crossword puzzle
Across
  1. the practice of tricking Internet users (as through the use of deceptive email messages or websites)
  2. thing made for a particular purpose, especially a piece of mechanical or electronic equipment. For example an keyboard.
  3. is a programming language commonly used in web development.
  4. refers to a system of connected computers and other devices such as printers that exchange data with each other.
Down
  1. when talking about transferring data or information from a main computer source to another device or transferring information from the cloud.
  2. a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems
  3. is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  4. is defined as a framework with a set of best practices for delivering efficient IT support services.
  5. mean making a copy of data and files to protect them against accidental loss.
  6. is a framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.

10 Clues: is a programming language commonly used in web development.mean making a copy of data and files to protect them against accidental loss.the practice of tricking Internet users (as through the use of deceptive email messages or websites)is defined as a framework with a set of best practices for delivering efficient IT support services....

Teka-Teki Silang Seputar Materi Informatika 2025-08-24

Teka-Teki Silang Seputar Materi Informatika crossword puzzle
Across
  1. Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
  2. Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
  3. Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
  4. Perangkat keras yang digunakan untuk memproses data.
  5. Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
  6. Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
Down
  1. Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
  2. lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
  3. Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
  4. Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.

10 Clues: Perangkat keras yang digunakan untuk memproses data.Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya....

Chapter 2- TYPES OF ATTACKS 2022-09-10

Chapter 2- TYPES OF ATTACKS crossword puzzle
Across
  1. Contain tracking information for an individual email
  2. Fraud like Phishing, but it comes as a text message or SMS
  3. It is a deceptive scheme or trick used to cheat someone out of something
  4. It is merely an email trying to convince you to do something
  5. It is a phone scam designed to get your personal information by impersonating
  6. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  7. Threat that involves sending email messages with a fake sender address
  8. It is just like Phishing but it only targets specific individuals within an organization
Down
  1. It is news or knowledge received or given
  2. Help protect computer systems against cyber-attacks or unauthorized access
  3. A link that direct you to a fake login page, in the hope that you might enter your credentials
  4. Exclusively targets high-ranking individuals such as your BOSS within an organization
  5. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  6. It is a type of email attack where bad people are trying to steal your precious information
  7. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
  8. Unsolicited bulk messages normally from people trying to sell something
  9. An act of pretending to be another person for the purpose of commiting fraud

17 Clues: It is news or knowledge received or givenContain tracking information for an individual emailFraud like Phishing, but it comes as a text message or SMSIt is merely an email trying to convince you to do somethingThreat that involves sending email messages with a fake sender address...

iACE Crossword Puzzle 3 2021-11-08

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  3. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  4. An official inspection of an individual’s or organization’s accounts.
  5. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
  1. Unacceptable or improper behaviour, especially by an employee or professional person.
  2. ________ risk refer to the risk of inadequate employment practices and resource management.
  3. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  4. Wrongful or criminal deception intended to result in financial or personal gain
  5. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gainUnacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

iACE Crossword Puzzle 3 2021-11-09

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  2. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  3. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  4. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
  5. An official inspection of an individual’s or organization’s accounts.
Down
  1. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
  3. ________ risk refer to the risk of inadequate employment practices and resource management.
  4. Unacceptable or improper behaviour, especially by an employee or professional person.
  5. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gain.Unacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

Unit 6 Vocab Crossword 2021-09-28

Unit 6 Vocab Crossword crossword puzzle
Across
  1. offensive maneuver that targets computer information systems, computer networks, infrastructures
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
  4. are criminals who break into computer networks with malicious intent.
  5. slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
  6. the use of computer-based technique such as hacking as a form of civil disobedience
  7. a relatively unskilled individual who uses scripts or programs
  8. prevents someone watching your connection from knowing what websites you visit
  9. parts of the World Wide Web whose contents are not indexed by standard web search-engines.
  10. is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
  1. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  2. allows developers to discover and resolve bugs before the general public is aware of such bug
  3. a path or means by which an attacker or hacker can gain access to a computer or network server
  4. the gaining of unauthorized access to data in a system or computer.
  5. open-source software for enabling anonymous communication.

15 Clues: open-source software for enabling anonymous communication.a relatively unskilled individual who uses scripts or programsthe gaining of unauthorized access to data in a system or computer.are criminals who break into computer networks with malicious intent.prevents someone watching your connection from knowing what websites you visit...

ICT 2019-11-25

ICT crossword puzzle
Across
  1. A letter or note that you can send electronically
  2. You may request one of these if you wish to know that your e-mail has arrived safely
  3. The software application used to store all of the records of crimes and victims
  4. The person who the e-mail is from
  5. An e-mail can transmit one of these in an attachment
  6. Devices such as mobile phones, laptops, personal computers (PCs), printers, digital cameras, and video game consoles, can connect to each other and exchange information using Bluetooth protocol for wireless communication. Bluetooth can only be used for relatively short distances (a few metres).
  7. Acronym for the Police National Computer
  8. MSN is a method of ....-time communication
Down
  1. This type of junk e-mail is now becoming a major problem
  2. In order to send an e-mail, a person needs to have their own e-mail .......
  3. This type of conference enables people to see and hear one another
  4. This enables two people to hold a conversation
  5. An illicit attempt to trick individuals into handing over personal, confidential information.
  6. Important for cybersecurity, a Firewall is a hardware- or software-based system used as an interface between the internet and a (home or corporate) computer system, that monitors and filters incoming and outgoing traffic and block malware attacks.
  7. A paper based method of communication

15 Clues: The person who the e-mail is fromA paper based method of communicationAcronym for the Police National ComputerMSN is a method of ....-time communicationThis enables two people to hold a conversationA letter or note that you can send electronicallyAn e-mail can transmit one of these in an attachment...

Browsing Safely 2025-06-04

Browsing Safely crossword puzzle
Across
  1. The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
  2. An illegal entry into a computer system or network.
  3. A collection of technologies, processes, and data from attack, damage, or unauthorised access.
  4. It is an act of harming or harassing using information technology in a deliberate manner.
  5. Act of stealing and misusing someone's personal information.
  6. The receiver of a message is fooled into believing that message received by him is from a trusted source, which is actually not true.
Down
  1. Any criminal activity intended to harm anyone using a computer and an internet connection.
  2. Use of illegal methods to get money or other things that belong to a bank or its customers.
  3. Used yo conduct terrorism through the use of computers and internet in order to cause fear and panic.
  4. An impression you create when you engage in various online activities, like browsing, communicating with others, or uploading content.
  5. A crime in which the victim is attacked first and then forced to pay money to stop further attacks.
  6. The act of sending an email to a user; misleading him to believe that is from a trusted person or organisation.
  7. A set of programs that disrupts the normal functioning of a computer.

13 Clues: An illegal entry into a computer system or network.Act of stealing and misusing someone's personal information.A set of programs that disrupts the normal functioning of a computer.It is an act of harming or harassing using information technology in a deliberate manner....

Crossword 3 2024-07-25

Crossword 3 crossword puzzle
Across
  1. A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
  2. A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  3. A security concept that ensures that data is only accessible to those with authorized access.
  4. A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
  5. A security protocol that ensures privacy between communicating applications and their users on the internet.
  6. A type of firewall that filters traffic between a trusted and an untrusted network.
  7. A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
  1. A security measure that involves hiding internal IP addresses.
  2. A method used to verify the integrity and authenticity of a message, software, or digital document.
  3. A security model that enforces strict access controls and compartmentalization.
  4. A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
  5. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  6. A type of security threat that is disguised as legitimate software.

13 Clues: A security measure that involves hiding internal IP addresses.A type of security threat that is disguised as legitimate software.A security model that enforces strict access controls and compartmentalization.A type of firewall that filters traffic between a trusted and an untrusted network....

The IoT - Crossword 2021-04-19

The IoT - Crossword crossword puzzle
Across
  1. an event that makes it very difficult or changes the way things or a system usually works.
  2. things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
Down
  1. the part of a car that contains some of the controls used for driving and the devices for measuring speed and distance
  2. to make a process in a factory or office operate by machines or computers, in order to reduce the amount of work done by humans and the time taken to do the work
  3. a subject or problem that people are thinking and talking about
  4. someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
  5. an object or machine that has been invented for a particular purpose
  6. having the abilities needed to do an activity or job well

8 Clues: having the abilities needed to do an activity or job wella subject or problem that people are thinking and talking aboutan object or machine that has been invented for a particular purposean event that makes it very difficult or changes the way things or a system usually works....

Technology Terminologies 2023-04-28

Technology Terminologies crossword puzzle
Across
  1. The process of designing, writing, testing, and maintaining computer programs.
  2. A programming language used to create interactive web pages and web applications.
  3. The process of encoding data in a way that can only be accessed by authorized parties.
  4. The process of creating a virtual version of something, such as a computer system or network.
  5. A set of instructions written in a programming language that a computer can execute.
  6. A programming language used to manage and manipulate relational databases.
  7. A collection of data that can be accessed, managed, and updated by a computer.
  8. The language used to create web pages and define their structure and content.
  9. A step-by-step process for solving a problem or completing a task.
Down
  1. The practice of protecting computer systems and networks from digital attacks, theft, and damage.
  2. A group of interconnected devices and computers that can communicate and share resources.
  3. The practice of securing communication and data through techniques such as encryption and decryption.
  4. The part of a website or application that the user interacts with directly.
  5. A collection of programs and data that perform a specific task or set of tasks on a computer.
  6. Data that describes other data, such as information about a file's format, size, or author.
  7. A set of practices that combines software development and IT operations to streamline software delivery.
  8. A security system that monitors and controls incoming and outgoing network traffic.
  9. The latest version of HTML, used to create modern web pages and applications.
  10. Refers to the design and user experience of software or applications.

19 Clues: A step-by-step process for solving a problem or completing a task.Refers to the design and user experience of software or applications.A programming language used to manage and manipulate relational databases.The part of a website or application that the user interacts with directly....

Technology 2021-03-23

Technology crossword puzzle
Across
  1. circulated rapidly and widely from one internet user to another.
  2. use of social media to stay connected with friends, family etc.. (two words)
  3. software application for accessing the World Wide Web (2 words)
  4. protecting computer systems and networks from information disclosure, theft of, or damage to hardware or software.
  5. 3-D image formed by the interference of light beams from a laser or other light source.
  6. communication over a distance by cable, telegraph, telephone, or broadcasting.
  7. computer program made to simulate conversation with human users over the internet
  8. a detection system that uses radio waves to determine the range, angle, or velocity of objects.
  9. sports competition using video games
  10. aircraft without a human pilot on board.
Down
  1. simulation of human intelligence in machines programmed to think like humans and mimic their action (2 words)
  2. a computer based technology which allows the sharing of ideas, thoughts, and information through virtual networks and communities.(2 words)
  3. easy to use or understand.
  4. amplifying device which fits on the ear, worn by a partially deaf person.(2 words)
  5. a digital currency that can be used to buy goods and services
  6. a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.
  7. home setup where appliances can be controlled remotely from anywhere with an internet connection using a mobile or other networked device. (2 words)
  8. a person who fears, dislikes, or avoids new technology.
  9. outdated computer hardware, software, technology, services or practices that are no longer used

19 Clues: easy to use or understand.sports competition using video gamesaircraft without a human pilot on board.a person who fears, dislikes, or avoids new technology.a digital currency that can be used to buy goods and servicessoftware application for accessing the World Wide Web (2 words)circulated rapidly and widely from one internet user to another....

Puzzle - 7 2022-10-10

Puzzle - 7 crossword puzzle
Across
  1. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
  2. a regular system update released by developers to fix bugs and other software vulnerabilities
  3. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  4. a list of permitted items that are automatically let through whatever gate is being used.
  5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
  1. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  2. State of being safe / free from danger or threat
  3. a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system, except those explicitly mentioned which are denied access.
  4. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  5. The programs and other operating information used by a computer

10 Clues: State of being safe / free from danger or threatThe programs and other operating information used by a computera list of permitted items that are automatically let through whatever gate is being used.a regular system update released by developers to fix bugs and other software vulnerabilities...

Puzzle - 11 2022-10-10

Puzzle - 11 crossword puzzle
Across
  1. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. an isolated environment on a network that mimics end-user operating environments.
  5. Comprised of any number and variety of interconnected devices
Down
  1. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  2. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  3. Breach of a system's security policy in order to affect its integrity or availability
  4. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
  5. string of characters used to verify the identity of an user during the authentication process

10 Clues: Comprised of any number and variety of interconnected devicesan isolated environment on a network that mimics end-user operating environments.Breach of a system's security policy in order to affect its integrity or availabilitystring of characters used to verify the identity of an user during the authentication process...

corps of signals 2023-01-11

corps of signals crossword puzzle
Across
  1. the use of radio waves to transmit and receive information, a primary means of communication for the corps of signals
  2. a military branch that specializes in communications, responsible for providing and maintaining the communication systems and networks used by a military force.
  3. the use of speech to convey information, one of the primary means of communication for the corps of signals
  4. communications: the use of satellites to transmit and receive information, a key capability of the corps of signals
  5. a group of interconnected devices and systems that can exchange information and share resources
  6. the practice of protecting communication systems, networks and data from unauthorized access or attack
Down
  1. ios or smartphones, to communicate, an essential capability for the corps of signals
  2. a communication facility that receives a signal from one source and retransmits it on to another, used by the corps of signals to extend the range of communication networks.
  3. the process of converting plain text into a coded form to protect the information from unauthorized access
  4. the use of light-carrying fibers to transmit information, a technology used by the corps of signals for high-speed data transfer

10 Clues: ios or smartphones, to communicate, an essential capability for the corps of signalsa group of interconnected devices and systems that can exchange information and share resourcesthe practice of protecting communication systems, networks and data from unauthorized access or attack...

