cybersecurity Crossword Puzzles

IT and How Computers Work 2023-07-05

IT and How Computers Work crossword puzzle
Across
  1. this type of memory is permanent and saved on the hard drive
  2. job-specific high-speed wire used to communicate the processor with other components
  3. overseer of the CPU
  4. information that gets returned by the computer
  5. A machine that can quickly complete a vast number of extremely simple tasks.
  6. this type of bus carries data back and forth
  7. Stores data which is virtual information only accessible with a computer
  8. arithmetic and logic operations are processed here
  9. data we give to our computers
  10. printed circuit board that houses important hardware components via ports
  11. 0's and 1's
  12. used to store either temporary or permanent information
  13. limited space, high-speed memory that the CPU can use for quick processing
  14. comprised of the translation of input and the instructions given for output
Down
  1. this type of bus carries a specific address in memory and are unidirectional
  2. A way for computers all around the world to communicate with each other
  3. Making sure the information is communicated and stored safely and securely – only the right people should have access to it
  4. type of input device
  5. "brain of the computer"
  6. physical outlet used to connect outside, IO (Input/Output) devices to a computer.
  7. Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
  8. responsible for the long-term, or secondary storage of data and programs
  9. type of output device
  10. fast and temporary memory
  11. a mouse being clicked
  12. this type of bus carries the control signals to the other components and are unidirectional
  13. the use of technology to organize, store, share, and process information.

27 Clues: 0's and 1'soverseer of the CPUtype of input devicetype of output devicea mouse being clicked"brain of the computer"fast and temporary memorydata we give to our computersthis type of bus carries data back and forthinformation that gets returned by the computerarithmetic and logic operations are processed here...

Public Safety 2024-08-09

Public Safety crossword puzzle
Across
  1. a person whose job is to extinguish fires
  2. the action of evacuating a person or a place
  3. a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
  4. responsible for the prevention and detection of crime and the maintenance of public order
  5. an established or official way of doing something
  6. freedom from disturbance
  7. the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
  8. the action of keeping something harmful under control or within limits
  9. a danger or risk
  10. the action of protecting, or the state of being protected
  11. an act of saving or being saved from danger or distress
Down
  1. a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
  2. the action of stopping something from happening or arising
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  4. the act of compelling observance of or compliance with a law, rule, or obligation
  5. rule or directive made and maintained by an authority
  6. the state of being free from danger or threat
  7. one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
  8. protected from or not exposed to danger or risk; not likely to be harmed or lost
  9. the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise

20 Clues: a danger or riskfreedom from disturbancea person whose job is to extinguish firesthe action of evacuating a person or a placethe state of being free from danger or threatan established or official way of doing somethingrule or directive made and maintained by an authorityan act of saving or being saved from danger or distress...

September Edition Crossword 2024-09-24

September Edition Crossword crossword puzzle
Across
  1. 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
  2. This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
  3. This French political party accused the election of being "stolen" after Michel Barnier was named President.
  4. A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
  5. Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
  6. First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
  7. A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
  8. Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
  9. Surname of the Supreme Allied Commander of NATO.
Down
  1. A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
  2. This Chinese investment program has led to complicated ties with Myanmar.
  3. Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
  4. This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
  5. Campus News Editor Madeline Rowe interned with this former congressman.
  6. A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
  7. A recent rise in this political phenomenon threatens long-term stability and economic performance.
  8. This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
  9. Former vice president of Google's ad platform.
  10. This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
  11. This statute in international law reaffirms the authority of the International Criminal Court.

20 Clues: Former vice president of Google's ad platform.Surname of the Supreme Allied Commander of NATO.Campus News Editor Madeline Rowe interned with this former congressman.This Chinese investment program has led to complicated ties with Myanmar.Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete....

Technology Crossword 2023-06-07

Technology Crossword crossword puzzle
Across
  1. represents text, computer processor instructions, or any other data using a two-symbol system.
  2. is the most important processor in a given computer.
  3. is the protection of computer systems and networks from attack by malicious actors.
  4. is a form of computer memory that can be read and changed in any orde.
  5. is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
  6. is a file format developed by Adobe in 1992 to present document
  7. is a digital multimedia container format most commonly used to store video and audi.
  8. is a collection of discrete values that convey informatio.
  9. is a method of representing data in a visual, machine-readable form
Down
  1. is an American multinational technology company
  2. is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
  3. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  4. are small blocks of data created by a web server.
  5. is a bitmap image format that was developed by a team at the online services provider CompuServe.
  6. is a mobile operating system
  7. is a hardware or software component that stores data so that future requests for that data can be served faster
  8. is a mapping from some domain (for example, a range of integers) to bits.
  9. is a method of transmitting and receiving messages using electronic devices.
  10. is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
  11. is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.

20 Clues: is a mobile operating systemis an American multinational technology companyare small blocks of data created by a web server.is the most important processor in a given computer.is a collection of discrete values that convey informatio.is a file format developed by Adobe in 1992 to present document...

Unit 8 Key Terms 2023-04-27

Unit 8 Key Terms crossword puzzle
Across
  1. taken to achieve this.
  2. a place of refuge or safety.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the
  4. a term typically used to describe international, supranational, and global resource domains in
  5. a tax or duty paid on a particular class of imports or exports.
  6. the system.
  7. to do so.
  8. fiscal policy to stimulate the economy.
  9. sum of money provided by the government or a public body
  10. economically stimulus refers to attempts to use monetary policy
  11. a system of recording information in a way that makes it difficult or impossible to change, hack, or
  12. common-pool resources are found.
  13. the profession, activity or skill of managing international relations, typically
Down
  1. the state of being equal especially in status, rights and opportunities.
  2. a video of a person in which their face or body has been digitally altered so that they appear to be
  3. to reveal personal information, such as passwords and credit card numbers
  4. else, typically used maliciously or to spread false information
  5. money paid regularly at a particular rate for the use of money lent.
  6. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
  7. sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
  8. to influence a country's economy.
  9. businesses.
  10. controlling the overall supply of money that is available to the nation's banks, its consumers, and
  11. a set of tools that a nation's central bank has available to promote sustainable economic growth
  12. the use of government revenue collection and
  13. a countries representative abroad.
  14. existing or occurring within a particular country
  15. assist an industry or business in order to remain competitive.

28 Clues: to do so.businesses.the system.taken to achieve this.a place of refuge or safety.common-pool resources are found.to influence a country's economy.a countries representative abroad.fiscal policy to stimulate the economy.the use of government revenue collection andexisting or occurring within a particular country...

TECH CONNECT 2023-08-30

TECH CONNECT crossword puzzle
Across
  1. Writing and structuring code that computers can execute to perform desired functions.
  2. Programs and applications that run on computers or devices, enabling various tasks.
  3. A set of rules defining how data is transmitted and received across a network.
  4. A interconnected system that allows devices to communicate and share resources.
  5. Implementing systems or processes that operate with minimal human intervention.
  6. The point of interaction between a user and a device or software application.
  7. Writing instructions that computers can understand to perform specific tasks.
  8. Measures to protect digital systems and information from unauthorized access or attacks.
  9. A remote network of servers for storing, managing, and processing data over the internet.
  10. A powerful computer that stores and manages data and resources for other devices.
  11. Intelligence, The ability of machines to simulate human cognitive functions.
Down
  1. Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
  2. Using technology to streamline and execute tasks without human intervention.
  3. The global network connecting computers and devices, facilitating information exchange.
  4. Identifying and removing errors or issues in software code.
  5. The process of introducing new ideas, methods, or technologies to improve existing systems.
  6. Combining different components or systems to work together seamlessly.
  7. Often in the form of facts, figures, or statistics, used for analysis.
  8. Examination of data to extract meaningful insights and make informed decisions.
  9. Converting data into a code to prevent unauthorized access.
  10. Short for "application," referring to software designed for specific tasks or purposes.
  11. The process of designing, creating, and refining software, systems, or products.
  12. Physical components of computers and devices that enable software to function.
  13. The person interacting with a device, system, or software application.
  14. A set of step-by-step instructions for solving a problem or completing a task.

25 Clues: Identifying and removing errors or issues in software code.Converting data into a code to prevent unauthorized access.Combining different components or systems to work together seamlessly.Often in the form of facts, figures, or statistics, used for analysis.The person interacting with a device, system, or software application....

Bureaucracy and Foreign Policy 2024-10-03

Bureaucracy and Foreign Policy crossword puzzle
Across
  1. Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
  2. The method of influencing someone, usually a country, to behave in a certain way
  3. Department that leads the country’s foreign policy
  4. A government’s set of strategies and goals for dealing with other nations
  5. Allows both groups to meet their interests
  6. Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
  7. Large, complex administrative structure that handles the everyday business of an organization
  8. Provides the President with the support and services he needs to govern effectively
  9. Department that oversees and advises the president on military action
  10. Violent attacks against civilians
  11. The President oversees the miliatry as ________-in-chief.
  12. Government officials who live in foreign countries and represent their government
  13. A type of agency such as the CIA, NSA, and DIA
Down
  1. The heads of independent agencies are confirmed by what?
  2. Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
  3. An agreement between countries
  4. Type of aid that helps develop other nations
  5. Congress holds the power of the _________—they control how government money is raised and spent
  6. The federal bureaucracy is part of the ___________ branch.
  7. Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
  8. Economics method to stop trade and assistance to a specific country
  9. Mutually beneficial relationship between an agency, congressional committee, and interest group.
  10. When the U.S. only threatens (key word threatens) to use military forces against another country
  11. Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue

24 Clues: An agreement between countriesViolent attacks against civiliansAllows both groups to meet their interestsType of aid that helps develop other nationsA type of agency such as the CIA, NSA, and DIADepartment that leads the country’s foreign policyThe heads of independent agencies are confirmed by what?...

Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11

Tugas Daring Informatika Salsabila.n.l 30/xi crossword puzzle
Across
  1. digital upaya untuk memerangi penyebaran konten negatif disebut...
  2. analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
  3. creator profesi yang bertugas membuat konten untuk media sosial adalah...
  4. rangkaian karakter yang digunakan untuk mencari informasi di mesin pencari.....
  5. scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
  6. proses penyebaran konten digital kepada khalayak luas disebut...
  7. proses verifikasi kebenaran konten digital disebut...
  8. operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
  9. operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
  10. cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
  11. simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
Down
  1. salah satu contoh platform untuk diseminasi konten digital adalah...
  2. salah satu contoh HAKI adalah...
  3. Tanda kutip ganda (") digunakan untuk mencari frasa yang...
  4. pelanggaran haki dapat dikenakan sanksi...
  5. etika dalam memproduksi dan mendiseminasikan konten digital disebut...
  6. salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan.
  7. profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
  8. salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
  9. dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
  10. salah satu contoh konten digital yang mengandung unsur budaya adalah...
  11. dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
  12. salah satu contoh konten negatif adalah...
  13. hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
  14. organisasi internasional yang mengurusi HAKI adalah...
  15. grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...

26 Clues: salah satu contoh HAKI adalah...pelanggaran haki dapat dikenakan sanksi...salah satu contoh konten negatif adalah...proses verifikasi kebenaran konten digital disebut...organisasi internasional yang mengurusi HAKI adalah...Tanda kutip ganda (") digunakan untuk mencari frasa yang...proses penyebaran konten digital kepada khalayak luas disebut......

TTS27X_D 2025-04-27

TTS27X_D crossword puzzle
Across
  1. Platform atau media yang seringkali menjadi sarana penyebaran konten negatif
  2. Ahli yang mengelola dan memelihara sistem basis data
  3. Untuk mencari informasi dari situs web tertentu, kita dapat menggunakan awalan site diikuti dengan
  4. Simbol asterisk dalam search engine berfungsi sebangai karakter
  5. Kegiatan menyaring atau membersihkan platform digital dari konten yang merugikan
  6. Upaya untuk memperkenalkan dan menyebarkan warisan budaya melalui platfrom digital
  7. Hak eksklu untuk menggunakan simbol, logo, atau nama tertentu dakam kegiatan perdagangan atau jasa
  8. Singkatan dari Hak Kekayaan Intelektual
  9. Adaptasi cerita atau mitos tradisional ke dalam format konten digital yang lebih modern
  10. Profesi yang bertugas merancang dan membangun jaringan komputer
  11. Ahli yang fokus pada keamanan sistem komputer dan jaringan dari ancaman siber
  12. Orang yang memberikan dukungan teknis kepada pengguna komputer dan sistem informasi
  13. Proses awal dalam membuat konten digital yang seringkali terinspirasi dari kekayaan budaya
Down
  1. Bentuk perlindungan HAKI untuk karya cipta di bidang ilmu pengetahuan, seni, dan sastra
  2. Operator logika dalam search engine yang mengharuskan kedua kata kunci ada dalam hasil pencarian
  3. Hak eksklusif yang diberikan kepada invetor atas invensinya
  4. Proses untuk memastikan kebenaran suatu informasi dan menangkal berita bohong
  5. Profesi yang berfokus pada pengembangan dan pemeliharaan situs web
  6. Penggunaan tanda filetype dalam pencarian digunakan untuk mencari file dengan format
  7. Simbol yang digunakan untuk menunjukkann merek dagang yang belum terdaftar secara resmi
  8. Salah satu bentuk konten digital yang efektif menyampaikan cerita rakyat atau legenda daerah
  9. Kemampuan berpikir kritis dan analitis dalam mengevaluasi informasi yang diterima
  10. Situs web atau sistem yang dirancang untuk mencari informasi di internet
  11. Metode untuk memeriksa keaslian gambar atau video yang beredar di internet
  12. Media digital yang sering digunakan untuk menyebarkan konten budaya seperti video tari tradisisonal

25 Clues: Singkatan dari Hak Kekayaan IntelektualAhli yang mengelola dan memelihara sistem basis dataHak eksklusif yang diberikan kepada invetor atas invensinyaSimbol asterisk dalam search engine berfungsi sebangai karakterProfesi yang bertugas merancang dan membangun jaringan komputerProfesi yang berfokus pada pengembangan dan pemeliharaan situs web...

Applications of AI 2025-04-30

Applications of AI crossword puzzle
Across
  1. AI technology that converts spoken words to text
  2. AI tailors educational content to individual students
  3. AI helps with crop monitoring and yield prediction
  4. AI tools can generate novel images and music
  5. AI field focused on understanding and processing human language
  6. Vehicles that use AI to navigate without human input
  7. AI generates content and powers recommendation systems
  8. AI enabling computers to "see" and interpret images
  9. Identifying and labeling patterns, like faces or speech
  10. AI systems that sort and prioritize information
  11. AI detects threats and anomalies in networks
  12. AI programs that help with tasks, often voice-activated
  13. Field where AI diagnoses diseases and analyzes images
  14. AI is used for fraud detection and algorithmic trading in this sector
  15. Autonomous vehicles rely heavily on AI
  16. Chatbots and virtual agents are common here
Down
  1. AI accelerates the process of finding new medicines
  2. AI forecasts equipment failures in industry
  3. AI models help forecast weather and study environmental changes
  4. Personalized learning paths and grading are AI applications here
  5. AI is used to identify and prevent deceptive activities
  6. AI suggests products or content based on user history
  7. AI provides the intelligence for automated machines
  8. AI optimizes production and quality control
  9. AI personalizes advertising and analyzes consumer behavior
  10. AI systems that convert text or speech from one language to another
  11. AI controls non-player characters and generates game content
  12. Identifying objects or patterns in data, often using AI
  13. Creating new content like text, images, or music using AI
  14. AI is good at spotting unusual patterns that might indicate fraud or issues

30 Clues: Autonomous vehicles rely heavily on AIAI forecasts equipment failures in industryAI optimizes production and quality controlChatbots and virtual agents are common hereAI tools can generate novel images and musicAI detects threats and anomalies in networksAI systems that sort and prioritize informationAI technology that converts spoken words to text...

