cybersecurity Crossword Puzzles
Yubi Crossword Challenge 2023-10-11
Across
- Yubi's policy that defines the principles and responsibilities for securely managing user authentication and access permissions.
- Yubi's structured process of classifying, labeling, and protecting data based on its sensitivity and importance.
- A software vulnerability that allows an attacker to execute arbitrary code.
- The practice of allowing only authorized users to access certain resources.
- The practice of granting the minimum access necessary for users to perform their tasks.
- The process of converting plaintext into unreadable, scrambled data for security.
- A method for simulating real-world attacks to test security defences
- A cryptographic technique used to prove knowledge of a secret without revealing the secret.
- A cryptographic technique that involves hiding data within other data.
- A software vulnerability that is unknown to the software vendor.
- Yubi's framework for quickly recovering from cyber incidents and ensuring minimal disruption to operations.
Down
- The unauthorized access and theft of confidential information.
- Type of attack where an attacker monitors and captures data in transit.
- Yubi's systematic practice of disguising or obfuscating sensitive data to protect it from unauthorized access.
- A security incident where a user receives fraudulent emails attempting to trick them.
- A malicious software that demands a ransom from the victim.
- A network security device that filters incoming and outgoing network traffic
- A type of attack where an attacker pretends to be someone else to gain unauthorized access.
- A security measure that ensures data is not altered during transmission.
- A system's ability to resist unauthorized access and protect against cyberattacks.
- A security model that assumes no trust, even within the network.
- Yubi's strategic choice to safeguard data within its own borders.
- A process of analyzing network traffic patterns for anomalies.
- A technique for identifying and managing security risks.
- A system or network designed to attract attackers to collect threat intelligence.
25 Clues: A technique for identifying and managing security risks. • A malicious software that demands a ransom from the victim. • The unauthorized access and theft of confidential information. • A process of analyzing network traffic patterns for anomalies. • A security model that assumes no trust, even within the network. • ...
Internet Safety Crossword 2025-03-13
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- alter (a photographic image) digitally using Photoshop image-editing software.
- Using bold letter during text
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- any kind of communication over the Internet
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
- It encompasses a wide range of criminal activities that are carried out using digital devices and/or networks
- the part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user
- the acceptable way of communicating on the internet.
- An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
- using the Internet, email, or other electronic communications to stalk someone
- Grooming is when someone builds your trust and makes a connection with you to get you to do something sexual or illegal.
Down
- small files of information that a web server generates and sends to a web browse
- intentional video-recorded assault of individuals which are then posted
- Theft an act of pretending to be another person for the purpose of entertainment or fraud.
- when someone posts or comments online to deliberately upset others
- the illegal copying or distribution of copyrighted material via the Internet
- mean content about someone else
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
- information about a particular person that exists on the internet
20 Clues: Using bold letter during text • mean content about someone else • any kind of communication over the Internet • the acceptable way of communicating on the internet. • information about a particular person that exists on the internet • when someone posts or comments online to deliberately upset others • ...
Cyber security 2023-04-28
Across
- Software designed to harm or exploit any device or network it infects.
- A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
- Software designed to detect and remove viruses and other types of malware.
- detection system Software that monitors a network or system for signs of unauthorized access or activity.
- attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
- authentication A security measure that requires two forms of identification to access an account.
- breach The unauthorized access, use, or disclosure of sensitive information.
- engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- force attack A method of guessing a password by trying every possible combination until the correct one is found.
- security The practice of securing a network from unauthorized access or attacks.
- An update to software that fixes a vulnerability or bug.
- Criminal activity that involves the use of digital devices or networks.
- testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
- exploit An attack that exploits a previously unknown vulnerability in a software application or system.
- The process of verifying the identity of a user or system.
- A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
- Method of converting plain text into a code that can only be read by authorized parties.
- A weakness or flaw in a system that can be exploited by attackers.
- Network security system that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
20 Clues: An update to software that fixes a vulnerability or bug. • The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • Software designed to harm or exploit any device or network it infects. • Criminal activity that involves the use of digital devices or networks. • ...
FITC_Vocab.jfz 2013-05-15
Across
- something that serves as something to copy
- any document you can edit
- What does VDU stand for?
- Who/What/Why
- What does CPU stand for?
- Types:DSI/Cable
- What does PDF stand for?
- allows additional boards to be connected
- an application that searches for data based information
- protect computer and network systems
- What does SSID stand for?
- the front face of the computer
- What does RAM stand for?
- an image that is put on a webpage that appeals to you
- optical/mechanical
- formal induction into office
- internet and online world
- What does WI-FI stand for?
- memorable phrase used in advertising
- how you act online
- provides internet access
- how you choose to save a document
- where your flashdrive goes
- the overall layout of a document
Down
- a printed circuit board contained in a device
- What does RTF stand for?
- a quotation from a reference
- encoded computer instructions
- indication that a product meets the specifications
- allows a computer to connect to a network
- What does NCSA stand for?
- computer port for keyboard or mouse
- program that the user applies to control hardware/software
- Types:3G/4G
- allows sound devices to be connected
- an speech a person takes before taking the duties of office
- used for storing large amounts of data
- instructions that a device can interpret
- data sent out of a computer
- rules and behaviors to keep you safe
- stores/shared all the pages of your website
- How can talk to someone through your car?
- a summary of your academic and work history
- protection for any piece of published work
- an image that relates to a company
- structure arrangement of items
46 Clues: Types:3G/4G • Who/What/Why • Types:DSI/Cable • optical/mechanical • how you act online • What does RTF stand for? • What does VDU stand for? • What does CPU stand for? • What does PDF stand for? • What does RAM stand for? • provides internet access • any document you can edit • What does NCSA stand for? • What does SSID stand for? • internet and online world • What does WI-FI stand for? • ...
FITD Vocab.af 2013-05-15
Across
- the internet and online world
- Where you connect to a network using a wired connection (internet)
- searches all search engines and gets the top results
- SSID
- Alternatively to as high-speed Internet or wide band transmission
- a program that allows you to search the internet for information
- long term memory
- the way you behave online
- a readable file
- Homeland Security (NCSA)
- CPU
- examples: headphones, speakers
- the heart of the computer
- the software of a laptop
- hand free speaking device
- set of structured activies (safari, firefox)
- 8 bits make a ____
- is a sequence of instructions
- created with a copyright symbol on it
- location for CD in your laptop
- a device that displays signals on a computer screen
- a brief background of your history
Down
- is equal to 1,099,511,627,776 bytes
- ISP
- portable device
- where all information is stored
- when the computer isn't working you ____ it back up
- this is a program
- What do they want? who is asking? Why do they want it?
- a port used to connect a computer a mouse or a keyboard to an IBM compatible computer
- is an object on a computer that stores data
- rules and behavior to keep you and your computer safe
- short term memory
- USB (flash drive)
- examples: flashdrive, keyboard, mouse, etc
- LCD
- the purpose of this is to upgrade your computer
- LED
- a device that receives data and projected data
- a storage device or backup device that you can access
- A electronical and physical port
- to protect information and networks
- a program on your device that allows you to download and upload
- is a physical components of computer wiring (the inside of the computer)
- cloud based presentation on the internet. There is only one slide that can be edited. .
45 Clues: ISP • LCD • CPU • LED • SSID • portable device • a readable file • long term memory • this is a program • short term memory • USB (flash drive) • 8 bits make a ____ • Homeland Security (NCSA) • the software of a laptop • the way you behave online • the heart of the computer • hand free speaking device • the internet and online world • is a sequence of instructions • examples: headphones, speakers • ...
FITDVocab.HB 2013-05-15
Across
- A online, zoomable presentation website
- The way you behave online
- ISP
- a phrase representing a
- MB; 1,048,576 bytes
- SSID; a 32 digit code
- The main circuit center usually located in the modem
- the arrangement of a document
- .RTF
- GB 1,073,741,824 bytes
- to start up a computer
- Wireless local area network; WIFI
- a file extension used for Microsoft Word 97-03
- A search tool that uses results from multiple search engines
- Internet and online world
- a space used to plug mice and keyboards into PCs
- An affirmation taken by a person before understanding the duties of an office
Down
- A plug-in device
- Who is it? Why are they contacting me? What do they want?
- KB;1,024 bytes
- The ability to work with another program or hardware device
- NCSA
- Your computer's short term memory
- A ceremonial induction into office
- a pre-formated document
- used to connect your computer to another computer, a local network, or a cable modem
- VDU
- Protection of information on the internet
- A device that sends information into the computer Ex. Keyboard, Mouse
- A portable,handheld, wireless computing device.
- USB
- LED
- A device that sends information out of the computer Ex.Headphones, Printer
- LCD
- A handsfree communicating device
- physical components of computer wiring
- 8 bits
- (apps) programs on a computer
- rules and behavior to keep you safe online
- a program for the retrieval of data ex: Bing, Yahoo, Google
- A brief summary of achievements and previous and current occupations that you use to apply to a job
- Reference to a book, paper, author, magazine, etc.
- a mouse with a rolling ball in the bottom
- a picture representing a company
45 Clues: ISP • VDU • USB • LED • LCD • NCSA • .PDF • .RTF • 8 bits • KB;1,024 bytes • A plug-in device • MB; 1,048,576 bytes • SSID; a 32 digit code • GB 1,073,741,824 bytes • to start up a computer • a pre-formated document • a phrase representing a • The way you behave online • Internet and online world • the arrangement of a document • (apps) programs on a computer • A handsfree communicating device • ...
Hung Cucks NYE Crossword Puzzle 2021-12-27
Across
- The Hung Cucks met two years ago at this museum
- Laura's little sister's first name
- When Matt was younger, he considered playing this sport professionally
- Neal lives on this street in CLT
- Haleigh's middle name
- In 2017, Haleigh bungee-jumped in this European country
- In her studio apartment, Laura creates space by mounting her _ bed
- The DNS cybersecurity software Laura sells at Cisco
- Haleigh works at this Top 4 Accounting Firm
- Matt and Haleigh recently vacationed with his parents at this coastal metropolis
- Neal and his brothers are part of this fraternity
- The bar Haleigh and Laura arm-wrestled in
- Neal's beloved family pet who frequented as a therapy dog volunteer
- How many 4's does Matt have in his Instagram handle
- Summer of senior year, one of Haleigh and Laura's almost sugar daddy's referred to Haleigh's eyes as "_ eyes"
- In 2015, Laura became the _ Lincoln Douglas Debate North Carolina State Champion by unanimous vote
Down
- This year, Matt and Neal celebrated this many years of Facebook Friendship
- The size of Neal's graduating class
- Neal's Instagram handle
- Matt was a founding member of this fraternity at High Point
- The surgical journal subscription Neal gifted Matt
- Change one letter in Haleigh's name
- The Fire Department Neal volunteered at in Tennessee
- Matt performed this dance during his show choir's performance
- Matt and Laura share appreciation for this spiritual practice
- Matt and Haleigh met on this dating application
- From 2013-2016 Haleigh served as head cashier at this footwear retailer
- Haleigh and Laura met working under this manager of the Global Programs office
- Neal's parent's Mercedes camper
- Laura's dream dog
- As teenagers, Neal and Matt were employed at this country club
- Matt's childhood guinea pig
32 Clues: Laura's dream dog • Haleigh's middle name • Neal's Instagram handle • Matt's childhood guinea pig • Neal's parent's Mercedes camper • Neal lives on this street in CLT • Laura's little sister's first name • The size of Neal's graduating class • Change one letter in Haleigh's name • The bar Haleigh and Laura arm-wrestled in • Haleigh works at this Top 4 Accounting Firm • ...
Computer Science 6th Period 2024-04-03
Across
- A control flow statement that allows for the repeated execution of a block of code until a certain condition is met, such as for loops and while loops.
- A high-level, interpreted programming language known for its simplicity and readability
- the device you use to click on a computer
- a set of instructions and data that tells a computer how to perform specific tasks or operations
- A collection of related webpages, usually registered under the same domain name
- Information (numbers, words, measurements, observations, etc) that is in a computer-readable form
- A symbolic name that refers to a value stored in memory, which can be manipulated and referenced by the program's instructions.
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
- the practice of protecting computer systems, networks, and data from unauthorized access, attacks, or damage aimed at exploitation or disruption
- the device you use to type on a computer
Down
- a message in your code that explains what is going on, but is not seen by the user
- the device you use to make phone calls
- the physical components of a computer
- A named block of code that performs a specific task or calculation, which can be called and executed from other parts of the program
- The usage of deceptive emails and websites to maliciously gather personal information
- The primary software that runs applications and manages all the hardware, memory and other software on a computer
- The small robot we use in class, also a type of bird
- base-16 numbering system that uses sixteen distinct symbols to represent numbers, consisting of the digits 0-9 and the letters A-F
- a numbering system that consists of two digits, 0 and 1
- the coding language used to code the "bones" of a website
- the coding language used to make a website visually appealing
21 Clues: the physical components of a computer • the device you use to make phone calls • the device you use to type on a computer • the device you use to click on a computer • The small robot we use in class, also a type of bird • a numbering system that consists of two digits, 0 and 1 • the coding language used to code the "bones" of a website • ...
Technology Words Search 2025-01-23
Across
- - The address of a web page on the internet.
- - A device that connects different networks and directs data traffic.
- - A storage layer that speeds up data access by storing frequently used information. Cloud - A virtual storage solution accessed over the internet.
- - A place where data is saved and retrieved.
- - A wireless technology used to connect devices to the internet.
- - A computer or system that provides resources or services to other computers.
- - A global network that connects millions of private, public, academic, and business networks.
- - Software that secretly gathers information from a user.
- - Software designed to damage or disrupt a computer system.
- - The component of a computer that executes instructions.
- - A group of connected computers that share resources.
- - The core of an operating system, managing hardware and software.
- - A programming language commonly used in web development.
- - A set of rules governing the exchange of data between devices.
Down
- - A step-by-step procedure for solving a problem. Bandwidth - The maximum amount of data that can be transmitted over an internet connection.
- - A network security system that monitors and controls incoming and outgoing traffic.
- - Practices and technologies to protect systems and data from cyberattacks.. Data - Information processed or stored by a computer.
- - The physical components of a computer system.
- - Programs and operating information used by a computer.
- - The process of creating virtual versions of hardware or resources.
- - An organized collection of data, often stored electronically.
- - The process of finding and fixing coding errors. Encryption - The process of converting data into a code to prevent unauthorized access.
- System - Software that manages hardware and provides services for applications.
- - A secret word or phrase used to gain access to a system.
- - Temporary memory a computer uses to store data for quick access.
- - A unique string of numbers identifying devices on a network.
26 Clues: - The address of a web page on the internet. • - A place where data is saved and retrieved. • - The physical components of a computer system. • - A group of connected computers that share resources. • - Programs and operating information used by a computer. • - Software that secretly gathers information from a user. • ...
Computer Science Module 1 2024-11-04
Across
- a wireless networking technology that allows computers and other devices to communicate over a wireless signal.
- Network a group of computers connected with each other so that various devices can interact with each other through a network.
- Language zeros and ones; code arranged in ways that the computer can read, understand, act upon.
- Area Network (LAN) a group of computers connected to each other in a small area such as a building, office.
- the activities practiced by individuals, organizations, and nations, in order to gain unauthorized access to computer and technology dependent systems.
- the process of hiding readable information in a format that can't be read.
- a device that uses information or data, and carries out instructions. It takes input from input devices, runs code, and produces output through output devices.
- The amount of data that can be transmitted within a fixed time period.
- Central processing unit that calculates information.
- Structures Do certain things based on a true or false, yes or no decision.
- Area Network (WAN) a network that extends over a large geographical area such as states or countries.
- memory is temporarily stored; Also known as random access memory.
Down
- Device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
- global network of computers that use protocols and data packets to exchange information.
- a basic unit of communication over a digital network.
- Stores information.
- protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- Converts physical input to binary information.
- of Commands The right commands in the right order.
- Model a layered abstract description for communications and computer network protocol design.
- Structures List of instructions to do more than once.
- a process through which digital data is saved within a data storage device by means of computing technology.
- Converts information to physical output.
- a high-speed electronic network that carries more than one type of communication (as Internet and cable television signals).
24 Clues: Stores information. • Converts information to physical output. • Converts physical input to binary information. • of Commands The right commands in the right order. • Central processing unit that calculates information. • a basic unit of communication over a digital network. • Structures List of instructions to do more than once. • ...
FITDVocab.jg 2013-05-15
Across
- A port for a PlayStation2
- Where is something processed
- A written set of instructions
- Host A host that is on the internet, or a site hoster
- Manners Online
- When a new president gets assigned and uses a bible
- Random.........
- A server in the "sky"
- What is that tower thingy called?
- "Fidelity"
- Protecting Passwords online
- The made layout by a company or software
- A device that you use for the computer using a mechanical ball
- To restart your computer
- A HUGE search engine
- What "things" are installed on your computer?
- The way things are arranged
- Light emitting diodes, Light crystal display
- A website that is like an "engine"
- Where documents and Power-points are stored in
- A catchy phrase a company uses
- Online safety
- You need 8 of these to make a byte
- What is your screen called
Down
- Feeding something "out" of your computer
- Things you plug into your computer
- What does "©" stand for?
- What do you plug your flash-drive in?
- Those square things on your homepage on an iPhone
- A drive that is very, very important
- OSX,MAC,PC,WINDOWS7
- Online
- where do you plug in your headphones?