TECH 2024-07-08

TECH crossword puzzle
Across
  1. A decentralized and distributed digital ledger technology that records transactions across multiple computers in a way that is secure, transparent, and resistant to tampering.
  2. Source: Software or technology that is released with a license that allows anyone to inspect, modify, and distribute its source code.
  3. A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.
  4. The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches
Down
  1. The process of converting data into a code to prevent unauthorized access, especially during transmission over networks.
  2. Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.

6 Clues: A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breachesThe process of converting data into a code to prevent unauthorized access, especially during transmission over networks....

CSA CROSSWORD #1 2022-01-07

CSA CROSSWORD #1 crossword puzzle
Across
  1. industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  2. form of cloud computing that provides virtualized computing resources over the internet.
  3. cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
  4. a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
  5. This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
  1. cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  2. Centre of expertise for cyber security in Europe
  3. widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  4. way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
  5. cybersecurity control framework for cloud computing

10 Clues: Centre of expertise for cyber security in Europecybersecurity control framework for cloud computingform of cloud computing that provides virtualized computing resources over the internet.cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

October's Blackink Crossword 2024-09-24

October's Blackink Crossword crossword puzzle
Across
  1. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. process of converting information or data into a code to prevent unauthorized access.
  3. type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. maximum rate of data transfer across a given path, measured in bits per second (bps).
  5. method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
  6. A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
  7. A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
  1. A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  2. delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
  3. A method of trying to gather personal information using deceptive e-mails and websites.

10 Clues: process of converting information or data into a code to prevent unauthorized access.maximum rate of data transfer across a given path, measured in bits per second (bps).A method of trying to gather personal information using deceptive e-mails and websites....

INTELLECTUAL PROPERTY RIGHTS 2025-02-05

INTELLECTUAL PROPERTY RIGHTS crossword puzzle
Across
  1. The specific legal statements in a patent that define the scope of protection granted to the inventor.
  2. is the natural person who has created the work. Some examples of authors include: writers, composers, carvers, etc.
  3. The practice of protecting online systems, networks, and data from cyber threats, ensuring the safe use of e-services.
  4. How well a product performs its intended purpose.
Down
  1. The process where a patent office reviews an application to determine if it meets legal requirements for patentability.
  2. The detailed explanation of an invention in a patent application, ensuring that the public can understand how it works once the patent expires.
  3. the transmission by wireless means for the public reception of sounds or of images or of representations thereof
  4. An exclusive legal right granted to an inventor, giving them control over the use, sale, and production of their invention for a limited period.
  5. a legal term which comprises both the economic and moral rights which creators have over their literary and artistic works.
  6. process where a neutral arbitrator hears evidence from both parties and makes a binding decision to resolve the dispute.

10 Clues: How well a product performs its intended purpose.The specific legal statements in a patent that define the scope of protection granted to the inventor.the transmission by wireless means for the public reception of sounds or of images or of representations thereof...

Teka-Teki Seputar Materi Informatika 2025-08-24

Teka-Teki Seputar Materi Informatika crossword puzzle
Across
  1. Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
  2. Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
  3. Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
  4. Perangkat keras yang digunakan untuk memproses data.
  5. Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
  6. Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
Down
  1. Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
  2. lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
  3. Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
  4. Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.

10 Clues: Perangkat keras yang digunakan untuk memproses data.Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya....

Teka-Teki Silang Seputar Materi Informatika 2025-08-25

Teka-Teki Silang Seputar Materi Informatika crossword puzzle
Across
  1. Proses mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak berwenang, sehingga hanya pihak yang memiliki kunci dekripsi yang dapat mengakses dan membaca data tersebut.
  2. Perangkat penyimpanan data yang digunakan untuk menyimpan data digital, seperti file, dokumen, foto, video, dan program.
  3. Aplikasi pengolah kata yang digunakan untuk membuat, mengedit, dan mencetak dokumen teks, seperti laporan, surat, dan artikel.
  4. lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya.
  5. Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.
  6. Alat input yang digunakan untuk memasukkan data atau instruksi ke dalam komputer dengan menekan tombol-tombol yang ada di atasnya.
  7. Teknik yang digunakan untuk melindungi sistem, jaringan, program, dan data dari serangan digital atau akses ilegal yang dapat menyebabkan kehilangan informasi, gangguan operasional, atau kebocoran identitas.
Down
  1. Proses berpikir yang melibatkan kemampuan untuk memecahkan masalah dan mengembangkan solusi dengan menggunakan konsep komputasi.
  2. Aplikasi yang digunakan untuk mengolah data numerik dan melakukan perhitungan, analisis data, dan visualisasi data dalam bentuk tabel, grafik, dan chart.
  3. Perangkat keras yang digunakan untuk memproses data.

10 Clues: Perangkat keras yang digunakan untuk memproses data.Aplikasi presentasi yang digunakan untuk membuat, mengedit, dan menampilkan presentasi dalam bentuk slide.lmu yang mempelajari tentang pengolahan informasi dengan menggunakan komputer dan teknologi informasi lainnya....

Datafication and Digital Trust 2022-11-09

Datafication and Digital Trust crossword puzzle
Across
  1. Information _________ is the right to have some control over how your personal information is collected and used.
  2. The method by which information is converted into secret code that hides the information's true meaning
  3. Data as processed, stored, or transmitted by a computer
  4. A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
  5. Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
  1. Intrusive software that is designed to damage and destroy computers and computer systems
  2. The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
  3. When somebody sends an e-mail with a link to a bogus website it is called ___________
  4. An organized collection of structured information, or data, typically stored electronically in a computer system
  5. Smallest unit of data

10 Clues: Smallest unit of dataData as processed, stored, or transmitted by a computerWhen somebody sends an e-mail with a link to a bogus website it is called ___________Intrusive software that is designed to damage and destroy computers and computer systems...

Puzzle - 2 2022-10-10

Puzzle - 2 crossword puzzle
Across
  1. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
  4. weaknesses in software programs that can be exploited by hackers to compromise computers.
  5. a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
  1. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
  2. the process of decoding cipher text to plain text, so it is readable by humans.
  3. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  4. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
  5. Cryptocurrency, a form of electronic cash

10 Clues: Cryptocurrency, a form of electronic cashthe process of decoding cipher text to plain text, so it is readable by humans.a type of internet fraud that seeks to acquire a user’s credentials by deception.weaknesses in software programs that can be exploited by hackers to compromise computers....

Puzzle - 6 2022-10-10

Puzzle - 6 crossword puzzle
Across
  1. extends a private network across a public network and enables users to send and receive data across shared or public networks
  2. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  4. Breach of a system's security policy in order to affect its integirty or availability
  5. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
  1. a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
  2. name commonly given to unsolicited email.
  3. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
  4. a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
  5. Good guys in the world of cybercrime. Hackers who use their skills and talents for good

10 Clues: name commonly given to unsolicited email.Breach of a system's security policy in order to affect its integirty or availabilityGood guys in the world of cybercrime. Hackers who use their skills and talents for goodcontains items that are temporarily blocked (or temporarily allowed) until an additional step is performed....

CW-2 2023-09-15

CW-2 crossword puzzle
Across
  1. which cmd is used to display the contents of a text file in the terminal
  2. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
  3. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
  4. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
  5. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
  6. the core component of an operating system that manages hardware resources
Down
  1. in linux, what cmd is used to change the ownership of files and directories
  2. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
  3. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
  4. what do you type into a web browser to visit a websit

10 Clues: what do you type into a web browser to visit a websitwhich cmd is used to display the contents of a text file in the terminalthe core component of an operating system that manages hardware resourcesin linux, what cmd is used to change the ownership of files and directories...

phish 2024-03-21

phish crossword puzzle
Across
  1. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
  2. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
  3. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
  4. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
Down
  1. What process in cybersecurity involves encoding data to protect it from unauthorized access?
  2. What are the software updates released to fix vulnerabilities and improve security in computer systems?
  3. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
  4. A software that is designed to detect and destroy computer viruses.
  5. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
  6. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?

10 Clues: A software that is designed to detect and destroy computer viruses.What process in cybersecurity involves encoding data to protect it from unauthorized access?What are the software updates released to fix vulnerabilities and improve security in computer systems?...

phish 2024-03-21

phish crossword puzzle
Across
  1. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
  2. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
  3. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
  4. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
  5. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
Down
  1. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
  2. What are the software updates released to fix vulnerabilities and improve security in computer systems?
  3. What process in cybersecurity involves encoding data to protect it from unauthorized access?
  4. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
  5. A software that is designed to detect and destroy computer viruses.

10 Clues: A software that is designed to detect and destroy computer viruses.What process in cybersecurity involves encoding data to protect it from unauthorized access?What are the software updates released to fix vulnerabilities and improve security in computer systems?...

Technology 2025-01-28

Technology crossword puzzle
Across
  1. It's a way of linking devices and systems together so they can communicate and share information more quickly and efficiently.
  2. This is another technology that we all use often without realizing it.
  3. It's a way for computers to learn and improve from data without being directly told what to do.
  4. t's the practice of protecting computers, networks, and data from unauthorized access or attacks.
Down
  1. Write a simple and short definition of software like a student and without using word:
  2. It's a digital world where people can interact, work, and play using virtual reality or online platforms.
  3. It's a way of making physical objects by building them layer by layer from a digital design, using materials like plastic or metal.
  4. It's the use of technology to study, create, or improve living things and biological processes.
  5. It's a set of instructions or programs that tell a computer what to do, helping it perform tasks or run applications.
  6. It's a branch of technology that designs and builds machines to perform tasks, often by imitating human actions or working automatically.

10 Clues: This is another technology that we all use often without realizing it.Write a simple and short definition of software like a student and without using word:It's the use of technology to study, create, or improve living things and biological processes.It's a way for computers to learn and improve from data without being directly told what to do....

Technology 2025-01-28

Technology crossword puzzle
Across
  1. It's a way of linking devices and systems together so they can communicate and share information more quickly and efficiently.
  2. This is another technology that we all use often without realizing it.
  3. It's a way for computers to learn and improve from data without being directly told what to do.
  4. t's the practice of protecting computers, networks, and data from unauthorized access or attacks.
Down
  1. Write a simple and short definition of software like a student and without using word:
  2. It's a digital world where people can interact, work, and play using virtual reality or online platforms.
  3. It's a way of making physical objects by building them layer by layer from a digital design, using materials like plastic or metal.
  4. It's the use of technology to study, create, or improve living things and biological processes.
  5. It's a set of instructions or programs that tell a computer what to do, helping it perform tasks or run applications.
  6. It's a branch of technology that designs and builds machines to perform tasks, often by imitating human actions or working automatically.

10 Clues: This is another technology that we all use often without realizing it.Write a simple and short definition of software like a student and without using word:It's the use of technology to study, create, or improve living things and biological processes.It's a way for computers to learn and improve from data without being directly told what to do....

CISO Crossword Quiz - 2225 2025-08-02

CISO Crossword Quiz - 2225 crossword puzzle
Across
  1. Which secured number is not required for receiving money through UPI?
  2. What practice involves authorized and legal attempts to penetrate computer systems, networks, or applications to uncover vulnerabilities and security weaknesses, with the goal of improving overall security?
  3. What is a simulated discussion-based activity where participants, often key personnel having emergency management roles during a Cyber Crisis, simulate a real-world cyber incidents/crisis to test an organization's response?
  4. What disguised link leads to a malicious webpage?
Down
  1. What method uses a QR code to lead users to fake webpage/payment sites?
  2. What security mechanism focuses on protecting devices, or "endpoints," that connect to a network, like laptops, smartphones, and servers, from cyber threats?
  3. What refers to all the potential entry points an attacker could use to gain unauthorized access to an organization's systems, data, or infrastructure?
  4. What should be strong and unique to protect your online accounts?
  5. What term describes an entity or attacker attempting to breach cybersecurity defense of an organization?
  6. What attack tricks people into clicking something different than they think?

10 Clues: What disguised link leads to a malicious webpage?What should be strong and unique to protect your online accounts?Which secured number is not required for receiving money through UPI?What method uses a QR code to lead users to fake webpage/payment sites?What attack tricks people into clicking something different than they think?...

Cyber Security 2024-08-29

Cyber Security crossword puzzle
Across
  1. Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
  2. tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
  3. Jenis malware yang merekam aktivitas pengguna di komputer
  4. Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
  5. Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
  6. jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
  7. proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
  8. Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
  9. Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
  1. Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
  2. proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
  3. proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
  4. Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
  5. Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
  6. Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
  7. Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
  8. Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
  9. Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
  10. Jenis malware yang menyebarkan dirinya melalui email atau lampiran
  11. Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain

20 Clues: Jenis malware yang merekam aktivitas pengguna di komputerTeknik manipulasi psikologis untuk mendapatkan informasi sensitifJenis malware yang menyebarkan dirinya melalui email atau lampiranJenis malware yang menyamarkan diri sebagai program yang baik dan bergunaPerangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer...