SCIENCE AND TECHNOLOGY 2024-10-25

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. The force that pulls objects toward each other, especially toward the Earth.
  2. The technology used to design and create robots.
  3. The science of building and using tiny structures at a molecular scale.
  4. The basic building block of all living organisms.
  5. The study of matter, energy, and the forces that act on them.
  6. The act of introducing something new, often advancing technology or science.
  7. A proposed explanation made based on limited evidence, to be tested.
  8. Facts or statistics collected for analysis or reference.
  9. The power needed to do work, from sources like fuel, electricity, or the sun.
  10. Something made by humans rather than occurring naturally.
  11. A place where scientists conduct experiments and research.
  12. The study of genes and heredity in living organisms.
  13. A branch of physics studying the behavior of particles on the smallest scales.
  14. A language or set of instructions used to program computers.
  15. The study of stars, planets, and outer space.
Down
  1. A path through which electric current flows.
  2. The molecule that carries genetic information in living organisms.
  3. An imitation of a real-world process for study or training purposes.
  4. A new idea or method that improves how things are done.
  5. The protection of computer systems from digital attacks.
  6. A small piece of matter, like an atom or molecule.
  7. A test done to discover or prove something.
  8. Microscopic organisms, some of which can cause diseases.
  9. A device that orbits Earth or another planet, used for communication or research.
  10. A set of rules or instructions for solving a problem, often used in computing.
  11. A collection of data organized for easy access and analysis.
  12. A small infectious agent that can multiply in living cells.
  13. The process by which species change over time through natural selection.
  14. The use of machines and technology to operate without human intervention.

29 Clues: A test done to discover or prove something.A path through which electric current flows.The study of stars, planets, and outer space.The technology used to design and create robots.The basic building block of all living organisms.A small piece of matter, like an atom or molecule.The study of genes and heredity in living organisms....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Cloud-based vulnerability management platform with scanning and reporting.
  2. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  3. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  4. Security documentation that details system resource usage by users and processes for auditing.
  5. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Policy-based accept or deny of network traffic.
  8. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Injecting malicious scripts into webpages viewed by other users
  3. Matching known patterns of threats against security event data to find potential matches.
  4. Code examination performed without running the malicious program.
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Criminal use of the internet or other electronic means to persistently harass an individual.
  8. Gaining unauthorized access to a secured area by following an authorized person.
  9. Attack that uses a list of commonly used words or phrases to guess a password.
  10. Process of transforming information into a scrambled format to secure it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Gaining unauthorized access to a secured area by following an authorized person.
  3. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Security documentation that details system resource usage by users and processes for auditing.
Down
  1. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. The correlation that matches the known patterns of threats against security event data to find potential matches.
  3. Process of transforming information into a scrambled format to secure it.
  4. Criminal use of the internet or other electronic means to persistently harass an individual.
  5. Attack that uses a list of commonly used words or phrases to guess a password.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Cloud-based vulnerability management platform with scanning and reporting.
  8. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  9. Code examination performed without running the malicious program.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  11. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  12. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  13. Policy-based accept or deny of network traffic.
  14. Graphic object used in reports to visualize the correlation between an object and its performance.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

Issues and Impacts Crossword 2025-12-03

Issues and Impacts Crossword crossword puzzle
Across
  1. Unfairness in algorithms or AI systems that can discriminate
  2. All the information about a person that exists online
  3. Copying someone else’s work without credit
  4. Crime where someone uses another person’s personal details illegally
  5. Illegal activities carried out using computers or the internet
  6. Platforms that can spread misinformation or affect mental health
  7. Technology that identifies people by their face
  8. Incident where sensitive information is accessed without permission
  9. Deliberately posting offensive or upsetting content online
  10. False or misleading information spread online
  11. Protecting systems and data from online threats
  12. Monitoring of people’s activities using technology
Down
  1. Gap between people who have access to technology and those who do not
  2. Computer-generated environment that feels real to users
  3. Software designed to damage or disrupt computers
  4. Legal right protecting creators of software, music, or digital content
  5. Money that exists only electronically, like Bitcoin
  6. Discarded electronic devices that harm the environment
  7. Technology that simulates human thinking and decision-making
  8. Small files stored by websites to track user activity
  9. Software that is freely available and can be modified by anyone
  10. Moral principles guiding responsible use of technology
  11. Process of converting data into code to prevent unauthorized access
  12. Creations of the mind protected by law
  13. Technology that overlays digital information onto the real world
  14. Environmental effects of producing and using technology
  15. Excessive use of technology leading to negative impacts on health or lifestyle
  16. Replacement of human jobs with computer-controlled systems
  17. Fraudulent attempt to steal sensitive information via fake emails or websites
  18. Ensuring personal information is kept safe and not misused
  19. Unauthorized access to computer systems
  20. Programs that can copy themselves and damage computers

32 Clues: Creations of the mind protected by lawUnauthorized access to computer systemsCopying someone else’s work without creditFalse or misleading information spread onlineTechnology that identifies people by their faceProtecting systems and data from online threatsSoftware designed to damage or disrupt computers...

Review Puzzle 2026-03-16

Review Puzzle crossword puzzle
Across
  1. A digital circuit used to perform arithmetic and logic operations.
  2. An international character encoding standard that provides a unique number for every character across languages and scripts
  3. A storage space for units of memory that are used to transfer data for immediate use by the CPU (Central Processing Unit) for data processing.
  4. A very small piece of code contained on a chip on your system board.
  5. The main circuit board in a computer system. It connects all of the internal components
  6. American Standard Code for Information Interchange.
  7. A type of cybersecurity threat that targets users directly through email, text, or direct messages
  8. Measures the speed at which electronic components process instructions from software.
  9. A form of computer storage that allows short-term data access.
  10. A physical data storage device that stores digital information.
  11. The process of sending and receiving data to/from the processor and memory
Down
  1. A fundamental electronic component that can amplify or switch electronic signals and electrical power.
  2. The primary functional component of a computer.
  3. The essential component of a processor that generates a pulse, functioning like a heartbeat, to regulate the timing of operations.
  4. A storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
  5. Is the responsible for reading instructions and ensure it execution.
  6. The process of converting encoded or encrypted information back into its original format.
  7. A bit is the smallest unit of digital information and can have a value of either 0 or 1.
  8. And/Or
  9. Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

20 Clues: And/OrThe primary functional component of a computer.American Standard Code for Information Interchange.A form of computer storage that allows short-term data access.A physical data storage device that stores digital information.A digital circuit used to perform arithmetic and logic operations....

Technology 2026-02-26

Technology crossword puzzle
Across
  1. Mining The process of discovering patterns and knowledge from large amounts of data.
  2. A network security system that monitors and controls incoming and outgoing network traffic.
  3. Source Software with source code that anyone can inspect, modify, and enhance.
  4. The practice of protecting systems, networks, and programs from digital attacks.
  5. of Things A network of physical objects embedded with sensors and software to connect and exchange data.
  6. The series of screens, pages, and visual elements that a user interacts with on a device.
  7. Computing The delivery of computing services—including servers and storage—over the internet ("the cloud").
  8. Application Programming Interface; a way for two or more computer programs to communicate.
Down
  1. A set of data that describes and gives information about other data.
  2. The physical components of a computer system, such as the monitor, keyboard, and CPU.
  3. A digital, decentralized ledger that records transactions across many computers securely.
  4. Data Extremely large data sets that may be analyzed computationally to reveal patterns and trends.
  5. A set of step-by-step instructions or rules followed by a computer to solve a problem.
  6. A service that creates a secure, encrypted connection over a less secure network.
  7. The process of converting information into a secret code to prevent unauthorized access.
  8. Intelligence The simulation of human intelligence processes by computer systems, especially learning and reasoning.
  9. The maximum amount of data transmitted over an internet connection in a given amount of time.
  10. Software as a Service; a software distribution model where applications are hosted by a provider.
  11. Random Access Memory; a computer's short-term memory used to store data for active tasks.
  12. Learning A subset of AI focused on building systems that learn from data to improve performance.

20 Clues: A set of data that describes and gives information about other data.Source Software with source code that anyone can inspect, modify, and enhance.The practice of protecting systems, networks, and programs from digital attacks.A service that creates a secure, encrypted connection over a less secure network....

FITAVocab.TC 2013-05-16

FITAVocab.TC crossword puzzle
Across
  1. programs that you can download
  2. ethical uses of or on a computer or the web
  3. circuit board
  4. something that shows off a a business and shows people what it is about
  5. crediting a persons work
  6. extra docking system
  7. the security of or on a computer
  8. a paid internet access
  9. central processing unit
  10. a companies "slogan"
  11. a type of layout
  12. a format of a program on your computer
  13. a combination of many search engines
  14. a program that allows you to create documents
  15. the thing at the top of the screen
  16. a port to get wifi
  17. storing space
  18. liquid crystal display
  19. an illegal way of taking credit for somebody's invention
  20. light emitting diode
  21. National Cyber Security Alliance
  22. what you have on you desktop already
Down
  1. a term that describes safety o the computer or on the web
  2. decision tool
  3. a place where you can virtually go and search on the web
  4. a system that allows you to connect to other peoples devices over wifi or cellular data
  5. cd port
  6. an adjective that describes cyber in a way that is someway pixel ly
  7. the old fashion watch "not digital"
  8. things that you can buy to play or enjoy on
  9. confusing
  10. a term that describes the web and computers
  11. a virtually folder where you can save your documents, files
  12. your work
  13. a user that is online
  14. a device that can go anywhere
  15. a thing of the computer that allows you to move around on the screen or click
  16. memory card

38 Clues: cd portconfusingyour workmemory carddecision toolcircuit boardstoring spacea type of layouta port to get wifiextra docking systema companies "slogan"light emitting diodea user that is onlinea paid internet accessliquid crystal displaycentral processing unitcrediting a persons worka device that can go anywhereprograms that you can download...

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) crossword puzzle
Across
  1. Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
  2. Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
  3. Conducting meetings between people in different locations using video and audio connections.
  4. Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
  5. The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
  6. The science or practice of encoding information to prevent unauthorized access, especially in information security.
  7. Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
  8. Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
  9. The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
  10. Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
  1. Employing data and algorithms to create models that predict future outcomes or behaviors.
  2. The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
  3. Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
  4. The commitment to complying with established standards, specifications, or regulations.
  5. Catering to a specific segment or group with unique preferences or needs.
  6. The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
  7. Alternative problem-solving methods employed when conventional approaches fail.
  8. The capability of being customized or adapted to suit individual preferences or needs.
  9. Losing interest or focus during discussions, indicating a lack of engagement or understanding.
  10. A systematic approach or set of procedures for solving a problem or accomplishing a task.

20 Clues: Catering to a specific segment or group with unique preferences or needs.Alternative problem-solving methods employed when conventional approaches fail.The capability of being customized or adapted to suit individual preferences or needs.The commitment to complying with established standards, specifications, or regulations....

Electronics 2025-03-05

Electronics crossword puzzle
Across
  1. – Field focused on designing and building robots.
  2. – Communication without physical cables.
  3. – Advanced field of physics used for computing and cryptography.
  4. – The field of making machines "think" like humans.
  5. – Type of system where software is built into hardware.
  6. – Board that connects electronic components.
  7. – The practice of protecting computer systems from attacks.
  8. - Systems that connect smart devices for real-time data exchange.
  9. – Energy sourced from nature, like solar or wind.
  10. - Devices that collect data and adapt based on environmental conditions.
  11. – Material used in electronic circuits, such as silicon.
  12. - The technology behind converting sunlight into electrical energy.
  13. – Technology that uses radio waves for identification and tracking.
  14. – Computing closer to the data source to reduce latency.
  15. – Engineering on a very tiny scale, atomic or molecular level.
Down
  1. – Use of technology to perform tasks with minimal human intervention.
  2. – Network of interconnected devices communicating via the internet.
  3. - A remote sensing method used in autonomous vehicles and robotics.
  4. - AI models inspired by the human brain, used in deep learning.
  5. - A revolutionary approach to processing information using qubits.
  6. - An integrated circuit that includes all components of a computer or electronic system.
  7. – A small computer on a single chip, used in embedded systems.
  8. – A device that detects physical properties such as temperature or motion.
  9. – A device that converts electrical signals into movement.
  10. - A next-generation display technology with superior brightness and efficiency.
  11. – Low-level software controlling hardware functions.
  12. – Unmanned aerial vehicles used for various applications.
  13. - A reconfigurable chip widely used in digital circuit design and embedded systems.
  14. – Latest generation of mobile network technology.

29 Clues: – Communication without physical cables.– Board that connects electronic components.– Field focused on designing and building robots.– Energy sourced from nature, like solar or wind.– Latest generation of mobile network technology.– The field of making machines "think" like humans.– Low-level software controlling hardware functions....

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  2. Gaining unauthorized access to a secured area by following an authorized person.
  3. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  6. Security documentation that details system resource usage by users and processes for auditing.
Down
  1. Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Process of transforming information into a scrambled format to secure it.
  4. Criminal use of the internet or other electronic means to persistently harass an individual.
  5. Attack that uses a list of commonly used words or phrases to guess a password.
  6. Attacks that overwhelm a target system or network with a flood of traffic
  7. Cloud-based vulnerability management platform with scanning and reporting.
  8. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  9. Code examination performed without running the malicious program.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  11. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  12. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  13. Policy-based accept or deny of network traffic.
  14. Graphic object used in reports to visualize the correlation between an object and its performance.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

Literasi Digital 2024-08-13

Literasi Digital crossword puzzle
Across
  1. salah satu Pillar literasi digital
  2. aplikasi mengirim pesan di handpone
  3. proses meyakinkan penggunaan layanan digital dengan aman
  4. Informasi yang tidak sengaja salah/akurat
  5. kata lain keamanan siber
  6. perangkat dalam komputer
  7. dunia bisnis
  8. salah satu perangkat lunak password manager
  9. alamat web address bar peramban
  10. lisensi dimana seluruh hak cipta terhadap perangkat lunak telah dilepaskan
  11. web penjelajah internet terus menerus
  12. kecakapan media digital
  13. singkatan dari Software of a service
  14. sistem menggunakan perangkat keras
  15. fitur yang dikembangkan oleh peramban
  16. mencari halaman dengan judul tertentu
  17. mencari konten yang muncul di alamat domain
  18. situs web
  19. bidang lain informatika
  20. lisensi perdaganga
  21. pembaruan perangkat lunak
  22. kata kunci khusus yang digunakan dalam pencarian
Down
  1. provokasi di media sosia
  2. tantangan era literasi digita
  3. lisensi publik umum
  4. literasi yang mencari dan memahami yang ditemukan
  5. informasi yang dikumpulkan oleh web crawler
  6. kata lain dari browser
  7. elektronik kepanjangan dari TE
  8. kata kunci pengaman handphone
  9. mesin pencari khusus anak²
  10. penyadap media sosial
  11. perangkat kedua dalam komputer
  12. perangkat lunak yang digunakan untuk mengakses informasi di internet
  13. tempat jasa SAS beroperasi
  14. profesi bidangn informatika
  15. sebutan komputer di Amerika Serikat
  16. teknologi informasi dan komunikasi
  17. fitur pencarian yang terus meningkat
  18. Engine mesin pencari
  19. lisensi yang boleh menggunakan perangkat lebih
  20. gak atas kekayaan intelektua
  21. kata lain lisensi gratis
  22. Informasi yang tidak benar
  23. Audio konten yang berupa suara yang bisa didedidengarkan
  24. manager pengelola kata sandi supaya aman
  25. jaringan komunikasi
  26. dasar kajian data
  27. intelektual hasil buah pikir dari perangkat lunak
  28. salah satu perilaku yang harus diterapkan dalam budaya digital
  29. yayasan perangkat lunak bebas

51 Clues: situs webdunia bisnisdasar kajian datalisensi perdagangalisensi publik umumjaringan komunikasiEngine mesin pencaripenyadap media sosialkata lain dari browserkecakapan media digitalbidang lain informatikaprovokasi di media sosiakata lain keamanan siberperangkat dalam komputerkata lain lisensi gratispembaruan perangkat lunakmesin pencari khusus anak²...