- the stuff inside your computer
- .docs .xcxl .pp
- Someone who provides their internet service
- think of a "disc Drive"
- Something that you type in, like "word"
- 1,000 of these equals a terabyte
- Something that feeds info "into" your computer
- Extra slots
- Something that you can call off of
- do you have 4G or 3G?
- A host that connects you to the internet
- When you "cite" a source, what is that called?
- A picture for a business
- Social security i_
47 Clues: Online • "Fidelity" • Extra slots • Online safety • Manners Online • .docs .xcxl .pp • Random......... • Social security i_ • OSX,MAC,PC,WINDOWS7 • A HUGE search engine • A server in the "sky" • do you have 4G or 3G? • think of a "disc Drive" • What does "©" stand for? • To restart your computer • A picture for a business • A port for a PlayStation2 • What is your screen called • ...
FITDVocab.Sb 2013-05-15
Across
- The slot to plug in headphones and other listening devices
- A device that can generate, record, process, transmit, or display information
- a device that you can use on the go
- the safe and responsible use of the information and communication on the internet
- The means for users to control or operate a computer
- The port used to connect internet if you don't have wireless internet
- Your area in which you can type, edit, or draw your information
- A device that operates separately as a magnetic disk or tape unit. Ex: Headphones,mouse,keyboard
- measures taken to keep your computer and computer system protected
- An arrangement of parts and elements
- Used to plug in a mouse or keyboard
- A more precise search engine that searches Google and Yahoo
- A hands free speaking device
- The process of powering the computer and getting into the operating system
- The screen of the computer
- You can use this to connect to a wireless network, but you must have the same ____ to connect
Down
- An online place that stores your files and documents
- Provides internet to users and subscribers
- The recent memory of your computer
- A cloud based presentation software that uses one big canvas
- a place where you can find websites based on the things you want
- something you can put in and use on your computer
- Third generation of this is not as good as fourth generation
- something online
- A legal right granted to the creator of something
- something that sends information out
- The heart of the computer,your computer would not work without this
- comes in DSL or Cable.
- A peripheral you use to navigate the screen of a computer
- Measuring data by means of physical properties
- You plug your flash drives and other devices into this
- A device that provides internet to all connected devices
32 Clues: something online • comes in DSL or Cable. • The screen of the computer • A hands free speaking device • The recent memory of your computer • a device that you can use on the go • Used to plug in a mouse or keyboard • something that sends information out • An arrangement of parts and elements • Provides internet to users and subscribers • ...
ADSI-Brahiam Castillo 2022-05-04
Across
- step by step process for developing high- quality information systems.
- they indicate the structure, operation and interaction between the parts of the software.
- It is someone who discovers the vulnerabilities of a computer or a communication and information system.
- For modeling and database management, it is a data model based on predicate logic and set theory.
- Deliver products that meet, and can exceed, user expectations.
- Allows users to find information by entering keywords.
- It refers to a digital interconnection of everyday objects with the internet.
- it is a complete description of the behavior of the system to be developed.
Down
- It is a centralized repository of information about data such as meaning, relation to other data, origin, use and format.
- Most large companies require systems that combine transaction processing, business support, knowledge management, and user productivity features.
- database management system.
- Set of standards that were created with the aim of helping companies establish levels of management, service provision and product development.
- It is the area related to information technology and telematics that focuses on the protection of the computing infrastructure.
- They are the computer programs that make it possible to execute specific tasks within a computer.
- It is a formal language that provides the programmer with the ability to write a series of instructions in the form of algorithms in order to control the physical or logical behavior of a computer system.
- It is a company specialized in the development of cloud and local solutions.
- Programming language and a computer platform that was first commercialized in 1995.
- It is an American company of electronic commerce and cloud computing services at all levels.
- It consists of buying and selling products or services through the internet.
- Set of physical or material elements that constitute a computer.
- Fitness for use meeting customer needs.
21 Clues: database management system. • Fitness for use meeting customer needs. • Allows users to find information by entering keywords. • Deliver products that meet, and can exceed, user expectations. • Set of physical or material elements that constitute a computer. • step by step process for developing high- quality information systems. • ...
Rhetoric Test Examples 2024-02-13
Across
- He could see the boy through streaked glass, flashing with sunlight, blurring his vision.
- As a doctor, I am qualified to tell you that this course of treatment will likely generate the best results.
- We have nothing to fear but fear itself.
- "By 2022, another study estimates, there will be 1.8 million vacant cybersecurity jobs"
- "we will not be satisfied until justice rolls down like waters, and righteousness like a mighty stream"
- "We don't have time to debate uniforms! We should really be talking about limiting students' access to technology."
- "Illegal immigration is illegal"
- "Some of you have come from"
- Eating french fries is as bad for your body as narcotic abuse.
- “before you listen to her, I should remind you that she has been charged with embezzlement.”
- “The majority of our countrymen think we should have military operations overseas; therefore, it's the right thing to do.”
Down
- "I'm a woman, so I must know how to cook"
- "Let us not wallow in the valley of despair, I say to you today, my friends."
- "Join or Die"
- "Lisa was brainwashed as a child into thinking that people are generally good. Therefore, people are not generally good."
- "If we ban assault rifles because they are unnecessarily deadly, eventually the government will ban all guns, so we should not ban assault rifles."
- "After my son had his vaccine, he developed autism. Therefor the vaccine gave him autism."
- The lifelong pain and anguish experienced by children of abusive and neglectful parents can never be erased.
- "a great American, in whose symbolic shadow we stand today, signed the Emancipation Proclamation"
- "Go Back to Mississippi, go back to Alabama, go back to South Carolina, go back to Georgia, go back to Louisiana, go back to the slums and ghettos of our northern cities"
- "black men and white men, Jews and Gentiles, Protestants and Catholics, will be able to join hands and sing"
21 Clues: "Join or Die" • "Some of you have come from" • "Illegal immigration is illegal" • We have nothing to fear but fear itself. • "I'm a woman, so I must know how to cook" • Eating french fries is as bad for your body as narcotic abuse. • "Let us not wallow in the valley of despair, I say to you today, my friends." • ...
NewOne 2024-01-22
Across
- Creation of a virtual version of something (e.g., operating systems, storage devices).
- eXtensible Markup Language; used for storing and transporting data.
- HyperText Markup Language; used for creating web pages.
- Programming paradigm based on the concept of objects.
- High-speed data storage used to access frequently used information quickly.
- A decentralized and distributed digital ledger technology.
- A technique in programming where a function calls itself.
- Practice of protecting systems, networks, and data from digital attacks.
- Local Area Network; a network that connects computers in a limited area.
- Graphical User Interface; a visual way to interact with a computer using icons and menus.
- A programming language used for web development.
- Data that describes other data.
- Set of rules governing data communication.
- Core part of an operating system.
- Data Large volumes of structured and unstructured data.
Down
- Process of converting data into a code to secure it.
- A step-by-step procedure for solving a problem.
- A JavaScript runtime environment used for server-side programming.
- In computing, a process that has been terminated but still has an entry in the process table.
- Yet Another Markup Language; used for configuration files.
- Internet Protocol version 6; the most recent version of the Internet Protocol.
- Characters used for spacing or formatting but do not represent visible symbols.
- Operating system developed in the 1960s and 1970s.
- Data structure that follows the First In, First Out (FIFO) principle.
- Base-2 numbering system used in computers.
- Structured Query Language; used for managing and manipulating databases.
- A structured set of data organized for easy retrieval.
- Security system that monitors and controls incoming and outgoing network traffic.
- Learning Subset of AI that enables systems to learn and improve from experience.
- Transmission Control Protocol/Internet Protocol; the basic communication language of the Internet.
30 Clues: Data that describes other data. • Core part of an operating system. • Base-2 numbering system used in computers. • Set of rules governing data communication. • A step-by-step procedure for solving a problem. • A programming language used for web development. • Operating system developed in the 1960s and 1970s. • Process of converting data into a code to secure it. • ...
CROSSWORD PUZZLE 2024-08-22
Across
- The system allows taxpayers from across the nation and the world to participate in auctions, promoting this. (10 letters)
- These professionals ensure that IoT devices are functional and connected (eight letters)
- Challenge in measuring ROI due to multiple factors (10 letters)
- This term describes a type of auction conducted entirely over the internet. (6 letters)
- Crucial for successful data analytics projects (6 letters)
- Most analytics initiatives fail due to poor ___ (4 letters)
- HR teams must ensure that these devices are safe and secure on the network (fifteen letters)
- The reduction of this at ports is a major benefit of the new online auction system. (9 letters)
- SMART objectives should align with this (4 letters)
- Visualization tool that shows task timelines (5 letters)
- Technique used in HR to anticipate future behaviors and events (ten letters)
Down
- This tool provides interactive dashboards and helps analyze large datasets. (7 letters)
- The process of quickly completing transactions and reducing paperwork is an advantage of online auctions. (8 letters)
- The process of transforming large datasets into visual formats for better understanding. (11 letters)
- Tool providing round-the-clock project assistance (7 letters)
- Primary area of improvement through AI: ___ costs (5 letters)
- Disruptive 21st-century business approach involving big data analytics (ten letters)
- Approach that shifts HR management from guesswork to data-driven practices (eleven letters)
- HR function that benefits from data analytics in identifying the best platforms and job boards (eight letters)
- ROI formula dividing net income by this (9 letters)
- This term refers to the quality of being open and honest in an auction process. (12 letters)
- This visualization technique is used to highlight areas of higher risks or anomalies. (7 letters)
- This type of graph is useful for tracking changes over time, like revenue growth. (4 letters)
- A common chart used to show proportions and components of a whole. (3 letters)
- Financial metric measuring investment efficiency (3 letters)
25 Clues: ROI formula dividing net income by this (9 letters) • SMART objectives should align with this (4 letters) • Visualization tool that shows task timelines (5 letters) • Crucial for successful data analytics projects (6 letters) • Most analytics initiatives fail due to poor ___ (4 letters) • Financial metric measuring investment efficiency (3 letters) • ...
ekonomi 2024-09-02
Across
- program beasiswa terkenal yang merupakan hubungan pendidikan antara Belanda dan Amerika Serikat
- York Negara bagian di Amerika Serikat yang memiliki hubungan historis dengan Belanda.
- Organisasi internasional di mana Belanda dan Amerika Serikat bekerja sama dalam masalah lingkungan.
- Konvensi yang diikuti oleh Belanda dan Amerika Serikat untuk mengatur perdagangan internasional.
- Badan antar-pemerintah di bidang energi yang diikuti oleh Belanda dan Amerika Serikat.
- Kerjasama di bidang keamanan antara Belanda dan Amerika Serikat setelah 9/11.
- Perjanjian dagang penting antara Amerika Serikat dan negara-negara Eropa, termasuk Belanda.
- kerjasama militer yang terjalin antara Belanda dan Amerika Serikat sering melalui organisasi ini
- Organisasi internasional di bidang ekonomi di mana Belanda dan Amerika Serikat adalah anggotanya
- Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS
- Industri teknologi besar asal Amerika Serikat yang memiliki fasilitas di Belanda.
- Produk teknologi yang dikembangkan bersama oleh Belanda dan Amerika Serikat.
- York Kota di AS yang merupakan pusat dari banyak perusahaan Belanda.
- Bentuk kerja sama di bidang kesehatan antara Belanda dan Amerika Serikat.
- plan Bentuk bantuan ekonomi yang diberikan Amerika Serikat kepada Belanda setelah Perang Dunia II.
Down
- Konferensi internasional tentang hak asasi manusia yang dihadiri oleh Belanda dan Amerika Serikat.
- Perjanjian militer antara Belanda dan Amerika Serikat di bawah naungan NATO.
- Program pertukaran pelajar antara Belanda dan Amerika Serikat.
- pelajar Bentuk kerjasama di bidang pendidikan tinggi antara universitas Belanda dan Amerika Serikat.
- Kerjasama di bidang keamanan siber antara Belanda dan Amerika Serikat.
- kegiatan penelitian bersama antara universitas Belanda dan Amerika Serikat
- perjanjian antara negara-negara di Eropa yang diikuti oleh Belanda dan berimplikasi pada hubungan dagang dengan Amerika Serikat
- Perusahaan transportasi asal Amerika yang memiliki hubungan dagang dengan Belanda.
- Program pelatihan militer bersama antara Belanda dan Amerika Serikat.
- salah satu produk utama yang diekspor Belanda ke Amerika Serikat
- industri utama Belanda yang diekspor ke Amerika Serikat selain bunga.
- Organisasi lingkungan yang diikuti oleh Belanda dan Amerika Serikat untuk melindungi spesies terancam punah.
- Kota di Belanda tempat markas besar Eropa dari banyak perusahaan Amerika Serikat.
- Perusahaan teknologi asal Amerika yang bekerja sama dengan perusahaan Belanda di bidang chip.
- Organisasi internasional di bidang kesehatan di mana Belanda dan AS bekerja sama.
30 Clues: Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS • Program pertukaran pelajar antara Belanda dan Amerika Serikat. • salah satu produk utama yang diekspor Belanda ke Amerika Serikat • York Kota di AS yang merupakan pusat dari banyak perusahaan Belanda. • Program pelatihan militer bersama antara Belanda dan Amerika Serikat. • ...
Cyber and DIGITAL LITERACY 2024-04-30
Across
- - Criminal activities conducted via digital means.
- - Measures to protect against cyber attacks.
- - Secret word or phrase to access a system.
- - Fraudulent acquisition of someone's identity.
- - Rights related to digital content and technology.
- - Securing data by converting it into a code.
- - Shared values and norms in the digital community.
- - Gathering and analyzing digital threat information.
- - Practices to maintain online safety and security.
- - Gap between those with and without access to technology.
- - Protection against cyber-related losses.
- - Study of human behavior in cyberspace.
- - Understanding of cyber threats and safety measures.
- - Malicious software that replicates itself.
- - Software designed to harm or infiltrate a system.
- - Promoting products or services online.
- - Programs and applications for computers.
- - Writing instructions for computers.
- - System of interconnected computers.
- - Potential dangers to digital systems.
- - Person raised in the digital age.
- - Knowledge of cyber risks and precautions.
- - Mobile phone with advanced capabilities.
- - Encoding data for secure transmission.
- - Right to control personal information.
- - Education on protecting against cyber threats.
- - Global network connecting computers worldwide.
- - Accountability for one's online actions.
- - Banking services conducted over the internet.
- - Unique name used to identify oneself online.
Down
- - Ethical behavior in the digital world.
- - Protection of sensitive information.
- - Investigation of cybercrimes.
- - Verification of a user's identity.
- - Ability to effectively use digital tools and technologies.
- - Harassment or intimidation online.
- - Barrier to block unauthorized access to a network.
- - Conflict conducted in the digital realm.
- - Deliberate exploitation of computer systems.
- - Protection of digital systems from cyber threats.
- - Internet-based currency for online transactions.
- - Platforms for online social interaction.
- - Representation of a person's online presence.
- - Fraudulent attempt to obtain sensitive information.
- - Individuals gaining unauthorized access to systems.
- - Unsolicited and often irrelevant messages.
- - Legal regulations governing cyberspace.
- - Responsible use of technology.
- - Electronic system for online financial transactions.
- footprint - Trail of data left by online activity.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Verification of a user's identity. • - Harassment or intimidation online. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
Literasi Digital 2024-08-20
Across
- aplikasi pengolahan angka
- mencuri informasi sensitif melalui email palsu
- layanan untuk menyembunyikan aktivitas online
- untuk merekam layar
- bukan layanan chatting
- untuk mengakses halaman web di internet digital
- aplikasi yang membantu diskusi dengan guru
- aplikasi blender
- digital kemampuan menggunakan teknologi informasi untuk mencari dan mengkomunikasikan informasi
- teks di akhir video
- informasi atau materi yang tersedia dalam format digital seperti gambar,teks,video dan audio data backup menyimpan salinan data untuk melindungi dari kehilangan atau kerusakan
- seminar atau pelatihan yang dilakukan secara online platform
- video yang menggambarkan peristiwa kehidupan nyata
- ukuran gambar untuk pembuka suatu adegan untuk tempat dan waktu
- bukan fungsi komunikasi daring
- aplikasi pengolahan kata
- proses pengikatan objek dalam gambar berurutan
- etika atau tata krama yang berlaku saat berkomunikasi melalui internet
- menggunakan informasi digital secara efektif dan aman
Down
- informasi palsu yang sengaja disebarkan untuk menipu orang
- proses pemindahan informasi ke orang lain
- program perangkat lunak yang digunakan untuk mengakses dan menjelajahi halaman web
- nama lain angka
- mengubah informasi menjadi kode rahasia untuk melindungi dari akses yang tidak sah
- mengalirkan konten audio atau video secara langsung dari internet tanpa harus diiunduh online
- pengambilan gambar secara keseluruhan
- perangkat befungsi penghubung perangkat keras
- mendengarkan pertunjukan secara langsung
- bukan menu home di office word berisi tool
- aplikasi yang memungkinkan pengguna berinteraksi dan berbagi konten dengan orang lain
- digunakan untuk pencarian
- perangkat lunak yang merusak atau mengganggu sistem komputer virtual meeting pertemuan yang dilakukan secara online melalui platform digital
- teknologi digital untuk mengancam atau mempermalukan seseorang secara online
- penipuan yang dilakukan melalui internet untuk mendapatkan uang atau informasi pribadi dari korban
- data dan jejak aktivitas yang anda tinggalkan saat menggunakan internet
- untuk mempotong vidio atau musik
- upaya untuk melindungi sistem komputer,jaringan, dan data dari serangan siber atau akses yang tidak sah
- penyimpanan dan pengolahan data di server jarak jauh yg diakses melalui internet
38 Clues: nama lain angka • aplikasi blender • untuk merekam layar • teks di akhir video • bukan layanan chatting • aplikasi pengolahan kata • aplikasi pengolahan angka • digunakan untuk pencarian • bukan fungsi komunikasi daring • untuk mempotong vidio atau musik • pengambilan gambar secara keseluruhan • mendengarkan pertunjukan secara langsung • proses pemindahan informasi ke orang lain • ...
data types 2025-03-06
Across
- Key: A cryptographic key kept secret, used in asymmetric encryption algorithms to decrypt data.