ICT Crossword 2023-03-28

ICT Crossword crossword puzzle
Across
  1. The learning process of new skills necessary to complete a different role; move onto a new role within their current company.
  2. A cyber attack intended to redirect a website's traffic to another fake site
  3. A wireless computer network that links two or more devices using wireless communication to form a local area network.
  4. The safe and responsible use of technology.
  5. A type of malware that attaches to another program and can replicate and spread to other computers.
  6. The replacement of skilled people with technology that require people who can operate that only need fewer skills.
  7. What is a private computer network within an organization
  8. Allows two staff members to share the responsibilities of one full-time position.
  9. A person who uses computers to gain unauthorized access to data
Down
  1. A telecommunications network that extends over a large geographic area.
  2. Phone calls that induce you to reveal personal information.
  3. Unsolicited messages sent in bulk by email.
  4. Information relating to an identified or identifiable individual.
  5. A meeting held by people who are talking to each other over the internet
  6. A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  7. What is a global network of interconnected computer networks
  8. A phishing cybersecurity attack carried out over mobile text messaging
  9. A collection of devices connected together in one physical location.
  10. What is usually considered as working fewer than 35 hours, or 30 hours, per week.
  11. An attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate.

20 Clues: Unsolicited messages sent in bulk by email.The safe and responsible use of technology.What is a private computer network within an organizationPhone calls that induce you to reveal personal information.What is a global network of interconnected computer networksA person who uses computers to gain unauthorized access to data...

Chapter 8 - Errors, Failures, and Risks 2024-11-19

Chapter 8 - Errors, Failures, and Risks crossword puzzle
Across
  1. A data structure that allows for pushing and popping elements in a last-in-first-out order.
  2. An organized collection of data that can be accessed and updated electronically.
  3. System used to confirm whether a job applicant is legally authorized to work.
  4. A repeated error caused by an error in the system or program.
  5. Abbreviation for the US deferral agency for public security including immigration, cybersecurity, and disaster prevention.
  6. A software and computer program error that causes incorrect behavior.
  7. The process of planning, decision making and putting a system into effect.
  8. The process of identifying and fixing errors in systems.
  9. A displayed description to help the programmer/operator know the issue the program is having.
  10. Reliance on computer systems and technology for essential functions.
  11. The concept where everyday devices are embedded with software and communication technologies to connect and exchange data over the internet.
  12. A check within a program that sees whether a given output or input falls within a logical range of what is acceptable.
  13. A variable in computer programming storing true or false (0 or 1) for a condition in the program.
Down
  1. Including duplicate components of systems in software to ensure reliability.
  2. Process of identifying, analyzing, and evaluating potential risks in a system to ensure safety in the technology.
  3. A mistake where the incorrect data is entered into a system.
  4. A variable exceeding the storage capacity of memory it was allocated for.
  5. A device that can operate in two different modes.
  6. A computer controlled radiation therapy machine that caused several incidences with radiation overdoses to patients.
  7. The name of Hong Kong’s international airport that experienced system failures.

20 Clues: A device that can operate in two different modes.The process of identifying and fixing errors in systems.A mistake where the incorrect data is entered into a system.A repeated error caused by an error in the system or program.Reliance on computer systems and technology for essential functions....

INFORMATIKA KELAS VII SEMESTER 1 2024-12-03

INFORMATIKA KELAS VII SEMESTER 1 crossword puzzle
Across
  1. Platform kolaborasi digital yang memungkinkan komunikasi real time antaranggota tim dan memungkinkan anggota tim berkomunikasi secara langsung melalui video berbagi layer dan berkolaborasi dalam waktu nyata mengatasi hambtan geografis
  2. Komponen computer yang bertanggung jawab untuk melakukan pemrosesan data dan menjalankan instruksi
  3. Orang yang menggunakan, memakai ataupun mengoperasikan perangkat computer disebut
  4. ibu memasak nasi goreng dengan langkah-langkah yang telah diresepkan nenek. Serangkaian langkah terstruktur dan sistematis yang dilakukan ibu disebut
  5. Alat utama yang berfungsi mengolah data secara digital dan sering disebut sebagai otak computer adalah
  6. Alamat unik web disebut
  7. perangkat lunak yang digunakan untuk browsing
  8. Alat output yang berfungsi menampilkan hasil proses komputasi
  9. Keyboard termasuk perangkat ...
  10. Fitur email yang berfungsi untuk melampirkan file dokumen
  11. Penggunaan internet merupakan salah satu factor penting yang membantu dalam kegiatan pembelajaran dan praktik,adalah manfaat internet dalam bidang
Down
  1. Speaker teramsuk perangkat ...
  2. Tempat utama pesan e-mail diterima dan disimpan
  3. Orang yang mengoperasikan computer atau user
  4. Di era teknologi yang sangat canggih sangat memerlukan praktik dan teknologi yang berfungsi untuk melindungi siostem computer, jaringan, perangkat dan data dari ancaman dan serangan yang berasal dari dunia digital, teknologi tersebut disebut dengan
  5. Fitur web yang memungkinkan pengguna untuk menyimpan alamat web atau halaman web yang sering dikunjungi, sehingga dapat diakses dengan mudah di kemudian hari
  6. Platform digital yang mengkinkan anggota tim untuk bekerja sama dalam dokumen yang sama secara online
  7. Gaya antar muka berbasis grafis disebut
  8. Flashdisk salah satu Perangkat computer sebagai
  9. Bagian dari system computer sebagai perangkat yang dapat diraba, dilihat secara fisik, dan bertindak untuk melanjutkan instruksi dari perangkat lunak (software)
  10. Perangkat elektronik yang dapat menerima, meyimpan, memproses dan menghasilkan informasi secara digital

21 Clues: Alamat unik web disebutSpeaker teramsuk perangkat ...Keyboard termasuk perangkat ...Gaya antar muka berbasis grafis disebutOrang yang mengoperasikan computer atau userperangkat lunak yang digunakan untuk browsingTempat utama pesan e-mail diterima dan disimpanFlashdisk salah satu Perangkat computer sebagai...

FAI Unit 5 CIE 2025-04-30

FAI Unit 5 CIE crossword puzzle
Across
  1. Popular library for image processing and computer vision.
  2. Technique used to enhance or manipulate digital pictures.
  3. The ability of AI tools to handle growing data and computation needs.
  4. Tool that uses AI to monitor and predict website traffic behavior.
  5. Googles multimodal AI model that supports text, code, and video.
  6. These automate responses in customer service chats.
  7. Open-source AI framework developed by Google Brain.
  8. Abbreviation for the field where AI processes human language.
  9. Type of AI that runs on local devices without needing the cloud.
  10. General category of services like AWS and Google Cloud.
  11. Amazon's cloud platform offering scalable AI services.
  12. Statistical data visualization library built on Matplotlib.
  13. Ability to tweak AI models for specific industry needs.
  14. AI movement focused on transparent and understandable decisions.
  15. Deep learning framework known for dynamic computation graphs.
  16. Using AI tools to generate blogs, ads, or emails.
  17. Field of AI involving autonomous machines.
  18. AI content generator used in marketing and copywriting.
  19. Finding patterns and making sense of large datasets.
Down
  1. Analyzing data to make future predictions.
  2. Charts and graphs made using AI tools like Seaborn.
  3. Converts spoken language into text using deep learning.
  4. AI-powered services like Siri or Alexa fall under this category.
  5. A learning paradigm used in gaming and robotics.
  6. Python library used for data visualization with a MATLAB-like interface.
  7. AIs role in replacing manual, repetitive tasks.
  8. How accurate AI predictions are compared to human decisions.
  9. Area where AI detects threats and prevents online attacks.
  10. A key branch of machine learning used for neural networks.
  11. AI-powered chatbot developed by OpenAI.

30 Clues: AI-powered chatbot developed by OpenAI.Analyzing data to make future predictions.Field of AI involving autonomous machines.AIs role in replacing manual, repetitive tasks.A learning paradigm used in gaming and robotics.Using AI tools to generate blogs, ads, or emails.Charts and graphs made using AI tools like Seaborn....

Intro to IT Crossword 2025-05-05

Intro to IT Crossword crossword puzzle
Across
  1. A wireless way to connect devices to the internet
  2. websites and applications that enable users to create and share content or to participate in social networking
  3. a part of the internet that is not indexed by traditional search engines and is typically accessed using specialized browsers or network configurations
  4. technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
  5. American former NSA intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs
  6. the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information
  7. programming language that helps you give instructions to a computer
Down
  1. Software that protects against malware
  2. making machines think and act like humans, especially in ways that require intelligence, like learning, problem-solving, and making decisions
  3. CEO & Inventor of Apple
  4. computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
  5. Helps users with technical issues
  6. co-founding and being the CEO of Facebook
  7. protecting computer systems, networks, and data from unauthorized access, use, disruption, or destruction
  8. A network security device that monitors and controls network traffic based on defined security rules
  9. type of cyberattack where attackers attempt to deceive individuals into revealing sensitive information like passwords or credit card details
  10. computer program designed to simulate conversation with human users, especially over the internet
  11. A person who writes code
  12. information about a particular person that exists on the internet as a result of their online activity
  13. The operating system used by Apple computers
  14. a large language model chatbot created by OpenAI
  15. An electronic device for storing and processing data

22 Clues: CEO & Inventor of AppleA person who writes codeHelps users with technical issuesSoftware that protects against malwareco-founding and being the CEO of FacebookThe operating system used by Apple computersa large language model chatbot created by OpenAIA wireless way to connect devices to the internet...

ICT crosswords 2025-05-16

ICT crosswords crossword puzzle
Across
  1. is a law that sets rules for how organizations can collect, store, and use personal data about individuals.
  2. a type of malware that masquerades as legitimate software to deceive users into installing it.
  3. short name of Repetitive Strain Injury
  4. ICT Chapter4
  5. is a type of cyberattack where criminals trick people into revealing sensitive info like passwords or credit card details.
  6. is a company that provides users with access to the internet for a monthly fee.
  7. its a law in ICT when you use others things
  8. part of system life cycle which include technical and user documentation
  9. an electronic document that verifies the identity of a user, device, server, or website.
  10. software that help a user to finds websites using keywords or phrases.
  11. combination of internet and etiquette
  12. The lack of harm or injury caused by a physical object or related practices.
  13. is a type of malware that spreads between computers and causes damage to data and software.
  14. is a type of malware that covertly record keystrokes on a keyboard.
Down
  1. 4stage of system life cycle
  2. online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
  3. part of a design stage that check for correctness, meaningfulness, and security of data that are input to the system.
  4. a device that links multiple computers and devices together
  5. Name of our ICT teacher
  6. It extends intranet to trusted outsiders
  7. is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing.
  8. name of chapter 9
  9. network that use in an organisation
  10. is a security device that separates a trusted network from an untrusted one.
  11. 1stage of system life cycle

25 Clues: ICT Chapter4name of chapter 9Name of our ICT teacher4stage of system life cycle1stage of system life cyclenetwork that use in an organisationcombination of internet and etiquetteshort name of Repetitive Strain InjuryIt extends intranet to trusted outsidersits a law in ICT when you use others things...

Technology Crossword 2024-04-11

Technology Crossword crossword puzzle
Across
  1. a device used to only capture photos and videos
  2. a device that sends out signals wirelessly
  3. a nonhuman technology
  4. they produce sounds so you can listen to music or audio out loud
  5. a machine used for sending and receiving documents
  6. a display screen that shows the converted code
  7. a device used to watch movies and shows
  8. a lighting system commonly used on gaming computers
  9. you can wear them on your head a listen to music
  10. a tool used to type words
  11. portable device used for communication
  12. a device used for playing video games
  13. a device able to track things
  14. the practice of protecting computers and serves form online threats and viruses
Down
  1. the main circuit board of a computer
  2. a computer component that helps render and display images and videos
  3. a computer component that helps cool down parts of a computer
  4. a portable power source for electronic devices
  5. reality a technology that lets you escape to a different world
  6. a type of coding used in Mr.Kannani's class
  7. a flying device able to record videos
  8. a device used to do school work, watch videos, and play games
  9. a handheld object that is used to control objects on a computer screen
  10. a device that prints documents and images
  11. a technology that allows wireless communication between devices over a great distance
  12. the "brain" of the computer
  13. a fancy term used for online shopping
  14. a camera that goes on a monitor
  15. a technology that allows wireless communication between devices over a short distance
  16. a type of computer memory

30 Clues: a nonhuman technologya tool used to type wordsa type of computer memorythe "brain" of the computera device able to track thingsa camera that goes on a monitorthe main circuit board of a computera flying device able to record videosa fancy term used for online shoppinga device used for playing video gamesportable device used for communication...

Tugas Informatika Terakhir 2025-05-26

Tugas Informatika Terakhir crossword puzzle
Across
  1. Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
  2. Platform digital untuk pendidikan Islam dalam smart city.
  3. Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
  4. Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
  5. Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
  6. Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
  7. Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
  8. Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
  9. Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
  10. Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
  1. Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
  2. Teknologi untuk sholat berjamaah virtual dalam smart city.**
  3. Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
  4. Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
  5. Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
  6. Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
  7. Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
  8. Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
  9. Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
  10. Kota masa depan dalam Islam yang makmur dan berkelanjutan.