Tugas Informatika Terakhir 2025-05-26

Tugas Informatika Terakhir crossword puzzle
Across
  1. Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
  2. Platform digital untuk pendidikan Islam dalam smart city.
  3. Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
  4. Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
  5. Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
  6. Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
  7. Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
  8. Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
  9. Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
  10. Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
  1. Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
  2. Teknologi untuk sholat berjamaah virtual dalam smart city.**
  3. Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
  4. Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
  5. Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
  6. Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
  7. Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
  8. Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
  9. Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
  10. Kota masa depan dalam Islam yang makmur dan berkelanjutan.

20 Clues: Platform digital untuk pendidikan Islam dalam smart city.Kota masa depan dalam Islam yang makmur dan berkelanjutan.Teknologi untuk sholat berjamaah virtual dalam smart city.**Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12)....

Tugas Informatika Terakhir 2025-05-26

Tugas Informatika Terakhir crossword puzzle
Across
  1. Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
  2. Platform digital untuk pendidikan Islam dalam smart city.
  3. Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
  4. Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
  5. Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
  6. Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
  7. Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
  8. Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
  9. Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
  10. Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
  1. Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
  2. Teknologi untuk sholat berjamaah virtual dalam smart city.**
  3. Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
  4. Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
  5. Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
  6. Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
  7. Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
  8. Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
  9. Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
  10. Kota masa depan dalam Islam yang makmur dan berkelanjutan.

20 Clues: Platform digital untuk pendidikan Islam dalam smart city.Kota masa depan dalam Islam yang makmur dan berkelanjutan.Teknologi untuk sholat berjamaah virtual dalam smart city.**Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12)....

Science technology & society 2024-12-16

Science technology & society crossword puzzle
Across
  1. Earth's rising temperature.
  2. Number of species in an area.
  3. Long-term weather patterns.
  4. Height above sea level.
  5. Radical beliefs or actions.
  6. Basic unit of biological classification.
  7. Wireless identification technology.
  8. Early long-distance communication system.
  9. Early sound playback device.
  10. Political decision-making stalemate.
  11. Worldwide interconnectedness.
  12. Layer of gases around Earth.
  13. Computer's processing chip.
  14. Science of classifying organisms.
  15. Broadest biological group.
  16. Floating water droplets in the sky.
  17. Immersive digital environment.
  18. Tiny electronic switch.
  19. Digital currency system.
  20. Public participation in research.
  21. Group of related species.
  22. Global disease outbreak.
  23. Connected system of computers.
  24. Large, slow-moving ice masses.
  25. Genetic sequencing process.
  26. Taxonomic group below order.
  27. Rank below phylum.
  28. Unfair treatment of groups.
  29. Unequal access to resources.
  30. Variety of all life forms.
  31. Government collection of revenues.
Down
  1. Body that rules a nation.
  2. Heat-trapping atmospheric gases.
  3. Freedom from surveillance.
  4. Long-term shifts in climate.
  5. Look-alike species.
  6. Popular social network site.
  7. Day-to-day atmospheric conditions.
  8. System of medical services.
  9. Machine-based decision-making.
  10. Ability to analyze information sources.
  11. Unauthorized computer infiltrator.
  12. Grouping of related families.
  13. Overflow of water onto land.
  14. Community well-being efforts.
  15. Tiny particles in the air.
  16. Digital ledger system.
  17. Online social platforms.
  18. Frozen water falling as flakes.
  19. Variation in DNA within species.
  20. New ideas or inventions.
  21. Gas from burning fossil fuels.
  22. Potent greenhouse gas.
  23. Transmitted information wave.
  24. Protection from online threats.
  25. Major taxonomic category.
  26. Variety of ecosystems.
  27. Sharp division of opinions.
  28. Contaminated air particles.

59 Clues: Rank below phylum.Look-alike species.Digital ledger system.Potent greenhouse gas.Variety of ecosystems.Height above sea level.Tiny electronic switch.Online social platforms.New ideas or inventions.Digital currency system.Global disease outbreak.Body that rules a nation.Major taxonomic category.Group of related species.Freedom from surveillance....

Current Events Final Exam 2024-05-08

Current Events Final Exam crossword puzzle
Across
  1. - Competitive video gaming.
  2. - Able to be maintained long-term. (Often refers to environmental practices)
  3. - Application software for a smartphone or computer.
  4. - Protecting computer systems from attacks.
  5. - Spreading quickly on social media.
  6. - A virtual world users can access and interact with.
  7. - Audio program series distributed online.
  8. - Digital currency secured by cryptography.
  9. - Playing video games.
  10. - Energy sources that can be replenished, like solar or wind power.
  11. - Unmanned aerial vehicles used for various purposes.
  12. - Delivering content online in real-time.
  13. - Creating three-dimensional objects from a digital file.
  14. - Billionaire entrepreneur behind companies like Tesla and SpaceX.
  15. (AGI) - Hypothetical AI with human-like intelligence.
  16. - Online seminar or presentation.
Down
  1. - A large-scale disaster or event. (Can be metaphorical)
  2. - Science, Technology, Engineering, and Math education.
  3. - An additional dose of the COVID-19 vaccine given to maintain immunity.
  4. - Long-term shift in weather patterns.
  5. - Virtual reality, a simulated experience.
  6. - Object orbiting Earth used for communication or observation.
  7. - Storing and accessing data through the internet.
  8. - Online platforms for social connection and content sharing.
  9. (AI) - Machines that mimic human cognitive functions.
  10. - Large and complex sets of data used for analysis.
  11. - False or misleading information presented as news.
  12. (IoT) - Network of physical devices connected to the internet.
  13. - Non-fungible token, a unique digital asset.
  14. - Autonomous vehicle that operates without a driver.
  15. - Person with a large online following who promotes products.
  16. (EV) - Vehicle powered by electricity.
  17. - Mobile phone with advanced features.
  18. - The field of designing and building robots.
  19. - Automated vacuum cleaner.
  20. - Using biology to create new products or processes.

36 Clues: - Playing video games.- Competitive video gaming.- Automated vacuum cleaner.- Online seminar or presentation.- Spreading quickly on social media.- Long-term shift in weather patterns.(EV) - Vehicle powered by electricity.- Mobile phone with advanced features.- Delivering content online in real-time.- Virtual reality, a simulated experience....

Science, Technology, and Society 2024-12-15

Science, Technology, and Society crossword puzzle
Across
  1. make changes
  2. replace or modify
  3. coins made of valuable metals
  4. relates to society
  5. condition of a person
  6. relating worldwide
  7. long-term weather condition
  8. way or manner something occurs
  9. lack of evenness
  10. losing something
  11. woody perennial plant
  12. electronic device bigger than laptop
  13. to disturb
  14. wide variety of differences
  15. home of an organism
  16. allows users yo sync data across devices
  17. _______ world due to political polarization
  18. live-able planet in the solar system
  19. to advance
  20. eco______
  21. very important matter for each country
  22. creating something
  23. can be seen in the sky during cloudy days
  24. other word for age
  25. a global network for everyone
  26. a system of recorded transactions
  27. random access memory
  28. the process of coding
  29. woody plant smaller than tree
  30. relates to computers
Down
  1. situation where progress is stalled due to excess demand
  2. even distribution of weight
  3. the Earth
  4. grows in damp habitats
  5. harmful substances in environment
  6. practice of protecting work programs
  7. way of life
  8. area covered with trees
  9. to gain unauthorized access to data
  10. short plants
  11. artificial intelligence
  12. problem for deep discussion
  13. also known as digital divide
  14. information collected
  15. series of actions or steps
  16. there is balance
  17. does not exist physically
  18. legally recognized subject in a nation
  19. medium for mass communication
  20. opposite of old
  21. jumping on the bandwagon
  22. internet of things
  23. robotic process automation
  24. power derived from using resources
  25. unit of heredity
  26. climbing plant
  27. moving river of ice
  28. can be seen falling during snowy weather
  29. relating to present-time
  30. move from one place to another

60 Clues: the Eartheco______to disturbto advanceway of lifemake changesshort plantsclimbing plantopposite of oldlack of evennesslosing somethingthere is balanceunit of heredityreplace or modifyrelates to societyrelating worldwideinternet of thingscreating somethingother word for agehome of an organismmoving river of icerandom access memory...

Information Technology_1 2025-04-03

Information Technology_1 crossword puzzle
Across
  1. A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  2. An error or flaw in software that causes it to produce incorrect or unexpected results.
  3. Software for which the original source code is made freely available and may be redistributed and modified.
  4. Learning A type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
  5. Programming Interface) A set of rules that allows different software applications to communicate with each other.
  6. The maximum rate of data transfer across a given path.
  7. A version control system for tracking changes in source code during software development.
  8. The process of finding and fixing errors in software.
  9. A program that translates source code into executable code.
  10. The practice of protecting systems, networks, and programs from digital attacks.
  11. A basic structure underlying a system, concept, or text.
Down
  1. A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
  2. A step-by-step procedure for solving a problem or performing a task.
  3. The delivery of computing services over the internet.
  4. The process of converting data into a code to prevent unauthorized access.
  5. A network security system that monitors and controls incoming and outgoing network traffic.
  6. The part of a website or application that users interact with directly.
  7. An organized collection of data, generally stored and accessed electronically.
  8. (Integrated Development Environment) A software application that provides comprehensive facilities to computer programmers for software development.
  9. A set of rules governing the exchange or transmission of data between devices.

20 Clues: The delivery of computing services over the internet.The process of finding and fixing errors in software.The maximum rate of data transfer across a given path.A basic structure underlying a system, concept, or text.A program that translates source code into executable code.A step-by-step procedure for solving a problem or performing a task....

Digital Transformation in PM 2025-04-30

Digital Transformation in PM crossword puzzle
Across
  1. Services or systems hosted on remote servers and accessed via the internet.
  2. Information Data that is stored and accessible from a single, unified location.
  3. The ability of a system to handle a growing amount of work or its potential to be enlarged.
  4. Occurring immediately and without delay, often used for live updates or collaboration.
  5. Team A group of employees working from different geographical locations.
  6. Management The identification and mitigation of potential problems that could negatively affect a project.
  7. The protection of computer systems and networks from digital attacks or unauthorized access.
  8. Encryption The process of converting data into a coded format to prevent unauthorized access.
  9. (Artificial Intelligence) Technology that enables machines to perform tasks that normally require human intelligence.
  10. The action of working with others to achieve a common goal.
  11. Transformation The integration of digital technologies into all areas of a business to improve operations and value delivery.
  12. Allocation The process of assigning available resources to various tasks to maximize efficiency.
Down
  1. Application Software designed to run on mobile devices, often used to access cloud-based systems.
  2. Authentication A security system that requires more than one form of identification to access data or systems.
  3. The use of technology to perform tasks with minimal human intervention.
  4. Learning A branch of AI where systems learn from data to improve their performance over time without being explicitly programmed.
  5. Management The process of planning, executing, and overseeing a project to meet specific goals and deadlines.
  6. Analytics The use of data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.
  7. Data Analytics The process of examining large and complex data sets to uncover patterns, trends, and insights.
  8. A series of steps or processes through which a task is completed.

20 Clues: The action of working with others to achieve a common goal.A series of steps or processes through which a task is completed.The use of technology to perform tasks with minimal human intervention.Team A group of employees working from different geographical locations.Services or systems hosted on remote servers and accessed via the internet....

tugas daring kelas X-I(Mahatma Bara) 2025-04-17

tugas daring kelas X-I(Mahatma Bara) crossword puzzle
Across
  1. Hak eksklusif bagi pencipta untuk mengumumkan atau memperbanyak ciptaannya
  2. Apa nama proses di mana mesin pencari menggunakan algoritma untuk menentukan urutan hasil pencarian yang paling relevan?
  3. Perusahaan search engine paling populer
  4. Proses menyebarkan konten digital ke berbagai media atau audiens
  5. Salah satu tantangan utama dalam validasi konten negatif yang melibatkan subjektivitas penilaian
  6. Kata atau frasa yang diketik pengguna
  7. Jenis konten digital yang menggabungkan unsur visual dan suara
  8. Apa singkatan dari istilah yang merujuk pada proses pengindeksan halaman web oleh mesin pencari?
  9. Manfaat HAKI bagi pemegang hak atau pemilik adalah
  10. Proses membuat konten digital yang mengangkat cerita rakyat dari daerah tertentu.
  11. Singkatan dari Hak Atas Kekayaan Intelektual
  12. ahli yang bertanggung jawab untuk mengamankan jaringan komputer
  13. Sistem otomatis yang digunakan untuk mendeteksi konten negatif secara cepat dan efisien
Down
  1. proses mengidentifikasi dan menandai konten yang berpotensi berbahaya.
  2. Proses membuat konten digital dari awal hingga siap dipublikasikan
  3. Unsur utama yang harus diperiksa dalam validasi konten negatif agar tidak tersebar luas.
  4. Profesi yang mengelola dan mengamankan jaringan komputer dalam sebuah organisasi.
  5. profesi yang bertugas merancang dan memelihara software
  6. Lembaga pemerintah yang mengelola Hak Kekayaan Intelektual di Indonesia
  7. Apa istilah yang digunakan untuk menyebut halaman hasil pencarian yang muncul setelah pengguna memasukkan kata kunci di mesin pencari?
  8. Profesi yang menganalisis data untuk membantu pengambilan keputusan bisnis.
  9. Proses menghapus atau menandai konten yang mengandung unsur kekerasan, pornografi, atau ujaran kebencian
  10. Platform media sosial yang sering digunakan untuk menyebarkan video budaya tradisional.
  11. Hak eksklusif yang diberikan negara kepada penemu atas hasil invensinya di bidang teknologi
  12. Profesi yang bertugas menulis dan mengembangkan program komputer

25 Clues: Kata atau frasa yang diketik penggunaPerusahaan search engine paling populerSingkatan dari Hak Atas Kekayaan IntelektualManfaat HAKI bagi pemegang hak atau pemilik adalahprofesi yang bertugas merancang dan memelihara softwareJenis konten digital yang menggabungkan unsur visual dan suaraahli yang bertanggung jawab untuk mengamankan jaringan komputer...

Post Cold War 2024-10-01

Post Cold War crossword puzzle
Across
  1. The practice of protecting computer systems and networks from unauthorized access or attacks.
  2. A long-term shift in global temperatures and weather patterns caused by human activity.
  3. A political movement claiming to represent the voice of ordinary people against elites.
  4. The process of increasing interconnection between countries through trade, culture, and technology.
  5. 2015 international treaty aimed at reducing global greenhouse gas emissions.
  6. U.S.-led global military campaign launched after the 9/11 attacks.
  7. A series of coordinated terrorist attacks in 2001 that reshaped global security policies.
  8. The practice of using resources responsibly to ensure future generations can meet their needs.
  9. A conflict in which countries impose tariffs on each other, as seen between the U.S. and China.
Down
  1. Assistance provided during crises such as natural disasters, conflicts, or famines.
  2. Initiative China’s global infrastructure development strategy aimed at increasing its global influence.
  3. The rapid development of the internet and social media since the 1990s.
  4. The disintegration of this superpower in 1991 marked the end of the Cold War.
  5. Political and economic union of 27 European countries, facing challenges like Brexit.
  6. Laws regulating how people can enter and live in a country, often debated in the context of security and economics.
  7. Online platforms that have transformed global communication and activism, such as Facebook and Twitter.
  8. The use of violence, especially against civilians, to achieve political goals.
  9. The United Kingdom’s decision to leave the European Union in 2016.
  10. Country whose rapid economic and political rise has challenged U.S. global dominance.
  11. Political ideology focused on promoting the interests of one's country, often at the expense of global cooperation.