- (Message Authentication Code): A short piece of information used to verify the integrity and authenticity of a message.
- A cryptographic operation that ensures data integrity and authenticity, typically used in digital signatures.
- Address: A unique identifier assigned to devices connected to a network, used to route data.
- ID: A unique identifier assigned to a user's session, often stored in cookies to maintain state in web applications.
- Unencrypted, readable data.
- Key: A unique identifier used to authenticate a user or application when accessing an API.
- A piece of data used for authentication or session management, often used in multi-factor authentication.
- Random data added to passwords before hashing to increase security and prevent pre-computed attacks (like rainbow tables).
- A set of data (such as a username and password) used to authenticate and authorize access to systems or services.
Down
- Data: Information about weaknesses in software, systems, or protocols that can be exploited by attackers.
- A string of characters used for authentication to verify a user's identity.
- A unit of data transmitted over a network, often containing information for routing, as well as the payload.
- A digital document used to prove the ownership of a public key, commonly used in SSL/TLS.
- Log: A record of events or activities, often used in cybersecurity to track access and usage of sensitive data.
- Key: A cryptographic key that can be shared openly and is used in asymmetric encryption algorithms.
- A measure of randomness used in cryptography to evaluate the strength of keys or data.
- Encrypted data that is unreadable without the correct decryption key.
- A fixed-length string generated from input data, often used to verify data integrity in cryptographic applications.
- Rule: A set of conditions or patterns used to filter network traffic and allow or block specific data types.
20 Clues: Unencrypted, readable data. • Encrypted data that is unreadable without the correct decryption key. • A string of characters used for authentication to verify a user's identity. • A measure of randomness used in cryptography to evaluate the strength of keys or data. • A digital document used to prove the ownership of a public key, commonly used in SSL/TLS. • ...
Unit 5 Crossword 2025-04-30
Across
- Open-source framework by Google for building machine learning models
- Visualization tool that supports 3D plots and multi-panel figures
- Technology enabling AI models to be run on smartphones and edge devices
- Google's service that transcribes spoken words into text
- Python library often used with Matplotlib for advanced visualizations
- AI technique that finds unusual trends in data automatically
- Future trend involving AI detecting and stopping digital threats
- Google's multimodal AI model capable of processing text, images, and audio
- Tool used for summarizing legal documents and drafting contracts
- Google's framework that allows integration of AI with productivity tools
- Python library used for creating 2D plots and graphs
- Mathematical method used to train neural networks in TensorFlow
- Technology that mimics human intelligence in machines
- AI tool known for generating marketing and blog content
- Programming language commonly used in AI tools like TensorFlow and PyTorch
Down
- AI capability that allows virtual assistants to answer user questions
- An AI tool that generates human-like text developed by OpenAI
- System that allows real-time transcription even in noisy environments
- Visualization library in Python ideal for statistical graphics
- Google's free cloud platform for running Python-based notebooks
- Jasper AI uses this type of learning model to generate content
- Feature that allows Gemini to process both text and images
- Feature in Seaborn that shows relationships between variables
- AI field focused on generating new content like text or images
- Machine learning process that adjusts models using user feedback
- AI trend involving cars that drive without human input
- A platform that integrates AI with data tracking for websites and apps
- Software that detects faces and objects in video feeds
- Framework for managing AI model training and deployment at scale
- AI-powered chatbot with memory and conversation continuity
- Deep learning framework by Meta, popular in research
- AI library widely used for computer vision tasks
32 Clues: AI library widely used for computer vision tasks • Python library used for creating 2D plots and graphs • Deep learning framework by Meta, popular in research • Technology that mimics human intelligence in machines • AI trend involving cars that drive without human input • Software that detects faces and objects in video feeds • ...
Holiday Homework 2025-06-10
Across
- Any criminal activity using the computer or the internet connection to harm or steal data.
- It is a statically typed, general-purpose programming language developed by JetBrains.
- A collection of technologies designed to protect computers from unauthorised access.
- A set of programs used to disrupt the normal functioning of the computer by hampering its memory, data and other essential resources.
- A stylesheet language used to define and apply styles to your Web Pages in HTML.
- It is an act of hoaxing or misleading people into deceiving that the bogus e-mail received by them is from a trusted source, which is actually not true.
- An illegal entry into a computer system.
- A programming language for storing and processing information in a relational database.
- Use of illegal methods to get money or other things that belong to a Bank or its customers.
- It is a standard mark-up language used to create Web Pages.
- An act of stealing or misusing someone's personal information.
- The lowest-level programming language understood directly by a computer's hardware.
- A software that helps in preventing unauthorised access to your computer by blocking unsolicited information.
Down
- A dynamic, open-source programming language that empha sizes simplicity and productivity, often used for web development.
- A programming language that's easier for humans to understand and write than a computer's instructions.
- A set of instructions, written in a programming language, that a computer uses to perform tasks.
- A high-level programming language primarily used for numerical computation and scientific computing.
- A computer program that is designed to identify, prevent and remove viruses from a computer.
- A low-level programming language that uses mnemonic codes and symbolic representation of instructions.
- Any software designed to harm computer systems or networks.
- An example of antivirus.
21 Clues: An example of antivirus. • An illegal entry into a computer system. • It is a standard mark-up language used to create Web Pages. • Any software designed to harm computer systems or networks. • An act of stealing or misusing someone's personal information. • A stylesheet language used to define and apply styles to your Web Pages in HTML. • ...
DIGITAL LITERACY and CYBER HYGIENE 2025-01-21
Across
- - Legal regulations governing cyberspace.
- - Programs and applications for computers.
- - Verification of a user's identity.
- - Electronic system for online financial transactions.
- - Shared values and norms in the digital community.
- - Platforms for online social interaction.
- - Criminal activities conducted via digital means.
- - Unique name used to identify oneself online.
- - Measures to protect against cyber attacks.
- - Ethical behavior in the digital world.
- - Protection of sensitive information.
- - Malicious software that replicates itself.
- footprint - Trail of data left by online activity.
- - Ability to effectively use digital tools and technologies.
- - Securing data by converting it into a code.
- - Fraudulent acquisition of someone's identity.
- - Barrier to block unauthorized access to a network.
- - Protection of digital systems from cyber threats.
- - Global network connecting computers worldwide.
- - Gap between those with and without access to technology.
- - Responsible use of technology.
- - Encoding data for secure transmission.
Down
- - Deliberate exploitation of computer systems.
- - Representation of a person's online presence.
- - Internet-based currency for online transactions.
- - Software designed to harm or infiltrate a system.
- - Right to control personal information.
- - Mobile phone with advanced capabilities.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Individuals gaining unauthorized access to systems.
- - Accountability for one's online actions.
- - Knowledge of cyber risks and precautions.
- - Potential dangers to digital systems.
- - Protection against cyber-related losses.
- - Harassment or intimidation online.
- - Study of human behavior in cyberspace.
- - Fraudulent attempt to obtain sensitive information.
- - Secret word or phrase to access a system.
- - Writing instructions for computers.
- - Conflict conducted in the digital realm.
- - Education on protecting against cyber threats.
- - Unsolicited and often irrelevant messages.
- - Gathering and analyzing digital threat information.
- - Understanding of cyber threats and safety measures.
- - System of interconnected computers.
- - Promoting products or services online.
- - Person raised in the digital age.
- - Practices to maintain online safety and security.
- - Rights related to digital content and technology.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Verification of a user's identity. • - Harassment or intimidation online. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
Foundations of Cyber Security I 2025-02-13
Across
- The act of making sure every individual working with an information system has specific responsibilities for information assurance.
- A process that gives a user permission to do certain things.
- A three-pronged system of cybersecurity.
- Ciphers that break down information into fixed-size blocks before encrypting it.
- Software that displays unwanted advertising while running an application on your computer.
- A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
- A guarantee of reliable access to information.
- A device that helps join two separate computer networks together to allow for communication.
- A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
- A security technique used to regulate who or what can utilize the resources of a computer system.
- Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
- A process that measures how much information has been accessed or the amount of time spent on a session.
- The governance, development, and maintenance of computer programs.
- A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
- The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
- One that is physically isolated from the internet and only able to pass data along via removable media.
- A process or set of rules.
- The use of human characteristics to distinctly identify individuals as themselves.
- A process that keeps a system secure by physically isolating it from all unsecured networks.
- An orderly search for nonvolatile data storage to load the OS.
20 Clues: A process or set of rules. • A three-pronged system of cybersecurity. • A guarantee of reliable access to information. • A process that gives a user permission to do certain things. • An orderly search for nonvolatile data storage to load the OS. • The governance, development, and maintenance of computer programs. • ...
Cyber Vocab 1.1 2025-08-29
Across
- A secret string of characters used for authentication.
- Precomputed tables used to reverse cryptographic hash functions.
- Ensuring that information and resources are accessible when needed.
- An attack that attempts common passwords against many accounts.
- When two different inputs produce the same hash output.
- The combination of username and password or other authentication information.
- An authentication method allowing a user to access multiple systems with one login.
- A mix of dictionary and brute force attacks.
- Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
- The practice of protecting systems- networks and programs from digital attacks.
- The process of verifying an individual’s identity before granting access.
- A process of converting data into a fixed-size string - typically used for storing passwords securely.
- The process of verifying the identity of a user or system.
- An organized collection of structured information or data stored electronically.
- A cryptographic attack that exploits the probability of hash collisions.
- Ensuring that information is only accessible to those with proper authorization.
- An incident where unauthorized access to data or systems occurs.
Down
- A method of breaking passwords by systematically entering every word in a dictionary.
- Tracking user actions and activities for auditing and monitoring.
- A digital document used to prove ownership of a public key.
- Physical cards with embedded chips used for secure authentication.
- An attack where stolen credentials are used to gain unauthorized access.
- Maintaining the accuracy and trustworthiness of data.
- An attack that tries all possible combinations to guess a password.
- Restricting access to resources based on user identity and permissions.
- A step-by-step procedure for calculations or problem-solving.
- A sequence of words used instead of a password for authentication.
- A security model consisting of Confidentiality Integrity and Availability.
28 Clues: A mix of dictionary and brute force attacks. • Maintaining the accuracy and trustworthiness of data. • A secret string of characters used for authentication. • When two different inputs produce the same hash output. • The process of verifying the identity of a user or system. • A digital document used to prove ownership of a public key. • ...
RU ITEC411 2025-10-11
Across
- - What is it called when the bug that was found in OpenSSL in 2012 was exploited
- - The ______ horse was a software application that is believed to be safe but has other intended functions
- - The secondary measure when identifying malware looks at virus-like _______
- - What part of security it used to verify the identity of a user, device or entity
- - This was an example of a popular worm in 2008
- - A specific hack known as, the ________ worm, in 1988 coined the term for internet hacking
- - The phrase ________ theft is coined as doing a malicious act and consuming the identification of another person
- - A manipulation technique that allows for the release of information for credible gain is what type of _________ engineering
- - In vintage age, hackers were known as ____________ programmers
- - A lot of people are offered payment for encrypted files on a computer
Down
- - What cyberattack was carried out by U.S. and Israel to damage centrifuges in Iran
- - What type of testing is usually used for checking for security flaws or bugs within programs or systems
- - This company was hacked from a phishing attempt where the hacker elevated privileges and gained access to 40 million credit card numbers
- - This type of hack only works if a person opens an infected program or infected attachment
- - What form of technology is now available to look at the biological characteristics of an individual for authentication
- - The term that has been evolved to individuals who break into systems for either financial gains or to discover vulnerabilities
- - The phrase also known as political hacking
- - A software that is mainly used to search for malware on your computer
- - What triad is very popular in Cybersecurity and it helps to prevent unauthorized access to different systems
- - A method/security tool to keep data at rest and in transit safe
20 Clues: - The phrase also known as political hacking • - This was an example of a popular worm in 2008 • - In vintage age, hackers were known as ____________ programmers • - A method/security tool to keep data at rest and in transit safe • - A software that is mainly used to search for malware on your computer • ...
Fintech 2022-09-23
BROWSING SAFELY 2025-05-19
Across
- IT IS A SOFTWARE THAT HELPS IN PREVENTING UNAUTHORISED ACCESS TO YOUR COMPUTER BY BLOCKING UNSOLICITED COMMUNICATION
- IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONES PERSONAL INFORMATION
- IT IS ANY CRIMINAL ACTIVITY INTENDED TO HARM ANYONE USING COMPUTER AND AN INTERET CONNECTION
- IT IS THE ACT OF SENDING AN EMAIL TO A USER;MISLEADING HIM TO BELIEVE THAT IT IS FROM TRUSTED PERSON OR ORGANISATION
- IT IS A CRIME IN WHICH THE VICTIM IS ATTACKED FIRST AND THEN FORCED TO PAY MONEYTO STOP FURTHER ATTACKS
- IT IS THE PROCESS OF BEFRIENDS A CHILDREN ON SOCIAL MEDIA TO FACILITATE ONLINE OR PHISICAL SEXUAL ABUSE
- IT IS THE USE IF ILLEGAL METHODS TO GET MONEY OTHER THINGS THAT BELONG TO A BANK OR ITS CUSTOMERRS
Down
- THEY WRITE OR USE READYMADE COMPUTER PROGRAMS TO ATTACK THE TARGET COMPUTER
- IN IT THE RECEIVER OF A MESSAGE IS FOOLED INTO BELIEVING THAT THE MESSAGE RECIEVED BY HIM FROM A TRUSTED SOURCE WHICH IS ACTUALLY NOT TRUE
- IT IS A COMPUTER PROGRAM THAT IS DESIGNED TO IDENTIFY,PREVENT,REMOVE VIRUSES FROM A COMPUTER
- IT IS A COLLECTION OF TECHNOLOGIES,PROCESS,AND PRACTICES DESIGNED TO PROTECT NETWORKS,COMPUTER,PROGRAMS,AND DATA FROM ATTACK,DAMAGE,OR UNATHORISED ACCESS
- IT IS AN ACT OF HARMING OR HARASSING USING INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- THEY ARE CALLED UNETHICAL HACKERS
- IT REFERS TO AN ILLEGAL ENTRY INTO A COMPUTER SYSTEM OR A NETWORK
- IT IS A PROGRAM O A SET OF PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER
- IT IS USED TO CONDUCT TERRORISM THROUGH THE USE OF COMPUTERS AND INTERNET IN ORDER TO CAUSE FEAR AND PANIC
16 Clues: THEY ARE CALLED UNETHICAL HACKERS • IT REFERS TO AN ILLEGAL ENTRY INTO A COMPUTER SYSTEM OR A NETWORK • THEY WRITE OR USE READYMADE COMPUTER PROGRAMS TO ATTACK THE TARGET COMPUTER • IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONES PERSONAL INFORMATION • IT IS A PROGRAM O A SET OF PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER • ...
English File Upper Intermediate Crime Vocab (part 1) 2024-07-10
Across
- The ___________ was arrested and charged with selling illegal substances to minors.
- The bike ___________ was caught after being seen riding away from the scene of the crime with the stolen bike.
- The victim was ___________ by two teenagers who took her purse and ran away.
- The politician was caught accepting a ___________ from a wealthy donor in exchange for favorable treatment.
- The city was put on high alert after receiving a threat from a ___________ organization claiming responsibility for the recent bombings.
- The corrupt official was accused of ___________ the business owner to pay him a large sum of money.
Down
- The company was accused of ___________ after it was discovered that they had been misrepresenting their financial statements.
- The customs agent discovered a shipment of illegal drugs being ___________ into the country in a shipment of fruit.
- The victim obtained a restraining order against her ex-boyfriend who had been ___________ her outside her home and work for months.
- The convenience store owner reported that someone had ___________ him at gunpoint and stolen a large sum of cash.
- The plane was ___________ by terrorists who demanded that the pilot fly to a specific location.
- The detective was tasked with solving the ___________ of the wealthy businessman who was found dead in his mansion.
- The police were called to investigate a ___________ at the jewelry store, where thieves had broken in through a window.
- The cybersecurity team worked to prevent ___________ attempts on their company's sensitive data.
- The ___________ spray-painted graffiti on the school's walls, causing damage to the property and disrupting classes.
- The child was ___________ from her school playground and later found safe and sound after a ransom was paid.
16 Clues: The ___________ was arrested and charged with selling illegal substances to minors. • The victim was ___________ by two teenagers who took her purse and ran away. • The plane was ___________ by terrorists who demanded that the pilot fly to a specific location. • ...