20 Clues: Platform digital untuk pendidikan Islam dalam smart city.Kota masa depan dalam Islam yang makmur dan berkelanjutan.Teknologi untuk sholat berjamaah virtual dalam smart city.**Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12)....

Remote Work: Challenges and Benefits 2025-07-23

Remote Work: Challenges and Benefits crossword puzzle
Across
  1. Ongoing business expenses not directly attributed to creating a product or service, like rent or utilities.
  2. A large and impersonal political, corporate, or social structure regarded as indivisible and uniform.
  3. A situation or event that creates a sudden increase in wealth, good fortune, or profits.
  4. A state of emotional, physical, and mental exhaustion caused by excessive and prolonged stress.
  5. A seemingly absurd or self-contradictory statement or proposition that when investigated or explained may prove to be well founded or true.
  6. The regular journey between one's home and place of work.
  7. Describing work or communication where participants are not engaged at the same time.
  8. Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.
  9. The condition of being alone or separated from others.
  10. The state of being protected against the criminal or unauthorized use of electronic data.
  11. Something made by combining two different elements; in business, a model combining remote and in-office work.
  12. The ideas, customs, and social behavior of a particular people or organization.
  13. The study of people's efficiency in their working environment, often focused on comfort and safety.
Down
  1. The state of being involved with something; in business, an employee's commitment to their job and company.
  2. The quality of being done on purpose; deliberateness.
  3. The state or quality of producing something; the effectiveness of productive effort.
  4. The quality of bending easily without breaking; the ability to be easily modified or to change.
  5. The right or condition of self-government; freedom from external control or influence.
  6. Not physically existing as such but made by software to appear to do so.
  7. The action of working with someone to produce or create something.

20 Clues: The quality of being done on purpose; deliberateness.The condition of being alone or separated from others.The regular journey between one's home and place of work.The action of working with someone to produce or create something.Not physically existing as such but made by software to appear to do so....

Intro to CompSci Vocab 2025-08-15

Intro to CompSci Vocab crossword puzzle
Across
  1. The delivery of computing services-including servers, storage, databases, networking, software, analytics, and intelligence-over the internet.
  2. A block of code designed to perform a specific task.
  3. A set of instructions written in a programming language that a computer can understand.
  4. A number system that uses only two digits, 0 and 1.
  5. A step-by-step procedure or formula for solving a problem.
  6. A type of temporary, high-speed memory that stores data the CPU needs to access quickly.
  7. The process of finding and fixing errors or "bugs" in a program.
  8. The set of rules that defines how a program must be written in a specific programming language.
  9. Information processed or stored by a computer.
  10. The physical components of a computer, such as the monitor, keyboard, and hard drive.
Down
  1. A control structure that repeats a block of code multiple times.
  2. The practice of protecting computer systems and networks from digital attacks.
  3. A collection of interconnected computers and devices that can share data and resources.
  4. A control structure that allows a program to execute different code blocks based on whether a condition is true or false.
  5. A group of 8 bits.
  6. A storage location in memory that holds a value.
  7. The core software that manages all the hardware and software resources of the computer.
  8. The programs and other operating information used by a computer.
  9. The "brain" of the computer that performs all the calculations and instructions.
  10. The smallest unit of data in a computer, represented by a single binary digit.
  11. A unique numerical label assigned to each device participating in a computer network.

21 Clues: A group of 8 bits.Information processed or stored by a computer.A storage location in memory that holds a value.A number system that uses only two digits, 0 and 1.A block of code designed to perform a specific task.A step-by-step procedure or formula for solving a problem.A control structure that repeats a block of code multiple times....

Cybersecurity Fundamental Chapter 8 Part 2 2024-06-05

Cybersecurity Fundamental Chapter 8 Part 2 crossword puzzle
Across
  1. The process of distributing and applying updates to software to fix known vulnerabilities.
  2. The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
  3. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  4. The process of addressing and managing the aftermath of a security breach or cyberattack.
  5. Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
  1. A proactive system that detects and prevents identified threats from infiltrating a network
  2. The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
  3. An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
  4. Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
  5. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  6. A system that monitors network traffic for suspicious activity and potential threats
  7. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.

12 Clues: A system that monitors network traffic for suspicious activity and potential threatsThe process of addressing and managing the aftermath of a security breach or cyberattack.The process of distributing and applying updates to software to fix known vulnerabilities....

Technology 2023-06-14

Technology crossword puzzle
Across
  1. A technology that creates a computer-generated environment, simulating a realistic experience.
  2. A machine that can store, process, and retrieve information, and perform various tasks.
  3. The process of creating instructions for computers to follow, often using programming languages.
  4. Measures and practices to protect computer systems and networks from unauthorized access or attacks.
  5. A mobile phone that can also perform functions similar to a computer, such as internet browsing.
  6. The development of computer systems that can perform tasks that would normally require human intelligence.
  7. Information that is stored and processed by computers, often in the form of numbers or text.
  8. The physical components of a computer or electronic device, such as the processor or screen.
Down
  1. The use of remote servers to store, manage, and process data over the internet, rather than locally.
  2. The process of converting information into a secret code to prevent unauthorized access.
  3. Relating to information that is stored and processed in a digital format, such as digital photos or music.
  4. The branch of technology that deals with the design, construction, and operation of robots.
  5. The process of transmitting or receiving multimedia content, such as videos or music, over the internet.
  6. A global network that connects computers and allows people to access and share information.
  7. Programs or applications that run on a computer or smartphone, providing specific functionalities.
  8. The act of playing electronic games, often on a computer or gaming console.

16 Clues: The act of playing electronic games, often on a computer or gaming console.A machine that can store, process, and retrieve information, and perform various tasks.The process of converting information into a secret code to prevent unauthorized access.The branch of technology that deals with the design, construction, and operation of robots....

CNB Employee Community Banking Month Crossword 2023-04-18

CNB Employee Community Banking Month Crossword crossword puzzle
Across
  1. KnowBe4 allows us to offer free ____________ training to all our customers.
  2. The Videos section of our website features Customer ______________. They’re also featured on our YouTube channel.
  3. CNB currently has _____________________ branch locations through Ohio.
  4. In 1920, Citizens National Bank opened its doors and gave everyone an ___________ in appreciation for stopping by.
  5. Each year, CNB offices host Community Shred Day on the last _____________ of April.
  6. CNB was recently named one of the Top 50 Community Banks in the _______________.
  7. Customers may enter in person or ____________ to win a Community Gift Basket, which includes items from each of our markets, valued at more than $150.
  8. The CNB ____________ Club was re-introduced this year, offering the opportunity for employees to donate resources and time to charity.
  9. Our Financial _________________ Sweepstakes runs through May 31st and offers the chance to win $2000 for using bill payment products.
  10. If someone is interested in retirement accounts or investment opportunities, they can speak with someone from Citizens ____________ Management Group.
Down
  1. The Executive Newsletter is geared towards ___________________, providing information for owners and managers.
  2. Both the Free Checking and Go ________________ Account can be opened completely online through our website.
  3. In 2022, CNB ____________ more than $180,000 to local schools and organizations.
  4. Our _____________________ newsletter offers personal finance information and info about CNB.
  5. We offer many financial ___________________, including mortgage, investment, loan/credit card, on our website under the Resources tab.
  6. CNB Visa Credit Card customers can earn 5x points through the end of June at Home ____________ stores, such as Lowe’s.

16 Clues: CNB currently has _____________________ branch locations through Ohio.KnowBe4 allows us to offer free ____________ training to all our customers.In 2022, CNB ____________ more than $180,000 to local schools and organizations.CNB was recently named one of the Top 50 Community Banks in the _______________....

Computer & Internet Vocabulary 2026-01-26

Computer & Internet Vocabulary crossword puzzle
Across
  1. an incident where private or sensitive information is accessed or stolen without permission.
  2. a computer or system that stores data and provides services or information to other devices on a network.
  3. a unique number that identifies a device on a network or the internet.
  4. software used to access and view websites on the internet, such as Chrome, Safari, or Firefox.
  5. clickable text or an image that takes you to another webpage or section online.
  6. a secret word or phrase used to log into an account and protect personal information.
Down
  1. harmful software designed to damage devices, steal data, or disrupt systems.
  2. a method of changing information into a secret code so only authorized users can read it.
  3. the practice of protecting computers, networks, and data from digital attacks or unauthorized access.
  4. the main name of a website, usually ending in .com, .org, or .net.
  5. a scam where attackers try to trick users into sharing passwords or personal data through fake emails or messages.
  6. a type of malware that spreads between devices and can damage files or slow performance.
  7. a security system that controls incoming and outgoing internet traffic to block harmful activity.
  8. small files stored on your device by websites to remember preferences, logins, or activity.
  9. a device that sends internet data to computers, phones, and other devices in a home or office.
  10. servers accessed over the Internet, often used for storing data remotely.

16 Clues: the main name of a website, usually ending in .com, .org, or .net.a unique number that identifies a device on a network or the internet.servers accessed over the Internet, often used for storing data remotely.harmful software designed to damage devices, steal data, or disrupt systems....

iACE Crossword Puzzle 3 2021-11-09

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  2. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  3. Unacceptable or improper behaviour, especially by an employee or professional person.
  4. An official inspection of an individual’s or organization’s accounts.
Down
  1. _____________ refers to adherence to policies, plans, procedures, laws, regulations, contracts, or other requirements.
  2. ________ risk refer to the risk of inadequate employment practices and resource management.
  3. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  4. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  5. Wrongful or criminal deception intended to result in financial or personal gain.
  6. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gain.Unacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

The central technologies to digital transformation 2023-12-15

The central technologies to digital transformation crossword puzzle
Across
  1. practice of protecting critical systems and sensitive information from digital attacks
  2. provides a secure and transparent way to record and verify transactions. It is commonly associated with cryptocurrencies but has broader applications, such as supply chain management and secure data sharing.
  3. involves the use of software robots to automate repetitive and rule-based tasks. It helps streamline business processes, reduce errors, and increase operational efficiency.
  4. technology enhances user experiences by creating immersive virtual environments
  5. provides faster and more reliable connectivity, enabling the seamless operation of applications that require high data transfer speeds
  6. enable systems to learn from data and make intelligent decisions.
Down
  1. involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
  2. involves connecting physical devices to the internet, allowing them to collect and exchange data
  3. enable the processing and analysis of large volumes of data to derive insights and make informed business decisions.
  4. provides scalable and flexible resources, allowing organizations to store and access data, run applications, and deploy services without the need for on-premises infrastructure

10 Clues: enable systems to learn from data and make intelligent decisions.technology enhances user experiences by creating immersive virtual environmentspractice of protecting critical systems and sensitive information from digital attacksinvolves connecting physical devices to the internet, allowing them to collect and exchange data...

Corporate Compliance and Ethics Week 2023 2023-10-30

Corporate Compliance and Ethics Week 2023 crossword puzzle
Across
  1. What you must do if you suspect that someone is doing anything that violates the Compliance and Ethics code and our Standards of Conduct.
  2. The acronym for the policy that ensures and protects a patient's electronic health record (EHR).
  3. The acronym for our "Safety and Compliance" reporting system.
  4. The practice of protecting systems, networks and programs from digital attacks.
  5. The fraudulent practice of sending emails purporting to be from a reputable company in order to trick someone into sharing their personal information.
Down
  1. Following the rules. It means we try to understand and comply with all the laws and policies that apply to our duties at Community.
  2. A system of moral principles dealing with values with respect to the rightness and wrongness of certain actions and to the goodness and badness of motives and ends of such actions.
  3. Who is responsible for compliance at Community Health System.
  4. A type of email that covers a range of protective measures and creates a secure connection between a dedicated web server and browser.
  5. Another name for your CHS system username and password.

10 Clues: Another name for your CHS system username and password.Who is responsible for compliance at Community Health System.The acronym for our "Safety and Compliance" reporting system.The practice of protecting systems, networks and programs from digital attacks....

CW-2 2023-09-15

CW-2 crossword puzzle
Across
  1. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
  2. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
  3. what do you type into a web browser to visit a websit
  4. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
  5. in linux, what cmd is used to change the ownership of files and directories
Down
  1. the core component of an operating system that manages hardware resources
  2. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
  3. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
  4. which cmd is used to display the contents of a text file in the terminal
  5. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)

10 Clues: what do you type into a web browser to visit a websitwhich cmd is used to display the contents of a text file in the terminalthe core component of an operating system that manages hardware resourcesin linux, what cmd is used to change the ownership of files and directories...

Dark Web Saga 2024-02-04

Dark Web Saga crossword puzzle
Across
  1. Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?
  2. I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.
  3. In circuits, I compute without a hitch, a brain of metal and silicon which is which?
  4. With keys at my command, I type and code, a writer's ally on the digital road. What am I, in the coding abode?
  5. A web of connections, wires in a dance, transmitting data at a rapid advance. What am I, in the networking expanse?
  6. A language, zeroes and ones, the foundation of code, where the digital journey begins. What am I, in the coding bins?
Down
  1. In the coding labyrinth, where symbols align, a programmer's toolkit, where solutions shine. What am I, in the coding design?
  2. Pixels and screens, a visual delight, bringing images to life, in the digital light. What am I, in the visual height?
  3. With keys and codes, I lock and secure, a guardian of data, making breaches obscure.
  4. I hide in the shadows, a secret unknown, where the internet's darker side is shown.