20 Clues: The United Kingdom’s decision to leave the European Union in 2016.U.S.-led global military campaign launched after the 9/11 attacks.The rapid development of the internet and social media since the 1990s.2015 international treaty aimed at reducing global greenhouse gas emissions....

Literasi digital 2024-08-20

Literasi digital crossword puzzle
Across
  1. menandai kata kunci atau topik
  2. kejahatan yang melibatkan penggunaan komputer
  3. menandai lokasi geografis dalam foto
  4. sebuah metode untuk memanipulasi orang
  5. mengambil file dari internet
  6. perangkat lunak yang di ciptakan untuk merusak sistem komputer
  7. sebuah vidio yang berfokus pada cerita
  8. upaya untuk mencuri informasi sensitif
  9. melindungi sistem komputer dan jaringan dari ancaman
  10. suatu konten yang cepat menyebar
  11. sebuah antar muka untuk menghubungkan aplikasi
  12. pengguna internet yang sengaja membuat komentar provokatif
  13. metadata
  14. teknologi yang memadukan dunia
  15. istilah untuk mengurangi penggunaan teknologi
  16. sebuah gambar kecil atau simbol
  17. sebuah format untuk menyediakan konten
  18. penggunaan teknologi digital untuk menghina
  19. catatan online atau jurnal yang sering di update
  20. sebuah jenis kode matriks
  21. pengguna internet yang memiliki banyak follower
  22. representasi grafis atau karakter
  23. informasi yang memberikan deskripsi
Down
  1. tempat untuk berbagi pendapat
  2. menyaksikan konten vidio secara langsung
  3. memanen data pribadi
  4. yang digunakan untuk melindungi jaringan
  5. platfrom media sosial yang paling umum
  6. kiriman pesan kepada banyak orang tanpa izin
  7. sebuah metode keamanan identitas akun
  8. menyimpan data secara online dalam serfer
  9. platfrom yang sering di gunakan untuk melakukan vidio konvergensi
  10. digital yang meninggalkan jejak aktivitas online
  11. proses merubah informasi menjadi kode
  12. situs web yang memungkinkan pengguna untuk mengedit
  13. sebuah kelemahan atau cela yang dapat diserang
  14. kesenjangan akses terhadap teknologi digital
  15. penggunaan teknologi digital untuk menghina
  16. sebuah unit infomasi
  17. layanan untuk menyimpan data online
  18. menyimpan prefensi menggunakan
  19. generasi yang tumbuh Dengan teknologi
  20. topik yang sedang populer
  21. menyimpan dan menyediakan data
  22. sebuah alamat web
  23. program yang dapat menggandakan dirinya sendiri dan menyebar ke komputer lain
  24. untuk menampilkan konten
  25. strategi untuk meningkatkan visibilitas website
  26. sebuah perangkat lunak atau parangkat keras
  27. perangkat lunak yang berinteraksi dengan pengguna

50 Clues: metadatasebuah alamat webmemanen data pribadisebuah unit infomasiuntuk menampilkan kontentopik yang sedang populersebuah jenis kode matriksmengambil file dari internettempat untuk berbagi pendapatmenandai kata kunci atau topikmenyimpan prefensi menggunakanmenyimpan dan menyediakan datateknologi yang memadukan duniasebuah gambar kecil atau simbol...

Risk Management Puzzle 2025-11-17

Risk Management Puzzle crossword puzzle
Across
  1. / Strategy to offset potential losses
  2. management / Process of identifying and mitigating threats to assets
  3. at Risk / Estimate of potential loss in value
  4. detection / Identifying and preventing deceptive financial activity
  5. / Insurance purchased by insurers to reduce risk
  6. / Protection against financial loss
  7. controls / Procedures to ensure integrity and accuracy in operations
  8. appetite / Level of risk an organization is willing to accept
  9. tolerance / Degree of variability in outcomes an entity can withstand
  10. risk / Risk from fluctuations in exchange rates
  11. / Measure of price fluctuations
  12. / Statistical analysis used in insurance and finance
  13. / Collection of financial investments
  14. continuity / Planning to maintain operations during disruptions
  15. / Framework of rules and practices for corporate oversight
  16. risk / Risk of collapse affecting the entire financial system
  17. / Asset pledged for a loan
  18. rating / Assessment of a borrower's creditworthiness
  19. / Financial instruments based on underlying assets
  20. risk / Risk from business decisions or changes in market conditions
  21. rate risk / Risk from changes in interest rates
  22. risk / Risk from fluctuations in prices or rates
  23. testing / Simulating crisis scenarios to assess resilience
Down
  1. / Selling assets to pay off debts
  2. III / International banking regulations for risk and capital
  3. risk / Risk that the other party in a transaction may default
  4. risk / Risk of changes in laws or regulations
  5. / Ease of converting assets to cash
  6. adequacy / Measure of a bank's capital relative to its risks
  7. analysis / Evaluating outcomes under different hypothetical conditions
  8. risk / Risk from internal processes or systems
  9. / Protection of digital systems from threats and breaches
  10. / Process of evaluating and assuming risk for insurance or securities
  11. risk / Risk of legal actions or non-compliance
  12. / A borrower's ability to repay a loan
  13. / Independent examination of financial records and processes
  14. / Adherence to laws, regulations, and policies
  15. / Amount at risk in a financial transaction
  16. / Failure to meet financial obligations

39 Clues: / Asset pledged for a loan/ Measure of price fluctuations/ Selling assets to pay off debts/ Ease of converting assets to cash/ Protection against financial loss/ Strategy to offset potential losses/ Collection of financial investments/ A borrower's ability to repay a loan/ Failure to meet financial obligations...

Industrial Security Concepts Crossword Puzzle 2025-10-28

Industrial Security Concepts Crossword Puzzle crossword puzzle
Across
  1. plan 4. A detailed plan for responding to emergencies such as fire or natural disasters.
  2. 2. An intentional act to harm, steal, or damage property or personnel.
  3. security 10. The act of protecting confidential company information from unauthorized access.
  4. 9. The ability to keep sensitive operations or information from being exposed.
  5. 8. The use of cameras to monitor activities within and around a facility.
  6. in 1. Unauthorized or forced entry into a building, vehicle, or area.
  7. 1.The protection of company assets, employees, and information from threats, theft, or damage.
  8. 7. a person responsible for ensuring safety and enforcing company security
  9. 4. The act of following and watching someone closely for safety or investigation purposes.
Down
  1. 5. Any weakness in a system that can be exploited by threats.
  2. control 5. The safe and efficient movement of people and goods in and out of a facility.
  3. 6. Physical barrier used to prevent unauthorized entry into restricted areas. pany security policies.
  4. 3. Type of security focusing on protecting computers and digital information.
  5. order 8. A written order outlining the duties and responsibilities of security personnel.
  6. report 10. A detailed report documenting any incident or breach in security.
  7. control 3. A system or process for controlling entry and exit of people in a facility.
  8. security 2. Measures designed to protect buildings and equipment from damage or loss.
  9. protection 7. Procedures and tools designed to prevent, detect, and respond to fire.
  10. assessment 9. Process of evaluating potential risks and determining preventive measures.
  11. 6. A person or group that poses a potential danger to an organization’s assets.

20 Clues: 5. Any weakness in a system that can be exploited by threats.in 1. Unauthorized or forced entry into a building, vehicle, or area.2. An intentional act to harm, steal, or damage property or personnel.8. The use of cameras to monitor activities within and around a facility.7. a person responsible for ensuring safety and enforcing company security...

Technology concepts 2025-09-04

Technology concepts crossword puzzle
Across
  1. The physical components of a computer system, such as the CPU, memory, and storage devices.
  2. Software Programs designed for end-users, such as word processors, web browsers, and mobile apps.
  3. Devices Hardware that displays or outputs data from a computer, such as monitors, printers, or speakers.
  4. A computer that provides services, resources, or data to other devices on a network.
  5. Programs and applications that run on a computer and perform specific tasks for the user.
  6. Computing The delivery of services like storage, software, and processing power over the internet.
  7. (SSD) A type of storage device that uses flash memory for faster performance compared to traditional hard drives.
  8. A global network that connects millions of computers, enabling communication and information sharing.
  9. Technology that allows machines to simulate human intelligence, such as learning and decision-making.
  10. Devices Hardware used to enter data into a computer, such as a keyboard, mouse, or scanner.
  11. System The system software that manages computer hardware, software, and resources (e.g., Windows, macOS, Linux).
Down
  1. (AR) Technology that overlays digital information on the real world, often using smartphones or AR glasses.
  2. (VR) A simulated digital environment that immerses users through special gadgets like VR headsets.
  3. An organized collection of data stored electronically and accessed by specialized software.
  4. A device that forwards data between networks and provides internet connectivity.
  5. The practice of protecting systems, networks, and data from digital attacks or unauthorized access.
  6. (GPU) A specialized computer component that handles rendering images, videos, and graphics.
  7. An electronic device that processes information and performs tasks according to instructions.
  8. (Internet of Things) A network of everyday objects embedded with sensors and software to exchange data (e.g., smartwatches, smart home devices).
  9. A system of interconnected devices that communicate and share resources.

20 Clues: A system of interconnected devices that communicate and share resources.A device that forwards data between networks and provides internet connectivity.A computer that provides services, resources, or data to other devices on a network.Programs and applications that run on a computer and perform specific tasks for the user....

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network....

Rush Health Cybersecurity Crossword Puzzle 2020-02-26

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Something that secures or makes safe; protection; defense.
  2. The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
  3. Intending or intended to do harm.
  4. Exposure to the chance of injury or loss.
Down
  1. To try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.
  2. The act or a result of breaking.
  3. Malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access.
  4. A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.

8 Clues: The act or a result of breaking.Intending or intended to do harm.Exposure to the chance of injury or loss.Something that secures or makes safe; protection; defense.A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network....

CONTRACTS CROSSWORD 2025-09-03

CONTRACTS CROSSWORD crossword puzzle
Across
  1. How many different Contract bill-to's does BSRx have in NAV?
  2. September 3rd, 2025
  3. How many hours do you have to fulfill an URGENT Delivery Request if received at 12:00 pm
  4. As part of the _______ Compliance Program, the Provider will maintain a detailed inventory and ability to track the records of Personal Information, with audit logs showing who Handled the Personal Information
  5. As part of our _____ requirements, BSRx must have an information & cybersecurity program
Down
  1. 99.00% of Orders filled as specified in each Order during the month, without errors in product type, quality, quantity, etc = ORDER _______ ACCURACY
  2. How many OHaH regions does BSRx have under the NPWT Contract?
  3. a HCCSS request or a Patient, Patient’s physician, Caregiver or Service Provider Organization request, for a _________ with a Registered Pharmacist
  4. Service Delivery Locations that are used to facilitate patient pick-ups and can only be invoiced once the order has been picked up.
  5. REPORT The FSP shall, for each Fiscal Year during the Term, submit this to HCCSS and the HCCSS Contract Manager
  6. The Provider shall provide the Recipient with all necessary instruction and disposal containers required for the proper disposal of _______ Waste
  7. Receiving an end rental for an equipment will initiate this type of Service Request
  8. Cardinal & OMS are examples of what?
  9. This is the Del Code for Non-Urgent Delivery Requests

14 Clues: September 3rd, 2025Cardinal & OMS are examples of what?This is the Del Code for Non-Urgent Delivery RequestsHow many different Contract bill-to's does BSRx have in NAV?How many OHaH regions does BSRx have under the NPWT Contract?Receiving an end rental for an equipment will initiate this type of Service Request...

Challenging Indian Tech & Innovation Crossword 2024-10-10

Challenging Indian Tech & Innovation Crossword crossword puzzle
Across
  1. A startup that’s revolutionizing the Indian agritech sector with AI-driven predictive analytics for farming
  2. This Indian multinational technology company is the world's largest provider of IT consulting services
  3. An Indian unicorn startup specializing in online education, now expanding globally with gamified learning solutions
  4. The first Indian startup to be listed on NASDAQ, specializing in AI-powered customer engagement platforms
  5. India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles
  6. This Indian tech company developed a super app in the post-pandemic era, offering a wide range of services, including payments and healthcare
  7. An Indian renewable energy company that’s making headlines for being the largest in the world by installed capacity
  8. An Indian tech company focused on blockchain and AI for managing supply chain transparency in industries like pharma and logistics
Down
  1. An Indian company that developed an AI-based cybersecurity platform, now offering services across more than 30 countries
  2. India’s largest IT company by market capitalization, known for pioneering automation and AI-based IT solutions
  3. This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem
  4. A major player in India’s space technology, this private company built India’s first privately developed rocket
  5. The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services
  6. This company is leading India’s AI-based conversational chatbot innovations, widely used by financial institutions

14 Clues: India’s leading tech unicorn in ride-sharing, now venturing into electric vehiclesThis Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystemThe largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services...

Cybersecurity Awareness month at Kent! 2024-10-14

Cybersecurity Awareness month at Kent! crossword puzzle
Across
  1. Sense created by the attacker to make you react quickly without thinking.
  2. When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
  3. Software attack method to harm or exploit a device or network.
  4. Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
  1. Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
  2. An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
  3. Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
  4. The address of a webpage which you check the validity of before clicking it. (Acronym)

8 Clues: Software attack method to harm or exploit a device or network.Sense created by the attacker to make you react quickly without thinking.The address of a webpage which you check the validity of before clicking it. (Acronym)Additional layer of security that verifies a user's access to an account more than once. (Acronym)...

CYBER FEST CROSSWORD 2024-10-18

CYBER FEST CROSSWORD crossword puzzle
Across
  1. Software designed to detect, prevent, and remove malware and other harmful software.
  2. Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
  3. A secret string of characters used to verify the identity of a user.
  4. An attempt by hackers to damage or disrupt a computer system or network.
  5. Ensuring that an organization meets regulatory and legal requirements for security practices.
  6. Software that secretly monitors and collects personal information from a computer.
  7. A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
  8. The process of verifying the identity of a user or device before granting access to a system.
Down
  1. Related to computers, information technology, or virtual reality, often used in the context of online environments.
  2. The process of converting data into a secret code to protect it from unauthorized access.
  3. A weakness in software, hardware, or procedures that could be exploited to cause harm.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
  6. Any software intentionally designed to cause damage to a computer, server, or network.
  7. A person who uses computers to gain unauthorized access to data.
  8. A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.

16 Clues: A person who uses computers to gain unauthorized access to data.A secret string of characters used to verify the identity of a user.An attempt by hackers to damage or disrupt a computer system or network.Software that secretly monitors and collects personal information from a computer....

SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10

SAFETY AND ETHICS CROSSWORD PUZZLE crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

Safety and Ethics Puzzle 2024-01-10

Safety and Ethics Puzzle crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

UNIT 1 - REVISION 2024-10-14

UNIT 1 - REVISION crossword puzzle
Across
  1. Consisting of more than one component or instance, used to describe redundant systems or data sets.
  2. Based on or following established practices or standards, often referring to traditional methods or widely accepted technologies.
  3. Moving or extending in a direction parallel to the surface or side.
  4. A device used to inject or withdraw fluid, often found in medical or laboratory environments.
  5. Expressing much in few words, especially in communication or technical documentation.
  6. Hydraulic fracturing, a method to extract oil or gas from the earth by breaking rock layers with fluid pressure.
  7. The distance between successive peaks of a wave, often related to light or sound.
  8. Having equal value, function, or meaning in a technical context, such as electrical or mechanical equivalence.
  9. To make impure by exposure to or addition of unwanted substances, relevant in contexts like data or chemical purity.
Down
  1. Inactive but capable of becoming active
  2. Focused or aligned along a specific direction, often used in antenna or signal technologies.
  3. Capable of being controlled or directed, often used in relation to antennas or vehicles.
  4. The delay before a transfer of data begins following an instruction, commonly in network or computing systems.
  5. To fail to notice or account for, often referring to missing critical details in analysis.
  6. Featuring new methods or ideas that introduce improvement or change in technology or processes.
  7. Comprising light or radiation of a single wavelength or color.
  8. To pose a risk or potential harm, often in cybersecurity or environmental contexts.
  9. To increase the strength of a signal, sound, or electrical current.