Fintech 2022-09-23
Browsing safely 2025-06-13
Across
- a collection of technology,processes and practices design to protect networks,computers,programs and data from attack,damage or on authorised access
- it referred to the act of stealing and misusing someone's personal information
- used to conduct aeroism through the use of computers and internet in order to cause fear and panic
- the process of be friend in children on social media to facilate online or physical sexual abuse
- the act of sending an email to a user miscellating him to believe that it is from a trusted person or organisation
- a software that help in preventing on authorised access to your computer
- it is a program or set of program that disrupt the normal functioning of a computer
- it is also called unethical hackers extract confidential information from user and use this information to execute fraudulent task online
- an act of harming or harising using information technology in a deliberate manner
- an impression you create when you engage in various online activities like browsing communication with others or uploading content
Down
- a crime in which the victim is attacked first and then forced to pay money to stop further attack
- a computer program that is design to identify prevent and remove virus from a computer
- the receiver of a messages fold into believing at the message is received by him is from a trusted source which is actually not true
- any criminal activity intended to harm anyone using a computer and an Internet connection
- referred to an illegal entry into a computer system or network
- use of illegal method to get money or other things that belong to a bank or its customer
16 Clues: referred to an illegal entry into a computer system or network • a software that help in preventing on authorised access to your computer • it referred to the act of stealing and misusing someone's personal information • an act of harming or harising using information technology in a deliberate manner • ...
U03 - CSE-CH01 - Keywords 2024-02-01
Across
- (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- (13,8) The CVE National Database was developed to provide a publicly available database of all know vulnerabilities. The Common Vulnerabilities and Exposures (CVE) database is an example.
- (8,2,6) is the collection of technologies that enable the connection of various devices to the Internet abbreviated (IoT).
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Down
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- (11,8,10,9) The standards provide a framework for implementing cybersecurity measures within an organization. The ISO 27000 standards are an example.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
9 Clues: (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate. • ...
FITDVocab.Sb 2013-05-15
Across
- The screen of the computer
- Used to plug in a mouse or keyboard
- the safe and responsible use of the information and communication on the internet
- The heart of the computer,your computer would not work without this
- A more precise search engine that searches Google and Yahoo
- An arrangement of parts and elements
- measures taken to keep your computer and computer system protected
- You can use this to connect to a wireless network, but you must have the same ____ to connect
- The port used to connect internet if you don't have wireless internet
- Third generation of this is not as good as fourth generation
- You plug your flash drives and other devices into this
- a device that you can use on the go
- A device that can generate, record, process, transmit, or display information
- The slot to plug in headphones and other listening devices
- The process of powering the computer and getting into the operating system
- An online place that stores your files and documents
Down
- A device that provides internet to all connected devices
- A hands free speaking device
- comes in DSL or Cable.
- a place where you can find websites based on the things you want
- Your area in which you can type, edit, or draw your information
- A peripheral you use to navigate the screen of a computer
- The recent memory of your computer
- something online
- A legal right granted to the creator of something
- Provides internet to users and subscribers
- something that sends information out
- A device that operates separately as a magnetic disk or tape unit. Ex: Headphones,mouse,keyboard
- A cloud based presentation software that uses one big canvas
- The means for users to control or operate a computer
- Measuring data by means of physical properties
- something you can put in and use on your computer
32 Clues: something online • comes in DSL or Cable. • The screen of the computer • A hands free speaking device • The recent memory of your computer • Used to plug in a mouse or keyboard • a device that you can use on the go • An arrangement of parts and elements • something that sends information out • Provides internet to users and subscribers • ...
FITAVocab.TW 2013-05-15
Across
- a letter that gives information about you
- a sign or symbol a business makes for advertising
- wired internet
- a program that is one canvas that moves around
- second smallest piece of data
- a piece of paper that says basic points about your business
- ex:Iphone
- another term for monitor
- the part of a computer that makes it work
- a search engine that combines results from multiple search engines
- a way to save files over the web
- the programs on your computer used to make it run
- National Cyber Security Alliance
- ex:Windows 7, IOS 6
- a file format that gives an electronic image
- able to work together
- a type of clock that uses numbers to tell time
- being safe on the web
- the area that you make a prezi on
- the circuits and motherboard inside of the computer
- the way you act and behave online
Down
- universal serial bus
- sending information into a modem
- an extra for a computer
- central processing unit
- fourth smallest piece of data MB
- sending information out from a modem
- Who is asking Why are they asking What are they asking for?
- ex:Google
- a small speech given by someone before they become president
- internet service provider
- the amount of data a router can process at once
- fifth smallest piece of data GB
- a type of clock that uses hand to tell time
- rich text format
- another name for tower
- programs that do a task
- third smallest piece of data KB
- being secure on the web
- service set
- sixth smallest piece of data TB
- smallest piece of data
- wireless local area network
- a prefix that means "on the web"
- random access memory
- a phrase a business makes for advertising
46 Clues: ex:Google • ex:Iphone • service set • wired internet • rich text format • ex:Windows 7, IOS 6 • universal serial bus • random access memory • able to work together • being safe on the web • another name for tower • smallest piece of data • an extra for a computer • central processing unit • programs that do a task • being secure on the web • another term for monitor • internet service provider • ...
Technology Crossword (by aria) 2023-06-07
Across
- an American multinational technology company headquartered in Cupertino, California
- a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
- a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning
- a form of computer memory that can be read and changed in any order
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser
- a commonly used method of lossy compression for digital images
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- the most important processor in a given computer
- a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- In computing, it's a mapping from some domain (for example, a range of integers) to bits
- represents text, computer processor instructions, or any other data using a two-symbol system
- a file format developed by Adobe in 1992 to present documents
- a method of transmitting and receiving messages using electronic devices
Down
- it's a hardware or software component that stores data so that future requests for that data can be served faster
- any software intentionally designed to cause disruption to a computer
- a method of representing data in a visual, machine-readable form
- the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware
- a digital multimedia container format most commonly used to store video and audio
- a bitmap image format that was developed by a team at the online services CompuServe led by American computer scientist Steve Wilhite provider
- a mobile operating system based on a modified version of the Linux kernel and other open-source software
20 Clues: the most important processor in a given computer • a file format developed by Adobe in 1992 to present documents • a commonly used method of lossy compression for digital images • a method of representing data in a visual, machine-readable form • a form of computer memory that can be read and changed in any order • ...
STS 2024-12-11
Across
- - Intelligent, often through technology.
- - Tools and systems of innovation.
- - Watching or monitoring.
- - Fields of science, technology, engineering, and math.
- - Relating to people in general.
- - Ability to change to suit new conditions.
- - Decentralized digital ledger.
- - A device for performing tasks.
- - Machines used for transportation.
- - Next-generation mobile network.
- - Power to do work.
- - Technology based on biology.
- - A personal belief or judgment.
- - Abilities acquired through learning.
- - The smallest unit in physics.
- - Digital or virtual currency.
- - The ability to create or innovate.
- - Machines for carrying people or goods.
- - Environmentally friendly.
- - Moving from one place to another.
- - Protection against digital attacks.
- - A structure with walls and a roof.
- - Force or influence.
- - Management of money.
- - Not controlled by a central authority.
- - Efforts to promote or impede social change.
- - To form or influence.
- - New ideas or methods.
Down
- - Rules controlling behavior.
- - The use of computers.
- - Machines programmed to perform tasks.
- - Legal agreements.
- - The process of teaching and learning.
- - Modifying content for clarity.
- - Paid work or employment.
- - The process of growth or change.
- - Belonging to people.
- - Basic unit of heredity.
- - Self-operating or independent.
- - System of government by the people.
- - Willing to take risks in business.
- - Meeting present needs without compromising the future.
- - Right to be left alone.
- - A community of people.
- - To take or seize.
- - Unmanned aerial vehicles.
- - Resources that can be replenished.
- - The plan or creation of something.
- - Powered by electricity.
- - Moral principles.
- - The shared customs and beliefs of a group.
- - Element central to life and climate.
- - Overlaying digital content onto the real world.
- - What’s yet to come.
- - Immersive digital environment.
- - Machines mimicking human intelligence.
- - Involving careful analysis.
- - Gaining knowledge or skills.
- - The process of considering or reasoning.
- - Open to everyone.
60 Clues: - Legal agreements. • - Power to do work. • - To take or seize. • - Moral principles. • - Open to everyone. • - What’s yet to come. • - Force or influence. • - Belonging to people. • - Management of money. • - The use of computers. • - To form or influence. • - New ideas or methods. • - A community of people. • - Watching or monitoring. • - Basic unit of heredity. • - Right to be left alone. • ...
RU ITEC411 Chapter 5 Crime and Security 2024-11-16
Across
- Early packet switching network, seen as the predecessor for modern internet.
- Software intentionally designed to cause disruption.
- Use of cyber-attacks against a state, causing comparable harm to warfare.
- A destructive computer worm that spread rapidly through email attachments.
- Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
- Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
- Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
- A short-range wireless technology that allows electronic devices to communicate.
- Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
- Ethical hacking of a computer system to evaluate security weaknesses and address them.
- A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
- Use of computer hacking to promote political agenda or social change.
- A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
- An open-source library that provides secure communication between computer networks.
- A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
- A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
- Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
- Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
- Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
- Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
- Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.
21 Clues: Software intentionally designed to cause disruption. • Use of computer hacking to promote political agenda or social change. • Use of cyber-attacks against a state, causing comparable harm to warfare. • A destructive computer worm that spread rapidly through email attachments. • Early packet switching network, seen as the predecessor for modern internet. • ...
Application Attacks 2025-03-06
Across
- Overloading a system’s resources to cause performance degradation or crashes.
- The framework commonly used for penetration testing and executing exploits.
- A cyberattack that targets a vendor or third-party provider to introduce vulnerabilities.
- Junk email that is often used to spread malware, scams, or advertisements.
- A malicious attempt to access restricted files by altering a website’s URL path.
- A cyberattack where an application processes malformed XML data to manipulate database queries.
- The practice of keeping software up-to-date to protect against vulnerabilities.
- A social engineering attack that tricks users into providing sensitive information via emails or messages.
- The unauthorized redirection of users from a legitimate site to a malicious one.
- A cybersecurity practice that involves scanning attachments before opening them.
Down
- An attack that abuses an application programming interface to steal or manipulate data.
- A web attack where malicious scripts are injected into webpages and executed in a victim's browser.
- A defense mechanism that automatically removes dangerous spam from inboxes.
- A cyberattack that involves resending captured data packets to trick systems into repeated execution.
- The best practice that involves writing secure and well-tested software to prevent attacks.
- The technique of overwhelming a server by flooding it with excessive requests, making it unavailable.
- A targeted phishing attack that customizes fraudulent messages based on personal details.
- A cyberattack that redirects users to a fake website to steal their credentials.
- A phishing attack targeting high-profile individuals such as executives and politicians.
- A phishing attack conducted via voice communication to steal sensitive information.
- The term for data storage areas that can be exploited if improperly managed, leading to attacks.
- A security flaw where excess data overflows into adjacent memory space, leading to crashes or exploits.
- The process of validating and sanitizing user input to prevent code injection attacks.
- A tool often used for scanning networks and detecting vulnerabilities.
24 Clues: A tool often used for scanning networks and detecting vulnerabilities. • Junk email that is often used to spread malware, scams, or advertisements. • A defense mechanism that automatically removes dangerous spam from inboxes. • The framework commonly used for penetration testing and executing exploits. • ...
IST Chapter 1 & 2 2025-04-24
Across
- Permanent memory storing firmware and essential instructions.
- The main circuit board connecting all hardware components.
- A serial communication protocol used in embedded systems.
- Temporary memory used by systems to run programs and process data.
- Core software that manages computer hardware and software resources.
- Devices like keyboard or mouse used to enter data into a computer.
- A device that acts in response to a signal, such as a motor or light.
- A compact integrated circuit that contains a processor, memory, and I/O interfaces.
- Devices like monitor or printer used to present data from a computer.
- Internet-enabled devices that can monitor and control systems remotely.
- Techniques used to reduce energy usage in embedded systems.
- Software that enables the OS to interact with hardware devices.
- Software that enables multiple OSes to run on the same hardware.
- Protection of systems from digital attacks.
- Sophisticated software that manages system resources and enhances performance.
- Delivery of computing services over the internet.
- A system combining hardware and software to perform a specific function.
Down
- Components like HDD or SSD used to store data long-term.
- Software tools for system maintenance like antivirus or backup tools.
- Technology to create virtual versions of computing resources.
- Software embedded into hardware to control low-level device functions.
- Another serial protocol for communication between microcontrollers and peripherals.
- The CPU of a computer system, performing general computations.
- A serial communication protocol common in microcontrollers.
- A process to validate system performance and reliability.
- An operating system designed for real-time applications.
- Measured in GHz, determines how fast a CPU can process instructions.
- A device that converts physical input into electrical signals.
- The feature of systems being linked to other systems or networks.
- A popular architecture for low-power embedded processors.
30 Clues: Protection of systems from digital attacks. • Delivery of computing services over the internet. • Components like HDD or SSD used to store data long-term. • An operating system designed for real-time applications. • A serial communication protocol used in embedded systems. • A process to validate system performance and reliability. • ...
INFORMATIKA 2025-09-16
Across
- Bentuk visualisasi data untuk mempermudah analisis.
- Jaringan komputer global yang menghubungkan seluruh dunia.
- Kemampuan untuk mengidentifikasi pola dalam data.
- Bagian dari program yang memiliki fungsi tertentu.
- Serangan siber untuk mencuri informasi sensitif melalui email palsu.
- Suatu perintah untuk mengulangi suatu blok kode.SOFTWARE
- Proses menyembunyikan detail yang tidak perlu.
- Proses memecah masalah kompleks menjadi bagian-bagian yang lebih kecil.
- Komponen yang berfungsi sebagai papan sirkuit utama komputer.
- Sebuah variabel yang menyimpan alamat memori.
- Istilah untuk komputer saku atau ponsel pintar.
- Sistem penyimpanan data yang bisa diakses melalui internet.
- Komponen yang menghubungkan komputer ke internet.
- Otak dari komputer yang bertugas menjalankan instruksi.
- Ruang penyimpanan data digital di server.
- Bagian fisik dari komputer.
- Serangkaian langkah terstruktur untuk menyelesaikan masalah.
- Bentuk keamanan untuk melindungi sistem dari serangan siber.
- Program yang mengelola semua sumber daya perangkat keras dan perangkat lunak.
Down
- Proses mengubah data menjadi format yang tidak dapat dibaca.
- Teknologi yang meniru kecerdasan manusia.
- Kemampuan mesin untuk belajar dari data.
- Keterampilan yang mencakup kemampuan menggunakan teknologi.
- Cabang ilmu yang mempelajari komputer dan komputasi.
- Data yang sangat besar dan kompleks.
- Sistem operasi yang sering digunakan di ponsel.
- Teknologi yang memungkinkan mobil bergerak tanpa pengemudi.
- Bahasa pemrograman tingkat tinggi yang populer.
- Ilmu yang mempelajari cara memecahkan masalah menggunakan komputer.
- Bentuk representasi visual dari sebuah algoritma.
- Teknologi untuk membuat simulasi 3D.
- Sebutan untuk peranti lunak yang berbahaya.
- Istilah untuk perangkat yang terhubung ke internet.
- Pengujian program untuk menemukan dan memperbaiki kesalahan.
- lain dari program komputer.
- Perangkat untuk menyimpan data secara permanen.
- Komponen yang menyimpan data sementara saat komputer beroperasi.
- Proses peniruan lingkungan fisik atau virtual.
- Kumpulan dari beberapa komputer yang saling terhubung.
- Sektor yang paling berkembang pesat dalam industri teknologi.
40 Clues: lain dari program komputer. • Bagian fisik dari komputer. • Teknologi untuk membuat simulasi 3D. • Proses menyembunyikan detail yang tidak perlu. • Istilah untuk komputer saku atau ponsel pintar. • Perangkat untuk menyimpan data secara permanen. • Bentuk visualisasi data untuk mempermudah analisis. • Cabang ilmu yang mempelajari komputer dan komputasi. • ...
Cast study - An ethical approach to hacking 2025-06-12
Across
- Simulated cyberattacks used to assess system security.
- The analysis of systems and data to investigate security incidents or breaches.
- Software used to recover or bypass passwords through brute force or other methods.
- A testing method where the tester has full knowledge of the system’s internals.
- The technique of identifying active devices and services on a network.
- A testing method where the tester has partial knowledge of the system.
- A social engineering attack using phone calls to extract sensitive information.
- A unique identifier assigned to each device connected to a network.
- The creation of code or tools to take advantage of system vulnerabilities.
- Identifying the operating system of a target device during reconnaissance.
- Probing a system to identify open ports and available services.
- Psychological manipulation tactics to trick people into revealing confidential information.
- A documented strategy for detecting, responding to, and recovering from security incidents.
Down
- An evaluation of an organization’s overall cybersecurity strength and weaknesses.
- A web attack that injects malicious scripts into trusted websites.
- Using advanced search operators to find sensitive data or vulnerabilities online.
- The process of evaluating systems through defined methods to find vulnerabilities.
- Publicly available information gathered for analysis.
- Malicious software designed to harm or exploit systems.
- An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
- A code injection attack targeting databases through malicious SQL queries.
- A social engineering method that involves inventing a scenario to steal information.
- An individual who gains unauthorized access to systems or data.
- A testing method where the tester has no prior knowledge of the system.
- The layout or structure of a network’s connections and devices.
- The process of discovering devices and connections within a network.
26 Clues: Publicly available information gathered for analysis. • Simulated cyberattacks used to assess system security. • Malicious software designed to harm or exploit systems. • An individual who gains unauthorized access to systems or data. • Probing a system to identify open ports and available services. • ...