10 Clues: Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.I hide in the shadows, a secret unknown, where the internet's darker side is shown.With keys and codes, I lock and secure, a guardian of data, making breaches obscure....

altafiber Security Awareness 2022-08-29

altafiber Security Awareness crossword puzzle
Across
  1. Your ____ is like your underwear; don't share it with your friends, and change it often.
  2. Personal Identifiable Information
  3. _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
  4. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
  5. A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
  6. A weakness in a program or system that can be exploited
  7. A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
  8. The process of changing plain text to cipher text using an algorithm
  9. Logical or physical device used to filter network traffic
Down
  1. Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
  2. United States Federal Agency that specializes in cybersecurity
  3. National Institute of Standards and Technology
  4. The form of malware that encrypted Colonial Pipeline files in 2021.
  5. An email that tricks you into giving up your passphrase, password or clicking on a malicious link
  6. Cyber Security Awareness Month
  7. A Virtual Private Network connection that establishes a secure connection between you and the internet.
  8. Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
  9. Similar to a password except you use a string of words and it gives you access to your computer.

18 Clues: Cyber Security Awareness MonthPersonal Identifiable InformationNational Institute of Standards and TechnologyA weakness in a program or system that can be exploitedLogical or physical device used to filter network trafficUnited States Federal Agency that specializes in cybersecurityThe form of malware that encrypted Colonial Pipeline files in 2021....

IoT Word Puzzle 2025-04-01

IoT Word Puzzle crossword puzzle
Across
  1. is a set of technologies that enable computers to perform a variety of advanced functions, including the ability to see, understand and translate spoken and written language, analyze data, make recommendations, and more
  2. an electronic device generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously.
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. involves using technology, programs, robotics, or processes to perform tasks with minimal human input
  3. a device that detects and responds to a physical stimulus (like heat, light, sound, pressure, or motion) and transmits a resulting impulse, often for measurement or control.
  4. extremely large and diverse collections of structured, unstructured, and semi-structured data
  5. the state of being connected or interconnected.

7 Clues: the state of being connected or interconnected.extremely large and diverse collections of structured, unstructured, and semi-structured datainvolves using technology, programs, robotics, or processes to perform tasks with minimal human input...

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network....

Rush Health Cybersecurity Crossword Puzzle 2020-02-26

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Something that secures or makes safe; protection; defense.
  2. The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
  3. Intending or intended to do harm.
  4. Exposure to the chance of injury or loss.
Down
  1. To try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.
  2. The act or a result of breaking.
  3. Malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access.
  4. A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.

8 Clues: The act or a result of breaking.Intending or intended to do harm.Exposure to the chance of injury or loss.Something that secures or makes safe; protection; defense.A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network....

Rush Health Cybersecurity Crossword Puzzle 2020-03-03

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive information, typically via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network....

Standards Law & Ethics of Cybersecurity 2023-06-08

Standards Law & Ethics of Cybersecurity crossword puzzle
Across
  1. Link that is ______ often found on social media and SMS is one of the Phishing Scams.
  2. By sharing ______ date it potentially threatens personal safety.
  3. What should you do if you receive suspicious links on your mobile phone?
  4. Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
  1. Resending fake emails to everyone who knows you can be identified as _______.
  2. Do not ______ your password.
  3. _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
  4. Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.

8 Clues: Do not ______ your password.By sharing ______ date it potentially threatens personal safety.What should you do if you receive suspicious links on your mobile phone?Resending fake emails to everyone who knows you can be identified as _______.Link that is ______ often found on social media and SMS is one of the Phishing Scams....

FITDVocabulary.lm 2013-05-15

FITDVocabulary.lm crossword puzzle
Across
  1. the way you behave online
  2. the design of a document
  3. things that your computer needs
  4. computer plug-ins
  5. selling of a company
  6. rtf
  7. LCD
  8. campaigning for a company
  9. a more modern version of power point
  10. doc.
  11. standards that a product must meet
  12. how secure you and your computer is while online
  13. a giant search engine
  14. ipad, cellphone
  15. a website with tips that help keep you safer while online
  16. what a president says when elected
  17. ISP
  18. an area where you plug in a cord to give you internet access
  19. a booklet representing a company
  20. a sign/symbol that represents a business
  21. credit for an author or writer
  22. a form you turn into a business
  23. where you put your CD's
  24. additional hardware for a computer (needed for gamers)
  25. an online flash drive
Down
  1. web
  2. LED
  3. the second smallest form of storage
  4. a device that gives out
  5. a computer's short term memory
  6. pdf
  7. where you plug in your headphones
  8. google
  9. wireless internet
  10. an internet hosting service that lets people and organizations have internet
  11. a tool that allows you to have access to the internet
  12. the smallest form of storage
  13. start up
  14. a device that gives in
  15. an option for a document's layout
  16. extra things for a computer
  17. VDU
  18. CPU
  19. word, pages
  20. "talking up" a company
  21. a service that is able to be downloaded for pleasure
  22. being safe online
  23. a patent on writing
  24. brain of the computer
  25. a catch phrase that helps you remember a business

50 Clues: webLEDpdfrtfLCDISPVDUCPUdoc.googlestart upword, pagesipad, cellphonecomputer plug-inswireless internetbeing safe onlinea patent on writingselling of a companya giant search enginebrain of the computeran online flash drivea device that gives in"talking up" a companya device that gives outwhere you put your CD'sthe design of a document...

RU ITEC411-Crime and Security 2022-10-16

RU ITEC411-Crime and Security crossword puzzle
Across
  1. gaining unauthorized access to data in a system or computer
  2. software that allow future access to a computer system by bypassing the normal layers of security.
  3. can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
  4. biological characteristics unique to an individual
  5. criminal activity that involves the use of a computer r a network
  6. person that uses their technical knowledge to break into a computer system or network by no standard means.
  7. irrelevant or inappropriate messages sent in bulk to recepients
  8. malware that can monitor or record victim's activities on a computer or mobile phone
  9. group of internet connected devices each of which runs one or more bots.
  10. use of computers or computer network techniques such as hacking to promote political agenda
  11. the assurance that private data will remain private
Down
  1. sending fraudulent text messages on purpose appearing to come from reputable and legit companies
  2. the assurance that data will not change without authorization
  3. malware that blocks access to data or threatens to publish it unless a ransom is paid.
  4. recording devices inside credit card readers to collect credit card numbers and PINs.
  5. converting information into secret code that hides the meaning of the information
  6. protection of computer systems and networks from information theft or hardware damage.
  7. the way in which thieves collect personal data by luring the victims to fake websites
  8. sending deceiving emails in order to obtain sensitive personal information from the victim
  9. malicious computer worm that targets a specific type of control system
  10. software designed intentionally to be intrusive and destructive to a computer or network
  11. software that attaches itself to other software and spreads when someone runs an infected program.

22 Clues: biological characteristics unique to an individualthe assurance that private data will remain privategaining unauthorized access to data in a system or computerthe assurance that data will not change without authorizationirrelevant or inappropriate messages sent in bulk to recepientscriminal activity that involves the use of a computer r a network...

Tech puzzle 2023-02-26

Tech puzzle crossword puzzle
Across
  1. A software program that allows you to surf the web
  2. reality ____________ reality is the integration of digital information with live video
  3. Give one example of a game that used unity and C#
  4. What protects your computer from hackers
  5. Primary memory is also known as _______ memory
  6. the primary component of a computer that acts as its “control center.”
  7. _______ is the way of sending messages over the Internet
  8. What technology was used in avengers end game
  9. Which technology is used in Brahmastra movie
  10. Protection of computer system and information from harm theft and unauthorised use
  11. what’s the name of Tony Stark’s computer that features advanced artificial intelligence
  12. Smallest unit of measurement in computing
Down
  1. RAM stands for _______ access memory
  2. The initial program that runs when a computer is powered up or rebooted
  3. Visual display unit is also called
  4. What is a document sent with with an email message ?
  5. This number system has a base 8
  6. What is the #1 social media app
  7. Is temporarily stored on your computer
  8. Terminates the loop statement and transfers execution to the statement immediately following the loop.
  9. _______is considered as one of the univerals gates.
  10. computing the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  11. _________________ protects your computer from viruses and hackers
  12. An incredibly powerful tool used to get meaning out of vast amounts of data
  13. A chatbot developed by openAI and launched in November 2022
  14. An interrupt triggered by a software
  15. Hyperlink is a saved link to a particular web page

27 Clues: This number system has a base 8What is the #1 social media appVisual display unit is also calledRAM stands for _______ access memoryAn interrupt triggered by a softwareIs temporarily stored on your computerWhat protects your computer from hackersSmallest unit of measurement in computingWhich technology is used in Brahmastra movie...

Envision Crossword 2024-02-29

Envision Crossword crossword puzzle
Across
  1. : Who famously exclaimed "Eureka!" when he discovered the principle of buoyancy while taking a bath?
  2. : What term describes a startup company valued at over $1 billion?
  3. : What mountain range serves as a natural barrier between Italy and Switzerland?
  4. : What geological feature erupts molten rock, ash, and gases from beneath the Earth's surface?
  5. : What branch of mathematics deals with symbols and the rules for manipulating those symbols?
  6. : Which prolific composer from the Classical era created over 600 works, including operas, symphonies, and concertos?
  7. : What field focuses on protecting computer systems, networks, and data from unauthorized access or attacks?
  8. : What is the planned sequence of learning experiences designed to achieve specific educational goals?
  9. : What city in Japan was devastated by the first wartime use of an atomic bomb?
  10. : Who proposed the concept of the "Neuralink," a brain–computer interface technology?
Down
  1. : What term refers to the process of designing, launching, and running a new business?
  2. : Who is the protagonist of a popular anime series about a young ninja striving for recognition and aiming to become the strongest ninja in his village?
  3. : What traditional teaching tool consists of a dark surface on which teachers can write with chalk?
  4. : What is a set of instructions designed to perform a specific task?
  5. : What sport is traditionally played with an oval-shaped ball?
  6. : What area of the school provides meals and a place for students to eat?
  7. : Who developed the theory of special relativity, which describes the relationship between space and time?
  8. : What is the first and most well-known cryptocurrency?
  9. : What term refers to ownership interest in a company, typically represented by shares of stock?
  10. : Which tennis tournament is played on grass courts?

20 Clues: : Which tennis tournament is played on grass courts?: What is the first and most well-known cryptocurrency?: What sport is traditionally played with an oval-shaped ball?: What term describes a startup company valued at over $1 billion?: What is a set of instructions designed to perform a specific task?...

technology and innovation vocabulary for IELTS bumper crossword (2) www.atomicielts.com 2024-09-01

technology and innovation vocabulary for IELTS bumper crossword (2) www.atomicielts.com crossword puzzle
Across
  1. to go -----; spreading quickly and widely on the internet (5)
  2. data-driven decisions are decisions or ------- based on data analysis (7)
  3. ----- computing; using the internet to store and access data and programs (5)
  4. e-learning is learning conducted via electronic media, typically on the --------(8)
  5. growing --------; when more and more people are becoming curious or involved in something (8)
  6. research methodology; the ------- or methods used in research (7)
  7. automation ------; the effect of using machines and technology to do jobs once done by people (6)
  8. digital --------; the ability to use technology and understand digital information (8)
  9. different forms of content like text, video, and audio together (10)
Down
  1. proving that something is true or meets a standard (10)
  2. ----- technology; technology that is environmentally friendly (5)
  3. a digital record of transactions that is secure and cannot be changed (10)
  4. user -------- designs; designing products with the needs of the user in mind (7)
  5. cybersecurity is protecting --------- and data from theft or damage (9)
  6. ------- transformation; the use of technology to change how a business or society operates (7)
  7. ----- cities; cities that use technology to improve services and quality of life (5)
  8. to change something in a big way (9)
  9. --------- biology is creating new biological parts or systems that do not exist in nature (9)
  10. pharmacogenomics is how a person’s ----- affect their response to drugs (5)
  11. ------- concerns are worries about how personal information is used or shared online (7)
  12. telecommuting is working from home using the internet to connect with the office (4)
  13. gene ------- is creating new biological parts or systems that do not exist in nature (7)

22 Clues: to change something in a big way (9)proving that something is true or meets a standard (10)to go -----; spreading quickly and widely on the internet (5)----- technology; technology that is environmentally friendly (5)research methodology; the ------- or methods used in research (7)different forms of content like text, video, and audio together (10)...

Technology crossword. 2023-06-07

Technology crossword. crossword puzzle
Across
  1. standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images
  2. is a method of representing data in a visual, machine-readable form
  3. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
  4. are small blocks of data created by a web server while a user is browsing
  5. is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information,
  6. is a digital multimedia container format most commonly used to store video and audio
  7. is a mapping from some domain (for example, a range of integers) to bits.
  8. is a bitmap image format that was developed by a team at the online services
  9. is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
  10. is a commonly used method of lossy compression for digital images
  11. Android is a mobile operating system
Down
  1. is an American multinational technology company
  2. is a hardware or software component that stores data so that future requests for that data can be served faster;
  3. also called a central processor or main processor
  4. is a collection of discrete values that convey information
  5. represents text, computer processor instructions, or any other data using a two-symbol system.
  6. is the protection of computer systems and networks
  7. is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
  8. is a method of transmitting and receiving messages using electronic devices.
  9. is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device

20 Clues: Android is a mobile operating systemis an American multinational technology companyalso called a central processor or main processoris the protection of computer systems and networksis a collection of discrete values that convey informationis a commonly used method of lossy compression for digital images...