18 Clues: Inactive but capable of becoming activeComprising light or radiation of a single wavelength or color.Moving or extending in a direction parallel to the surface or side.To increase the strength of a signal, sound, or electrical current.The distance between successive peaks of a wave, often related to light or sound....

Study subjects 2024-11-29

Study subjects crossword puzzle
Across
  1. The study of how people think, feel, and behave.
  2. The study and design of robots, machines that can do tasks on their own or help people.
  3. The activity of starting and running a business, especially when it involves taking risks to make a profit.
  4. The study of ideas about life, knowledge, and the difference between right and wrong.
  5. Systems of words and rules used by people to communicate, such as English, Spanish, or Chinese.
  6. The work of designing and building machines, roads, bridges, and other structures using science and math.
  7. A group of subjects that focus on science, technology, engineering, and mathematics.
Down
  1. The protection of computers, networks, and personal information from being stolen or damaged.
  2. A system of rules that people in a country or place must follow.
  3. Subjects about human life, such as history, philosophy, and literature, that focus on culture and ideas instead of science.
  4. The science that studies how things move, the forces that act on them, and how energy works.
  5. The rights and responsibilities of being a member of a country.
  6. The study of people, their cultures, and how they have lived in the past and present.
  7. Sciences The study of people and society, including subjects like psychology, sociology, and economics.
  8. The study and design of buildings and other structures.
  9. The study of money, trade, and how people and governments use resources.
  10. The study of numbers, shapes, and patterns.
  11. The science of substances, what they are made of, how they combine, and how they change.

18 Clues: The study of numbers, shapes, and patterns.The study of how people think, feel, and behave.The study and design of buildings and other structures.The rights and responsibilities of being a member of a country.A system of rules that people in a country or place must follow.The study of money, trade, and how people and governments use resources....

Cybersecurity Awareness Puzzle 2 2024-08-09

Cybersecurity Awareness Puzzle 2 crossword puzzle
Across
  1. __ over links before clicking
  2. __ software regularly
  3. __ alert button
Down
  1. __ reusing passwords
  2. __ factor authentication
  3. __ a ticket if you're unsure

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 1 2024-08-09

Cybersecurity Awareness Puzzle 1 crossword puzzle
Across
  1. __ alert button
  2. __ factor authentication
Down
  1. __ reusing passwords
  2. __ software regularly
  3. __ over links before clicking
  4. __ a ticket if you're unsure

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 7 2024-08-09

Cybersecurity Awareness Puzzle 7 crossword puzzle
Across
  1. __ alert button
  2. __ software regularly
  3. __ reusing passwords
Down
  1. __ over links before clicking
  2. __ a ticket if you're unsure
  3. __ factor authentication

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cyber Security Awareness 2018-06-05

Cyber Security Awareness crossword puzzle
Across
  1. Be careful connecting to public _____.
  2. is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
  3. unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
  4. shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
  5. What month is National Cyber Security Awareness Month?
  6. True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
  1. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
  2. techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  3. a secret word or expression used by authorized persons to prove their right to access, information, etc.
  4. when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
  5. type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
  6. is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user

12 Clues: Be careful connecting to public _____.What month is National Cyber Security Awareness Month?True/False: Call I.T. Service desk right away when you suspect a phishing emailtechniques of protecting computers, networks, programs and data from unauthorized access or attacks...

Cybersecurity Awareness Month 2023 #InformationSecurityInsights 2023-10-03

Cybersecurity Awareness Month 2023 #InformationSecurityInsights crossword puzzle
Across
  1. Ability to withstand and recover from cyberattacks
  2. Potential for harm, loss, or breach
  3. Deceptive email attacks.
  4. Adherence to regulations.
Down
  1. Examination for compliance.
  2. Trust model with no implicit trust.
  3. Secure data disposal.
  4. Security approach to the left.

8 Clues: Secure data disposal.Deceptive email attacks.Adherence to regulations.Examination for compliance.Security approach to the left.Trust model with no implicit trust.Potential for harm, loss, or breachAbility to withstand and recover from cyberattacks

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points....

Rush Health Cybersecurity Crossword Puzzle 2020-02-27

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points....

Rush Health Cybersecurity Crossword Puzzle 2020-03-03

Rush Health Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
  2. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive information, typically via a malicious hyperlink.
  3. ________ software, such as viruses, malware, or ransomware, is designed or intended to do the most harm when executed on a computer system.
  4. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
  1. The result of a compromise to the security or data of an information system or network.
  2. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
  3. Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
  4. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.

8 Clues: The result of a compromise to the security or data of an information system or network.Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.The probability of negative exposure or loss resulting from a cyber attack or data breach on your network....

Standards Law & Ethics of Cybersecurity 2023-06-08

Standards Law & Ethics of Cybersecurity crossword puzzle
Across
  1. Link that is ______ often found on social media and SMS is one of the Phishing Scams.
  2. By sharing ______ date it potentially threatens personal safety.
  3. What should you do if you receive suspicious links on your mobile phone?
  4. Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
  1. Resending fake emails to everyone who knows you can be identified as _______.
  2. Do not ______ your password.
  3. _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
  4. Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.

8 Clues: Do not ______ your password.By sharing ______ date it potentially threatens personal safety.What should you do if you receive suspicious links on your mobile phone?Resending fake emails to everyone who knows you can be identified as _______.Link that is ______ often found on social media and SMS is one of the Phishing Scams....

The Internet Crossword 2024-01-23

The Internet Crossword crossword puzzle
Across
  1. wide web a system of interconnected public web pages accessible through the Internet
  2. abbreviation away from keyboard
  3. a set of computers sharing resources located on or provided by network codes
  4. facts provided or learned about something or someone
  5. The maximum amount of data transmitted over an internet connection in a given amount of time.
  6. Chip A set of microminiaturized electronic circuits fabricated on a thin slice of semiconductor material.
  7. electronic technology that generates, stores and processes data
  8. abbreviation for "for your information."
  9. the application of scientific knowledge for practical purposes, especially in industry
  10. conduct electricity and provide a low-resistance path for electricity to flow through
  11. information that is set up for easy access, management and updating.
  12. engine, coordinated set of programs that searches for and identifies items in a database that match
  13. facts and statistics collected together for reference or analysis
  14. search for information on the internet using the search engine Google
  15. an electronic device for storing and processing data
  16. an application, especially as downloaded by a user to a mobile device
  17. a computer program which manages access to a centralized resource or service in a network.
  18. the state of being protected against the criminal or unauthorized use of data
  19. text files with small pieces of data like a username and password
  20. abbreviation for non-player character
  21. abbreviation for frequently asked questions
  22. spot a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network
  23. abbreviation for By The Way
  24. the default or front page of a site.
Down
  1. a device having or operating with the aid of many small components
  2. an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  3. the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state
  4. A newb or newbie; refers to the idea that someone is new to a game, concept, or idea; implying a lack of experience.
  5. a software application that runs automated tasks (scripts) on the Internet.
  6. A protected/private string of letters, numbers, and/or special characters used to authenticate an identity or to authorize access to data.
  7. relating to mobile phones, handheld computers, and similar technology
  8. an act of logging in to a computer, database, or system
  9. a type of communications technology that allows voice calls and other telephony
  10. something that can be done or seen using computers or the internet
  11. a set of related web pages located under a single domain name
  12. relating the culture of computers, information technology, and virtual reality
  13. a frequently updated web page used for personal commentary or business content
  14. an information system that enables content sharing over the Internet
  15. Room an online platform that enables users to communicate with each other in real time
  16. social media sites, applications, or accounts
  17. a computer program for displaying and navigating between web pages
  18. complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it
  19. an insulated wire or wires having a protective casing and used for transmitting electricity
  20. a worldwide system of computer networks
  21. a web services provider that offers both a search engine and a directory of World Wide Web pages organized in a hierarchy of topic categories
  22. computer network security system that restricts internet traffic in, out, or within a private network
  23. the largest vendor of computer software in the world
  24. abbreviation which means estimated time of arrival or the time you expect to arrive.
  25. the application of scientific knowledge for practical purposes, especially in industry
  26. The technology of transmitting audio and video files
  27. a unique address that identifies a device on the internet or a local network

51 Clues: abbreviation for By The Wayabbreviation away from keyboardthe default or front page of a site.abbreviation for non-player charactera worldwide system of computer networksabbreviation for "for your information."abbreviation for frequently asked questionssocial media sites, applications, or accounts...

Internet Safety Puzzle 2025-03-04

Internet Safety Puzzle crossword puzzle
Across
  1. controls available on many websites and apps to limit who can access your profile and what information visitors can see
  2. tiny files of data used to track your online activities and information when you're browsing a website
  3. the correct or acceptable way of communicating on the internet
  4. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  5. the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
  6. which is the act of someone causing discord online or in person.
  7. the information about a particular person that exists on the internet as a result of their online activity.
  8. the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
  9. a type of malware (malicious software) designed to deny access to a user's data
Down
  1. Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
  2. Using all caps when you type
  3. An online conversation
  4. the practice of protecting systems, networks, and programs from digital attacks
  5. Being nice or showing kindness to a child to eventually have them comfortable enough to do something bad
  6. using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
  7. posting, sharing, or saying harmful things about someone on the internet
  8. the animal that looks for prey to eat

17 Clues: An online conversationUsing all caps when you typethe animal that looks for prey to eatthe correct or acceptable way of communicating on the internetwhich is the act of someone causing discord online or in person.posting, sharing, or saying harmful things about someone on the internet...

Chapter 2- TYPES OF ATTACKS 2022-09-10

Chapter 2- TYPES OF ATTACKS crossword puzzle
Across
  1. Contain tracking information for an individual email
  2. Fraud like Phishing, but it comes as a text message or SMS
  3. It is a deceptive scheme or trick used to cheat someone out of something
  4. It is merely an email trying to convince you to do something
  5. It is a phone scam designed to get your personal information by impersonating
  6. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  7. Threat that involves sending email messages with a fake sender address
  8. It is just like Phishing but it only targets specific individuals within an organization
Down
  1. is news or knowledge received or given
  2. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
  3. A link that direct you to a fake login page, in the hope that you might enter your credentials
  4. Exclusively targets high-ranking individuals such as your BOSS within an organization
  5. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  6. It is a type of email attack where bad people are trying to steal your precious information
  7. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
  8. unsolicited bulk messages normally from people trying to sell something
  9. An act of pretending to be another person for the purpose of commiting fraud

17 Clues: is news or knowledge received or givenContain tracking information for an individual emailFraud like Phishing, but it comes as a text message or SMSIt is merely an email trying to convince you to do somethingThreat that involves sending email messages with a fake sender addressunsolicited bulk messages normally from people trying to sell something...

Chapter 2- TYPES OF ATTACKS 2022-09-10

Chapter 2- TYPES OF ATTACKS crossword puzzle
Across
  1. It is a phone scam designed to get your personal information by impersonating
  2. A link that direct you to a fake login page, in the hope that you might enter your credentials
  3. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  4. It is a type of email attack where bad people are trying to steal your precious information
  5. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
  6. Fraud like Phishing, but it comes as a text message or SMS
  7. It is just like Phishing but it only targets specific individuals within an organization
  8. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
Down
  1. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  2. Threat that involves sending email messages with a fake sender address
  3. It is news or knowledge received or given
  4. Unsolicited bulk messages normally from people trying to sell something
  5. It is merely an email trying to convince you to do something
  6. Contain tracking information for an individual email
  7. Exclusively targets high-ranking individuals such as your BOSS within an organization
  8. It is a deceptive scheme or trick used to cheat someone out of something
  9. An act of pretending to be another person for the purpose of commiting fraud

17 Clues: It is news or knowledge received or givenContain tracking information for an individual emailFraud like Phishing, but it comes as a text message or SMSIt is merely an email trying to convince you to do somethingThreat that involves sending email messages with a fake sender address...

3rd Quarter Review 2026-03-17

3rd Quarter Review crossword puzzle
Across
  1. Unauthorized access, use, and modification to software, computer system, and/or network.
  2. an authentication process that permits a user to use one set of login credentials.
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. A video, image, or audio recording created using AI that makes it look like someone said or did something they didn’t.
  5. Technology that allows computers to perform tasks that normally require human intelligence
  6. The ability to verify the identity of an entity/individual.
  7. Using technology to perform tasks automatically without human involvement.
Down
  1. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. The information used to teach an AI model how to recognize patterns or make decisions.
  3. A type of AI where computers learn from data and improve their performance over time without being directly programmed for every step.
  4. AI that creates new content such as text, images, music, or video.
  5. When an AI gives false or made-up information but presents it as if it were true.
  6. privacy Protecting personal information from being collected or used without permission.
  7. The input or instruction given to an AI system to guide its response.
  8. When an AI system produces unfair or inaccurate results because of the data it was trained on.
  9. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information
  10. Protection of information from being shared to unauthorized systems, entities, or individuals.

17 Clues: The ability to verify the identity of an entity/individual.AI that creates new content such as text, images, music, or video.The input or instruction given to an AI system to guide its response.Using technology to perform tasks automatically without human involvement.When an AI gives false or made-up information but presents it as if it were true....

Cybersecurity Awareness Puzzle 3 2024-08-09

Cybersecurity Awareness Puzzle 3 crossword puzzle
Across
  1. __ a ticket if you're unsure
  2. __ alert button
  3. __ over links before clicking
Down
  1. __ factor authentication
  2. __ software regularly
  3. __ reusing passwords

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 5 2024-08-09

Cybersecurity Awareness Puzzle 5 crossword puzzle
Across
  1. __ over links before clicking
  2. __ factor authentication
  3. __ a ticket if you're unsure
Down
  1. __ alert button
  2. __ reusing passwords
  3. __ software regularly

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 8 2024-08-09

Cybersecurity Awareness Puzzle 8 crossword puzzle
Across
  1. __ factor authentication
  2. __ reusing passwords
  3. __ over links before clicking
  4. __ a ticket if you're unsure
Down
  1. __ alert button
  2. __ software regularly

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 9 2024-08-09

Cybersecurity Awareness Puzzle 9 crossword puzzle
Across
  1. __ over links before clicking
  2. __ factor authentication
  3. __ alert button
Down
  1. __ reusing passwords
  2. __ a ticket if you're unsure
  3. __ software regularly

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 5 2024-08-09

Cybersecurity Awareness Puzzle 5 crossword puzzle
Across
  1. __ over links before clicking
  2. __ factor authentication
  3. __ alert button
Down
  1. __ reusing passwords
  2. __ a ticket if you're unsure
  3. __ software regularly

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

hi 2022-09-28

hi crossword puzzle
Across
  1. A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
  2. A generic term encompassing decode and decipher
  3. Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
  4. Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
  5. The service provider for CrowdStrike's internal training courses
  6. The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
  7. Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
  8. CrowdStrike's CEO and co-founder; abbr
  9. The property of being accessible and usable upon demand
  10. Computer compromised with malicious code; used by a threat actor to perform remote commands
  11. Hosting city of Fal.Con; abbr
  12. Someone who uses a social network to create an account with a fake identity to deceive an individual
  13. Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
  15. As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
  16. System of prevention and recovery from potential threats to a business; abbr
  17. As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
  18. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
  19. String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  20. An unauthorized user who attempts to or gains access to an information system
  21. Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
  22. CrowdStrike's annual cybersecurity convention; "___.Con"
  23. Software that compromises the operation of a system by performing an unauthorized function or process
  24. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
  25. Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
  26. A way to take advantage of a vulnerability in software
  27. A cybersecurity company
  28. The generic term encompassing encipher and encode
  29. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  30. The process of verifying the identity or other attributes of an entity
Down
  1. Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
  2. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  3. A denial of service technique that uses numerous systems to perform the attack simultaneously
  4. A recognizable, distinguishing pattern; typically used to sign documents
  5. Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
  6. Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
  7. Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
  8. Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
  9. ___-Party Information
  10. Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
  11. A capability to limit network traffic between networks and/or information systems
  12. Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  13. General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
  14. In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
  15. The process of transforming plaintext into ciphertext
  16. Type of analysis that determines what levels of impact to a system are tolerable; abbr
  17. Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
  18. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  19. CrowdStrike threat hunting team
  20. Intranet webpage for all things CrowdStrike-related; abbr
  21. Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
  22. Cryptographic network protocol for operating network services securely over an unsecured network; abbr
  23. A dishonest scheme; a fraud
  24. CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
  25. Short form for "cryptography"
  26. When someone uses a social network to create an account with a fake identity to deceive a concrete person
  27. The process of transforming ciphertext into its original plaintext
  28. Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
  29. Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
  30. Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
  31. Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms

61 Clues: ___-Party InformationA cybersecurity companyA dishonest scheme; a fraudHosting city of Fal.Con; abbrShort form for "cryptography"CrowdStrike threat hunting teamCrowdStrike's CEO and co-founder; abbrA generic term encompassing decode and decipherThe generic term encompassing encipher and encodeThe process of transforming plaintext into ciphertext...