Digital Information Technology Ch. 1 Intro to Information Technology 2025-08-04
Across
- enhanced form of printing in which a user holds a mobile device over a printed page and associated videos or other content appears on the screen
- (software as a service) Cloud-based model in which software resides in the cloud and is accessed by users without downloading or installing it on their local computers.
- enhanced e-books that contain integrated multimedia features such as audio, video, pop-up graphics, 3D images, and animations.
- measure of the amount of data that can travel on a communication system
- delivery of network or computing services over the Internet
- communication sent to a computer address where the message is stored until it can be read by the recipient
- gap between the individuals, communities, and countries who have access to the information technologies that transform life and those who do not have this access.
- branch of IT that protects computer systems, networks, devices, and data from unauthorized access and usage.
- two-dimensional bar code
- small computer found inside another device
- set of related fields that includes all work performed with computers.
- ever-expanding progression of technical, economic, and cultural changes brought about by computers.
Down
- measure of how efficiently and quickly a person completes tasks.
- group of people who extensively use digital devices and embrace the newest digital technologies.
- device that handles input, processes data, stores data, and produces usable output according to sets of stored instructions.
- view of the live world that has been enhanced with computerized graphics, sound, or other outputs.
- cloud-based file storage.
- innovations that represent significantly new fields or technologies.
- handheld computer that contains a telephone, software applications commonly called apps, and the ability to quickly connect to the Internet.
- working for a company from home using information technology.
- information that has been translated into a form a computer can interpret
- act of searching through huge amounts of data to find patterns.
22 Clues: two-dimensional bar code • cloud-based file storage. • small computer found inside another device • delivery of network or computing services over the Internet • working for a company from home using information technology. • act of searching through huge amounts of data to find patterns. • measure of how efficiently and quickly a person completes tasks. • ...
LEGAL 2024-11-13
Across
- refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
- Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
- These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
- is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
- refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
- is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
- theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
- refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization
8 Clues: theft refers to obtaining or possessing another’s identity and information to commit a legal offense. • refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization • ...
Compleanno 2025-12-18
Across
- La "bionda" (o rossa) più amata del post-lezione, l'unica capace di far dimenticare i teoremi più ostici.
- Il tuo futuro "campo di battaglia", dove darai la caccia agli hacker e proteggerai il mondo digitale.
- La nostra tappa fissa quando la fame chiama e i carboidrati diventano l'unica risposta possibile.
- Le note di una storia che, proprio come dice la canzone, dobbiamo ancora finire di scrivere insieme.
- Il marchio di fabbrica che ti porti addosso a Catania centro, come se avessi sempre un pistacchio in tasca.
- Il posto dove è bastata... appunto, "mezza parola" a un compleanno per capire che sarebbe iniziato tutto.
Down
- Il cognome della prof che, nonostante il nome, non promette mai nulla di "esteticamente piacevole" sul libretto.
- Lo stato civile di chi sopravvive tra scatoloni, lavatrici a metà e un frigo condiviso con altri tre disperati.
- L'unico momento in cui i tuoi coinquilini diventano acerrimi nemici tra carichi, assi e segni fatti di nascosto.
- Quattro cerchi che sfrecciano nei tuoi sogni (e spero presto anche nel tuo garage), specialmente se è una A5.
- Quella materia che ti insegna a nascondere i segreti, ma che per te a volte è solo un grande, indecifrabile mal di testa.
- Quel caos meraviglioso a base di verde smeraldo che ogni ottobre ti richiama alle origini come un rito sacro.
- Non siamo a New York, ma tra i suoi cabinati e i joystick ci sentiamo comunque dei veri campioni.
- Quel nomignolo "esotico" che uso solo io e che ti trasforma istantaneamente nel mio unico grande amore.
14 Clues: La nostra tappa fissa quando la fame chiama e i carboidrati diventano l'unica risposta possibile. • Non siamo a New York, ma tra i suoi cabinati e i joystick ci sentiamo comunque dei veri campioni. • Le note di una storia che, proprio come dice la canzone, dobbiamo ancora finire di scrivere insieme. • ...
IT_Rokko 2023-12-04
Across
- - A step-by-step procedure or formula for solving a problem or accomplishing a task in computing.
- - The process of identifying and fixing errors, bugs, or defects in software code.Interface - The point of interaction between a user and a computer system, often involving a graphical user interface (GUI) or command-line interface.
- - The practice of protecting systems, networks, and programs from digital attacks, theft, or damage.
- - A set of rules defining how data is transmitted over a network, ensuring standardized communication between devices.
- - A set of interconnected computers or devices that share resources and information through various communication channels.
- - Instructions written in a programming language that a computer can interpret and execute to perform specific tasks.
- - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- - An organized collection of data stored electronically, typically in tables, allowing for efficient retrieval and manipulation.
- - The process of converting information into a code to prevent unauthorized access, providing data security.
- (Application Programming Interface) - A set of rules and tools that allows different software applications to communicate with each other
- - Programs and applications that run on a computer, providing functionality and enabling specific tasks to be performed.
- - Physical components of a computer system, such as the central processing unit (CPU), memory, and storage devices.
- - A computer or system that manages network resources and provides services to other computers (clients) in the network.
- - Refers to remote servers accessed over the internet to store, manage, and process data, instead of using a local server or computer.
14 Clues: - A step-by-step procedure or formula for solving a problem or accomplishing a task in computing. • - The practice of protecting systems, networks, and programs from digital attacks, theft, or damage. • - The process of converting information into a code to prevent unauthorized access, providing data security. • ...
esafety 2023-06-29
Across
- Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
- A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
- A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
- The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
- designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
- An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
- The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
- The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
- Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
- The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
- The right to keep personal information and online activities confidential and secure from unauthorized access.
- Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
- Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.
14 Clues: Measures taken to protect computers, networks, and data from unauthorized access or attacks. • The right to keep personal information and online activities confidential and secure from unauthorized access. • Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information. • ...
14.06.23 2023-06-14
Across
- The combination of skills, abilities, knowledge, and expertise that a person possesses in a particular field or area of work.
- Located close in proximity or a short distance away from a particular place or point of reference.
- The lack of success or the inability to achieve desired goals or objectives. Failure refers to a negative outcome or result.
- The allocation of money, time, or resources into an asset, venture, or project with the expectation of generating a positive return or future benefits.
- The practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage, ensuring confidentiality, integrity, and availability of information.
Down
- The process of transforming raw materials or components into finished products through various production methods, such as assembly, fabrication, or processing.
- An individual, group, or organization that has an interest or concern in the activities and outcomes of a business or project. Stakeholders can include employees, shareholders, customers, suppliers, and the local community.
- To provide valid reasons, explanations, or evidence to support or defend a decision, action, or belief, typically in response to criticism, doubt, or scrutiny.
- The financial income or profit generated from business activities, employment, investments, or other sources of revenue.
- The practice of hiring an external company or individuals to perform specific tasks, services, or functions that were previously handled internally within an organization.
10 Clues: Located close in proximity or a short distance away from a particular place or point of reference. • The financial income or profit generated from business activities, employment, investments, or other sources of revenue. • The lack of success or the inability to achieve desired goals or objectives. Failure refers to a negative outcome or result. • ...
Guardians of the Gateway: A Cybersecurity Puzzle 2025-10-13
Across
- A digital band-aid for fixing known security holes
- It scrambles your data so only the right key can make sense of it
- Like the wooden horse in Troy — looks harmless, but hides something dangerous inside
- Your files are locked, and the price to unlock them isn’t cheap
- Software with bad intentions — often hidden in innocent-looking files
Down
- Like the Impostor in Among Us — pretending to be someone else to cause trouble
- Before access is granted, this process asks: “Are you really who you claim to be?
- Like James Bond — secretly watching, gathering intel without you knowing
- A baited email hoping you’ll bite — and give away your credentials
- A secret way into a system — often left open by accident or design
- Like Jurassic Park — “The fences are down!” and now the threats are loose
11 Clues: A digital band-aid for fixing known security holes • Your files are locked, and the price to unlock them isn’t cheap • It scrambles your data so only the right key can make sense of it • A baited email hoping you’ll bite — and give away your credentials • A secret way into a system — often left open by accident or design • ...
AP COMPUTER SCIENCE ULTIMATE CROSSWORD!!!!!!!!!!!!!!! 2022-05-31
Across
- the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers.
- the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide
- criminal activities carried out by means of computers or the Internet
- an encryption technique that uses a paired public and private key (or asymmetric key) algorithm for secure data communication. A message sender uses a recipient's public key to encrypt a message. To decrypt the sender's message, only the recipient's private key may be used
- computer software used to prevent, detect and remove malicious software
Down
- a form of computerized cryptography using a singular encryption key to guise an electronic message. Its data conversion uses a mathematical algorithm along with a secret key, which results in the inability to make sense out of a message
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes
- the art of writing or solving codes
9 Clues: the art of writing or solving codes • criminal activities carried out by means of computers or the Internet • computer software used to prevent, detect and remove malicious software • a part of a computer system or network that is designed to block unauthorized access while permitting outward communication • ...
Cyber-1 2023-09-26
Across
- A network security device that monitors and filters incoming and outgoing network traffic to block or allow data based on a set of security rules.
- breach The unauthorized access, disclosure, or exposure of sensitive or confidential data to individuals or entities not authorized to possess it.
- A deliberate and malicious attempt to breach the security of a computer system, network, or device.
- The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.
- A weakness or flaw in a system's security that can be exploited by attackers to compromise its integrity, confidentiality, or availability.
- A secret combination of characters used to authenticate a user and grant access to a system, device, or application.
- The process of verifying the identity of a user, device, or system before granting access to resources.
- A collection of interconnected devices and systems that allow data and information to be shared among users.
Down
- Criminal activities carried out using digital technologies, including hacking, fraud, and identity theft.
- Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- Unauthorized access or entry into a computer system, network, or environment with malicious intent.
- Software designed to damage, disrupt, or gain unauthorized access to computer systems, including viruses, worms, and spyware.
- A type of cyberattack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information like login credentials.
- A software update or fix released to address security vulnerabilities or improve the performance of an application or operating system.
15 Clues: A deliberate and malicious attempt to breach the security of a computer system, network, or device. • Unauthorized access or entry into a computer system, network, or environment with malicious intent. • The process of verifying the identity of a user, device, or system before granting access to resources. • ...
DPI COMPUTER SCIENCE TERMS 2025-10-06
Across
- Formulating problems in a way that enables us to use a computer and other tools to help solve them. Logically organizing and analyzing data
- Breaking down a problem or system into components.
- an academic discipline that encompasses the study of computers and their principles.
- The skill of proficient and accurate digital input by means of a keyboard. This includes understanding the keyboard layout and its function.
- Any device, software, or system that is used to increase, maintain, or improve the functional capabilities of a person with a disability.
- Imitation of the operation of a real-world process or system.
- Educational technology is the process of integrating technology into education in a way that promotes a more diverse learning environment and a way for students to learn how to use technology as well as their common assignments.
- Level of familiarity with hardware, software, cybersecurity, and internet concepts that allow one to use computer services.
- The process of finding and correcting errors (bugs) in programs.
Down
- Refers to the continuously developing appropriate, responsible, and empowered use of technology such as choosing an appropriate password and keeping it secure.
- (noun): An ordered set of instructions.
- The study of computer science or related activities.
- A step-by-step process to complete a task.
- The capability of a network to handle a growing amount of work or its potential to be enlarged to accommodate that growth.
- Literacy: The term “technological literacy” refers to one's ability to use, manage, evaluate, and understand technology. Xello: Formerly, Career Cruising, Xello is an Internet-based career exploration and planning tool used to explore career and college options and develop a career plan.
15 Clues: (noun): An ordered set of instructions. • A step-by-step process to complete a task. • Breaking down a problem or system into components. • The study of computer science or related activities. • Imitation of the operation of a real-world process or system. • The process of finding and correcting errors (bugs) in programs. • ...
EDUC 522 - Ethical Considerations in AI-Powered Cybersecurity 2024-10-13
Across
- unfair favor of or against a thing, person or group
- a means of solving a problem
- facts and stats collected
- the retention of retrievable data
- openness and the willingness to share information
- the state of being free from being observed
- a principal adopted by a government or business
- impartial or just treatment
Down
- problem solving operations by a computer
- device or program enabling a user to communicate with a computer
- the system by which you are controlled and operate
- a person who operates something
- converting information or data into a code
- the state or sense of safety or certainty
14 Clues: facts and stats collected • impartial or just treatment • a means of solving a problem • a person who operates something • the retention of retrievable data • problem solving operations by a computer • the state or sense of safety or certainty • converting information or data into a code • the state of being free from being observed • ...
Standard 15.0 Vocabulary Terms 2022-05-08
Across
- The steps you take to make sure you are safe before, during and after an emergency or natural disaster.
- A form of terrorism in which victims "within a country are targeted by a perpetrator with the same citizenship" as the victims.
- The organization and management of the resources and responsibilities for dealing with all humanitarian aspects of emergencies (prevention, preparedness, response, mitigation, and recovery).
- The action of reducing the severity, seriousness, or painfulness of something.
- They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste.
Down
- They prepare plans and procedures for responding to natural disasters and other emergencies.
- Provides first responders with a go-to manual to help deal with hazmat transportation accidents during the critical first 30 minutes.
- They establishes protocols and creates prevention and recovery systems in case of a cyber-attack or natural disaster.
- Department that works to improve the security of the United States. Includes customs, border, and immigration enforcement, emergency response to natural and manmade disasters, antiterrorism work, and cybersecurity.
- Any substance or material that is capable of posing an unreasonable risk to health, safety, and property when transported in commerce.
- The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
- The National Incident Management System guides all levels of government, nongovernmental organizations and the private sector to work together to prevent, protect against, mitigate, respond to and recover from incidents.
12 Clues: The action of reducing the severity, seriousness, or painfulness of something. • They prepare plans and procedures for responding to natural disasters and other emergencies. • They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste. • ...
VFS Celebrating Data Protection Day With More Than Cookies 🍪 - 2024 Edition 2024-01-23
Across
- Privacy __________ Screening questionnaire (PISQ) is a document to identify and minimise data protection risks within a process/system/project/software.
- ___________ is a cybersecurity attack that can be mistaken for a hobby.
- Privacy By ____________ is a concept intended to anticipate, build, and manage privacy during the entire life cycle of a process/system/project/product/software, right from its concept to execution to retirement.
- _________ is the Volvo Group Appointed cloud-based SaaS Solution for managing Privacy Compliance.
- A personal data _________ is considered to be a security incident and can be either accidental or intentional/unlawful. You should immediately alert the IT service desk and contact vfs.privacy@volvo.com
- Information classified as _______ may cause significant damage (medium to high impact) to the Volvo Group, our business partners or an individual’s right to privacy if leaked.
- Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data
Down
- ___________ is an automated Processing of Personal Data to analyse a data subject or predict his/her interests, behaviour, and other attributes.
- What does AI stand for? (2 words)
- Within the Volvo Group, we collect 3 categories of personal data, HR data, Business Partner data & ____________ data.
- You do not have to accept them unless they are topped with chocolate chips & sea salt.
- The ________ is responsible for his/her TD/BA/GF ongoing compliance activities with directives and applicable personal data laws. (Acronym)
- VFS privacy ______ provides individuals a clear explanation of our personal data handling practices at the time of collection.
- _________ must be freely given and easy to withdraw.
14 Clues: What does AI stand for? (2 words) • _________ must be freely given and easy to withdraw. • ___________ is a cybersecurity attack that can be mistaken for a hobby. • You do not have to accept them unless they are topped with chocolate chips & sea salt. • _________ is the Volvo Group Appointed cloud-based SaaS Solution for managing Privacy Compliance. • ...
cyber_cross 2024-11-07
Across
- a technique of hiding information within other, seemingly innocuous files, such as images, audio, or video files.
- is a general term for any type of intrusive computer software with malicious intent against the user.
- decoding cipher text to plain text
- a type of internet fraud that seeks to acquire a user’s credentials by deception
- attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
- additional, revised or updated code for an operating system or application.
Down
- encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals (2 words)
- a type of cyberattack where an attacker secretly uses someone else’s device to mine cryptocurrency without their permission.
- the process of verifying the identity of a user or piece of information and the veracity of the information provided.
- a cyberattack that redirects users from a legitimate website to a fraudulent one without their knowledge, even if they type in the correct web address. This is typically done by corrupting the website’s DNS (Domain Name System) settings.
- a hacker successfully breaching a network or device to gain access to it's files and data ( 2 words )
- a cybersecurity threat that involves registering domain names similar to legitimate ones, often with minor typos , Attackers use these lookalike domains to trick users into visiting fake websites
- extends a private network across a public network,a virtual secure network
- unsolicited emails,the email equivalent of physical junk mail delivered through the post.
14 Clues: decoding cipher text to plain text • extends a private network across a public network,a virtual secure network • additional, revised or updated code for an operating system or application. • a type of internet fraud that seeks to acquire a user’s credentials by deception • ...
security+J 2024-04-25
Across
- software and operating system (OS) updates that address security vulnerabilities within a program or product
- when cybercriminals breach a private network, steal valuable data and hold the information hostage
- put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
- sites that are not indexed and only accessible via specialized web browsers
- an important factor in the determination of the risk of a threat actor. Highly ___________ threat actors are more likely to be successful if an attack is launched. Less _________ attackers have a lower probability of an attack being successful should it be launched
- a sovereign territory with one group of individuals who share a common history
Down
- typically involves a cyber criminal stealing data from personal or corporate devices, such as computers and mobile phones, through various cyberattack methods
- a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
- a person or test result that is incorrectly classified as positive (as for the presence of a health condition) because of imperfect testing methods or procedures
- a cybersecurity approach that uses existing infrastructure and controls to secure endpoints, rather than deploying people
10 Clues: sites that are not indexed and only accessible via specialized web browsers • a sovereign territory with one group of individuals who share a common history • when cybercriminals breach a private network, steal valuable data and hold the information hostage • ...