Data Protection 2022-09-19

Data Protection crossword puzzle
Across
  1. To gather compromised information and/or defense secrets
  2. Individuals who want to attack computers yet lack the knowledge
  3. Following a victim with authorized credentials through a door or other secure building access point
  4. Data at rest
  5. Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
  6. Designed to hold a computer system or the data it contains captive until a payment
  7. A security breach can have a negative long-term impact on an organization’s _________
  8. More targeted version of the phishing
  9. Employees, contract staff or trusted partners
  10. Telling a computer to perform some task using CLI
  11. Cyberwarfare can destabilize a nation
Down
  1. an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
  2. Preventing unwanted changes or alteration
  3. Network, Devices, Power Grid, Roads
  4. Data traveling between information systems
  5. A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
  6. Core Principles of Cybersecurity
  7. Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
  8. Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
  9. Amateurs or skilled attackers outside of the organization
  10. Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
  11. Breaks into networks or computer systems to identify and improve any weaknesses
  12. Technique used on unshredded documents
  13. Make political statements in order to raise awareness about issues
  14. Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems

25 Clues: Data at restCore Principles of CybersecurityNetwork, Devices, Power Grid, RoadsMore targeted version of the phishingCyberwarfare can destabilize a nationTechnique used on unshredded documentsPreventing unwanted changes or alterationData traveling between information systemsEmployees, contract staff or trusted partners...

RU ITEC411 Chapter 5 2025-03-19

RU ITEC411 Chapter 5 crossword puzzle
Across
  1. the use of computer hacking for politically or socially motivated purposes
  2. a cyberattack that uses fake calls to trick people into giving sensitive information
  3. an act that makes it so that gambling businesses cannot knowingly accept bets/wagers from people over the internet
  4. an international organization that allows people to buy services from other countries as long as its legal in their own
  5. Unique physiological or behavioral characteristics that are used to verify the identity of a person
  6. a software used to prevent/delete viruses from a computer
  7. a cyberattack that uses fake texts to trick people into giving sensitive information
  8. a computer worm that targets control systems and was thought to be the cause of the damage to the nuclear program of Iran
  9. people who are considered cybersecurity professionals who use their skills show system vulnerabilities
  10. a security barrier that monitors incoming and outgoing network traffic
  11. a law made to help with national security by creating more government surveillance
Down
  1. a cyberattack that uses fake emails to trick people into giving sensitive information
  2. a type of program designed to prevent/find unwanted spyware programs
  3. a decoy system designed to trap potential attackers
  4. The act of going to a foreign place with libel laws so the person can sue
  5. a cyberattack that uses fake websites to trick people into giving sensitive information
  6. the act of breaking unto digital devices intentionally
  7. a cyberattack that makes a computer resource unavailable to users by overwhelming it with traffic
  8. the illegal acquisition and use of a person's identifying information
  9. a bill passed in the US that fixed the existing computer fraud law

20 Clues: a decoy system designed to trap potential attackersthe act of breaking unto digital devices intentionallya software used to prevent/delete viruses from a computera bill passed in the US that fixed the existing computer fraud lawa type of program designed to prevent/find unwanted spyware programs...

BUAW Crossword 2024-11-12

BUAW Crossword crossword puzzle
Across
  1. The act of adhering to laws, regulations, and standards.
  2. An official examination and verification of financial accounts and records.
  3. A portion of a company's earnings distributed to shareholders.
  4. Any individual or group that has an interest in the operations of a business.
  5. The act of reporting illegal or unethical practices within an organization, often to an external body or regulatory agency.
  6. The process of distributing decision-making power away from a central authority to smaller, localized units.
  7. A digital or virtual currency that uses cryptography for security.
  8. A method for identifying and assessing risks through Threat, Assessment, Risk, and Action.
  9. A business structure where two or more individuals share ownership and responsibility.
  10. The process of creating a unique identity for a product or company in the marketplace.
  11. The practice of conducting business in an open and accountable manner.
  12. The ability to maintain or improve business operations without depleting natural resources.
  13. A market structure dominated by a small number of large firms, leading to limited competition.
Down
  1. A market state where supply and demand are balanced.
  2. A company’s financial obligations or debts.
  3. The combination of two or more companies into one entity.
  4. The availability of assets to meet short-term obligations
  5. The value of ownership interest in a business, after liabilities are subtracted.
  6. Financial assets used by a business to fund its operations and growth.
  7. A decentralized digital ledger technology used for secure, transparent transactions, often associated with cryptocurrency.
  8. The practice of contracting external parties to perform business functions or services.
  9. The practice of protecting computer systems and networks from digital threats such as hacking, malware, and data breaches.
  10. Rules or laws created to control or govern business practices.

23 Clues: A company’s financial obligations or debts.A market state where supply and demand are balanced.The act of adhering to laws, regulations, and standards.The combination of two or more companies into one entity.The availability of assets to meet short-term obligationsA portion of a company's earnings distributed to shareholders....

TTS29X_D 2025-04-22

TTS29X_D crossword puzzle
Across
  1. Istilah yang digunakan untuk menggambarkan tanda yang digunakan untuk membedakan produk atau jasa
  2. Proses untuk memperoleh perlindungan HAKI di beberapa negara
  3. Scientist Ahli yang mengelola data besar menggunakan berbagai algoritma dan analisis
  4. Proses memeriksa apakah konten yang ada melanggar kebijakan atau hukum
  5. Istilah yang digunakan untuk menggambarkan proses produksi konten digital yang melibatkan kolaborasi antara kreator konten dan komunitas budaya tertentu.
  6. Sebutkan satu contoh platform media sosial yang populer digunakan untuk membagikan konten digital berbasis budaya
  7. Jenis konten yang dapat mengganggu kenyamanan atau melanggar etika
  8. Pekerjaan yang mengembangkan perangkat lunak untuk berbagai keperluan
  9. Istilah yang digunakan untuk menggambarkan penyebaran konten digital yang cepat dan luas melalui media sosial
  10. Jenis HAKI yang melindungi penemuan dan inovasi teknologi
  11. Orang yang bekerja untuk mengelola basis data dan memastikan integritasnya
  12. Profesi yang menangani keamanan sistem komputer dan jaringan
  13. Sintaks pencarian untuk mencari cache halaman web
Down
  1. Kegiatan yang dilakukan untuk meninjau dan menghapus konten yang tidak sesuai
  2. Profesi yang bertugas mengelola dan merawat jaringan komputer
  3. Sintaks pencarian untuk mencari kata dalam teks halaman
  4. Pemeriksaan terhadap gambar, video, atau teks untuk menghindari penyebaran kebencian
  5. Perangkat atau sistem yang digunakan untuk mendeteksi konten berbahaya
  6. Lembaga internasional yang menangani HAKI
  7. Sebutkan satu contoh platform online yang dapat digunakan untuk membagikan konten digital berbasis budaya
  8. Sintaks pencarian untuk mencari hasil pencarian yang terkait dengan kata tertentu
  9. Sebutkan satu contoh jenis konten digital yang dapat digunakan untuk mempromosikan budaya lokal
  10. Cipta Istilah yang digunakan untuk menggambarkan hak eksklusif yang diberikan kepada pencipta karya intelektual
  11. Sintaks pencarian untuk mencari kata dalam judul halaman
  12. Sintaks pencarian untuk mencari kata dalam URL

25 Clues: Lembaga internasional yang menangani HAKISintaks pencarian untuk mencari kata dalam URLSintaks pencarian untuk mencari cache halaman webSintaks pencarian untuk mencari kata dalam teks halamanSintaks pencarian untuk mencari kata dalam judul halamanJenis HAKI yang melindungi penemuan dan inovasi teknologi...

Internet Safety 2025-02-26

Internet Safety crossword puzzle
Across
  1. Editing an image
  2. Criminal activities carried out by means of computers or the internet.
  3. Online grooming is when someone uses the internet to build a relationship with a young person, with the intention of assault
  4. The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user
  5. The fraudulent practice of sending emails or other messages Purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  6. The repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
  7. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  8. Using all caps
  9. Bullying online
  10. The correct or acceptable way of communicating on the internet.
  11. A piece of data from a website that is stored within a web browser that the website can retrieve at a later time
  12. A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
Down
  1. Someone who uses the internet to commit sexual acts towards children
  2. The intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes
  3. Using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
  4. Joking about someone online
  5. Conversation
  6. Downloading and distributing copyrighted works digitally without permission
  7. Unique trail of data that a person creates while using the internet.
  8. Protecting networks, devices, and data from unauthorized access or criminal use

20 Clues: ConversationUsing all capsBullying onlineEditing an imageJoking about someone onlineThe correct or acceptable way of communicating on the internet.Someone who uses the internet to commit sexual acts towards childrenUnique trail of data that a person creates while using the internet....

Abdoulaye's word puzzle 2025-02-27

Abdoulaye's word puzzle crossword puzzle
Across
  1. talk in a friendly and informal way.
  2. (short for weblog) Blog is an abbreviation of “weblog”
  3. Flame trolling is the posting of a provocative or offensive message, known as flamebait
  4. shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
  5. the intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes.
  6. an animal that naturally preys on others.
  7. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  8. Typing in all CAPPPSSS!!!!!!.
  9. Theft identity theft can sometimes be a component of impersonation
  10. using the Internet, email, or other electronic communications to stalk someone.
Down
  1. the unique trail of data that a person or business creates while using the internet
  2. sending,posting, or sharing negative, harmful, false, or mean content about someone else.
  3. the correct or acceptable way of communicating on the internet.
  4. unauthorized reproduction or distribution of someone's intellectual property without their consent.
  5. small text files that websites store on your computer to remember information about you and your browsing activity
  6. the practice of protecting systems, networks, and programs from digital attacks.
  7. the practice of preparing or training someone for a particular purpose or activity.
  8. to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
  9. Settings controls available on many websites and apps to limit who can access your profile and what information visitors can see.
  10. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.

20 Clues: Typing in all CAPPPSSS!!!!!!.talk in a friendly and informal way.an animal that naturally preys on others.(short for weblog) Blog is an abbreviation of “weblog”the correct or acceptable way of communicating on the internet.Theft identity theft can sometimes be a component of impersonation...

Crossword Puzzle 2025-03-04

Crossword Puzzle crossword puzzle
Across
  1. The percentage of available hotel rooms sold
  2. – A type of event that is a mix of in-person and virtual event experiences
  3. A diagram showing a process step by step
  4. Direct _______ Conversion - Immediate switch from an old system to a new one
  5. A tiny chip used for tracking objects and individuals
  6. _______ Meetings - Online gatherings where participants join remotely
  7. A type of expense that is tied to a specific project or service
  8. A type of conversion but while running both old and new systems simultaneously
  9. – A type of communication that leverages wireless technology and is used for contactless payments and access control
  10. (2 words) Large and complex datasets used for trend analysis
  11. (2 words) Unauthorized access or release of personal data
  12. An Analysis that assesses emotions in digital communications
  13. (2 words) An on-site assessment for planning or evaluation purposes
  14. Costs which are unexpected expenses and not initially considered
  15. _______ Rate - A measure of interaction with online content
  16. Small files websites use to track visitor activity
Down
  1. (2 words) A system offering rewards for repeat customers
  2. Protecting digital systems from unauthorized access
  3. The right to control personal information
  4. Costs that are expenses which are not directly linked to a specific project or service
  5. _______ Recognition - Technology that identifies attendees based on facial features
  6. A type of pricing whereby the manager adjusts prices based on demand and consumer data
  7. A set of rules a computer follows to process data
  8. _______ Retrieval Systems - Tools used to capture attendee contact information at events
  9. _______ Learning - AI that improves its performance through experience
  10. Scrambling data to protect sensitive information
  11. Event _______ - Digital or printed identification for event attendees
  12. The amount of data a network can handle at one time

28 Clues: A diagram showing a process step by stepThe right to control personal informationThe percentage of available hotel rooms soldScrambling data to protect sensitive informationA set of rules a computer follows to process dataSmall files websites use to track visitor activityProtecting digital systems from unauthorized access...

INFLUENCE OF SOCIAL MEDIA IN INDIA 2025-03-05

INFLUENCE OF SOCIAL MEDIA IN INDIA crossword puzzle
Across
  1. Study of mechanical principles in biological systems
  2. Technology that overlays digital elements in the real world
  3. Materials that change properties in response to environmental conditions
  4. Manipulation of matter on an atomic and molecular scale
  5. Computing systems inspired by human brain functioning
  6. Unmanned aerial vehicles that operate without direct human control
  7. The use of technology to perform tasks with minimal human intervention
  8. Technology that creates three-dimensional objects layer by layer
  9. Machines designed to simulate human intelligence
  10. Protection of internet-connected systems from cyber threats
  11. Cars powered by electricity instead of fossil fuels
  12. Vehicles that operate without human intervention using AI and sensors
  13. Network of physical devices connected to the internet for data exchange
Down
  1. A decentralized digital ledger for secure transactions
  2. Analysis of vast amounts of structured and unstructured data
  3. Environmentally friendly innovations for sustainability
  4. Urban development integrating IoT and sustainable technology
  5. The use of living organisms for technological advancements
  6. Engineering innovations for space travel and research
  7. Remote servers providing computing resources over the internet
  8. Algorithms that allow computers to learn from data and improve over time
  9. The application of computer science in biological research
  10. Engineering that designs and builds robots for various applications
  11. Electronic devices worn on the body for health and communication
  12. A new computing paradigm using quantum mechanics principles
  13. A simulated experience that can be similar to or completely different from reality
  14. Modifying genetic material to create desired biological traits
  15. Engineering solutions focused on reducing carbon footprint
  16. Energy sources that are naturally replenished, such as solar and wind
  17. The next-generation wireless network for faster data transfer

30 Clues: Machines designed to simulate human intelligenceCars powered by electricity instead of fossil fuelsStudy of mechanical principles in biological systemsEngineering innovations for space travel and researchComputing systems inspired by human brain functioningA decentralized digital ledger for secure transactions...