FITDVocab.MS 2013-05-15

FITDVocab.MS crossword puzzle
Across
  1. Where you would plug in games, keyboard, and a mouse
  2. Where you would plug in a flash drive
  3. The way things are arranged
  4. A brief description of your self you would fill out in you were applying for a job or a school
  5. Upgrade your computer
  6. A picture owned by a company
  7. An app that you can download
  8. 1,000 zettabytes
  9. Parts that let you control your computer
  10. Protect information and networks
  11. Screen
  12. A cloud based software the uses one canvas instead of traditional slides
  13. a port that allows a computer to connect to a network
  14. 8 bits
  15. 1,000 exabytes
  16. Is the newer and more common type of clock
  17. The shape or size of a document or something you can customize
  18. 1,000 petabytes
  19. a port for headphones
  20. Is the older type of clock
  21. Service Set Identifier
  22. 1,000 megabytes
Down
  1. A readable file
  2. A selection of drawing or editing tools on a program
  3. A phrase or word owned by a company
  4. An object on a computer that stores data or docs.
  5. An already made design for a document
  6. PC-Windows/Mac-Osx
  7. A device that is mobile
  8. device that makes it possible to transmission of data
  9. A place you can save docs and use anywhere
  10. 1,000 gigabytes
  11. 1,000 kilobytes
  12. Way you behave online
  13. 1,000 yottabytes
  14. Rules and behavior to keep your computer safe
  15. 1,000 brontobytes
  16. Heart of the computer
  17. 1,000 terabytes
  18. Central Processing Unit
  19. Long term memory
  20. Short term memory
  21. Comcast
  22. 1,000 bytes
  23. wireless Fidelity
  24. The first and smallest data storage

46 Clues: Screen8 bitsComcast1,000 bytes1,000 exabytesA readable file1,000 gigabytes1,000 kilobytes1,000 terabytes1,000 petabytes1,000 megabytes1,000 zettabytes1,000 yottabytesLong term memory1,000 brontobytesShort term memorywireless FidelityPC-Windows/Mac-OsxUpgrade your computerWay you behave onlineHeart of the computera port for headphones...

FIT_ Vocab.MGB 2013-05-16

FIT_ Vocab.MGB crossword puzzle
Across
  1. the heart of a computer
  2. a plan or design
  3. zoomable online presentation program
  4. a written document of what experience you have
  5. the right to make copies
  6. things you download onto your computer, phone, or pad
  7. protection of information on the internet
  8. it sends the user requests for other search engines
  9. a navigation tool that you use to go on websites
  10. a three folded pamphlet that tells about a company
  11. a file format that is meant for pictures
  12. somewhere where you can see the format of a doc
  13. things that have to do with a computer
  14. an internet provider
  15. a template that you can type on easily
  16. the act to induct into office
  17. a motto or something a company says to get your attention
  18. wireless internet
  19. something you plug into your computer
  20. to restart your computer
  21. flash drive mouse keyboard
  22. a name, symbol, or trademark
  23. a program that controls a display for the user
  24. random memory for your computer
  25. smallest unit of data on a computer
Down
  1. the arrangement of data on a document
  2. someone who sells space for websites
  3. a file having a present format
  4. the setup of a computer
  5. wired internet
  6. Google Bing! Yahoo
  7. something you can create on
  8. the rules or behavior to keep you safe online
  9. how to act online
  10. a online memory storing device that can be accessed anywhere
  11. iphone droid blackberry
  12. to tell people about someone's product or service
  13. the main processing unit
  14. a device that shows information
  15. wireless networking tech
  16. to help a company grow
  17. word excel powerpoint
  18. a company that helps keep you safe online

43 Clues: wired interneta plan or designhow to act onlinewireless internetGoogle Bing! Yahooan internet providerword excel powerpointto help a company growthe heart of a computerthe setup of a computeriphone droid blackberrythe right to make copiesthe main processing unitto restart your computerwireless networking techflash drive mouse keyboard...

Tech puzzle 2023-03-02

Tech puzzle crossword puzzle
Across
  1. Primary memory is also known as _______ memory.
  2. What is a document sent with with an email message called?
  3. ________________ hyperlink is a saved link to a particular web page.
  4. Which technology is used in Brahmastra movie?
  5. Visual display unit is also called _____________
  6. Protection of computer system and information from harm theft and unauthorised use.
  7. _______is considered as one of the universal gates.
  8. The primary component of a computer that acts as its “control center.”
  9. An incredibly powerful tool used to get meaning out of vast amounts of data
  10. The initial program that runs when a computer is powered up or rebooted.
  11. ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  12. What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
Down
  1. A chatbot developed by openAI and launched in November 2022
  2. _________ protects your computer from viruses and hackers
  3. _______________ reality is the integration of digital information with live video.
  4. What is temporarily stored on your computer?
  5. What technology was used in avengers end game?
  6. go Give one example of a game that used unity and C#
  7. A software program that allows you to surf the web.
  8. _______ is the way of sending messages over the Internet.
  9. Terminates the loop statement and transfers execution to the statement immediately following the loop.
  10. What is the #1 social media app?
  11. What protects your computer from hackers?
  12. call An interrupt triggered by a software.
  13. Smallest unit of measurement in computing

25 Clues: What is the #1 social media app?What protects your computer from hackers?Smallest unit of measurement in computingcall An interrupt triggered by a software.What is temporarily stored on your computer?Which technology is used in Brahmastra movie?What technology was used in avengers end game?Primary memory is also known as _______ memory....

UPC 2023-04-23

UPC crossword puzzle
Across
  1. The act of buying or selling goods or services online
  2. The process of protecting computer systems and networks from unauthorized access
  3. A software program used to create and edit digital images
  4. The amount of money required to start or operate a business
  5. A person who starts and runs a business
  6. The act of selling goods or services to another country
  7. A written agreement between two or more parties
  8. The process of promoting a product or service through paid advertising
  9. The difference between a company's assets and liabilities
  10. A software program that performs a specific task
  11. A type of authentication that uses a physical characteristic of the user, such as a fingerprint or iris scan
Down
  1. A type of legal protection for creative works
  2. A type of software used to create and edit spreadsheets
  3. A system of record-keeping and financial reporting for businesses
  4. A programming language used to create web pages and web applications
  5. A system used to store and organize data
  6. The process of bringing a new product or service to market
  7. The process of converting raw materials into finished goods
  8. A network of computers that allows users to share resources and information
  9. A type of software that provides security for a computer network
  10. The process of finding and fixing errors in code
  11. The total amount of money a company has made from its operations
  12. A type of software that translates computer code into machine-readable instructions
  13. The act of purchasing goods or services from another country
  14. A program that protects a computer from viruses and other malicious software

25 Clues: A person who starts and runs a businessA system used to store and organize dataA type of legal protection for creative worksA written agreement between two or more partiesThe process of finding and fixing errors in codeA software program that performs a specific taskThe act of buying or selling goods or services online...

AP Computer Science Review 2021-05-24

AP Computer Science Review crossword puzzle
Across
  1. manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
  2. the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
  3. a whole number
  4. a technique that attempts to trick a user into providing personal information
  5. data about data.
  6. software intended to damage a computing system or to take partial control over its operation
  7. a detailed yet readable description of what a computer program or algorithm must do.
  8. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  9. the delay between a user's action and a web application's response to that action
  10. the process of decoding data.
  11. is the practice of obtaining input or information from a large number of people via the Internet.
  12. study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
  1. transmission of data from one computer to another, or from one device to another.
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the ability to limit access to information to a certain set of users.
  4. either true or false.
  5. a base-16 number system.
  6. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
  7. the process of encoding data to prevent unauthorized access.
  8. a network of servers that track the IP addresses of different domain names like “example.com”
  9. a base-2 number system.

21 Clues: a whole numberdata about data.either true or false.a base-2 number system.a base-16 number system.the process of decoding data.the process of encoding data to prevent unauthorized access.the ability to limit access to information to a certain set of users.a technique that attempts to trick a user into providing personal information...

BRIANA & MATTHEW 2022-05-26

BRIANA & MATTHEW crossword puzzle
Across
  1. city where Briana’s first project as Construction PM was located
  2. Name of restaurant the couple went to on their first date (note: they ate in the car because they were running late to the movie)
  3. The ______: the nickname given to the house in which Matthew lived during his junior year of college
  4. name Matthew called Briana until they started dating
  5. winter sport Matthew helped to teach Briana
  6. TV show the couple has watched at least 7 times through
  7. City where the couple got engaged; beach town Briana visited with her dad during summers
  8. City in which Matthew lived at the time the couple adopted their eldest dog
  9. Briana’s nickname for Matthew
  10. acronym of the college Briana attended for undergraduate and Matthew attended for graduate
  11. college Matthew attended for his undergraduate degree
  12. city the couple first officially lived together
  13. Full name of the couple’s eldest dog
  14. city the couple currently live in
  15. matthew’s eye color
Down
  1. type of engineering Briana studied in college
  2. The couple’s favorite football team
  3. Sport Briana played in high school
  4. Matthew’s undergraduate degree was for _____ _____ engineering
  5. City in Arizona where both Briana and Matthew lived when they met
  6. name of the junior high school the couple attended together
  7. During college, Briana worked at this LA landmark as a research library and archives assistant
  8. State in which Matthew was born and lived until the family moved to Arizona
  9. mascot of the high school the couple attended together
  10. Sport Matthew played in high school and college
  11. Name of the couple’s youngest dog
  12. matthew’s favorite cuisine
  13. number of countries they have visited together (US not included)
  14. briana’s eye color

29 Clues: briana’s eye colormatthew’s eye colormatthew’s favorite cuisineBriana’s nickname for MatthewName of the couple’s youngest dogcity the couple currently live inSport Briana played in high schoolThe couple’s favorite football teamFull name of the couple’s eldest dogwinter sport Matthew helped to teach Briana...

Customer Service Week Crossword 2023-10-03

Customer Service Week Crossword crossword puzzle
Across
  1. Closing a _________ closes all the children.
  2. a holiday for us but not for financial institutions
  3. email address for notification intended for all employees
  4. __________ Expertise Efficiency. Every day. Every time.
  5. set your Non-Ready code to this 15 minutes prior to leaving to complete any end of day tasks.
  6. Teams channel for technical and non-technical information that everyone should be aware of
  7. actions you take to resolve an issue that should be documented in the ticket
  8. Not-Ready code to be used for time spent investigating an open ticket while the customer is not on the phone
  9. takes calls during non-staffed hours
  10. updates to major system outages should be sent at least _________
  11. The ________ Email Report Template is used to document suspicious emails reported by users.
  12. used for instant messaging
  13. ticket management tool used by the Support Center
Down
  1. _________ Downtime procedures should be followed for outages of any major system in the BEPC environment.
  2. the on-call contact should be notified off issues needing immediate attention even during _________ hours.
  3. An engineering contact during non-staffed hours
  4. call center front end used by Support Center to take calls
  5. considered a major system in the BEPC environment
  6. If it’s not in the _______, it didn’t happen.
  7. a problem with a major system impacting multiple users or departments
  8. required monthly cybersecurity training
  9. SysAid template to be used for any caller who reports to Jolene Johnson
  10. subject line tag for notifications that application or system has resumed normal operations
  11. “Done” is never an acceptable one.
  12. Send a ticket to ________ Support if no SA group exists for that software.

25 Clues: used for instant messaging“Done” is never an acceptable one.takes calls during non-staffed hoursrequired monthly cybersecurity trainingClosing a _________ closes all the children.If it’s not in the _______, it didn’t happen.An engineering contact during non-staffed hoursconsidered a major system in the BEPC environment...

Internet Safety 2025-02-26

Internet Safety crossword puzzle
Across
  1. Someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.
  2. Identity Theft Using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
  3. The practice whereby a group of people assault a stranger at random while filming the incident on a mobile device
  4. The action or behavior used to establish an emotional connection with a vulnerable person
  5. Criminal activities carried out by means of computers or the internet
  6. Footprint The unique trail of data that a person or business creates while using the internet.
  7. Writing in ALL CAPS.
  8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
  1. To alter (a digital image) with Photoshop software or other image-editing software
  2. A frequently updated web page used for personal commentary or business content.
  3. An informal conversation.
  4. Flaming The act of posting angry or insulting messages
  5. Unauthorized reproduction or distribution of someone's intellectual property without their consent.
  6. The practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  7. The correct or acceptable way of communicating on the internet.
  8. The use of technology to harass, threaten, embarrass, or target another person.
  9. A person who ruthlessly exploits others.
  10. A piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
  11. Settings Controls available on many websites and apps to limit who can access your profile
  12. The practice of protecting systems, networks, and programs from digital attacks

20 Clues: Writing in ALL CAPS.An informal conversation.A person who ruthlessly exploits others.Flaming The act of posting angry or insulting messagesThe correct or acceptable way of communicating on the internet.Criminal activities carried out by means of computers or the internetA frequently updated web page used for personal commentary or business content....

Engineering and Technological World 2025-04-30

Engineering and Technological World crossword puzzle
Across
  1. Term used to collectively refer to the atmosphere and outer space
  2. Tiny programmable chips
  3. Factory robots to automate processes
  4. Digital overlay on reality
  5. Immersive digital world
  6. Virtual system replica
  7. Massive datasets
  8. Mix of mechanics and electronics
  9. Miniature technology
  10. Modeling structural load behavior
  11. Electricity network that uses digital and other advanced technologies to monitor and manage the transport of electricity
  12. Smart connected devices
  13. Extracting insights from data
  14. How humans use computers
  15. Secure digital ledger
  16. Act of teaching AI robots
  17. Path for transmitting electric current
  18. Allows devices in remote locations to process data at the "edge" of the network
  19. A microprocessor based computer hardware system with a dedicated function
  20. Secure communication coding
Down
  1. AI driven repairs
  2. Energy Sustainable earth friendly energy
  3. Vehicles Self driving cars
  4. Remote data storage
  5. Usage of autonomous machines
  6. Process of creating a physical object from a digital design
  7. Smartwatches, fitness trackers, different type of body monitors
  8. Study of heat and energy
  9. Problem solving procedure
  10. Light enabled technological systems
  11. Study of how objects move through air
  12. Flying devices used for hobbies and war
  13. Developing new substances
  14. Latest wireless network
  15. Fluid powered systems
  16. Tool used for digital design
  17. Study of engineering and biology
  18. Computers utilizing quantum physics
  19. Space based communication
  20. Simulated human technology
  21. Study of internet safety
  22. Study of machines
  23. Silicon chip material
  24. Infrastructure design
  25. Brain inspired artificial intelligence

45 Clues: Massive datasetsAI driven repairsStudy of machinesRemote data storageMiniature technologyFluid powered systemsSilicon chip materialInfrastructure designSecure digital ledgerVirtual system replicaTiny programmable chipsImmersive digital worldLatest wireless networkSmart connected devicesStudy of heat and energyStudy of internet safety...