Chapter 7 E-Payment 2020-11-17
Across
- _____ text is unencrypted message in human-readable form.
- An electronic payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or _____.
- _____ card works like a credit card but without spending limit.
- In asymmetry encryption, anything encrypted using the public key must be decrypted using the corresponding _____ key.
- _____ is a process to identify the validity of a payment card while using payment card to make purchases.
- _____ card removes the amount of sales from buyer's bank account and transfer it to seller's bank account.
- Digital _____ is the additional information that the browser requires to identify the ownership of the private key.
- One of the purposes of PKI is to _____ the data flowing across the network.
- Certificate _____ is a trusted third-party that issues the SSL or TLS certificates.
- _____ is the bank which authenticates a transaction and approves an amount transacted.
Down
- It takes years for a payment system to reach a _____ acceptance in the market.
- One of the characteristics of a successful e-payment system that it needs to piggyback the existing technologies and practices.
- _____ letter is issued by a bank guaranteeing that a buyer's payment to a seller will be received on time and for the correct amount.
- A successful e-payment system must have _____ support as it is a worldwide phenomenon.
- Public key _____ employs two-keys system to enable both parties to verify each other's identity and then establish an encrypted connection between them.
- One of the major drive to the cashless society.
- _____ key infrastructure is one of the cybersecurity technique used to secure e-payment.
- _____ card is one of the smart cards which only has to be within a certain proximity of a smart card reader to process a transaction.
- _____text is a message after it has been encrypted into unreadable form.
19 Clues: One of the major drive to the cashless society. • _____ text is unencrypted message in human-readable form. • _____ card works like a credit card but without spending limit. • _____text is a message after it has been encrypted into unreadable form. • One of the purposes of PKI is to _____ the data flowing across the network. • ...
IT Essential Vocabulary 2024-04-03
Across
- The process of creating a virtual version of a computer hardware platform, operating system, storage device, or network resource.
- A structured collection of data organized in a way that makes it easily accessible, manageable, and updateable.
- A set of rules or instructions designed to perform a specific task, especially in computing.
- The graphical or visual elements of a software application that users interact with.
- Software whose source code is freely available for anyone to use, modify, and distribute.
- A computer or software program that provides data, resources, or services to other computers or devices on a network.
- A set of rules governing the format and transmission of data between devices on a network.
- A type of local area network that uses wireless communication to connect devices within a limited area.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The process of converting data into a code to prevent unauthorized access.
- (Hypertext Markup Language): The standard markup language used to create and design web pages.
Down
- The practice of protecting computer systems, networks, and data from unauthorized access, attacks, or damage.
- Computing: The delivery of computing services over the internet, including storage, servers, databases, networking, software, and more.
- A programming language commonly used to create interactive effects within web browsers.
- The process of planning, creating, testing, and deploying software applications.
- A temporary storage area where frequently accessed data is stored for quick retrieval.
- The client-side portion of a software application that users interact with directly.
- A set of protocols, tools, and definitions that allow different software applications to communicate with each other.Backend: The server-side portion of a software application responsible for managing data and processing requests from the frontend.
- A group of interconnected computers or devices that can communicate with each other.
19 Clues: The process of converting data into a code to prevent unauthorized access. • The process of planning, creating, testing, and deploying software applications. • The client-side portion of a software application that users interact with directly. • The graphical or visual elements of a software application that users interact with. • ...
Technology 2023-06-06
Across
- Reality (VR) Immersive technology that creates a simulated environment, often experienced through a headset.
- Unmanned aerial vehicles (UAVs) used for various purposes, including aerial photography, delivery, and surveillance.
- Data Large volumes of data that are collected, analyzed, and utilized to uncover patterns, trends, and insights.
- Computing On-demand access to a shared pool of computing resources, such as servers and storage, over the internet.
- Technology that uses unique physical or behavioral characteristics, such as fingerprints or facial recognition, for identification and authentication.
- Use of living organisms or biological systems to develop or modify products and processes for various industries, such as medicine and agriculture.
- Computing Utilizes principles of quantum mechanics to perform complex calculations and solve problems exponentially faster than classical computers.
- Energy Technologies that harness energy from natural resources, such as solar, wind, and hydro power, for sustainable electricity generation.
- Reality (AR) Technology that overlays digital information or virtual objects onto the real world.
- of Things (IoT) Network of interconnected devices embedded with sensors, software, and connectivity to exchange data.
- Mobile device with advanced computing capabilities, touchscreen interface, and internet connectivity.
- Vehicles Self-driving vehicles that use sensors, AI, and GPS to navigate and operate without human intervention.
Down
- Distributed and decentralized digital ledger technology used for secure and transparent transactions.
- Manipulation and control of matter on the atomic and molecular scale to create new materials and devices with unique properties.
- Intelligence (AI) Field of computer science focused on creating intelligent machines that can perform tasks requiring human-like intelligence.
- Design, development, and operation of robots, which are programmable machines capable of performing tasks autonomously or with human guidance.
- Global network that connects computers and allows communication and information sharing.
- Printing Additive manufacturing process that creates three-dimensional objects by layering materials based on a digital model.
- Technology Devices worn on the body, such as smartwatches and fitness trackers, that collect data and provide functionality.
- Protection of computer systems and networks from unauthorized access, attacks, and data breaches.
20 Clues: Global network that connects computers and allows communication and information sharing. • Protection of computer systems and networks from unauthorized access, attacks, and data breaches. • Reality (AR) Technology that overlays digital information or virtual objects onto the real world. • ...
Internet Saftey! 2025-03-07
Across
- (short for weblog) Blogging is the process that implies creating articles, photos, and other forms of content and publishing them on a website
- the correct or acceptable way of communicating on the internet.
- Settings Privacy settings are controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- Identity Theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- Recording without consent.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- any criminal activity that involves a computer, network or networked device.
- Flaming Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
- small text files that websites store on your computer to remember information about you and your browsing activity
- utter a loud call or cry, typically as an expression of a strong emotion
Down
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes
- an attack that attempts to steal your money, or your identity
- Footprint the unique trail of data that a person or business creates while using the internet.
- Piracy is the unauthorized reproduction or distribution of someone's intellectual property without their consent.
- Talk in a friendly and informal way
- Ransomware is a type of malware (malicious software) designed to deny access to a user's data
- A technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.
- Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person.
- Cyber predators exploit online platforms to deceive and manipulate individuals for malicious gain.
19 Clues: Recording without consent. • Talk in a friendly and informal way • an attack that attempts to steal your money, or your identity • the correct or acceptable way of communicating on the internet. • utter a loud call or cry, typically as an expression of a strong emotion • any criminal activity that involves a computer, network or networked device. • ...
comp sci 2023-11-27
Across
- Supporting network connectivity for communication between devices and remote systems. Manages network configurations, protocols, and network device interactions.
- An overview of imperative languages, functional languages, object-oriented languages, and domain-specific languages, highlighting their characteristics and typical applications.
- A combination of development and IT operations, emphasizing automation and collaboration in software development.
- Software designed to run on specialized hardware, like in consumer electronics or automotive control systems.
Down
- Used to create secure encryption and decryption methods, safeguarding data and communication.
- The quality of algorithms having a finite number of well-defined steps, ensuring that the algorithm will eventually terminate or complete its execution and provide a result.
- Well-defined, step-by-step procedure or set of instructions designed to solve a specific problem, perform a particular task, or achieve a desired outcome.
- The property of algorithms where every step is defined with absolute clarity and without ambiguity. Precision ensures there is no confusion about what the algorithm is supposed to do and how it should do it, preventing incorrect results or unexpected behavior.
- The property of an algorithm that, given the same input under the same conditions, produces the exact same output every time it's executed. This property is essential for reliability and predictability
- A software distribution model where applications are hosted in the cloud and provided on a subscription basis.
- Practices and tools used to protect software and data from unauthorized access, attacks, and vulnerabilities
11 Clues: Used to create secure encryption and decryption methods, safeguarding data and communication. • Practices and tools used to protect software and data from unauthorized access, attacks, and vulnerabilities • Software designed to run on specialized hardware, like in consumer electronics or automotive control systems. • ...
E-COMMERCE 2024-11-09
Across
- I connect you to friends, family, and new. With likes, shares, and posts, I’m the social tool you choose.
- Pictures and stories, your life on display. Filters and hashtags brighten your day. Follow your friends, see what’s new. A place to share what you like to do.
- Popular Southeast Asian e-commerce platform known for flash sales
- The practice of protecting computers, networks, and data from digital attacks, theft, and damage.
- A modern form of advertising, where individuals with a loyal crowd turn their endorsements into profit, shaping trends with a post, not a billboard.
- A virtual space where pages are linked, offering information, services, and goods, all accessible with a click but never seen in the physical world.
Down
- I’m the reason businesses exist, without me, sales would cease to persist. I browse, I buy, and I leave my review, what role do I play?
- A digital pouch that holds more than paper, yet never weighs a gram, it lets you pay with a tap, and travel light with ease.
- The belief or anticipation that something will happen in a favourable way.
- The outcome you experience after your online order arrives, which may not always match the hopes you had before making the purchase.
- Short clips that dance and trends that fly. You scroll and laugh as time goes by. From challenges to songs you can share. A viral moment is always there.
11 Clues: Popular Southeast Asian e-commerce platform known for flash sales • The belief or anticipation that something will happen in a favourable way. • The practice of protecting computers, networks, and data from digital attacks, theft, and damage. • I connect you to friends, family, and new. With likes, shares, and posts, I’m the social tool you choose. • ...
Career Clusters and Pathways 2023-12-11
Across
- A pathway under the Human Services career cluster that would help you become a social worker.
- A student who has met all requirements of a CTE pathway by completing 3.0 credits with one course being a concentrator course.
- A pathway under the Health Science career cluster that could help you become a registered nurse.
- A pathway under the Computer Science & Information Technology career cluster that could help you become a security engineer.
- A pathway under the Law, Public Safety, Corrections and Security career cluster that could help you become a firefighter.
- A pathway under the Hospitality and Tourism career cluster that could help you become an executive chef.
- Suggested courses to help students gain additional knowledge and skills within a pathway but do not count towards pathway completion.
- A pathway under the Transportation, Distribution and Logistics career cluster that could help you become a heavy equipment maintenance technician.
- A pathway under the Arts, Audio/Visual Technology & Communications career cluster that could help you become a web designer.
- Courses unique to a specific career pathway.
Down
- A pathway under the Manufacturing career cluster that would help you become a tool maker.
- A pathway under the Agriculture, Food & Natural Resources career cluster that could help you become an Agricultural Engineer.
- A collection of corresponding courses that prepare students for a given career.
- A pathway under the Engineering and Technology career cluster that could help you become an electrical engineer.
- A pathway under the Architecture and Construction career cluster that would help you become a photo stylist.
- A group of careers and industries that are related by skills or products.
- A pathway under the Education and Training career cluster that would help you become a middle school teacher.
- Courses designed for Grade 9 and 10 to allow students to find out what they like and dislike.
- A pathway under the Business, Finance and Marketing career cluster that could help you become and auditor.
19 Clues: Courses unique to a specific career pathway. • A group of careers and industries that are related by skills or products. • A collection of corresponding courses that prepare students for a given career. • A pathway under the Manufacturing career cluster that would help you become a tool maker. • ...
IMS 2024-03-22
Across
- [Computer Science] A structured set of data held in a computer, especially one that is accessible in various ways.
- [Chemistry] A chemical reaction that takes place between an oxidizing substance and a reducing substance.
- [Economics] The part of economics concerned with single factors and the effects of individual decisions.
- [Biology] The process by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water.
- [Physics] The phenomenon of the interaction of electric currents or fields and magnetic fields.
- [Math] A method used to compute the rate of change of a function f(x) with respect to its input x.
- [Physics] A closed loop that electrons can travel in.
Down
- [Math] Writing a number or another mathematical object as a product of several factors.
- [Math] The longest side of a right-angled triangle, opposite the right angle.
- [Computer Science] A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- [Economics] A general increase in prices and fall in the purchasing value of money.
- [Computer Science] The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- [Biology] A self-replicating material that is present in nearly all living organisms as the main constituent of chromosomes.
- [Physics] A quantity that has both magnitude and direction.
- [Chemistry] A standard scientific unit for measuring large quantities of very small entities such as atoms, molecules, or other specified particles.
- [Chemistry] The state in which both the reactants and products are present in concentrations which have no further tendency to change with time.
- [Economics] The total value of goods produced and services provided in a country during one year.
- [Biology] The smallest structural and functional unit of an organism.
- The School, that we are studying in.
19 Clues: The School, that we are studying in. • [Physics] A closed loop that electrons can travel in. • [Physics] A quantity that has both magnitude and direction. • [Biology] The smallest structural and functional unit of an organism. • [Math] The longest side of a right-angled triangle, opposite the right angle. • ...
Technology 2023-05-09
Across
- computing: the delivery of computing services, including servers, storage, databases, and software, over the internet
- energy - Energy that is generated from renewable sources such as wind, solar, or hydro power.
- a way to send and receive messages over the internet
- vehicles - Vehicles that can operate without human intervention, using sensors, software, and other technology to navigate and make decisions.
- media: websites and applications that allow users to create and share content, and connect with other users
- it is a program that runs on a computer or mobile device and performs a specific function.
- the use of technology to automate processes and reduce the need for human intervention.
- a decentralized digital ledger that records transactions in a secure and verifiable way
- computing - The delivery of computing services, including storage, servers, and software, over the internet.
- a wireless network that allows devices to connect to the internet without using cables
- an electronic device that can store, retrieve, and process data
Down
- the practice of protecting computer systems and networks from digital attacks, theft, and damage
- the use of living organisms, cells, or biological processes to develop new products or solve problems.
- a portable computer that typically has a touchscreen display and is smaller than a laptop.
- reality (VR): a computer-generated simulation of a three-dimensional environment that can be interacted with using special equipment
- a set of instructions that tells a computer what to do and how to do it.
- intelligence (AI): the ability of machines to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- - A set of instructions or rules that a computer program follows to perform a task or solve a problem.
- a mobile device that can make calls, send text messages, and access the internet
- the design, construction, and operation of robots that can perform tasks autonomously or with human guidance.
20 Clues: a way to send and receive messages over the internet • an electronic device that can store, retrieve, and process data • a set of instructions that tells a computer what to do and how to do it. • a mobile device that can make calls, send text messages, and access the internet • ...
CISO Crossword Quiz - 1725 2025-03-11
Across
- A technique by which cyber criminals steal potentially sensitive user information by injecting malicious script code in various forms/pages of targeted website
- A cybersecurity strategy in which an organization only allows pre-approved or trusted users, entities, or actions to operate/access a system or network
- a cybercrime where fraudsters impersonate law enforcement officials to trick people into paying money or giving personal information by making them believe they have been digitally arrested or digitally detained
- A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency
- A type of cybercrime that involves using QR codes to trick people into visiting malicious websites or to make payment to unauthorized persons
- Cyber fraudsters pose as a known/trusted person to dupe people into transferring money to a fraudulent account
- A Portal of Dept. of Telecommunication to report suspected fraud communications received through Call/SMS/WhatsApp messages
Down
- A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money
- A Security incident in which a malicious threat actor gains access to systems without authorization
- A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms
- A piece of audio or video that has been altered by an advanced editing technique to make it seem authentic or credible
11 Clues: A Security incident in which a malicious threat actor gains access to systems without authorization • A cyber attack method used by fraudsters that plays on people unawareness rather than technology deficiency • A type of cyber scam in which fraudsters try & convince the victim to merge the OTP call to siphon off money • ...
Digital Citizenship 2022-09-22
Across
- All the information online about a person either posted by that person or others, intentionally or unintentionally.
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
- False information that is spread, with intent to mislead
- Means that networks, systems, and applications are up and running. It ensures that authorized users have timely, reliable access to resources when they are needed.
- Small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
- Used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
- Protection of computer systems, networks, and data from digital attacks
- Secret series of numbers, letters and special characters that allows you to access a locked computer or program
Down
- Refers to an organizations efforts to keep their data private or secret. Only those authorized have access to specific assets.
- Being believed or accepted as true, real, or honest
- Contributing online via posts, comments, or other forms of communication or expression.
- A person with substance use disorder who is seeking a mental escape from reality
- A ritualistic routine that becomes part of your normal life
- An attitude or prejudice that favors a way of feeling or acting over another
- Is about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable.
- Scrolling through online content without reacting to the content.
- False information that is spread, regardless of intent to mislead
- Having a hidden identity
- False information published as being authentic
19 Clues: Having a hidden identity • False information published as being authentic • Being believed or accepted as true, real, or honest • False information that is spread, with intent to mislead • A ritualistic routine that becomes part of your normal life • Scrolling through online content without reacting to the content. • ...
tech 2023-06-07
Across
- It is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output(I/O)operations.
- In computing, a bitmap is a mapping from some domain to bits.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information
- a method of representing data in a visual
- The Graphics Interchange Format is a bitmap image format
- a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
- High-Definition Multimedia Interface is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio
- A binary code represents text, computer processor instructions.