Tugas Informatika Terakhir 2025-05-26

Tugas Informatika Terakhir crossword puzzle
Across
  1. Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
  2. Platform digital untuk pendidikan Islam dalam smart city.
  3. Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
  4. Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
  5. Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
  6. Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
  7. Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
  8. Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
  9. Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
  10. Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
  1. Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
  2. Teknologi untuk sholat berjamaah virtual dalam smart city.**
  3. Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
  4. Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
  5. Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
  6. Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
  7. Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
  8. Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
  9. Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
  10. Kota masa depan dalam Islam yang makmur dan berkelanjutan.

20 Clues: Platform digital untuk pendidikan Islam dalam smart city.Kota masa depan dalam Islam yang makmur dan berkelanjutan.Teknologi untuk sholat berjamaah virtual dalam smart city.**Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12)....

PROTECT YOUR PRIVACY 2025-01-09

PROTECT YOUR PRIVACY crossword puzzle
Across
  1. something that the FBI and CIA and NSA claim to protect us from
  2. NSA program that allowed telecommunication companies to turn over customer data
  3. this group was surveilled under the COINTELPRO program
  4. house leader who was very critical of the FBI and J. Edgar Hoover who later disappeared in a mysterious plane vanishing in Alaska
  5. the practice of protecting systems devices and data from cyber attacks
  6. collects and analyzes real time internet data
  7. something the FBI and the CIA commit
  8. profoundly immoral and wicked
  9. this group was surveilled under the COINTELPRO program
  10. president who signed the Executive Order 12,333
  11. secretly monitoring and recording a person's communications
  12. in 2013 this whistleblower leaked NSA documents
  13. group of seven judges picked by the Chief Justice who review government requests for warrants to authorize electronic surveillance for foreign agents or American citizens suspected of involvement in espionage
  14. transmits a mobile phone's location via hidden text message
Down
  1. edited in order to obscure or remove information
  2. something the FBI and NSA do
  3. how long before the parkland shooting that the FBI received a tip
  4. a key reason for the COINTELPRO program
  5. director of the NSA
  6. group of lawyers that has struggled to rein in the illegal surveillance by the government
  7. what the FBI did to MLK
  8. collects mobile phone location data and eavesdrops
  9. this person was murdered by a member of the KKK who was also an FBI informant
  10. FBI surveillance and neutralization program of lawful political dissent
  11. this group was surveilled under the COINTELPRO program
  12. carry out a systematic or formal inquiry to discover and examine the facts
  13. act that allowed the government to collect a record of every single phone call made by every single American "on an ongoing daily basis"

27 Clues: director of the NSAwhat the FBI did to MLKsomething the FBI and NSA doprofoundly immoral and wickedsomething the FBI and the CIA commita key reason for the COINTELPRO programcollects and analyzes real time internet datapresident who signed the Executive Order 12,333in 2013 this whistleblower leaked NSA documents...

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

Perkembangan Ekonomi Digital 2025-11-15

Perkembangan Ekonomi Digital crossword puzzle
Across
  1. ? Perdagangan elektronik antar-perusahaan (Business-to-Business).
  2. ? Istilah untuk toko fisik yang menjual produk di internet.
  3. ? Pembayaran non-tunai yang menggunakan kode unik.
  4. ? Proses untuk mengubah data menjadi format digital.
  5. ? Singkatan dari Non-Fungible Token.
  6. ? Bisnis yang fokus menyediakan produk atau layanan dengan pertumbuhan cepat dan didukung teknologi.
  7. ? Model kerja yang memanfaatkan pekerja lepas untuk proyek-proyek tertentu.
  8. ? Jenis kecerdasan buatan yang sering digunakan dalam layanan pelanggan digital.
  9. ? Sebuah perusahaan yang nilainya telah mencapai 10 miliar dolar AS.
  10. ? Inovasi yang menggabungkan teknologi dan layanan keuangan (Financial Technology).
  11. ? Model bisnis yang memungkinkan penjual tidak perlu menyimpan stok barang sendiri.
  12. ? Startup bervaluasi lebih dari satu miliar dolar AS.
  13. ? Keamanan sistem elektronik dan data dari serangan siber.
  14. ? Sebuah file kecil yang disimpan di komputer pengguna dan berfungsi melacak riwayat penelusuran.
  15. ? Pemanfaatan big data untuk memprediksi perilaku konsumen.
Down
  1. ? Transaksi keuangan tanpa perlu tatap muka menggunakan gawai.
  2. ? Mata uang digital terdesentralisasi pertama.
  3. ? Istilah untuk semua aset yang berupa data elektronik di internet.
  4. ? Aktivitas promosi berbayar yang ditargetkan di media sosial.
  5. ? Istilah yang merujuk pada peminjaman uang secara digital.
  6. ? Perangkat lunak yang memungkinkan pengguna menjelajahi internet.
  7. ? Platform tempat kreator mendapatkan donasi dari audiensnya.
  8. ? Kemampuan untuk saling terhubung dan berbagi data antarperangkat (Internet of Things).
  9. ? Istilah untuk transaksi yang terjadi secara langsung antara konsumen (Customer-to-Customer).
  10. ? Layanan transportasi berbasis aplikasi, seperti Gojek atau Grab.
  11. ? Bentuk investasi atau pendanaan oleh banyak orang melalui platform internet.
  12. ? Kegiatan pemasaran melalui mesin pencari (Search Engine Marketing).
  13. ? Suatu sistem yang menjamin kerahasiaan dan integritas data (sering digunakan di blockchain).
  14. ? Istilah umum untuk pasar daring tempat pembeli dan penjual bertemu.
  15. ? Penyimpanan data dan aplikasi di internet.

30 Clues: ? Singkatan dari Non-Fungible Token.? Penyimpanan data dan aplikasi di internet.? Mata uang digital terdesentralisasi pertama.? Pembayaran non-tunai yang menggunakan kode unik.? Proses untuk mengubah data menjadi format digital.? Startup bervaluasi lebih dari satu miliar dolar AS.? Keamanan sistem elektronik dan data dari serangan siber....

FITAVocab.TC 2013-05-16

FITAVocab.TC crossword puzzle
Across
  1. programs that you can download
  2. ethical uses of or on a computer or the web
  3. circuit board
  4. something that shows off a a business and shows people what it is about
  5. crediting a persons work
  6. extra docking system
  7. the security of or on a computer
  8. a paid internet access
  9. central processing unit
  10. a companies "slogan"
  11. a type of layout
  12. a format of a program on your computer
  13. a combination of many search engines
  14. a program that allows you to create documents
  15. the thing at the top of the screen
  16. a port to get wifi
  17. storing space
  18. liquid crystal display
  19. an illegal way of taking credit for somebody's invention
  20. light emitting diode
  21. National Cyber Security Alliance
  22. what you have on you desktop already
Down
  1. a term that describes safety o the computer or on the web
  2. decision tool
  3. a place where you can virtually go and search on the web
  4. a system that allows you to connect to other peoples devices over wifi or cellular data
  5. cd port
  6. an adjective that describes cyber in a way that is someway pixel ly
  7. the old fashion watch "not digital"
  8. things that you can buy to play or enjoy on
  9. confusing
  10. a term that describes the web and computers
  11. a virtually folder where you can save your documents, files
  12. your work
  13. a user that is online
  14. a device that can go anywhere
  15. a thing of the computer that allows you to move around on the screen or click
  16. memory card

38 Clues: cd portconfusingyour workmemory carddecision toolcircuit boardstoring spacea type of layouta port to get wifiextra docking systema companies "slogan"light emitting diodea user that is onlinea paid internet accessliquid crystal displaycentral processing unitcrediting a persons worka device that can go anywhereprograms that you can download...

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) crossword puzzle
Across
  1. Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
  2. Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
  3. Conducting meetings between people in different locations using video and audio connections.
  4. Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
  5. The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
  6. The science or practice of encoding information to prevent unauthorized access, especially in information security.
  7. Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
  8. Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
  9. The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
  10. Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
  1. Employing data and algorithms to create models that predict future outcomes or behaviors.
  2. The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
  3. Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
  4. The commitment to complying with established standards, specifications, or regulations.
  5. Catering to a specific segment or group with unique preferences or needs.
  6. The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
  7. Alternative problem-solving methods employed when conventional approaches fail.
  8. The capability of being customized or adapted to suit individual preferences or needs.
  9. Losing interest or focus during discussions, indicating a lack of engagement or understanding.
  10. A systematic approach or set of procedures for solving a problem or accomplishing a task.

20 Clues: Catering to a specific segment or group with unique preferences or needs.Alternative problem-solving methods employed when conventional approaches fail.The capability of being customized or adapted to suit individual preferences or needs.The commitment to complying with established standards, specifications, or regulations....

Literasi Digital 2024-08-13

Literasi Digital crossword puzzle
Across
  1. salah satu Pillar literasi digital
  2. aplikasi mengirim pesan di handpone
  3. proses meyakinkan penggunaan layanan digital dengan aman
  4. Informasi yang tidak sengaja salah/akurat
  5. kata lain keamanan siber
  6. perangkat dalam komputer
  7. dunia bisnis
  8. salah satu perangkat lunak password manager
  9. alamat web address bar peramban
  10. lisensi dimana seluruh hak cipta terhadap perangkat lunak telah dilepaskan
  11. web penjelajah internet terus menerus
  12. kecakapan media digital
  13. singkatan dari Software of a service
  14. sistem menggunakan perangkat keras
  15. fitur yang dikembangkan oleh peramban
  16. mencari halaman dengan judul tertentu
  17. mencari konten yang muncul di alamat domain
  18. situs web
  19. bidang lain informatika
  20. lisensi perdaganga
  21. pembaruan perangkat lunak
  22. kata kunci khusus yang digunakan dalam pencarian
Down
  1. provokasi di media sosia
  2. tantangan era literasi digita
  3. lisensi publik umum
  4. literasi yang mencari dan memahami yang ditemukan
  5. informasi yang dikumpulkan oleh web crawler
  6. kata lain dari browser
  7. elektronik kepanjangan dari TE
  8. kata kunci pengaman handphone
  9. mesin pencari khusus anak²
  10. penyadap media sosial
  11. perangkat kedua dalam komputer
  12. perangkat lunak yang digunakan untuk mengakses informasi di internet
  13. tempat jasa SAS beroperasi
  14. profesi bidangn informatika
  15. sebutan komputer di Amerika Serikat
  16. teknologi informasi dan komunikasi
  17. fitur pencarian yang terus meningkat
  18. Engine mesin pencari
  19. lisensi yang boleh menggunakan perangkat lebih
  20. gak atas kekayaan intelektua
  21. kata lain lisensi gratis
  22. Informasi yang tidak benar
  23. Audio konten yang berupa suara yang bisa didedidengarkan
  24. manager pengelola kata sandi supaya aman
  25. jaringan komunikasi
  26. dasar kajian data
  27. intelektual hasil buah pikir dari perangkat lunak
  28. salah satu perilaku yang harus diterapkan dalam budaya digital
  29. yayasan perangkat lunak bebas

51 Clues: situs webdunia bisnisdasar kajian datalisensi perdagangalisensi publik umumjaringan komunikasiEngine mesin pencaripenyadap media sosialkata lain dari browserkecakapan media digitalbidang lain informatikaprovokasi di media sosiakata lain keamanan siberperangkat dalam komputerkata lain lisensi gratispembaruan perangkat lunakmesin pencari khusus anak²...

Science technology & society 2024-12-16

Science technology & society crossword puzzle
Across
  1. Earth's rising temperature.
  2. Number of species in an area.
  3. Long-term weather patterns.
  4. Height above sea level.
  5. Radical beliefs or actions.
  6. Basic unit of biological classification.
  7. Wireless identification technology.
  8. Early long-distance communication system.
  9. Early sound playback device.
  10. Political decision-making stalemate.
  11. Worldwide interconnectedness.
  12. Layer of gases around Earth.
  13. Computer's processing chip.
  14. Science of classifying organisms.
  15. Broadest biological group.
  16. Floating water droplets in the sky.
  17. Immersive digital environment.
  18. Tiny electronic switch.
  19. Digital currency system.
  20. Public participation in research.
  21. Group of related species.
  22. Global disease outbreak.
  23. Connected system of computers.
  24. Large, slow-moving ice masses.
  25. Genetic sequencing process.
  26. Taxonomic group below order.
  27. Rank below phylum.
  28. Unfair treatment of groups.
  29. Unequal access to resources.
  30. Variety of all life forms.
  31. Government collection of revenues.
Down
  1. Body that rules a nation.
  2. Heat-trapping atmospheric gases.
  3. Freedom from surveillance.
  4. Long-term shifts in climate.
  5. Look-alike species.
  6. Popular social network site.
  7. Day-to-day atmospheric conditions.
  8. System of medical services.
  9. Machine-based decision-making.
  10. Ability to analyze information sources.
  11. Unauthorized computer infiltrator.
  12. Grouping of related families.
  13. Overflow of water onto land.
  14. Community well-being efforts.
  15. Tiny particles in the air.
  16. Digital ledger system.
  17. Online social platforms.
  18. Frozen water falling as flakes.
  19. Variation in DNA within species.
  20. New ideas or inventions.
  21. Gas from burning fossil fuels.
  22. Potent greenhouse gas.
  23. Transmitted information wave.
  24. Protection from online threats.
  25. Major taxonomic category.
  26. Variety of ecosystems.
  27. Sharp division of opinions.
  28. Contaminated air particles.