Tugas daring juang mario/15 2025-04-24

Tugas daring juang mario/15 crossword puzzle
Across
  1. Jenis konten yang mengandung kebencian, kekerasan, atau diskriminasi.
  2. Proses mengidentifikasi dan menghapus konten yang berbahaya dari platform digital.
  3. Hak atas penggunaan nama, logo, atau simbol dagang tertentu.
  4. Profesi yang berfokus pada analisis data dan menemukan wawasan dari data tersebut.
  5. Konten digital dalam bentuk gambar bergerak yang banyak ditemukan di YouTube.
  6. Orang yang merancang dan mengatur tampilan antarmuka pengguna pada aplikasi atau situs
  7. Hak eksklusif atas karya tulis, lagu, atau film.
  8. Profesi yang mengatur dan memelihara infrastruktur jaringan komputer di perusahaan
  9. Proses awal sebelum produksi konten, termasuk ide, riset, dan perencanaan.
  10. Proses mengoptimalkan website agar muncul di hasil teratas pencarian.
  11. Hak atas penemuan atau inovasi teknologi
  12. Mesin pencari paling populer milik perusahaan teknologi besar di Amerika.
Down
  1. Alat atau aplikasi yang digunakan untuk mendeteksi konten palsu atau manipulasi media
  2. Kepanjangan dari Hak Atas Kekayaan
  3. Alat atau sistem yang digunakan untuk menemukan informasi di internet berdasarkan kata kunci.
  4. Proses untuk memeriksa kebenaran atau kesahihan konten di internet, baik itu gambar, teks, atau video.
  5. Nama algoritma penilai halaman web yang diperkenalkan oleh pendiri Google.
  6. Tujuan utama dari menyebarkan konten digital adalah untuk meningkatkan ini terhadap suatu brand.
  7. Informasi digital seperti teks, gambar, atau video yang dipublikasikan secara online.
  8. Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia.
  9. Metode yang digunakan untuk memastikan apakah sebuah berita atau informasi benar-benar terjadi atau hanya hoaks.
  10. Media seperti Instagram, TikTok, dan Facebook yang digunakan untuk menyebarkan konten.
  11. Langkah awal mesin pencari menjelajahi dan mengumpulkan data situs web.
  12. Orang yang bertugas menjaga keamanan data dan jaringan dari ancaman
  13. Profesi yang membuat dan mengembangkan program komputer.

25 Clues: Kepanjangan dari Hak Atas KekayaanHak atas penemuan atau inovasi teknologiHak eksklusif atas karya tulis, lagu, atau film.Profesi yang membuat dan mengembangkan program komputer.Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia.Hak atas penggunaan nama, logo, atau simbol dagang tertentu....

“Family Life in a Changing World” 2025-03-27

“Family Life in a Changing World” crossword puzzle
Across
  1. The process of choosing the best options for family well-being
  2. Earning an income by running a business instead of working for someone
  3. Protecting family data and privacy when using the internet
  4. The main financial provider in a household
  5. The amount of work a person has in a job or at home
  6. Relying on others for financial or emotional support
  7. The connection and time spent between family members
  8. When individuals, including children, take responsibility for themselves
  9. Meaningful interactions that strengthen family relationships
  10. Maintaining stability between work, home, and personal life
  11. Emotional pressure caused by job demands and family responsibilities
  12. The ability of families to adjust to economic and technological changes
  13. Setting aside money for future family needs
  14. Planning and managing household income and expenses
  15. The exchange of information between family members
Down
  1. The people living together and sharing responsibilities in a home
  2. Buying and selling goods and services online for income
  3. The ability to adjust work and home responsibilities easily
  4. Money sent home by family members working overseas
  5. Tools and devices that help families communicate and work efficiently
  6. Using social connections to find jobs or grow a business
  7. A person who starts and manages their own business
  8. The responsibilities of each family member in managing the home
  9. Money earned from work or business to support the family
  10. Organizing tasks to ensure family and work responsibilities are met
  11. Online platforms used for work, school, or family communication
  12. The responsibilities and challenges of raising children
  13. Services or arrangements made for children when parents are working
  14. Movement of individuals to other countries for job opportunities

29 Clues: The main financial provider in a householdSetting aside money for future family needsMoney sent home by family members working overseasA person who starts and manages their own businessThe exchange of information between family membersThe amount of work a person has in a job or at homePlanning and managing household income and expenses...

Tugas Informatika Terakhir 2025-05-26

Tugas Informatika Terakhir crossword puzzle
Across
  1. Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
  2. Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
  3. Platform digital untuk pendidikan Islam dalam smart city.
  4. Teknologi untuk sholat berjamaah virtual dalam smart city.**
  5. Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
  6. Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
  7. Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
  8. Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
  9. Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
  10. Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
Down
  1. Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
  2. Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
  3. Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
  4. Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
  5. Kota masa depan dalam Islam yang makmur dan berkelanjutan.
  6. Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
  7. Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
  8. Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
  9. Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
  10. Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.

20 Clues: Platform digital untuk pendidikan Islam dalam smart city.Kota masa depan dalam Islam yang makmur dan berkelanjutan.Teknologi untuk sholat berjamaah virtual dalam smart city.**Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12)....

Shayna’s graduation! 2025-05-19

Shayna’s graduation! crossword puzzle
Across
  1. Shayna goes to UMD, but more specifically the College of ________.
  2. The formal name for the ceremony where Shayna becomes a college grad
  3. The name of Shayna’s first college roommate
  4. The MVP behind Shayna’s graduation. (And everything else.)
  5. The UMD commencement speaker
  6. Did Shayna live on North or South campus freshman year?
  7. The day Michelle and Seth’s life got a lot more expensive
  8. The name that Shayna calls her sister
  9. What Shayna is beyond thankful for
  10. By the end of Senior year, all students at UMD jump in the ________.
  11. white or red wine?
  12. The Latin honor Shayna is graduating with
  13. The mascot of UMD
  14. What year of college did Kayla Becker just finish? So proud!
  15. What is Shayna’s go-to alcohol? (Sorry mommy)
Down
  1. Where Seth once dreamed Shayna would go, but now knows Maryland was always meant to be.
  2. The field of study Mordechai is in school for right now (and is working really hard at!)
  3. Shayna’s apartment unit number
  4. The ______ is the grassy field with fountains and graduation photo ops.
  5. Michelle will 100% check this app 6 times on the way to Xfinity Center—just in case.
  6. The name of UMD’s mascot
  7. What Seth wants to start up at the Kabbalah Centre
  8. Where Shayna often spends Shabbat lunch
  9. When Michelle tells people about Mordechai, she says “He is Jewish AND he ______!”
  10. Shayna’s go-to bar in college
  11. Which tower is Shayna’s college apartment?
  12. Official title of Shayna’s minor
  13. The library Shayna would study at
  14. Shayna’s Major
  15. The people who paid for Shayna’s diploma
  16. What sorority was Shayna in?
  17. The first name of Shayna’s landlord
  18. The mascot of the school Seth originally planned for his daughter to go to

33 Clues: Shayna’s MajorThe mascot of UMDwhite or red wine?The name of UMD’s mascotThe UMD commencement speakerWhat sorority was Shayna in?Shayna’s go-to bar in collegeShayna’s apartment unit numberOfficial title of Shayna’s minorThe library Shayna would study atWhat Shayna is beyond thankful forThe first name of Shayna’s landlord...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Policy-based accept or deny of network traffic.
  2. Code examination performed without running the malicious program.
  3. Gaining unauthorized access to a secured area by following an authorized person.
  4. Injecting malicious scripts into webpages viewed by other users
  5. Cloud-based vulnerability management platform with scanning and reporting.
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Process of transforming information into a scrambled format to secure it.
  8. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  9. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  10. Matching known patterns of threats against security event data to find potential matches.
Down
  1. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  2. Attack that uses a list of commonly used words or phrases to guess a password.
  3. Security documentation that details system resource usage by users and processes for auditing.
  4. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  7. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  8. Graphic object used in reports to visualize the correlation between an object and its performance.
  9. Attacks that overwhelm a target system or network with a flood of traffic
  10. Criminal use of the internet or other electronic means to persistently harass an individual.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  2. Code examination performed without running the malicious program.
  3. Attacks that overwhelm a target system or network with a flood of traffic
  4. Injecting malicious scripts into webpages viewed by other users
  5. Process of transforming information into a scrambled format to secure it.
  6. Matching known patterns of threats against security event data to find potential matches.
  7. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  8. Criminal use of the internet or other electronic means to persistently harass an individual.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  11. Cloud-based vulnerability management platform with scanning and reporting.
  12. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
  1. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Policy-based accept or deny of network traffic.
  3. Attack that uses a list of commonly used words or phrases to guess a password.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Gaining unauthorized access to a secured area by following an authorized person.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. Security documentation that details system resource usage by users and processes for auditing.
  8. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attack that uses a list of commonly used words or phrases to guess a password.
  2. Injecting malicious scripts into webpages viewed by other users
  3. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Matching known patterns of threats against security event data to find potential matches.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  8. Policy-based accept or deny of network traffic.
Down
  1. Graphic object used in reports to visualize the correlation between an object and its performance.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Process of transforming information into a scrambled format to secure it.
  4. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  5. Security documentation that details system resource usage by users and processes for auditing.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  8. Code examination performed without running the malicious program.
  9. Criminal use of the internet or other electronic means to persistently harass an individual.
  10. Cloud-based vulnerability management platform with scanning and reporting.
  11. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  12. Attacks that overwhelm a target system or network with a flood of traffic

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Process of transforming information into a scrambled format to secure it.Attacks that overwhelm a target system or network with a flood of traffic...

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
  2. Code examination performed without running the malicious program.
  3. Attacks that overwhelm a target system or network with a flood of traffic
  4. Injecting malicious scripts into webpages viewed by other users
  5. Process of transforming information into a scrambled format to secure it.
  6. Matching known patterns of threats against security event data to find potential matches.
  7. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  8. Criminal use of the internet or other electronic means to persistently harass an individual.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  11. Cloud-based vulnerability management platform with scanning and reporting.
  12. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
  1. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  2. Policy-based accept or deny of network traffic.
  3. Attack that uses a list of commonly used words or phrases to guess a password.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. Gaining unauthorized access to a secured area by following an authorized person.
  6. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  7. Security documentation that details system resource usage by users and processes for auditing.
  8. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord Puzzle FJ3 -17.10.25 SET A       Duration :15 mins Marks:20 crossword puzzle
Across
  1. Criminal use of the internet or other electronic means to persistently harass an individual.
  2. Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
  3. Policy-based accept or deny of network traffic.
  4. Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
  5. A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
  6. Gaining unauthorized access to a secured area by following an authorized person.
  7. Process of transforming information into a scrambled format to secure it.
  8. Security documentation that details system resource usage by users and processes for auditing.
  9. Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
  10. Code examination performed without running the malicious program.
Down
  1. Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  2. Matching known patterns of threats against security event data to find potential matches.
  3. Cloud-based vulnerability management platform with scanning and reporting.
  4. Attacks that overwhelm a target system or network with a flood of traffic
  5. Injecting malicious scripts into webpages viewed by other users
  6. Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
  7. Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
  8. Attack that uses a list of commonly used words or phrases to guess a password.
  9. Graphic object used in reports to visualize the correlation between an object and its performance.
  10. Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.

20 Clues: Policy-based accept or deny of network traffic.Injecting malicious scripts into webpages viewed by other usersCode examination performed without running the malicious program.Attacks that overwhelm a target system or network with a flood of trafficProcess of transforming information into a scrambled format to secure it....

Psnjan26 2026-01-25

Psnjan26 crossword puzzle
Across
  1. L An old, clunky computer system that a company is still trying to use.
  2. D Digging through piles of information to find useful facts or trends.
  3. B A massive amount of information that computers study to find helpful patterns.
  4. F A digital "security guard" that blocks dangerous traffic from entering a network.
  5. E Scrambling information into a secret code so only the right person can read it.
  6. C Using the internet to store files instead of saving them on your own computer.
  7. C Tools and habits used to keep hackers away from your private data.
  8. A A digital bridge that lets two different apps share information with each other.
  9. M When a computer practices a task over and over to get better at it on its own.
  10. B Using your face or fingerprint to unlock an app or prove who you are.
  11. S A safe "practice zone" where developers test new ideas without breaking anything.
  12. U How easy or enjoyable it feels to use a specific app or website.
  13. B The hidden "brain" of an app where the data is stored and managed.
Down
  1. G The digital "checkout counter" that sends your credit card info to the bank.
  2. I When different apps or devices are able to work together without any issues.
  3. S Software you pay for monthly to use online, like Netflix or Microsoft 365.
  4. A A list of instructions a computer follows to finish a task or make a choice.
  5. M Building a large app by connecting many tiny, separate programs together.
  6. F The part of an app you can actually see, touch, and click on.
  7. O Software that is free for anyone to look at, change, or share.

20 Clues: F The part of an app you can actually see, touch, and click on.O Software that is free for anyone to look at, change, or share.U How easy or enjoyable it feels to use a specific app or website.C Tools and habits used to keep hackers away from your private data.B The hidden "brain" of an app where the data is stored and managed....

COE Crossword Mania 2025-12-14

COE Crossword Mania crossword puzzle
Across
  1. Iconic white coat worn by SCBE and MSE students during experiments
  2. Common abbreviation for tutorial sessions in NTU engineering modules
  3. Essential EEE lab tool for visualizing voltage signals over time
  4. Iconic lecture theatre in Nanyang Avenue, often used for COE finals
  5. NTU school merging engineering with biotech and healthcare innovation
  6. Interdisciplinary field led by MAE and EEE for building intelligent machines
  7. wire Safety practice in circuits—connected to zero voltage reference
  8. Hands-on space in N4 for capstone projects and student startups
  9. Final Year Project—the capstone engineering experience for all COE seniors
  10. NTU engineering school known for circuits, power, and semiconductors
  11. Identity of every NTU COE student solving real-world problems
Down
  1. Core engineering subject on fluid behavior—key for MAE and CEE students
  2. Popular software used in EEE and MAE for PCB and circuit design
  3. NTU school focused on sustainable infrastructure and water systems
  4. Symbolic CEE field equipment; also a beloved orientation camp prop
  5. ching tuan LT Lecture theatre near North Spine, home to many engineering tutorials
  6. NTU school designing everything from drones to jet engines
  7. School studying smart materials, nanotechnology, and advanced composites
  8. Programming language widely used in COE for data analysis and automation
  9. COE academic corridor housing EEE, MAE, MSE, and SCBE
  10. Core theme of NTU’s sustainable engineering and campus vision
  11. Fundamental concept in EEE—paths for current flow and system design
  12. SCBE’s teaching lab for biochemical and biomedical engineering practicals
  13. Process of fixing errors in code, circuits, or capstone prototypes
  14. Nickname for Thermodynamics, the challenging but foundational COE module
  15. NTU’s Cybersecurity Research Centre under the College of Engineering

26 Clues: COE academic corridor housing EEE, MAE, MSE, and SCBENTU school designing everything from drones to jet enginesCore theme of NTU’s sustainable engineering and campus visionIdentity of every NTU COE student solving real-world problemsPopular software used in EEE and MAE for PCB and circuit design...