- is a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still imagesPDF
- a hardware or software that shares data so the future requests for that data can be served faster
- a mobile operating system primarily developed by google
- A method of transmitting and receiving messages using electronics
Down
- It is the protection of computer systems and networks from attack by malicious actors
- In the pursuit of knowledge, data is a collection of discrete values that convey information
- is a commonly used method of lossy compression for digital images
- a multinational technology company and second largest mobile phone manufacturer
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- a coding format for digital audio developed largely by the Fraunhofer Society in Germany
19 Clues: a method of representing data in a visual • a mobile operating system primarily developed by google • The Graphics Interchange Format is a bitmap image format • In computing, a bitmap is a mapping from some domain to bits. • A binary code represents text, computer processor instructions. • is a commonly used method of lossy compression for digital images • ...
Smart city 2019-10-16
Across
- electricity network that uses ICT to integrate the actions of all users connected to it – generators, consumers
- the standard is maintained through a collaborative decision-making process that is consensus-based and independent of any individual supplier
- measures of the impact and success of smart city initiatives, programs, and projects
- dedicated space where ICT infrastructure is hosted and operated on behalf of one or a number of organizations
- mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
- act of periodically checking processes, equipment, and environment in order to detect any changes
- function of transforming data by the discipline of cryptography so as to make the data undecipherable to anyone other than the legitimate sender and receiver.
Down
- ability of systems to provide services to and accept services from other systems and to use the services so exchanged to enable them to operate effectively together
- scalable IT services accessible via the internet for a potentially large number of external customers, providing facilities for the storing and use of data and information on facilities remote from local computing facilities
- software system based on open standards
- state where things (e.g. objects, environments, vehicles and cloth-ing) have more and more information associated with them and may have the ability to sense, communicate, network and produce new information, becoming an integral part of the internet
- measures used to provide physical protection of resources against deliberate and accidental threats
- the standard has a transparent decision-making process
- property that information is not altered in any way, deliberately or accidentally
- process by which people become residents of cities
15 Clues: software system based on open standards • process by which people become residents of cities • the standard has a transparent decision-making process • property that information is not altered in any way, deliberately or accidentally • measures of the impact and success of smart city initiatives, programs, and projects • ...
Cyber security 2022-10-19
Across
- _______ is a program that secretly records what a user does so that cybercriminals can make use of this information. For example, spyware could capture credit card details.
- _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- _______ Malware locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.
- ________is actually considered the first computer virus?
- _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- In order to ensure the security of the data/ information, we need to ____________ the data:
Down
- _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- In Wi-Fi Security, which protocol is more used?
- _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
- __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Advertising software can be used to spread malware.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
15 Clues: In Wi-Fi Security, which protocol is more used? • Advertising software can be used to spread malware. • ________is actually considered the first computer virus? • In order to ensure the security of the data/ information, we need to ____________ the data: • _______ is a type of software designed to help the user's computer detect viruses and avoid them. • ...
Cybersecurity 2020-09-24
2 Clues: A form of malware that deliberately prevents you from accessing files on your computer until they are • A piece of malware that can replicate itself in order to spread the infection to other connected computers.
Cyber Security 2023-04-13
Across
- A memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity.
- The loss of confidentiality, integrity, or availability of information, data, or information (or control) systems
- A way of translating data from plaintext (unencrypted) to ciphertext (encrypted).
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- A patch, upgrade, or other modification to code that corrects security and/or functionality problems in software.
- Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- A security feature offered by many websites, applications and devices that dramatically improves account security.
- Ensuring timely and reliable access to and use of information.
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- An ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.
- Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- Types of software products which attempt to detect, quarantine and/or block malware from running on devices.
- Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
- A weakness in an IT system that can be exploited by an attacker to deliver a successful attack.
15 Clues: Ensuring timely and reliable access to and use of information. • A way of translating data from plaintext (unencrypted) to ciphertext (encrypted). • A weakness in an IT system that can be exploited by an attacker to deliver a successful attack. • Assurance that the confidentiality of, and access to, certain information about an entity is protected. • ...
Data Privacy 2023-09-11
Across
- The study and application of techniques to secure communication in the presence of adversaries.
- A security process where a user provides personal identifiers to gain access to a system or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- The automated processing of personal data to evaluate or predict aspects concerning that individual.
- A regulation in the EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area.
- The process of removing all personally identifiable information where identification of data can no longer occur.
- The process of processing personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information.
Down
- The process of editing or preparing a document, especially to obscure or remove confidential information.
- The process of converting data into a code to prevent unauthorized access.
- Small files that are stored on a user's device when they visit a website, often used to remember user preferences or track user behaviour.
- An incident where unauthorized individuals gain access to confidential data.
- The principle that individuals should be informed about the collection and use of their personal data.
- A cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on security policies.
- The process of replacing sensitive data with unique identification symbols that retain all the essential data about the data without compromising its security.
15 Clues: The process of converting data into a code to prevent unauthorized access. • An incident where unauthorized individuals gain access to confidential data. • The practice of protecting systems, networks, and programs from digital attacks. • The study and application of techniques to secure communication in the presence of adversaries. • ...
Cyber Crossword 2021-08-13
Across
- Software written to damage a computer’s performance, steal or alter data, or interfere in other ways with normal functions.
- Measures taken to protect a computer system (as on the internet) against unauthorized access or attack.
- The enciphering and deciphering of messages in secret code or cipher.
- Short for "malicious software". Malware is software designed by cybercriminals to gain access to and damage computers or computer access.
- A method of transforming a text in order to conceal its meaning.
- To engage in activity online that could result in something bad or unpleasant.
- When someone disguises an email address, sender name, phone number, or website URL-often by changing one letter, symbol, or number- to convince you that you are interacting with a trusted source.
- A conversion of something (such as data) into a code or cipher.
Down
- Weakness in the security of a system. Open to attack or damage.
- Software that encrypts data on someone's device until the person agrees to pay some amount of money to regain access to files.
- A set of characters used to identify a user to a computer system. It is similar to a password but much longer.
- Legitimate or innocent looking emails asking you to respond with personal data or to click on a link.
- Short for "malicious software." Malware is software designed by cybercriminals to gain access to and damage computers or computer networks. Typically spread by emails or text that entice people to click on links or open attachments.
- False or inaccurate information, especially that which is deliberately intended to deceive.
- When someone disguises an email address, sender name, phone number, or website URL-often by changing one letter, symbol, or number- to convince you that you are interacting with a source.
- The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
- To convert (something, such as a body of information) from one system of communication into another.
17 Clues: Weakness in the security of a system. Open to attack or damage. • A conversion of something (such as data) into a code or cipher. • A method of transforming a text in order to conceal its meaning. • The enciphering and deciphering of messages in secret code or cipher. • To engage in activity online that could result in something bad or unpleasant. • ...
Digital Media Crossword 3 2024-04-26
Across
- The development and application of principles, policies, and mechanisms to regulate and manage the internet's infrastructure and resources.
- Bullying or harassment that takes place over digital devices or online platforms, such as social media, email, or messaging apps.
- Marketing strategy focused on creating and distributing valuable, relevant content to attract and engage a target audience.
- A period of time during which a person refrains from using digital devices and technology, often to reduce stress, improve productivity, or foster mindfulness.
- A seminar or presentation conducted over the internet, allowing participants to interact with the presenter and ask questions in real-time.
- Creating and distributing audio content over the internet, typically in the form of episodes or series that can be subscribed to and downloaded.
- Measures and practices designed to protect digital systems, networks, and data from unauthorized access, cyberattacks, and data breaches.
Down
- The principle that internet service providers should treat all data on the internet equally, without discrimination or preference, ensuring open and fair access to online content and services.
- The ability to effectively find, evaluate, create, and communicate information using digital technologies.
- The trail of data and information left behind by a person's online activities, including social media posts, website visits, and online purchases.
- Setting up virtual boundaries or geographic limits using GPS or RFID technology to trigger actions or alerts when a device enters or exits the specified area.
- The protection of personal information and sensitive data from unauthorized access, use, or disclosure, often regulated by laws and policies.
12 Clues: The ability to effectively find, evaluate, create, and communicate information using digital technologies. • Marketing strategy focused on creating and distributing valuable, relevant content to attract and engage a target audience. • ...
NEWSPAPER CROSSWORD March 18 2015-03-18
Across
- The mini-can of Coke --one of the many ways food companies try to cast their products in a ______ light. RJT
- An envelope addressed to the White House has tentatively tested positive for ______. MJS
- The State Assembly voted to raise speed limit to 70 mph and to delay a state test aligned with Common Core and to allow people to sample ______ while shopping. MJS
- Aurora hired Mandiant, a cybersecurity company, to remove the ______ and determine what information may have been stolen. MJS
- Robert Durst, a millionaire is linked to three deaths: Susan Berman; ______ Durst; and Morris Black. RJT
- United Flight 1074 returned to Dulles International Airport on Monday night after the passenger shouted ______ headed toward the cockpit. MJS
Down
- "It would be dull without ______," Vladimir Putin said after his unexplained 10-day absence. RJT
- Racine’s candidates for mayor, ______ Mayor John Dickert and challenger Rev. Melvin Hargrove fielded questions at Gateway Technical College. RJT
- RUSD took steps to borrow $50 million which will go towards rebuilding ______ School and Olympia Brown School. RJT
- Oprah Winfrey plans to sell items from her condominium and proceeds from the sale will benefit Winfrey's South African girls ______. RJT
- The Iowa Ag Summit applauded when Walker described drug testing, treatment and job training for able-bodied adults in ______ programs. MJS
- An 85-year-old woman was killed struck by an 87-year-old man in parking lot of a Sendik's ______ store in Mequon. MJS
- Christopher Manney was fired after he fatally shot Dontre Hamilton, 31 in ______ will try to get his job back this week. MJS
13 Clues: An envelope addressed to the White House has tentatively tested positive for ______. MJS • "It would be dull without ______," Vladimir Putin said after his unexplained 10-day absence. RJT • Robert Durst, a millionaire is linked to three deaths: Susan Berman; ______ Durst; and Morris Black. RJT • ...
cybersecurity 2024-02-29
MIC Quiz 2 2023-04-26
Across
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
Down
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
Computer Science Vocabulary 2024-03-21
Across
- - A programming technique where a function calls itself in order to solve smaller instances of the same problem.
- - The process of translating source code written in a high-level programming language into machine code that can be executed by a computer.
- - A set of rules and protocols that allows different software applications to communicate with each other.
- - A set of practices that combines software development (Dev) and information technology operations (Ops) to shorten the systems development life cycle and provide continuous delivery of high-quality software.
- - The simulation of human intelligence processes by machines, especially computer systems.
- - The practice of protecting computer systems, networks, and data from unauthorized access, attacks, or damage.
- - The process of identifying and fixing errors or bugs in software code.
- - A programming paradigm based on the concept of "objects," which can contain data and code to manipulate that data.
- - The ability of a system, network, or process to handle a growing amount of work or users without experiencing a significant decrease in performance.
Down
- - The process of encoding data in such a way that only authorized parties can access it.
- - Refers to the rules governing the structure of statements or expressions in a programming language.
- - The process of simplifying complex systems or ideas by focusing on the essential aspects while hiding unnecessary details.
- - The process of creating a virtual (rather than actual) version of something, such as a virtual machine, operating system, storage device, or network resource.
- - Data that provides information about other data, such as file properties, tags, or descriptions.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
15 Clues: - The process of identifying and fixing errors or bugs in software code. • A step-by-step procedure or formula for solving a problem or accomplishing a task. • - The process of encoding data in such a way that only authorized parties can access it. • - The simulation of human intelligence processes by machines, especially computer systems. • ...
Palabras Tecnicas 2024-10-09
Across
- ¿Qué término se refiere a la capacidad de un dispositivo o sistema para interactuar con otros a través de una red, ya sea con cables o de manera inalámbrica?
- ¿Qué es lo que escriben los desarrolladores para dar instrucciones a las máquinas, utilizando lenguajes como Python o Java?
- ¿Cómo se llama el conjunto de pasos bien definidos que se utilizan para resolver un problema o realizar una tarea específica en programación?
- Acción que permite examinar los problemas del equipo.
- ¿Cómo se llama la estructura organizativa de los componentes de un sistema, que define cómo interactúan entre sí para lograr el funcionamiento general?
- ¿Cuál es la parte esencial de un sistema que permite que todas las piezas funcionen juntas, ya sea en hardware o software?
- ¿Qué es lo que se genera y almacena continuamente, considerado el nuevo "petróleo" de la era digital, y necesita ser gestionado de manera eficiente y segura?
- Lenguaje de programación que usa 0 y 1.
Down
- Una forma de almacenar los datos del sistema
- Forma de hacer cambios y mejorar el rendimiento de la pc.
- ¿Qué herramienta utilizas para acceder y visualizar sitios web en internet?
- ¿Cómo se llama el conjunto de medidas y prácticas diseñadas para proteger redes, sistemas y datos de ataques o accesos no autorizados?
- ¿Cómo se llama el programa que traduce el código fuente escrito por los programadores en un lenguaje de alto nivel a código máquina o bytecode que puede ser ejecutado por una computadora?
- ¿Qué proceso involucra el uso de sistemas o software para ejecutar tareas repetitivas sin intervención humana?
- Nombre de herramientas que se encuentran en iconos en el escritorio.
15 Clues: Lenguaje de programación que usa 0 y 1. • Una forma de almacenar los datos del sistema • Acción que permite examinar los problemas del equipo. • Forma de hacer cambios y mejorar el rendimiento de la pc. • Nombre de herramientas que se encuentran en iconos en el escritorio. • ¿Qué herramienta utilizas para acceder y visualizar sitios web en internet? • ...
Coding Terminology 2025-12-06
Across
- Sometimes, the code won’t work. It’s a glitch in the system which makes the computer behave in an unexpected way.
- Trail of data that we all leave behind when we’re using the internet.
- A giant network of computers that allows people all over the world to share information and communicate with each other.
- A way for computers and devices to talk to each other. Instead of using wires, it sends information through the air.
- Instruction that a coder can give to a computer.
- A repeating pattern that allows the computer to run a set of instructions multiple times.
- It's like a tightly locked door that protects our computers from harm. It's to keep our systems safe from cyber threats like viruses, hacking, and data breaches.
Down
- Something that is a computer does after you give it an instruction.
- These are storage places which you access using an internet connection.
- The process of finding and fixing the bugs in your computer code. This makes sure that your computer program runs smoothly without any glitches. Debugging is probably a coder’s most important skill. If one thing is certain in computer coding, it’s that your code won’t run properly on the first try.
- An instruction that you give to your computer. For example, a mouse click is a type of input that tells a computer what you want it to do.
- The language use by every computer, which made up of millions of zeroes and ones.
- A set of instructions that tell a computer what to do.
- Code that helps a computer to make a decision.
- The process of writing instructions for a computer to follow.
15 Clues: Code that helps a computer to make a decision. • Instruction that a coder can give to a computer. • A set of instructions that tell a computer what to do. • The process of writing instructions for a computer to follow. • Something that is a computer does after you give it an instruction. • Trail of data that we all leave behind when we’re using the internet. • ...
The Executive Branch 2025-11-10
Across
- a formal and organized choice by vote of a person for a political office or other position
- the official representatives to foreign government
- formal agreements between nations
- an indirect veto of a legislative bill by the president or a governor by retaining the bill unsigned until it is too late for it to be dealt with during the legislative session.
- speech given by the President of the United States to a joint session of Congress and the nation
- a public relations official who serves as the primary liaison between an organization or public figure and the news media
- a public office or position of authority that provides its occupant with an outstanding opportunity to speak out on any issue.
- a government's strategy in dealing with other nations.
- the effort to protect a country from terrorist attacks, natural disasters, and other threats through a range of measures including border security, cybersecurity, and emergency response
- a directive from the President of the United States that has the force of a law, used to manage the operations of the federal government.
- agreements with other countries that do not need senate approval
Down
- the part of government responsible for enforcing and administering the laws, and it is led by the President.
- Head of the executive branch
- an official or executive ranking below and deputizing for a president.
- advises the President on any subject he may require relating to the duties of each member's respective office.
- the constitutional authority of the U.S. President to grant forgiveness for federal crimes, which can absolve an individual of guilt and restore their civil rights.
- a constitutional right to reject a decision or proposal made by a law-making body.
- a body of people representing the states of the US, who formally cast votes for the election of the president and vice president.
- a directive from the President of the United States that has the force of a law, used to manage the operations of the federal government.
- speech given by the President of the United States to a joint session of Congress and the nation
20 Clues: Head of the executive branch • formal agreements between nations • the official representatives to foreign government • a government's strategy in dealing with other nations. • agreements with other countries that do not need senate approval • an official or executive ranking below and deputizing for a president. • ...
social media data collection & unit 2 vocab 2025-10-01
Across
- A tool monitoring system activities and network traffic for policy violations or malicious activity and lets the administrator know when something suspicious happens.
- The possibility for damage and harm to data and digital systems, which outcomes from a threat making use of a vulnerability.
- When maintaining the accuracy and preventing unauthorized modification
- Implementing measures to reduce the risk of a cyberattack or to make it less impactful if it does happen.
- A cybersecurity model which defines the primary principles of info security and stands for Confidentiality, Integrity, and Availability
- The process that verifies a user’s identity and prove who they claim to be.
- A process in which verifies that a user is who they claim to be.
- All people can securely and independently understand and use security tools, training, and services without creating new risks.