59 Clues: Rank below phylum.Look-alike species.Digital ledger system.Potent greenhouse gas.Variety of ecosystems.Height above sea level.Tiny electronic switch.Online social platforms.New ideas or inventions.Digital currency system.Global disease outbreak.Body that rules a nation.Major taxonomic category.Group of related species.Freedom from surveillance....

Current Events Final Exam 2024-05-08

Current Events Final Exam crossword puzzle
Across
  1. - Competitive video gaming.
  2. - Able to be maintained long-term. (Often refers to environmental practices)
  3. - Application software for a smartphone or computer.
  4. - Protecting computer systems from attacks.
  5. - Spreading quickly on social media.
  6. - A virtual world users can access and interact with.
  7. - Audio program series distributed online.
  8. - Digital currency secured by cryptography.
  9. - Playing video games.
  10. - Energy sources that can be replenished, like solar or wind power.
  11. - Unmanned aerial vehicles used for various purposes.
  12. - Delivering content online in real-time.
  13. - Creating three-dimensional objects from a digital file.
  14. - Billionaire entrepreneur behind companies like Tesla and SpaceX.
  15. (AGI) - Hypothetical AI with human-like intelligence.
  16. - Online seminar or presentation.
Down
  1. - A large-scale disaster or event. (Can be metaphorical)
  2. - Science, Technology, Engineering, and Math education.
  3. - An additional dose of the COVID-19 vaccine given to maintain immunity.
  4. - Long-term shift in weather patterns.
  5. - Virtual reality, a simulated experience.
  6. - Object orbiting Earth used for communication or observation.
  7. - Storing and accessing data through the internet.
  8. - Online platforms for social connection and content sharing.
  9. (AI) - Machines that mimic human cognitive functions.
  10. - Large and complex sets of data used for analysis.
  11. - False or misleading information presented as news.
  12. (IoT) - Network of physical devices connected to the internet.
  13. - Non-fungible token, a unique digital asset.
  14. - Autonomous vehicle that operates without a driver.
  15. - Person with a large online following who promotes products.
  16. (EV) - Vehicle powered by electricity.
  17. - Mobile phone with advanced features.
  18. - The field of designing and building robots.
  19. - Automated vacuum cleaner.
  20. - Using biology to create new products or processes.

36 Clues: - Playing video games.- Competitive video gaming.- Automated vacuum cleaner.- Online seminar or presentation.- Spreading quickly on social media.- Long-term shift in weather patterns.(EV) - Vehicle powered by electricity.- Mobile phone with advanced features.- Delivering content online in real-time.- Virtual reality, a simulated experience....

Science, Technology, and Society 2024-12-15

Science, Technology, and Society crossword puzzle
Across
  1. make changes
  2. replace or modify
  3. coins made of valuable metals
  4. relates to society
  5. condition of a person
  6. relating worldwide
  7. long-term weather condition
  8. way or manner something occurs
  9. lack of evenness
  10. losing something
  11. woody perennial plant
  12. electronic device bigger than laptop
  13. to disturb
  14. wide variety of differences
  15. home of an organism
  16. allows users yo sync data across devices
  17. _______ world due to political polarization
  18. live-able planet in the solar system
  19. to advance
  20. eco______
  21. very important matter for each country
  22. creating something
  23. can be seen in the sky during cloudy days
  24. other word for age
  25. a global network for everyone
  26. a system of recorded transactions
  27. random access memory
  28. the process of coding
  29. woody plant smaller than tree
  30. relates to computers
Down
  1. situation where progress is stalled due to excess demand
  2. even distribution of weight
  3. the Earth
  4. grows in damp habitats
  5. harmful substances in environment
  6. practice of protecting work programs
  7. way of life
  8. area covered with trees
  9. to gain unauthorized access to data
  10. short plants
  11. artificial intelligence
  12. problem for deep discussion
  13. also known as digital divide
  14. information collected
  15. series of actions or steps
  16. there is balance
  17. does not exist physically
  18. legally recognized subject in a nation
  19. medium for mass communication
  20. opposite of old
  21. jumping on the bandwagon
  22. internet of things
  23. robotic process automation
  24. power derived from using resources
  25. unit of heredity
  26. climbing plant
  27. moving river of ice
  28. can be seen falling during snowy weather
  29. relating to present-time
  30. move from one place to another

60 Clues: the Eartheco______to disturbto advanceway of lifemake changesshort plantsclimbing plantopposite of oldlack of evennesslosing somethingthere is balanceunit of heredityreplace or modifyrelates to societyrelating worldwideinternet of thingscreating somethingother word for agehome of an organismmoving river of icerandom access memory...

Information Technology_1 2025-04-03

Information Technology_1 crossword puzzle
Across
  1. A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  2. An error or flaw in software that causes it to produce incorrect or unexpected results.
  3. Software for which the original source code is made freely available and may be redistributed and modified.
  4. Learning A type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
  5. Programming Interface) A set of rules that allows different software applications to communicate with each other.
  6. The maximum rate of data transfer across a given path.
  7. A version control system for tracking changes in source code during software development.
  8. The process of finding and fixing errors in software.
  9. A program that translates source code into executable code.
  10. The practice of protecting systems, networks, and programs from digital attacks.
  11. A basic structure underlying a system, concept, or text.
Down
  1. A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  2. A step-by-step procedure for solving a problem or performing a task.
  3. The delivery of computing services over the internet.
  4. The process of converting data into a code to prevent unauthorized access.
  5. A network security system that monitors and controls incoming and outgoing network traffic.
  6. The part of a website or application that users interact with directly.
  7. An organized collection of data, generally stored and accessed electronically.
  8. (Integrated Development Environment) A software application that provides comprehensive facilities to computer programmers for software development.
  9. A set of rules governing the exchange or transmission of data between devices.

20 Clues: The delivery of computing services over the internet.The process of finding and fixing errors in software.The maximum rate of data transfer across a given path.A basic structure underlying a system, concept, or text.A program that translates source code into executable code.A step-by-step procedure for solving a problem or performing a task....

Digital Transformation in PM 2025-04-30

Digital Transformation in PM crossword puzzle
Across
  1. Services or systems hosted on remote servers and accessed via the internet.
  2. Information Data that is stored and accessible from a single, unified location.
  3. The ability of a system to handle a growing amount of work or its potential to be enlarged.
  4. Occurring immediately and without delay, often used for live updates or collaboration.
  5. Team A group of employees working from different geographical locations.
  6. Management The identification and mitigation of potential problems that could negatively affect a project.
  7. The protection of computer systems and networks from digital attacks or unauthorized access.
  8. Encryption The process of converting data into a coded format to prevent unauthorized access.
  9. (Artificial Intelligence) Technology that enables machines to perform tasks that normally require human intelligence.
  10. The action of working with others to achieve a common goal.
  11. Transformation The integration of digital technologies into all areas of a business to improve operations and value delivery.
  12. Allocation The process of assigning available resources to various tasks to maximize efficiency.
Down
  1. Application Software designed to run on mobile devices, often used to access cloud-based systems.
  2. Authentication A security system that requires more than one form of identification to access data or systems.
  3. The use of technology to perform tasks with minimal human intervention.
  4. Learning A branch of AI where systems learn from data to improve their performance over time without being explicitly programmed.
  5. Management The process of planning, executing, and overseeing a project to meet specific goals and deadlines.
  6. Analytics The use of data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.
  7. Data Analytics The process of examining large and complex data sets to uncover patterns, trends, and insights.
  8. A series of steps or processes through which a task is completed.

20 Clues: The action of working with others to achieve a common goal.A series of steps or processes through which a task is completed.The use of technology to perform tasks with minimal human intervention.Team A group of employees working from different geographical locations.Services or systems hosted on remote servers and accessed via the internet....

tugas daring kelas X-I(Mahatma Bara) 2025-04-17

tugas daring kelas X-I(Mahatma Bara) crossword puzzle
Across
  1. Hak eksklusif bagi pencipta untuk mengumumkan atau memperbanyak ciptaannya
  2. Apa nama proses di mana mesin pencari menggunakan algoritma untuk menentukan urutan hasil pencarian yang paling relevan?
  3. Perusahaan search engine paling populer
  4. Proses menyebarkan konten digital ke berbagai media atau audiens
  5. Salah satu tantangan utama dalam validasi konten negatif yang melibatkan subjektivitas penilaian
  6. Kata atau frasa yang diketik pengguna
  7. Jenis konten digital yang menggabungkan unsur visual dan suara
  8. Apa singkatan dari istilah yang merujuk pada proses pengindeksan halaman web oleh mesin pencari?
  9. Manfaat HAKI bagi pemegang hak atau pemilik adalah
  10. Proses membuat konten digital yang mengangkat cerita rakyat dari daerah tertentu.
  11. Singkatan dari Hak Atas Kekayaan Intelektual
  12. ahli yang bertanggung jawab untuk mengamankan jaringan komputer
  13. Sistem otomatis yang digunakan untuk mendeteksi konten negatif secara cepat dan efisien
Down
  1. proses mengidentifikasi dan menandai konten yang berpotensi berbahaya.
  2. Proses membuat konten digital dari awal hingga siap dipublikasikan
  3. Unsur utama yang harus diperiksa dalam validasi konten negatif agar tidak tersebar luas.
  4. Profesi yang mengelola dan mengamankan jaringan komputer dalam sebuah organisasi.
  5. profesi yang bertugas merancang dan memelihara software
  6. Lembaga pemerintah yang mengelola Hak Kekayaan Intelektual di Indonesia
  7. Apa istilah yang digunakan untuk menyebut halaman hasil pencarian yang muncul setelah pengguna memasukkan kata kunci di mesin pencari?
  8. Profesi yang menganalisis data untuk membantu pengambilan keputusan bisnis.
  9. Proses menghapus atau menandai konten yang mengandung unsur kekerasan, pornografi, atau ujaran kebencian
  10. Platform media sosial yang sering digunakan untuk menyebarkan video budaya tradisional.
  11. Hak eksklusif yang diberikan negara kepada penemu atas hasil invensinya di bidang teknologi
  12. Profesi yang bertugas menulis dan mengembangkan program komputer

25 Clues: Kata atau frasa yang diketik penggunaPerusahaan search engine paling populerSingkatan dari Hak Atas Kekayaan IntelektualManfaat HAKI bagi pemegang hak atau pemilik adalahprofesi yang bertugas merancang dan memelihara softwareJenis konten digital yang menggabungkan unsur visual dan suaraahli yang bertanggung jawab untuk mengamankan jaringan komputer...

Post Cold War 2024-10-01

Post Cold War crossword puzzle
Across
  1. The practice of protecting computer systems and networks from unauthorized access or attacks.
  2. A long-term shift in global temperatures and weather patterns caused by human activity.
  3. A political movement claiming to represent the voice of ordinary people against elites.
  4. The process of increasing interconnection between countries through trade, culture, and technology.
  5. 2015 international treaty aimed at reducing global greenhouse gas emissions.
  6. U.S.-led global military campaign launched after the 9/11 attacks.
  7. A series of coordinated terrorist attacks in 2001 that reshaped global security policies.
  8. The practice of using resources responsibly to ensure future generations can meet their needs.
  9. A conflict in which countries impose tariffs on each other, as seen between the U.S. and China.
Down
  1. Assistance provided during crises such as natural disasters, conflicts, or famines.
  2. Initiative China’s global infrastructure development strategy aimed at increasing its global influence.
  3. The rapid development of the internet and social media since the 1990s.
  4. The disintegration of this superpower in 1991 marked the end of the Cold War.
  5. Political and economic union of 27 European countries, facing challenges like Brexit.
  6. Laws regulating how people can enter and live in a country, often debated in the context of security and economics.
  7. Online platforms that have transformed global communication and activism, such as Facebook and Twitter.
  8. The use of violence, especially against civilians, to achieve political goals.
  9. The United Kingdom’s decision to leave the European Union in 2016.
  10. Country whose rapid economic and political rise has challenged U.S. global dominance.
  11. Political ideology focused on promoting the interests of one's country, often at the expense of global cooperation.

20 Clues: The United Kingdom’s decision to leave the European Union in 2016.U.S.-led global military campaign launched after the 9/11 attacks.The rapid development of the internet and social media since the 1990s.2015 international treaty aimed at reducing global greenhouse gas emissions....