COE Crossword Mania 2025-12-14

COE Crossword Mania crossword puzzle
Across
  1. Essential EEE lab tool for visualizing voltage signals over time
  2. Core theme of NTU’s sustainable engineering and campus vision
  3. NTU school designing everything from drones to jet engines
  4. Popular software used in EEE and MAE for PCB and circuit design
  5. Symbolic CEE field equipment; also a beloved orientation camp prop
  6. Identity of every NTU COE student solving real-world problems
  7. Programming language widely used in COE for data analysis and automation
  8. Core engineering subject on fluid behavior—key for MAE and CEE students
  9. NTU engineering school known for circuits, power, and semiconductors
  10. Hands-on space in N4 for capstone projects and student startups
  11. Lecture theatre near North Spine, home to many engineering tutorials
  12. Fundamental concept in EEE—paths for current flow and system design
  13. COE academic corridor housing CEE, MAE, MSE, and SCBE
  14. Iconic white coat worn by SCBE and MSE students during experiments
  15. Common abbreviation for tutorial sessions in NTU engineering modules
Down
  1. Interdisciplinary field led by MAE and EEE for building intelligent machines
  2. NTU school focused on sustainable infrastructure and water systems
  3. Final Year Project—the capstone engineering experience for all COE seniors
  4. SCBE’s teaching lab for biochemical and biomedical engineering practicals
  5. NTU school merging engineering with biotech and healthcare innovation
  6. Process of fixing errors in code, circuits, or capstone prototypes
  7. wire Safety practice in circuits—connected to zero voltage reference
  8. NTU’s Cybersecurity Research Centre under the College of Engineering
  9. School studying smart materials, nanotechnology, and advanced composites
  10. Iconic lecture theatre in Nanyang Avenue, often used for COE finals
  11. Nickname for Thermodynamics, the challenging but foundational COE module

26 Clues: COE academic corridor housing CEE, MAE, MSE, and SCBENTU school designing everything from drones to jet enginesCore theme of NTU’s sustainable engineering and campus visionIdentity of every NTU COE student solving real-world problemsPopular software used in EEE and MAE for PCB and circuit design...

hi 2022-09-28

hi crossword puzzle
Across
  1. A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
  2. A generic term encompassing decode and decipher
  3. Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
  4. Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
  5. The service provider for CrowdStrike's internal training courses
  6. The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
  7. Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
  8. CrowdStrike's CEO and co-founder; abbr
  9. The property of being accessible and usable upon demand
  10. Computer compromised with malicious code; used by a threat actor to perform remote commands
  11. Hosting city of Fal.Con; abbr
  12. Someone who uses a social network to create an account with a fake identity to deceive an individual
  13. Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
  15. As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
  16. System of prevention and recovery from potential threats to a business; abbr
  17. As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
  18. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
  19. String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  20. An unauthorized user who attempts to or gains access to an information system
  21. Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
  22. CrowdStrike's annual cybersecurity convention; "___.Con"
  23. Software that compromises the operation of a system by performing an unauthorized function or process
  24. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
  25. Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
  26. A way to take advantage of a vulnerability in software
  27. A cybersecurity company
  28. The generic term encompassing encipher and encode
  29. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  30. The process of verifying the identity or other attributes of an entity
Down
  1. Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
  2. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  3. A denial of service technique that uses numerous systems to perform the attack simultaneously
  4. A recognizable, distinguishing pattern; typically used to sign documents
  5. Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
  6. Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
  7. Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
  8. Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
  9. ___-Party Information
  10. Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
  11. A capability to limit network traffic between networks and/or information systems
  12. Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  13. General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
  14. In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
  15. The process of transforming plaintext into ciphertext
  16. Type of analysis that determines what levels of impact to a system are tolerable; abbr
  17. Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
  18. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  19. CrowdStrike threat hunting team
  20. Intranet webpage for all things CrowdStrike-related; abbr
  21. Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
  22. Cryptographic network protocol for operating network services securely over an unsecured network; abbr
  23. A dishonest scheme; a fraud
  24. CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
  25. Short form for "cryptography"
  26. When someone uses a social network to create an account with a fake identity to deceive a concrete person
  27. The process of transforming ciphertext into its original plaintext
  28. Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
  29. Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
  30. Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
  31. Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms

61 Clues: ___-Party InformationA cybersecurity companyA dishonest scheme; a fraudHosting city of Fal.Con; abbrShort form for "cryptography"CrowdStrike threat hunting teamCrowdStrike's CEO and co-founder; abbrA generic term encompassing decode and decipherThe generic term encompassing encipher and encodeThe process of transforming plaintext into ciphertext...

internet basics 2024-01-18

internet basics crossword puzzle
Across
  1. A global network of interconnected computers that enables the sharing of information and resources.
  2. Media: Online platforms that enable users to create and share content, communicate, and connect with others.
  3. To transfer data from a local device to a remote server over the internet.
  4. A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
  5. Electronic mail that allows users to send and receive messages and files over the internet.
  6. A
  7. The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
  8. To transfer data from a remote server to a local device over the internet.
Down
  1. Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
  2. Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
  3. The buying and selling of goods and services over the internet.
  4. Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
  5. A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
  6. Engine: A program that allows users to search for information on the internet by entering keywords or phrases.

14 Clues: AThe buying and selling of goods and services over the internet.To transfer data from a local device to a remote server over the internet.To transfer data from a remote server to a local device over the internet.Electronic mail that allows users to send and receive messages and files over the internet....

Cyber Test 2025-03-12

Cyber Test crossword puzzle
Across
  1. A Social Engineering technique that uses a fake promise to pique a victim's curiosity or greed.
  2. What is the name of the cybersecurity firm that has faulty software update on July 2024 and causes Global IT outage.
  3. Part of Social Engineering Life Cycle that identifies the victim & gathering their background information.
  4. It is the most targetted sector in the Philippines.
  5. A malicious software installed on a computing device without the end users knowledge.
  6. According to SimilarWeb Ranking, what is the top visited website as of February 2025.
Down
  1. A type of malware created to deny a user or organization access to files on their computer and will ask money for decryption.
  2. Occurs when a harmful code is injected into legitimate online advertising networks, and the code redirects users to malicious websites.
  3. Refers to a wide range of malicious activities carried out through human interactions.
  4. Refers to the unauthorized transfer or theft of sensitive, confidential, or private data from a computer system.
  5. Part of Social Engineering Life Cycle that occurs by forming a relationship and initiating communication to build trust.
  6. It is a type of malware that usually spreads in spam emails and malicious links.
  7. Is a type of malware designed to scare you into taking action.
  8. It is a advertisement-supported software helps generate revenue for its developers by automatically displaying adverts on your screen, typically within a web browser.

14 Clues: It is the most targetted sector in the Philippines.Is a type of malware designed to scare you into taking action.It is a type of malware that usually spreads in spam emails and malicious links.A malicious software installed on a computing device without the end users knowledge....

Digital Transformation Crossword 2018-04-02

Digital Transformation Crossword crossword puzzle
Across
  1. Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
  2. The intersection of marketing and technology in today's highly digital business world
  3. New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
  4. Intelligence demonstrated by machines
  5. The protection of computer systems from the theft and damage
  6. Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
  7. The range of interactions that patients have with the health care system, including their care from health plans
  8. Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
  9. Websites and applications that enable users to create and share content or to participate in social networking
  10. Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
Down
  1. The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
  2. The change associated with the application of new digital technology in all aspects of business and organizational strategy
  3. Creating relevant and consistent connections between offline and online media in real time
  4. A cross-channel business model and content strategy that companies use to improve their user experience
  5. Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
  6. Enhancing healthcare delivery and support using telecommunications technologies
  7. Computer oriented crime
  8. The practice that aims at unifying software development and software operation
  9. The myriad of IT resources provided over the internet; Digital data stored in logical pools

19 Clues: Computer oriented crimeIntelligence demonstrated by machinesThe protection of computer systems from the theft and damageThe practice that aims at unifying software development and software operationEnhancing healthcare delivery and support using telecommunications technologies...

Securing your work, home and your digital footprint! 2020-10-06

Securing your work, home and your digital footprint! crossword puzzle
Across
  1. someone pretending to be someone,such as your boss, friend etc.. sends a email intending to gain money or information from a fake email address.
  2. Applied to data to protect it from unauthorized use in case of theft or loss.
  3. electronic device for storing an processing data
  4. Choose a password that is easy for you to _____but hard for someone to guess.
  5. Cybersecurity is a shared ________
  6. it IS VERY IMPORTANT to use strong privacy settings on ________.
  7. These devices are used to direct information between public and private networks
Down
  1. is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's identity
  2. ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK
  3. DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.
  4. system of interrelated,internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
  5. Device that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
  6. _____is an attempt by an individual or group to trick you into giving personal information by employing social engineering techniques through email.
  7. An option you can use to protect your credit.
  8. networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
  9. Technology used to connect to a public network through a secure tunnel.
  10. ____Uses cellphone text messages to induce people to divulge their personal information
  11. ROVER12345 would be a bad example of a _____
  12. For a password to be secure, it should contain upper and lower case letters,numbers and ______.

19 Clues: Cybersecurity is a shared ________DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.ROVER12345 would be a bad example of a _____An option you can use to protect your credit.electronic device for storing an processing dataALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESKit IS VERY IMPORTANT to use strong privacy settings on ________....

Terminologies in RA 10175 2023-10-25

Terminologies in RA 10175 crossword puzzle
Across
  1. refers to the computer systems, and/or networks, whether physical or virtual
  2. refers to the mathematical algorithm produced against digital information
  3. refers to any representation of facts, information,
  4. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
  5. refers to any information contained in the form of computer data or any other form that is held by a service provider
  6. refers to the willful engagement, maintenance, control or operation, directly or indirectly,
  7. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
  8. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data
  9. refers to the application of investigative and analytical techniques that conform to evidentiary standards
Down
  1. refers to any computer data other than the content of the communication
  2. refers to a set of instructions executed by the computer to achieve intended results
  3. refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual,
  4. refers to the modification or change, in form or substance, of an existing computer data or program
  5. refers to the keeping of data that already exists in a stored form
  6. refers to the collection of tools, policies, risk management approaches, actions, training, best practices
  7. refers to evidence, the use of which is sanctioned by existing rules of evidence
  8. refers to the person who created or is the origin of the assailed electronic statement or post using a computer system;
  9. refers to digital information that may be used as evidence in a case.
  10. also known as a forensic copy
  11. refers to gathering and receiving information

20 Clues: also known as a forensic copyrefers to gathering and receiving informationrefers to any representation of facts, information,refers to the keeping of data that already exists in a stored formrefers to digital information that may be used as evidence in a case.refers to any computer data other than the content of the communication...

Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11

Encrypting the You Matter Most Cybersecurity Crossword Challenge! crossword puzzle
Across
  1. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
  2. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
  3. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
  4. _____-force attack is a technique used to guess a password by trying many possible combinations
  5. Gain access to someone else’s computer or device without permission
  6. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
  7. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
  8. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
  9. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
  10. A location on the internet where you can save your data (rather than on your computer or device)
Down
  1. A program or device used to detect and prevent unauthorized access to a network
  2. A sequence of characters (or words) used to stop criminals from accessing your accounts
  3. A method of protecting data by converting it into unreadable code that only authorized parties can read
  4. Malicious software that could harm your computer or gadget
  5. What is a form of malware that monitors and records a user's activities without their knowledge?
  6. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
  7. A security incident where sensitive information is leaked to the public is a data ______
  8. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor

18 Clues: Malicious software that could harm your computer or gadgetGain access to someone else’s computer or device without permissionA program or device used to detect and prevent unauthorized access to a networkThe program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)...

ADSI Cristian Niño 2022-06-01

ADSI Cristian Niño crossword puzzle
Across
  1. Set of physical or material elements that constitute a computer or a computer system
  2. area of ​​science that is responsible for studying the administration of methods, techniques and processes in order to store, process and transmit information and data in digital format
  3. Set of programs and routines that allow the computer to perform certain tasks
  4. relational database management system developed under dual license: General Public License/Commercial License by Oracle Corporation
  5. set of computers capable of handling requests from a client and returning a response accordingly
  6. is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
  7. arrangement and order of the parts within a whole
Down
  1. Program capable of storing large amounts of data, related and structured
  2. programming language and a computing platform that was first commercialized in 1995 by Sun Microsystems
  3. set of elements that are combined following certain rules and that are semantically interpretable, which allows information to be exchanged
  4. sum of techniques, skills, methods and processes used in the production of goods or services or in the achievement of objectives, such as scientific research
  5. a person who writes computer programs
  6. branch of applied physics that encompasses physics, engineering, technology, and applications dealing with the emission, flow, and control of electrons
  7. is the practice of protecting important systems and sensitive information from digital attacks
  8. worldwide interconnected computer network in the form of a spider web consisting of servers

15 Clues: a person who writes computer programsarrangement and order of the parts within a wholeProgram capable of storing large amounts of data, related and structuredSet of programs and routines that allow the computer to perform certain tasksSet of physical or material elements that constitute a computer or a computer system...

Cybersecurity Awareness Month - Acronym Edition 2022-10-07

Cybersecurity Awareness Month - Acronym Edition crossword puzzle
Across
  1. An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
  2. A system turns domain names into IP addresses
  3. A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
  4. Also called a "black cloud"
Down
  1. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
  2. A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
  3. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
  4. Provide outsourced monitoring and management of security devices and systems

8 Clues: Also called a "black cloud"A system turns domain names into IP addressesProvide outsourced monitoring and management of security devices and systemsA secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online...

Cybersecurity Awareness Puzzle 4 2024-08-09

Cybersecurity Awareness Puzzle 4 crossword puzzle
Across
  1. __ alert button
  2. __ factor authentication
  3. __ reusing passwords
  4. __ over links before clicking
Down
  1. __ a ticket if you're unsure
  2. __ software regularly

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

Cybersecurity Awareness Puzzle 6 2024-08-09

Cybersecurity Awareness Puzzle 6 crossword puzzle
Across
  1. __ a ticket if you're unsure
  2. __ software regularly
  3. __ reusing passwords
  4. __ over links before clicking
Down
  1. __ factor authentication
  2. __ alert button

6 Clues: __ alert button__ reusing passwords__ software regularly__ factor authentication__ a ticket if you're unsure__ over links before clicking

SET 5 2023-01-22

SET 5 crossword puzzle
Across
  1. Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution
  2. The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction
Down
  1. A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal
  2. A component of a computer that controls its performance, like the foreman of a construction site, it supervises the work of all the other parts
  3. A network of remote servers that are used to store, manage, and process data

5 Clues: A network of remote servers that are used to store, manage, and process dataA set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a mealProgramming language whos design turned out to be general enough to address a wide variety of domains but slow in execution...

Chapter 2- TYPES OF ATTACKS 2022-09-10

Chapter 2- TYPES OF ATTACKS crossword puzzle
Across
  1. Contain tracking information for an individual email
  2. Fraud like Phishing, but it comes as a text message or SMS
  3. It is a deceptive scheme or trick used to cheat someone out of something
  4. It is merely an email trying to convince you to do something
  5. It is a phone scam designed to get your personal information by impersonating
  6. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  7. Threat that involves sending email messages with a fake sender address
  8. It is just like Phishing but it only targets specific individuals within an organization
Down
  1. It is news or knowledge received or given
  2. Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
  3. A link that direct you to a fake login page, in the hope that you might enter your credentials
  4. Exclusively targets high-ranking individuals such as your BOSS within an organization
  5. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  6. It is a type of email attack where bad people are trying to steal your precious information
  7. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
  8. Unsolicited bulk messages normally from people trying to sell something
  9. An act of pretending to be another person for the purpose of commiting fraud

17 Clues: It is news or knowledge received or givenContain tracking information for an individual emailFraud like Phishing, but it comes as a text message or SMSIt is merely an email trying to convince you to do somethingThreat that involves sending email messages with a fake sender address...