- making sure data and systems are accessible when needed
- Protecting your info from unauthorized access
Down
- A program that is designed to prevent, remove,and prevent malicious malware like viruses, ransomware, etc from computers.
- A tool monitoring network traffic in real time, detecting and blocking malicious behavior like malware automatically.
- It depends on physical cables for data transmission instead of wireless singles to prevent unauthorized access through remote.
- Provides valid proof that a party was involved in a digital communication or transaction so they can’t deny it later.
- networks It uses light instead of electricity providing a more secure physical foundation for data transmission.
- Keeping sensitive and important data on a device that is disconnected to the internet or a network.
- the process that requires two distinct forms of identification to prove who they are when they log in in their account to add extra protection.
- A network security device or software that monitors and controls incoming and outcoming network traffic.
18 Clues: Protecting your info from unauthorized access • making sure data and systems are accessible when needed • A process in which verifies that a user is who they claim to be. • When maintaining the accuracy and preventing unauthorized modification • The process that verifies a user’s identity and prove who they claim to be. • ...
NEWSPAPER's CROSSWORD March 18th 2015-03-18
Across
- Oprah Winfrey plans to sell items from her condominium and proceeds from the sale will benefit Winfrey's South African girls ______. RJT
- The mini-can of Coke --one of the many ways food companies try to cast their products in a ______ light. RJT
- The State Assembly voted to raise speed limit to 70 mph and to delay a state test aligned with Common Core and to allow people to sample ______ while shopping. MJS
- An envelope addressed to the White House has tentatively tested positive for ______. MJS
- "It would be dull without ______," Vladimir Putin said after his unexplained 10-day absence. RJT
- Robert Durst, a millionaire is linked to three deaths: Susan Berman; ______ Durst; and Morris Black. RJT
- United Flight 1074 returned to Dulles International Airport on Monday night after the passenger shouted ______ headed toward the cockpit. MJS
Down
- The Iowa Ag Summit applauded when Walker described drug testing, treatment and job training for able-bodied adults in ______ programs. MJS
- An 85-year-old woman was killed struck by an 87-year-old man in parking lot of a Sendik's ______ store in Mequon. MJS
- Racine’s candidates for mayor, ______ Mayor John Dickert and challenger Rev. Melvin Hargrove fielded questions at Gateway Technical College. RJT
- Aurora hired Mandiant, a cybersecurity company, to remove the ______ and determine what information may have been stolen. MJS
- RUSD took steps to borrow $50 million which will go towards rebuilding ______ School and Olympia Brown School. RJT
- Christopher Manney was fired after he fatally shot Dontre Hamilton, 31 in ______ will try to get his job back this week. MJS
13 Clues: An envelope addressed to the White House has tentatively tested positive for ______. MJS • "It would be dull without ______," Vladimir Putin said after his unexplained 10-day absence. RJT • Robert Durst, a millionaire is linked to three deaths: Susan Berman; ______ Durst; and Morris Black. RJT • ...
Digital Media Crossword 2 2024-04-26
Across
- Measures and practices designed to protect digital systems, networks, and data from unauthorized access, cyberattacks, and data breaches.
- The simulation of human intelligence processes by machines, including learning, reasoning, and problem-solving.
- A subset of artificial intelligence that enables systems to automatically learn and improve from experience without being explicitly programmed.
- Obtaining ideas, services, or content by soliciting contributions from a large group of people, often done through online platforms or communities.
- Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.
Down
- A marketing technique that aims to spread information or promote products through social sharing and word-of-mouth, often leveraging online platforms.
- A decentralized and distributed digital ledger technology used to record transactions across multiple computers securely and transparently.
- Part of the internet that is not indexed by search engines and requires special software or authorization to access, often associated with illicit activities.
- The network of interconnected devices (such as smartphones, wearable gadgets, and home appliances) that can communicate and exchange data over the internet.
- Buying and selling goods or services over the internet, often through online marketplaces, websites, or mobile apps.
- Large and complex data sets that can be analyzed computationally to reveal patterns, trends, and associations, often used for business intelligence and decision-making.
- Adding geographical metadata (such as coordinates or location names) to digital content, such as photos or social media posts.
- Content, such as headlines or thumbnails, designed to attract attention and encourage clicks, often sensationalized or misleading.
13 Clues: The simulation of human intelligence processes by machines, including learning, reasoning, and problem-solving. • Buying and selling goods or services over the internet, often through online marketplaces, websites, or mobile apps. • ...
Data Visualisation 2025-09-09
Across
- The practice of collecting data from a wide range of sources within a company into a single database that may be used to guide management decisions.
- The protection of information technology elements, including hardware and software, data or network services.
- Acronym that is a computing method that enables users to easily and selectively extract and query data in order to analyse it.
Down
- A general direction of change: a way of behaving or proceeding, that is developing and becoming more common. For example, the downward/upward trend of the stock market. Digital technology is the latest/current trend in television.
- The graphical representation of information and data. By using visual elements like charts, graphs and maps, data visualisation tools provide an accessible way to see and understand trends, outliers and patterns in data.
- A particular tendency, trend, inclination, feeling, or opinion, especially one that is preconceived or unreasoned.
- The usability, ease of use and enjoyment provided in the interaction between the customer and the product.
- In a technological context, this might be the recurring sequences of data over time that can be used to predict trends, particular configurations of features in images that identify objects, frequent combinations of words and phrases, or particular clusters of behaviour.
8 Clues: The usability, ease of use and enjoyment provided in the interaction between the customer and the product. • The protection of information technology elements, including hardware and software, data or network services. • A particular tendency, trend, inclination, feeling, or opinion, especially one that is preconceived or unreasoned. • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 3 2022-10-06
Across
- What type of calls are made by social engineers
- Someone attempting to create Identity fraud
- a list of entities that are blocked or denied access/privilege
- This horse can stampede your security defenses for the bad guys and make you loop sheepish tool
Down
- what type of password is a strong password with descriptors before or after it?
- Duo-Security is considered what type of authentication when logging in remotely
- specific toolset that blocks users from accessing questionable websites through the network.
- Regular e-mail is sent in this type of text
- when somebody sends an e-mail with a link toa bogus website it is called
- This can slow down your computer AND watch everywhere you go on the internet
10 Clues: Regular e-mail is sent in this type of text • Someone attempting to create Identity fraud • What type of calls are made by social engineers • a list of entities that are blocked or denied access/privilege • when somebody sends an e-mail with a link toa bogus website it is called • This can slow down your computer AND watch everywhere you go on the internet • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 4 2022-10-06
Across
- the unauthorized access and disclosure of sensitive information released outside of unauthorized organization
- computer checks the __Data base___ of user names and passwords for a match before granting access.
- A list of organizations that are considered trustworthy or allowed access/privilege
- The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
- users may receive a fake DM or fake order detail with a cancellation link
- Which attack can be considered as the class of computer threats?
- Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called
Down
- used to describe any cde in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- specialized techniques for gathering, retaining and analyzing data as evidence for investigations
- is a type of software designed to help the user's computer detect viruses and avoid them.
- specialized techniques for gathering, retaining and analyzing data as evidence for investigations
11 Clues: Which attack can be considered as the class of computer threats? • users may receive a fake DM or fake order detail with a cancellation link • A list of organizations that are considered trustworthy or allowed access/privilege • is a type of software designed to help the user's computer detect viruses and avoid them. • ...
AVIAGE SYSTEMS Cybersecurity Week 2016 - Crossword competition 2016-10-21
Across
- To avoid getting phished, do not take action on __________ requests.
- Login password needs to be changed once every ________ days.
- __________ = Malicious Software.
- Always __________ a link before clicking it.
- __________ attack will use email or SMS to redirect a user to a fake website.
Down
- ___________ is a type of software that holds you at ransom.
- __________ wears a RED color badge.
- __________ type of information cannot be shared with everyone but only after prior approval of owner and shared only on need to know basis.
- Information which can shared with everyone, even outside the organization is classified as __________
- Never share your _________ with anyone, never ever!
10 Clues: __________ = Malicious Software. • __________ wears a RED color badge. • Always __________ a link before clicking it. • Never share your _________ with anyone, never ever! • ___________ is a type of software that holds you at ransom. • Login password needs to be changed once every ________ days. • To avoid getting phished, do not take action on __________ requests. • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
Cybersecurity (LRM Adv Unit 10 Listening task 2/155) 2023-03-15
Across
- an animal that is kept in the home as a companion and treated kindly
- data that is _ needs to be dealt with very carefully, because it is secret
- very silly or unreasonable
- a container for making and serving tea with a handle and a shaped opening for pouring
- not needed or wanted
- a person who has a first degree from a university or college
- Your digital _ is the collection of information generated by your online activity, e.g. your username, search history, list of contacts or purchase history.
Down
- someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
- to remove something that has been written down or stored in a computer
- an object or machine that has been invented for a particular purpose
- a secret word or combination of letters or numbers, used for communicating with a computer to prove who you are
- If something “is of _ interest to programmers”, they are especially interested in it.
- _ computing is a way of using computers in which you use software or storage space that is on the Internet rather than on your own computer
- information in an electronic form that can be stored and used by a computer
- Identity _ occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- to make known or show something that was previously secret
16 Clues: not needed or wanted • very silly or unreasonable • to make known or show something that was previously secret • a person who has a first degree from a university or college • an object or machine that has been invented for a particular purpose • an animal that is kept in the home as a companion and treated kindly • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 2 2022-10-06
Across
- Someone who creates a fake online profile to intentionally deceive you.
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
- any software program in which advertising banners are displayed while the program is running.
- made possible by using algorithms to create complex codes out of simple data,effectively making it more difficult for cyberthieves to gain access to the information
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- global system of interconnected computer networks that use the Internet protocol suite
Down
- A series of words strung together that is longer and easier to remember than a password.
- are small files that Web sites put on your computer hard disk drive when you first visit
- When a bad actor impersonates a specific person,business or agency.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
10 Clues: When a bad actor impersonates a specific person,business or agency. • Someone who creates a fake online profile to intentionally deceive you. • global system of interconnected computer networks that use the Internet protocol suite • A series of words strung together that is longer and easier to remember than a password. • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 2 2022-10-06
Across
- any software program in which advertising banners are displayed while the program is running.
- are small files that Web sites put on your computer hard disk drive when you first visit
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
- Someone who creates a fake online profile to intentionally deceive you.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- made possible by using algorithms to create complex codes out of simple data,effectively making it more difficult for cyberthieves to gain access to the information
Down
- A series of words strung together that is longer and easier to remember than a password.
- global system of interconnected computer networks that use the Internet protocol suite
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- When a bad actor impersonates a specific person,business or agency.
10 Clues: When a bad actor impersonates a specific person,business or agency. • Someone who creates a fake online profile to intentionally deceive you. • global system of interconnected computer networks that use the Internet protocol suite • A series of words strung together that is longer and easier to remember than a password. • ...
Cruciverba Modulo 7 - Cybersecurity Awareness 2024-05-28
Across
- Segnalazione di attività illecite o non etiche all'interno di un'organizzazione.
- Strumento che gestisce e protegge dispositivi mobili utilizzati in un'azienda, assicurando la sicurezza dei dati.
Down
- Processo di recupero di dati, sistemi o operazioni dopo un incidente o un attacco informatico.
- Sistema che monitora il traffico di rete per identificare attività sospette o potenzialmente dannose.
- Politica aziendale che permette ai dipendenti di utilizzare i propri dispositivi personali per accedere a dati e applicazioni aziendali.
- Gestione delle identità e degli accessi, sistema che controlla chi può accedere a risorse e informazioni aziendali.
6 Clues: Segnalazione di attività illecite o non etiche all'interno di un'organizzazione. • Processo di recupero di dati, sistemi o operazioni dopo un incidente o un attacco informatico. • Sistema che monitora il traffico di rete per identificare attività sospette o potenzialmente dannose. • ...
Cruciverba Modulo 8 - Cybersecurity Awareness 2024-05-29
Across
- Intelligenza artificiale che mira a comprendere e svolgere una vasta gamma di compiti umani.
- Uso non autorizzato delle risorse di un computer per minare criptovalute, spesso attraverso malware nascosto.
Down
- Servizio che offre sicurezza e prestazioni migliorate per siti web, proteggendoli da attacchi DDoS e altre minacce online.
- Video o audio manipolati digitalmente per far apparire una persona come se facesse o dicesse qualcosa che non ha mai fatto o detto.
- Sistema che integra dispositivi informatici e fisici per monitorare e controllare processi fisici attraverso la rete.
- Istituto nazionale degli standard e della tecnologia che fornisce linee guida e standard per la sicurezza informatica negli Stati Uniti.
6 Clues: Intelligenza artificiale che mira a comprendere e svolgere una vasta gamma di compiti umani. • Uso non autorizzato delle risorse di un computer per minare criptovalute, spesso attraverso malware nascosto. • Sistema che integra dispositivi informatici e fisici per monitorare e controllare processi fisici attraverso la rete. • ...
Programming_Language_For_Hackers 2024-09-27
Across
- These languages are used for systems programming and low-level interactions with hardware. They are essential for developing custom tools and exploiting vulnerabilities at the system level.
- A versatile language used for scripting, automation, and web development. It has a large community and extensive libraries for cybersecurity tasks, including network scanning, vulnerability assessment, and penetration testing.
- The primary language for web development, JavaScript is essential for understanding and exploiting web vulnerabilities. It can be used to create malicious scripts, analyze web applications, and automate tasks.
- Used for pattern matching and searching within text data.
- The standard language for interacting with databases. Ethical hackers need to understand SQL to extract data from databases and identify vulnerabilities.
Down
- Understanding assembly language can be helpful for analyzing malware and reverse engineering software.
- languages like PowerShell (Windows) or Bash (Linux) Essential for automating tasks and interacting with the operating system.
- Widely used for web development, PHP is often the language behind web applications that ethical hackers target. Understanding PHP is crucial for identifying and exploiting vulnerabilities in web applications.
- Scripting These scripting languages are used to automate tasks and interact with the operating system. They are essential for creating tools and automating penetration testing processes.
- A dynamic language often used for web development and scripting. Ruby on Rails, a popular web framework, is written in Ruby and can be a target for ethical hackers.
10 Clues: Used for pattern matching and searching within text data. • Understanding assembly language can be helpful for analyzing malware and reverse engineering software. • languages like PowerShell (Windows) or Bash (Linux) Essential for automating tasks and interacting with the operating system. • ...
Kim Chart Crossword Puzzle 2025-03-04
Across
- the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images.
- Talk in a friendly and informal way.
- (short for weblog) a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
Down
- Theft an act of pretending to be another person for the purpose of entertainment or fraud.
- part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information .
- every aspect of protecting an organization and its employees and assets against cyber threats.
- individuals who consistently violate personal boundaries with children, such as invading their personal space or engaging in inappropriate touching.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid.
- Footprint any information you leave about yourself online, from comments, pictures, and posts on social media to app use, emails, and the websites you visit.
10 Clues: Talk in a friendly and informal way. • Theft an act of pretending to be another person for the purpose of entertainment or fraud. • every aspect of protecting an organization and its employees and assets against cyber threats. • part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information . • ...
Cyber Security Challenge: Remote Financial Data Privacy 2023-12-29
Across
- This type of software is specifically developed to identify and eliminate computer viruses.
- This term describes an event that compromises the security, confidentiality, or integrity of personal data, often involving a breach of privacy.
- This term refers to unwanted emails, often sent for advertising purposes and distributed widely to numerous recipients.
- This security approach involves confirming a user's identity by requiring multiple forms of evidence before granting system access.
- This technology is a secure network that allows data transmission over public networks as if the devices were directly connected to a private network.
- This principle involves restricting the availability of information solely to individuals who are authorized to access it.
Down
- This term described a harmful action that intentionally disrupts or damages computer networks or systems.
- This type of malware is designed to restrict access to a computer system and demands a ransom to be paid for its removal.
- These plans and procedures help an organization bounce back after unexpected events like flood or cyber attacks.
- Ensuring the essential operations continue uninterrupted, even during crises, is the essence of this practice.
- This process involves transforming data or information into a secret code to prevent unauthorized access.
- This cybersecurity measure involves backup systems and resources, offering added security and reliability, especially with remote financial data.
- This advanced security technology facilitates password-free authentication, enhancing user verification in online transactions.
- This system acts as a protective barrier to prevent unauthorized access to or from a private network.
- This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle.
- This term describes an incident where there is unauthorized access or disclosure of personal information, compromising your privacy.
- This technique is a deceptive method used to obtain sensitive information by posing as a legitimate entity in digital communications.
17 Clues: This type of software is specifically developed to identify and eliminate computer viruses. • This system acts as a protective barrier to prevent unauthorized access to or from a private network. • This practice involves maintaining the accuracy and consistency of data throughout its entire lifecycle. • ...
Dasabase security 2024-10-15
Across
- What are the 3 Principles of Information Security? (second one)
- This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- What are the 3 Principles of Information Security? (third one)
- An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
Down
- A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- Software used to protect against malicious software
- Malicious software designed to harm or exploit any programmable device
- A type of cyberattack where malicious code is inserted into SQL queries to access data.
- Malicious software that can corrupt or steal data stored in a database.
- Divides left hand operand by right hand operand and returns remainder
- The process of controlling who has access to specific data in a database.
- The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- The primary language used to create web pages
- Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
17 Clues: The primary language used to create web pages • Software used to protect against malicious software • What are the 3 Principles of Information Security? (third one) • What are the 3 Principles of Information Security? (second one) • Divides left hand operand by right hand operand and returns remainder • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
